Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 2016-07-10 09:17:48,015 [root] INFO: Date set to: 07-10-16, time set to: 16:17:48
- 2016-07-10 09:17:50,905 [root] DEBUG: Starting analyzer from: C:\couuigxxgx
- 2016-07-10 09:17:50,905 [root] DEBUG: Storing results at: C:\zJApDghWI
- 2016-07-10 09:17:50,921 [root] DEBUG: Pipe server name: \\.\PIPE\UvAsGtkIf
- 2016-07-10 09:17:50,921 [root] DEBUG: No analysis package specified, trying to detect it automagically.
- 2016-07-10 09:17:50,937 [root] INFO: Automatically selected analysis package "exe"
- 2016-07-10 09:18:41,717 [root] DEBUG: Started auxiliary module Browser
- 2016-07-10 09:18:41,733 [modules.auxiliary.digisig] INFO: Skipping authenticode validation, signtool.exe was not found in bin/
- 2016-07-10 09:18:41,733 [root] DEBUG: Started auxiliary module DigiSig
- 2016-07-10 09:18:41,796 [root] DEBUG: Started auxiliary module Disguise
- 2016-07-10 09:18:41,812 [root] DEBUG: Started auxiliary module Human
- 2016-07-10 09:18:41,875 [root] DEBUG: Started auxiliary module Screenshots
- 2016-07-10 09:18:41,921 [root] DEBUG: Started auxiliary module Usage
- 2016-07-10 09:18:43,390 [lib.api.process] INFO: Successfully executed process from path "C:\Users\RICH\AppData\Local\Temp\671d98a17e304354221c93fda743e8e91cf3f3abeafdc6cbec71c2b7df2127a0.bin" with arguments "" with pid 2580
- 2016-07-10 09:18:47,500 [lib.api.process] DEBUG: Using QueueUserAPC injection.
- 2016-07-10 09:18:48,640 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2580
- 2016-07-10 09:18:50,655 [lib.api.process] INFO: Successfully resumed process with pid 2580
- 2016-07-10 09:18:50,655 [root] INFO: Added new process to list with pid: 2580
- 2016-07-10 09:18:56,171 [root] INFO: Cuckoomon successfully loaded in process with pid 2580.
- 2016-07-10 09:18:57,078 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:20:13,203 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Temp\tmp9978.tmp
- 2016-07-10 09:20:14,765 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Temp\tmp9F07.tmp
- 2016-07-10 09:20:17,671 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Roaming\Okuxeceri\revyuvogyb.exe
- 2016-07-10 09:20:18,092 [root] INFO: Announced 32-bit process name: revyuvogyb.exe pid: 2708
- 2016-07-10 09:20:18,108 [lib.api.process] DEBUG: Using QueueUserAPC injection.
- 2016-07-10 09:20:18,717 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2708
- 2016-07-10 09:20:18,842 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:20:18,905 [root] INFO: Added new process to list with pid: 2708
- 2016-07-10 09:20:18,905 [root] INFO: Cuckoomon successfully loaded in process with pid 2708.
- 2016-07-10 09:21:23,328 [root] INFO: Announced 64-bit process name: taskhost.exe pid: 1136
- 2016-07-10 09:21:23,328 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:21:23,483 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:21:23,530 [root] INFO: Announced 64-bit process name: dwm.exe pid: 1188
- 2016-07-10 09:21:23,546 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:21:23,625 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:21:23,717 [root] INFO: Added new process to list with pid: 1136
- 2016-07-10 09:21:23,733 [root] INFO: Cuckoomon successfully loaded in process with pid 1136.
- 2016-07-10 09:21:23,765 [root] INFO: Announced 64-bit process name: explorer.exe pid: 1232
- 2016-07-10 09:21:23,765 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:21:23,858 [root] INFO: Added new process to list with pid: 1188
- 2016-07-10 09:21:23,890 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:21:23,890 [root] INFO: Cuckoomon successfully loaded in process with pid 1188.
- 2016-07-10 09:21:24,000 [root] INFO: Announced 64-bit process name: taskeng.exe pid: 1796
- 2016-07-10 09:21:24,000 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:21:24,171 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:21:24,342 [root] INFO: Added new process to list with pid: 1796
- 2016-07-10 09:21:24,342 [root] INFO: Cuckoomon successfully loaded in process with pid 1796.
- 2016-07-10 09:21:24,796 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Roaming\Ulyvaxop\buygnydeud.acl
- 2016-07-10 09:21:25,000 [root] INFO: Added new process to list with pid: 1232
- 2016-07-10 09:21:25,000 [root] INFO: Cuckoomon successfully loaded in process with pid 1232.
- 2016-07-10 09:21:26,453 [root] INFO: Stopping WMI Service
- 2016-07-10 09:21:34,405 [root] INFO: Announced 32-bit process name: net.exe pid: 2532
- 2016-07-10 09:21:34,421 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:21:34,578 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:21:34,640 [root] INFO: Added new process to list with pid: 2532
- 2016-07-10 09:21:34,655 [root] INFO: Cuckoomon successfully loaded in process with pid 2532.
- 2016-07-10 09:21:37,967 [root] INFO: Notified of termination of process with pid 2532.
- 2016-07-10 09:21:37,983 [root] INFO: Announced 64-bit process name: conhost.exe pid: 1812
- 2016-07-10 09:21:38,000 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:21:38,030 [root] INFO: Stopped WMI Service
- 2016-07-10 09:21:38,515 [lib.api.process] ERROR: Unable to inject into 64-bit process with pid 1812, error: -1
- 2016-07-10 09:21:38,828 [root] INFO: Announced 32-bit process name: sc.exe pid: 2464
- 2016-07-10 09:21:38,842 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:21:39,750 [root] INFO: Announced 32-bit process name: sc.exe pid: 2464
- 2016-07-10 09:21:39,750 [lib.api.process] DEBUG: Using QueueUserAPC injection.
- 2016-07-10 09:21:40,780 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:21:41,015 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2464
- 2016-07-10 09:21:41,030 [root] INFO: Added new process to list with pid: 2464
- 2016-07-10 09:21:41,030 [root] INFO: Cuckoomon successfully loaded in process with pid 2464.
- 2016-07-10 09:21:41,937 [root] INFO: Process with pid 2532 has terminated
- 2016-07-10 09:21:48,578 [root] INFO: Notified of termination of process with pid 2464.
- 2016-07-10 09:21:48,640 [root] INFO: Announced 64-bit process name: conhost.exe pid: 1400
- 2016-07-10 09:21:48,687 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:21:48,687 [lib.api.process] WARNING: The process with pid 1400 is not alive, injection aborted
- 2016-07-10 09:21:48,796 [root] INFO: Announced 64-bit process name: WinMail.exe pid: 2044
- 2016-07-10 09:21:48,812 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:21:48,921 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:21:49,140 [root] INFO: Added new process to list with pid: 612
- 2016-07-10 09:21:49,155 [root] INFO: Cuckoomon successfully loaded in process with pid 612.
- 2016-07-10 09:21:49,312 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Temp\tmp0716edc8.bat
- 2016-07-10 09:21:50,046 [root] INFO: Process with pid 2464 has terminated
- 2016-07-10 09:21:51,125 [root] INFO: Starting WMI Service
- 2016-07-10 09:21:54,562 [root] INFO: Announced 32-bit process name: net.exe pid: 2680
- 2016-07-10 09:21:54,578 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:21:59,328 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:21:59,421 [root] INFO: Added new process to list with pid: 2680
- 2016-07-10 09:21:59,453 [root] INFO: Cuckoomon successfully loaded in process with pid 2680.
- 2016-07-10 09:21:59,921 [root] INFO: Announced 32-bit process name: cmd.exe pid: 1792
- 2016-07-10 09:21:59,953 [lib.api.process] DEBUG: Using QueueUserAPC injection.
- 2016-07-10 09:22:00,187 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 1792
- 2016-07-10 09:22:00,405 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Roaming\Ulyvaxop\buygnydeud.acl
- 2016-07-10 09:22:02,983 [root] INFO: Notified of termination of process with pid 2580.
- 2016-07-10 09:22:03,125 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:22:03,233 [root] INFO: Added new process to list with pid: 2044
- 2016-07-10 09:22:03,250 [root] INFO: Cuckoomon successfully loaded in process with pid 2044.
- 2016-07-10 09:22:03,717 [root] INFO: Process with pid 2580 has terminated
- 2016-07-10 09:22:03,780 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:22:03,890 [root] INFO: Added new process to list with pid: 1792
- 2016-07-10 09:22:03,921 [root] INFO: Cuckoomon successfully loaded in process with pid 1792.
- 2016-07-10 09:22:05,875 [root] INFO: Announced starting service "Winmgmt"
- 2016-07-10 09:22:06,140 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:22:06,140 [root] INFO: Announced 64-bit process name: conhost.exe pid: 2064
- 2016-07-10 09:22:06,187 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:22:06,453 [root] INFO: Notified of termination of process with pid 2680.
- 2016-07-10 09:22:06,515 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:22:06,687 [root] INFO: Started WMI Service
- 2016-07-10 09:22:06,717 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:22:06,828 [root] INFO: Announced 64-bit process name: conhost.exe pid: 2768
- 2016-07-10 09:22:06,858 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:22:06,890 [lib.api.process] DEBUG: Using CreateRemoteThread injection.
- 2016-07-10 09:22:08,921 [root] INFO: Added new process to list with pid: 448
- 2016-07-10 09:22:08,967 [root] INFO: Cuckoomon successfully loaded in process with pid 448.
- 2016-07-10 09:22:09,265 [root] INFO: Process with pid 2680 has terminated
- 2016-07-10 09:22:09,437 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:22:09,437 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:22:09,655 [root] INFO: Added new process to list with pid: 1504
- 2016-07-10 09:22:09,687 [root] INFO: Cuckoomon successfully loaded in process with pid 1504.
- 2016-07-10 09:22:09,687 [root] INFO: Added new process to list with pid: 2768
- 2016-07-10 09:22:09,765 [root] INFO: Cuckoomon successfully loaded in process with pid 2768.
- 2016-07-10 09:22:10,671 [root] INFO: Notified of termination of process with pid 1796.
- 2016-07-10 09:22:11,625 [root] INFO: Process with pid 1796 has terminated
- 2016-07-10 09:22:19,515 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\edb.log
- 2016-07-10 09:22:24,358 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\tmp.edb
- 2016-07-10 09:22:26,233 [root] INFO: Announced 64-bit process name: WmiPrvSE.exe pid: 672
- 2016-07-10 09:22:26,328 [lib.api.process] DEBUG: Using QueueUserAPC injection.
- 2016-07-10 09:22:26,875 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 672
- 2016-07-10 09:22:27,405 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:22:27,671 [root] INFO: Added new process to list with pid: 672
- 2016-07-10 09:22:27,765 [root] INFO: Cuckoomon successfully loaded in process with pid 672.
- 2016-07-10 09:22:30,078 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStore
- 2016-07-10 09:22:55,375 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.MSMessageStore
- 2016-07-10 09:22:56,530 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\winmail.fol
- 2016-07-10 09:22:56,983 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Local Folders\Outbox\winmail.fol
- 2016-07-10 09:22:59,453 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Local Folders\Sent Items\winmail.fol
- 2016-07-10 09:23:02,030 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Local Folders\Deleted Items\winmail.fol
- 2016-07-10 09:23:03,187 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Local Folders\Drafts\winmail.fol
- 2016-07-10 09:23:03,765 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Local Folders\Junk E-mail\winmail.fol
- 2016-07-10 09:23:07,312 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\edbtmp.log
- 2016-07-10 09:23:28,092 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\WindowsMail.pat
- 2016-07-10 09:23:30,515 [modules.auxiliary.human] INFO: Found button "OK", clicking it
- 2016-07-10 09:23:43,640 [root] INFO: Process with pid 2044 has terminated
- 2016-07-10 09:23:43,750 [root] INFO: Announced 64-bit process name: WinMail.exe pid: 2056
- 2016-07-10 09:23:43,858 [lib.api.process] DEBUG: Using QueueUserAPC injection.
- 2016-07-10 09:23:44,562 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 2056
- 2016-07-10 09:23:45,203 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:23:45,483 [root] INFO: Added new process to list with pid: 2056
- 2016-07-10 09:23:45,562 [root] INFO: Cuckoomon successfully loaded in process with pid 2056.
- 2016-07-10 09:23:56,750 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\edb.chk
- 2016-07-10 09:24:11,375 [root] WARNING: File at path "C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\tmp.edb" does not exist, skip.
- 2016-07-10 09:24:11,905 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\tmp.edb
- 2016-07-10 09:24:35,092 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.MSMessageStore
- 2016-07-10 09:24:43,750 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\edbtmp.log
- 2016-07-10 09:24:50,530 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7C0272B0-00000001.eml
- 2016-07-10 09:24:53,390 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Local Folders\Inbox\7C0272B0-00000001.eml:OECustomProperty
- 2016-07-10 09:25:22,155 [root] INFO: Notified of termination of process with pid 1792.
- 2016-07-10 09:25:23,328 [root] INFO: Process with pid 1792 has terminated
- 2016-07-10 09:25:23,421 [root] INFO: Process with pid 2768 has terminated
- 2016-07-10 09:25:35,233 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Backup\temp\edb00003.log
- 2016-07-10 09:25:35,875 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Backup\temp\WindowsMail.pat
- 2016-07-10 09:25:41,703 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Temp\Cab9CBC.tmp
- 2016-07-10 09:25:49,515 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Temp\Tar9CCD.tmp
- 2016-07-10 09:26:03,717 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E6024EAC88E6B6165D49FE3C95ADD735
- 2016-07-10 09:26:03,858 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E6024EAC88E6B6165D49FE3C95ADD735
- 2016-07-10 09:26:04,405 [root] INFO: Added new file to list with path: C:\Users\RICH\AppData\Local\Temp\ppcrlui_2056_2
- 2016-07-10 09:26:12,655 [root] INFO: Announced 64-bit process name: WMIADAP.exe pid: 2772
- 2016-07-10 09:26:12,703 [lib.api.process] DEBUG: Using QueueUserAPC injection.
- 2016-07-10 09:26:14,421 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 2772
- 2016-07-10 09:26:14,625 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:26:14,842 [root] INFO: Added new process to list with pid: 2772
- 2016-07-10 09:26:14,875 [root] INFO: Cuckoomon successfully loaded in process with pid 2772.
- 2016-07-10 09:26:19,780 [root] INFO: Announced 64-bit process name: WmiPrvSE.exe pid: 1964
- 2016-07-10 09:26:19,842 [lib.api.process] DEBUG: Using QueueUserAPC injection.
- 2016-07-10 09:26:20,437 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 1964
- 2016-07-10 09:26:20,687 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:26:20,875 [root] INFO: Added new process to list with pid: 1964
- 2016-07-10 09:26:21,015 [root] INFO: Cuckoomon successfully loaded in process with pid 1964.
- 2016-07-10 09:26:39,858 [root] INFO: Added new file to list with path: C:\Windows\sysnative\wbem\Performance\WmiApRpl_new.h
- 2016-07-10 09:27:23,812 [root] INFO: Added new file to list with path: C:\Windows\sysnative\wbem\Performance\WmiApRpl_new.ini
- 2016-07-10 09:27:28,187 [root] INFO: Added new file to list with path: C:\Windows\sysnative\wbem\repository\OBJECTS.DATA
- 2016-07-10 09:27:29,030 [root] INFO: Added new file to list with path: C:\Windows\sysnative\wbem\repository\INDEX.BTR
- 2016-07-10 09:27:30,578 [root] INFO: Added new file to list with path: C:\Windows\sysnative\wbem\repository\MAPPING2.MAP
- 2016-07-10 09:28:21,562 [root] INFO: Announced starting service "gupdate"
- 2016-07-10 09:28:21,858 [root] INFO: Announced 32-bit process name: GoogleUpdate.exe pid: 2184
- 2016-07-10 09:28:22,015 [lib.api.process] DEBUG: Using QueueUserAPC injection.
- 2016-07-10 09:28:22,608 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2184
- 2016-07-10 09:28:22,905 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:28:23,046 [root] INFO: Added new process to list with pid: 2184
- 2016-07-10 09:28:23,108 [root] INFO: Cuckoomon successfully loaded in process with pid 2184.
- 2016-07-10 09:29:13,733 [root] INFO: Notified of termination of process with pid 2184.
- 2016-07-10 09:29:13,890 [root] INFO: Process with pid 2184 has terminated
- 2016-07-10 09:29:28,046 [root] INFO: Announced 64-bit process name: taskhost.exe pid: 1788
- 2016-07-10 09:29:28,358 [lib.api.process] DEBUG: Using QueueUserAPC injection.
- 2016-07-10 09:29:29,515 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 1788
- 2016-07-10 09:29:30,530 [root] INFO: Announced 64-bit process name: taskhost.exe pid: 1788
- 2016-07-10 09:29:30,703 [root] INFO: Disabling sleep skipping.
- 2016-07-10 09:29:30,717 [lib.api.process] DEBUG: Using QueueUserAPC injection.
- 2016-07-10 09:29:32,233 [root] INFO: Added new process to list with pid: 1788
- 2016-07-10 09:29:32,375 [root] INFO: Cuckoomon successfully loaded in process with pid 1788.
- 2016-07-10 09:29:33,453 [root] INFO: Added new file to list with path: C:\Windows\sysnative\LogFiles\Scm\9435f817-fed2-454e-88cd-7f78fda62c48
- 2016-07-10 09:30:32,217 [root] INFO: Notified of termination of process with pid 2056.
- 2016-07-10 09:30:32,983 [root] INFO: Process with pid 2056 has terminated
- 2016-07-10 09:31:15,921 [root] INFO: Notified of termination of process with pid 1964.
- 2016-07-10 09:31:17,171 [root] INFO: Process with pid 1964 has terminated
- 2016-07-10 09:31:24,015 [root] INFO: Added new file to list with path: C:\Windows\inf\WmiApRpl\WmiApRpl.h
- 2016-07-10 09:31:24,140 [root] INFO: Added new file to list with path: C:\Windows\inf\WmiApRpl\0009\WmiApRpl.ini
- 2016-07-10 09:31:28,296 [root] INFO: Added new file to list with path: C:\Windows\sysnative\PerfStringBackup.TMP
- 2016-07-10 09:31:33,342 [root] INFO: Added new file to list with path: C:\Windows\sysnative\PerfStringBackup.INI
- 2016-07-10 09:32:55,921 [root] INFO: Notified of termination of process with pid 2772.
- 2016-07-10 09:32:56,546 [root] INFO: Process with pid 2772 has terminated
- 2016-07-10 09:37:46,875 [root] INFO: Analysis timeout hit, terminating analysis.
- 2016-07-10 09:37:47,078 [root] INFO: Created shutdown mutex.
- 2016-07-10 09:37:48,296 [root] INFO: Shutting down package.
- 2016-07-10 09:37:48,390 [root] INFO: Stopping auxiliary modules.
- 2016-07-10 09:37:53,280 [root] INFO: Terminating remaining processes before shutdown.
- 2016-07-10 09:37:53,515 [lib.api.process] INFO: Successfully terminated process with pid 2708.
- 2016-07-10 09:37:53,765 [lib.api.process] INFO: Successfully terminated process with pid 1136.
- 2016-07-10 09:37:54,015 [lib.api.process] INFO: Successfully terminated process with pid 1188.
- 2016-07-10 09:37:54,342 [lib.api.process] INFO: Successfully terminated process with pid 1232.
- 2016-07-10 09:37:54,780 [lib.api.process] INFO: Successfully terminated process with pid 612.
- 2016-07-10 09:37:55,078 [lib.api.process] INFO: Successfully terminated process with pid 448.
- 2016-07-10 09:37:55,140 [root] INFO: Received shutdown request
- 2016-07-10 09:37:55,140 [root] INFO: Received shutdown request
- 2016-07-10 09:37:55,171 [root] INFO: Received shutdown request
- 2016-07-10 09:37:55,250 [lib.api.process] INFO: Successfully terminated process with pid 1504.
- 2016-07-10 09:37:55,858 [lib.api.process] INFO: Successfully terminated process with pid 672.
- 2016-07-10 09:37:55,983 [lib.api.process] INFO: Successfully terminated process with pid 1788.
- 2016-07-10 09:37:56,092 [root] INFO: Finishing auxiliary modules.
- 2016-07-10 09:37:56,233 [root] INFO: Shutting down pipe server and dumping dropped files.
- 2016-07-10 09:37:58,796 [lib.common.results] ERROR: Exception uploading file C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\WindowsMail.MSMessageStore to host: [Errno 10054] An existing connection was forcibly closed by the remote host
- 2016-07-10 09:38:03,796 [root] WARNING: File at path "C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\tmp.edb" does not exist, skip.
- 2016-07-10 09:38:04,453 [root] WARNING: File at path "C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\tmp.edb" does not exist, skip.
- 2016-07-10 09:38:06,312 [lib.common.results] ERROR: Exception uploading file C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\Backup\new\windowsmail.msmessagestore to host: [Errno 10054] An existing connection was forcibly closed by the remote host
- 2016-07-10 09:38:07,453 [lib.common.results] ERROR: Exception uploading file C:\Users\RICH\AppData\Local\Microsoft\Windows Mail\edb.log to host: [Errno 10054] An existing connection was forcibly closed by the remote host
- 2016-07-10 09:38:16,530 [lib.common.results] ERROR: Exception uploading file C:\Windows\sysnative\wbem\repository\OBJECTS.DATA to host: [Errno 10054] An existing connection was forcibly closed by the remote host
- 2016-07-10 09:38:22,983 [root] INFO: Analysis completed.
- https://sandbox.anlyz.io/
- https://sandbox.anlyz.io/analysis/
- https://sandbox.anlyz.io/analysis/pending/
- https://sandbox.anlyz.io/submit/
- https://sandbox.anlyz.io/analysis/1049/
- https://sandbox.anlyz.io/compare/1049/
- http://fartertourhost.net:9040/data/travel/tourguide/hydroformTyrtAs.php
- http://crl.microsoft.com:9040/pki/crl/products/CodeSignPCA.crl
- http://tools.google.com:9040/service/update2?cup2key=6:841403583&cup2hreq=206c0cee54153255155ae1aef13951891af050d04a97b25d1d2c690eaaf8757b
- https://sandbox.anlyz.io/file/screenshot/1049/0001/
- https://sandbox.anlyz.io/file/screenshot/1049/0002/
- https://sandbox.anlyz.io/file/screenshot/1049/0003/
- https://sandbox.anlyz.io/file/screenshot/1049/0004/
- https://sandbox.anlyz.io/file/screenshot/1049/0005/
- https://sandbox.anlyz.io/file/screenshot/1049/0006/
- https://sandbox.anlyz.io/file/screenshot/1049/0007/
- https://sandbox.anlyz.io/file/screenshot/1049/0008/
- https://sandbox.anlyz.io/file/screenshot/1049/0009/
- https://sandbox.anlyz.io/file/screenshot/1049/0010/
- https://sandbox.anlyz.io/file/screenshot/1049/0011/
- https://sandbox.anlyz.io/file/screenshot/1049/0012/
- https://sandbox.anlyz.io/file/screenshot/1049/0013/
- https://sandbox.anlyz.io/file/screenshot/1049/0014/
- https://sandbox.anlyz.io/file/screenshot/1049/0015/
- https://sandbox.anlyz.io/file/screenshot/1049/0016/
- https://sandbox.anlyz.io/file/screenshot/1049/0017/
- https://sandbox.anlyz.io/file/screenshot/1049/0018/
- https://sandbox.anlyz.io/file/screenshot/1049/0019/
- https://sandbox.anlyz.io/file/screenshot/1049/0020/
- https://sandbox.anlyz.io/file/screenshot/1049/0021/
- https://sandbox.anlyz.io/file/screenshot/1049/0022/
- https://sandbox.anlyz.io/file/screenshot/1049/0023/
- https://sandbox.anlyz.io/file/screenshot/1049/0024/
- https://sandbox.anlyz.io/file/screenshot/1049/0025/
- https://sandbox.anlyz.io/file/screenshot/1049/0026/
- https://sandbox.anlyz.io/file/screenshot/1049/0027/
- https://sandbox.anlyz.io/file/screenshot/1049/0028/
- https://sandbox.anlyz.io/file/screenshot/1049/0029/
- https://www.virustotal.com/en/domain/clients2.google.com/information/
- https://threatintel.proofpoint.com/search?q=clients2.google.com
- https://www.passivetotal.org/passive/clients2.google.com
- https://www.virustotal.com/en/ip-address/172.217.22.174/information/
- https://threatintel.proofpoint.com/search?q=172.217.22.174
- https://www.passivetotal.org/passive/172.217.22.174
- https://www.virustotal.com/en/domain/dns.msftncsi.com/information/
- https://threatintel.proofpoint.com/search?q=dns.msftncsi.com
- https://www.passivetotal.org/passive/dns.msftncsi.com
- https://www.virustotal.com/en/ip-address/131.107.255.255/information/
- https://threatintel.proofpoint.com/search?q=131.107.255.255
- https://www.passivetotal.org/passive/131.107.255.255
- https://www.virustotal.com/en/domain/tools.google.com/information/
- https://threatintel.proofpoint.com/search?q=tools.google.com
- https://www.passivetotal.org/passive/tools.google.com
- https://www.virustotal.com/en/domain/fartertourhost.net/information/
- https://threatintel.proofpoint.com/search?q=fartertourhost.net
- https://www.passivetotal.org/passive/fartertourhost.net
- https://www.virustotal.com/en/ip-address/172.245.9.50/information/
- https://threatintel.proofpoint.com/search?q=172.245.9.50
- https://www.passivetotal.org/passive/172.245.9.50
- https://www.virustotal.com/en/domain/farterhotelshost.net/information/
- https://threatintel.proofpoint.com/search?q=farterhotelshost.net
- https://www.passivetotal.org/passive/farterhotelshost.net
- https://www.virustotal.com/en/ip-address//information/
- https://threatintel.proofpoint.com/search?q=
- https://www.passivetotal.org/passive/
- https://www.virustotal.com/en/domain/crl.microsoft.com/information/
- https://threatintel.proofpoint.com/search?q=crl.microsoft.com
- https://www.passivetotal.org/passive/crl.microsoft.com
- https://www.virustotal.com/en/ip-address/212.247.20.9/information/
- https://threatintel.proofpoint.com/search?q=212.247.20.9
- https://www.passivetotal.org/passive/212.247.20.9
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetConsoleMode
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetConsoleCP
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ReadFile
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetCurrentThreadId
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetLastError
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=TlsFree
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=TlsSetValue
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=TlsAlloc
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=TlsGetValue
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=IsValidCodePage
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetOEMCP
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetACP
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetModuleFileNameA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=WriteFile
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ExitProcess
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetModuleHandleW
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=HeapReAlloc
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=VirtualAlloc
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=VirtualFree
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetFileType
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=FlushFileBuffers
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetHandleCount
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetCPInfo
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=LCMapStringW
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=MultiByteToWideChar
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=WideCharToMultiByte
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=LCMapStringA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=RaiseException
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=RtlUnwind
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetStartupInfoA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetCommandLineA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=IsDebuggerPresent
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetUnhandledExceptionFilter
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=UnhandledExceptionFilter
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetCurrentProcess
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=TerminateProcess
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=HeapFree
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=LeaveCriticalSection
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=EnterCriticalSection
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DeleteCriticalSection
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=InitializeCriticalSection
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=InterlockedDecrement
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=InterlockedIncrement
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetFilePointer
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=FreeEnvironmentStringsA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetCurrentProcessId
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetEnvironmentStrings
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=FreeEnvironmentStringsW
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetEnvironmentStringsW
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=QueryPerformanceCounter
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetSystemTimeAsFileTime
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=HeapSize
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetUserDefaultLCID
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=EnumSystemLocalesA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=IsValidLocale
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetStringTypeA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetStringTypeW
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=InitializeCriticalSectionAndSpinCount
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=WriteConsoleA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetConsoleOutputCP
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=WriteConsoleW
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetStdHandle
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CreateFileA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetLocaleInfoW
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetEndOfFile
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetProcessHeap
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=lstrcpyA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CreateThread
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DeleteFileW
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CloseHandle
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=WinExec
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetModuleHandleA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GlobalDeleteAtom
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=LoadLibraryA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GlobalFree
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GlobalGetAtomNameA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetProcAddress
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetLastError
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GlobalUnlock
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetFileAttributesW
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=HeapCreate
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CreateEventA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=Sleep
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=LoadLibraryW
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GlobalAlloc
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetTickCount
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetEvent
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=WaitForSingleObject
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GlobalLock
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GlobalAddAtomA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=HeapAlloc
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=FreeLibrary
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetLocaleInfoA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=lstrlenA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetStdHandle
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=RegisterClassA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetDlgItemTextA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DestroyIcon
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=UnpackDDElParam
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DialogBoxParamA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetDlgItemTextA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetDlgCtrlID
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=LoadCursorA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetClipboardData
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=UpdateWindow
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=EndPaint
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DestroyWindow
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetCursor
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetMessageA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CloseClipboard
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetDlgItemInt
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetTimer
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetWindowRect
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=PackDDElParam
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=InsertMenuItemA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=RegisterClassExA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=PostQuitMessage
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SendDlgItemMessageA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetTopWindow
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=KillTimer
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DrawTextA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetSubMenu
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=LoadStringA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DeleteMenu
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetFocus
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=LoadBitmapA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=IsClipboardFormatAvailable
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=LoadIconA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=wsprintfA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetClientRect
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SendMessageA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=LoadImageA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetDC
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=TranslateMessage
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ShowCursor
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetForegroundWindow
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetDlgItemInt
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetMenu
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=OffsetRect
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetKeyboardLayout
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=TrackPopupMenuEx
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=RegisterClipboardFormatA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetRect
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetScrollInfo
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=MessageBoxA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=InvalidateRect
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetCursorPos
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CreateAcceleratorTableA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=EnumPropsA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetWindowLongA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetClipboardData
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CreateWindowExA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetScrollPos
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=PeekMessageA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ReleaseDC
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=EnableMenuItem
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=EmptyClipboard
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=TranslateAcceleratorA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetDlgItem
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=EndDialog
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DefWindowProcA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetSysColor
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetWindowPos
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetCursorPos
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CheckDlgButton
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=LoadAcceleratorsA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ShowWindow
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetSysColorBrush
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=IsDlgButtonChecked
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=FreeDDElParam
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=PostMessageA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DispatchMessageA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CheckRadioButton
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=OpenClipboard
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DefMDIChildProcA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ReleaseCapture
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetSystemMetrics
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetWindowTextA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=BeginPaint
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CreatePolygonRgn
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=MoveToEx
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=EndPage
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=BitBlt
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DeleteEnhMetaFile
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetEnhMetaFileA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=StartPage
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetTextColor
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CreateDIBSection
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CreateFontA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetDeviceCaps
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=LineTo
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetDCBrushColor
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetBkColor
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CopyEnhMetaFileA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetBkMode
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DeleteObject
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SelectObject
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetEnhMetaFileDescriptionA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CreateCompatibleDC
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetKerningPairsA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=PlayEnhMetaFile
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CreateCompatibleBitmap
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=StartDocA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=RealizePalette
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SelectPalette
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetTextExtentPointA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CreatePen
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetTextMetricsA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SetTextAlign
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=EndDoc
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetStockObject
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ExtTextOutA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=UpdateColors
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=TextOutA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CreateFontIndirectA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=DeleteDC
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetOpenFileNameA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GetSaveFileNameA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=PrintDlgA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=RegOpenKeyExA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=RegQueryValueExA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SHGetPathFromIDListA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SHGetMalloc
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SHGetDesktopFolder
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SHAppBarMessage
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SHGetSpecialFolderLocation
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SHGetFileInfoA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SHBrowseForFolderA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CoWaitForMultipleHandles
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=CoInitialize
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=None
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GopherGetLocatorTypeW
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=SHCreateStreamOnFileEx
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ImageList_Create
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ImageList_ReplaceIcon
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ImageList_Add
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=RpcServerUseProtseqEpA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GdipCreateBitmapFromScan0
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GdipFree
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GdipCloneImage
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GdipDisposeImage
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GdipAlloc
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=GdipGetImageGraphicsContext
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=glBegin
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=glClear
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=glNormal3f
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ImmGetConversionStatus
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ImmIsIME
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ImmReleaseContext
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ImmGetDescriptionA
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ImmSetOpenStatus
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ImmGetOpenStatus
- http://social.msdn.microsoft.com/Search/en-US/windows/desktop?query=ImmGetContext
- https://www.virustotal.com/en/file/671d98a17e304354221c93fda743e8e91cf3f3abeafdc6cbec71c2b7df2127a0/analysis/
- https://www.virustotal.com/en/file/b3427f8b86b69f13ab3212a732ae23e8b881abcc2251cb17c29c6eb576e37df1/analysis/
- https://www.virustotal.com/en/file/8fe47d70f14042df202d35186c01b55f5ccb64f63ab23f8184b63b67d3ef1462/analysis/
- https://www.virustotal.com/en/file/b09292ccbda9700bfabfeedf67d3f7b0a92edf7645f237239b86188ddb9db708/analysis/
- https://www.virustotal.com/en/file/7fa41bc535d6e4eb78ba9fb1d448021614b67da05e1931aa690212fdf2861283/analysis/
- https://www.virustotal.com/en/file/057db5fcb2f897feabdd8ac80f922c16d13e68a2f481d095e29b1d5414bdf5a9/analysis/
- https://www.virustotal.com/en/file/5a147e289db68bb4689a7d8683845531b09dae7069bc7e47d24c46c45c47b578/analysis/
- https://www.virustotal.com/en/file/7242a55abc0ea5c823cb5e755958781c5a3f362df1529e1c80dddc5739475e66/analysis/
- https://www.virustotal.com/en/file/68127084029e2acc33773446091acbdf274a1fc1428809728da7957ce93de128/analysis/
- https://www.virustotal.com/en/file/571a278882621b5d3dc2f3d213f0c464e6d6a4564413670394e050fc2d8d0f05/analysis/
- https://www.virustotal.com/en/file/c1f80d9e281441239c5f40d8ae18a867b2d517385d16fd05c122a0b2716cba56/analysis/
- https://www.virustotal.com/en/file/9d400c8c43a973087ab2e25624b894120d9789316a50cd1ae4d1c33e1f054f81/analysis/
- https://www.virustotal.com/en/file/aecc19ae0fe8a8abf97787fc85721255a482d988df3e2c4c39ea6f134a35ae3a/analysis/
- https://www.virustotal.com/en/file/2654c273c211ae1afc60a7736153a853142e3db028417206948576d1d57bf5d5/analysis/
- https://www.virustotal.com/en/file/ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef/analysis/
- https://www.virustotal.com/en/file/ab0bf207d577efd6e84fb4afda7ab3ea75b4fbcd4b54cae21c10506d9f3bbbfa/analysis/
- https://www.virustotal.com/en/file/7f5c7e162650a63836bbb727e04549195abea05407d7686b5700309554f92c2e/analysis/
- https://www.virustotal.com/en/file/3f94f8630c7603f9da79bf021cb56ac5357502badf6cb12f6ce11e5b2b244153/analysis/
- https://www.virustotal.com/en/file/7f60e0a695a98abc30f136fcad8d057619b994b7e14fdbb040a61e185d7f151c/analysis/
- https://www.virustotal.com/en/file/2080f6e16e43bbb87eb70aec708b7ffcbb9957a4f190e97eb286f0be8742ac42/analysis/
- https://www.virustotal.com/en/file/d23aef9ddc2056007405dd640ad431bff44c772702ef00fcbc8debc2f47d8e73/analysis/
- https://www.virustotal.com/en/file/ae2b6236d3eeb4822835714ae9444e5dcd21bc60f7a909f2962c43bc743c7b15/analysis/
- https://www.virustotal.com/en/file/a8bcce491a808d946d4eb7bf3e1a0e65ff0128a8076dc261372c75d4d77c4e61/analysis/
- https://www.virustotal.com/en/file/cc25aca0012374ee6ea7a6a26a0f9db8961c43f2198ad3954f25fc22a48a5543/analysis/
- https://www.virustotal.com/en/file/56dff4aa6b734e11de8c3b32eb4830c409f476889ca5bd7532500b0f2c1e25d8/analysis/
- https://www.virustotal.com/en/file/82dfefafabcf69320cf635a6997358b5dc955bb99e4fe6d4b0682b18ef4f7c8b/analysis/
- https://www.virustotal.com/en/file/dcddd71f96edc57c358666de7abe724adc2628a2cd1fd1183e32414a3cae35ed/analysis/
- https://www.virustotal.com/en/file/ee26bdbd4965b9a6459b7bad4e37134ee959cd9d4a639fb378a3382dc41a620c/analysis/
- https://www.virustotal.com/en/file/64ad4ac075bc724585ed2a0ff94659f529fe47c8ce41fd54961609c55349400d/analysis/
- https://www.virustotal.com/en/file/4b32155b384913c95df5a4c3cde6912c8a5b738c36ee3d257de6ef86f8be42f5/analysis/
- https://www.virustotal.com/en/file/d2d215d8a49266feb5f0ee6b3bfcac49db83285b95011fca32759b4bf6caa70d/analysis/
- https://www.virustotal.com/en/file/0b89ef7b431edc8726099d63525758f88c416ace0ce816dbcaaac4ae7050317a/analysis/
- https://www.virustotal.com/en/file/5b15b1fc32713447c3fbc952a0fb02f1fd78c6f9ac69087bdb240625b0282614/analysis/
- https://www.virustotal.com/en/file/21dfcad90667d0611e106ffd8c197d46a3a91fcd493dbd702c1d95ec52b37491/analysis/
- https://www.virustotal.com/en/file/16004a24f65ddfd3b6d9f2936b1df85cc83f121022a8155033bbbfa04f743b2d/analysis/
- https://sandbox.anlyz.io/filereport/1049/json/
- https://sandbox.anlyz.io/filereport/1049/html/
- https://sandbox.anlyz.io/filereport/1049/htmlsummary/
- https://sandbox.anlyz.io/filereport/1049/pdf/
- https://mutexdb.com/
- https://sandbox.anlyz.io/about
- https://sandbox.anlyz.io/terms
- https://github.com/marirs/anlyz/issues
- .text
- `.rdata
- @.data
- .rsrc
- SSPPPPh
- L$8h
- D$ h
- ;=PcF
- ;=LcF
- SSSPSPh
- D$D;5HcF
- VSSSSh
- |$` swj
- Wh0@C
- PhpCC
- YQPVh
- to=POC
- Phx`F
- QW@Ph
- 35pCC
- ;5HKC
- 95\`F
- Fh= GC
- Fh GC
- Y;=(MC
- ;5XOC
- v$;5tOC
- uL9=X`F
- 9=X`F
- SVWUj
- 95|cF
- string too long
- invalid string position
- Unknown exception
- LC_TIME
- LC_NUMERIC
- LC_MONETARY
- LC_CTYPE
- LC_COLLATE
- LC_ALL
- (null)
- `h````
- CorExitProcess
- runtime error
- Microsoft Visual C++ Runtime Library
- <program name unknown>
- Program:
- EncodePointer
- DecodePointer
- FlsFree
- FlsSetValue
- FlsGetValue
- FlsAlloc
- UTF-8
- UTF-16LE
- UNICODE
- bad exception
- HH:mm:ss
- dddd, MMMM dd, yyyy
- MM/dd/yy
- December
- November
- October
- September
- August
- April
- March
- February
- January
- Saturday
- Friday
- Thursday
- Wednesday
- Tuesday
- Monday
- Sunday
- united-states
- united-kingdom
- trinidad & tobago
- south-korea
- south-africa
- south korea
- south africa
- slovak
- puerto-rico
- pr-china
- pr china
- new-zealand
- hong-kong
- holland
- great britain
- england
- czech
- china
- britain
- america
- swiss
- swedish-finland
- spanish-venezuela
- spanish-uruguay
- spanish-puerto rico
- spanish-peru
- spanish-paraguay
- spanish-panama
- spanish-nicaragua
- spanish-modern
- spanish-mexican
- spanish-honduras
- spanish-guatemala
- spanish-el salvador
- spanish-ecuador
- spanish-dominican republic
- spanish-costa rica
- spanish-colombia
- spanish-chile
- spanish-bolivia
- spanish-argentina
- portuguese-brazilian
- norwegian-nynorsk
- norwegian-bokmal
- norwegian
- italian-swiss
- irish-english
- german-swiss
- german-luxembourg
- german-lichtenstein
- german-austrian
- french-swiss
- french-luxembourg
- french-canadian
- french-belgian
- english-usa
- english-us
- english-uk
- english-trinidad y tobago
- english-south africa
- english-nz
- english-jamaica
- english-ire
- english-caribbean
- english-can
- english-belize
- english-aus
- english-american
- dutch-belgian
- chinese-traditional
- chinese-singapore
- chinese-simplified
- chinese-hongkong
- chinese
- canadian
- belgian
- australian
- american-english
- american english
- american
- Norwegian-Nynorsk
- GetProcessWindowStation
- GetUserObjectInformationA
- GetLastActivePopup
- GetActiveWindow
- MessageBoxA
- USER32.DLL
- Complete Object Locator'
- Class Hierarchy Descriptor'
- Base Class Array'
- Base Class Descriptor at (
- Type Descriptor'
- `local static thread guard'
- `managed vector copy constructor iterator'
- `vector vbase copy constructor iterator'
- `vector copy constructor iterator'
- `dynamic atexit destructor for '
- `dynamic initializer for '
- `eh vector vbase copy constructor iterator'
- `eh vector copy constructor iterator'
- `managed vector destructor iterator'
- `managed vector constructor iterator'
- `placement delete[] closure'
- `placement delete closure'
- `omni callsig'
- delete[]
- new[]
- `local vftable constructor closure'
- `local vftable'
- `RTTI
- `udt returning'
- `copy constructor closure'
- `eh vector vbase constructor iterator'
- `eh vector destructor iterator'
- `eh vector constructor iterator'
- `virtual displacement map'
- `vector vbase constructor iterator'
- `vector destructor iterator'
- `vector constructor iterator'
- `scalar deleting destructor'
- `default constructor closure'
- `vector deleting destructor'
- `vbase destructor'
- `string'
- `local static guard'
- `typeof'
- `vcall'
- `vbtable'
- `vftable'
- operator
- delete
- __unaligned
- __restrict
- __ptr64
- __clrcall
- __fastcall
- __thiscall
- __stdcall
- __pascal
- __cdecl
- __based(
- SunMonTueWedThuFriSat
- JanFebMarAprMayJunJulAugSepOctNovDec
- CONOUT$
- CheckBox
- bad allocation
- ios_base::badbit set
- ios_base::failbit set
- ios_base::eofbit set
- 88u;L$_
- 3=pRUF$
- VideoDevice
- MDICLIENT
- Child Window
- TextEditor
- Failed To read file
- SysTreeView32
- Viewer
- Enhanced Metafiles (*.EMF)
- *.emf
- All Files (*.*)
- Description =
- Metafile Properties
- game's Scherer Scenarios Conditional
- terminology emphasise
- graphic Jensen EBM improves
- wasting Spotlight Checksum Aero triggering
- Foxconn manual airwaves destroy
- stem 142 standardizing
- enthusiasts insistence
- its immoralities RNA
- council multi establishes Removable local
- prove Ahead Server NT fixes
- recompiling JAM ExpressCharge guess Representation
- MLE OrderNumber Kardon pki schema
- MaxPendingSessions Lua equates resolution What
- generality currently kidnapping
- Detailed movable background incompatible
- Greater
- drying enormously raised ONTOLOGY
- jumbo ultimately traits
- negotiated Model'
- equates Sweden reception
- LAME tutorial totally
- NDA secret
- TRENDware
- cat Discretionary binary
- disgruntled enriches Bezier theyll
- Redefinition city Depmod PS
- disambiguate Flat extensively employed
- Boole VoodooPC
- dissociated template Monotone
- Anyone alteration enforce reader
- derived WinFS effected toggle
- Except Shingles Garbage DirectAccess
- commodities LED
- nantech accredited IMSAI
- runner AccuRev
- VNS openly Standoff FMCDH
- TAP Multisync Outlook date
- decades Blur ADSL 2004
- Both noticed DUN
- designations indenting
- WinFS Anyone predictor energies
- capacitors rational Industrial
- studied sounds
- undergraduates
- proliferation councils magazines
- Go Sarahs Flu series
- housewives BeginGetResponse disaster min
- Goals lasst Neuromorphic beyond whom
- tuned arcade
- blit guns multi SETI
- paychecks by DriveClone revocation Pool
- chameleon ensue Croatian
- boarding
- Choose student recreating
- If Handhelds
- Teleprocessing
- though Skeptics
- penalties
- Trustworthy macros multiplayer
- strikes behest
- friendships placed
- unifying results dwindle Aero
- int skeptical Uplink fiction
- shortcomings unsettled
- harming ClientCredentialType
- Access PGP row
- Is TokenStorage
- FLOSS LocalService
- RL large established scaling
- Berthon
- universally Everex reports reset boats
- Gonna Storing
- keys Mukophadhyay KOKORO
- updategrams singly nineteenth hangs
- Rivkin
- Pingback Unformat Hardware Copyright
- D3D10_USAGE_STAGING CAT6 travelers Hastie
- eastwards boy's
- Show Title
- button
- msctls_progress32
- Finished
- like 8086 render EDI
- DriveTrust gender 1963 blink Opera
- sessions You Crosby sidewalls
- other sons
- Samples
- decoding computers compatibility
- Jian Piping 115 AISI coastal
- rapidly Bravo some pixel
- inconceivable seperator 169
- regularly atom fashion
- Stuxnet consumer playing XmlAttribute
- An historically employeeUtils savvy perceptual
- prejudice
- BBIAM exploit To People
- pamphlet admire obvious PII
- article chef Wix
- Traveling looming less accuse
- directed tastes
- much
- Author demonstrates
- edited 2005 formal VXtreme Activision
- Fi cause
- mm awayGiven
- Remarks Turn Most feature
- Managed as Association
- Navigation
- maximized Linkjacking Install
- VMs someones
- foundations useful Continued Citizen
- ClientVersion Phototypesetter
- Menu ck
- Unlike partners Makedir Administration Basename
- statisticians 217
- problem ordering Whichever modern
- Guy loader
- patients ofprivacy talked
- Osbornes Mott
- Baltimore
- scare Sprint OLTP functions sizzle
- correspondents FAT mat fourth transcripts
- Vendors Computer
- referent Same retinal
- Logout
- violins 1682 shippable
- shell32
- \Windows
- rastrevn
- Cannot connect with DDEPOP1.EXE!
- Failure
- %-20s
- %10ld
- Child
- Application
- Error
- Cannot register class 4555
- ntdll
- AVI Files
- *.avi
- hand.exe
- map/set<T> too long
- vector<T> too long
- invalid map/set<T> iterator
- bad cast
- e+000
- GAIsProcessorFeaturePresent
- KERNEL32
- 1#QNAN
- 1#INF
- 1#IND
- 1#SNAN
- _nextafter
- _logb
- frexp
- _hypot
- _cabs
- ldexp
- floor
- atan2
- log10
- GlobalDeleteAtom
- lstrlenA
- GetLocaleInfoA
- FreeLibrary
- HeapAlloc
- GlobalAddAtomA
- GlobalLock
- WaitForSingleObject
- SetEvent
- GetTickCount
- GlobalAlloc
- LoadLibraryW
- Sleep
- CreateEventA
- HeapCreate
- GetFileAttributesW
- GlobalUnlock
- GetLastError
- GetProcAddress
- GlobalGetAtomNameA
- GlobalFree
- LoadLibraryA
- GetModuleHandleA
- WinExec
- CloseHandle
- DeleteFileW
- CreateThread
- lstrcpyA
- KERNEL32.dll
- RegisterClassA
- SetDlgItemTextA
- DestroyIcon
- UnpackDDElParam
- DialogBoxParamA
- GetDlgItemTextA
- GetDlgCtrlID
- LoadCursorA
- SetClipboardData
- UpdateWindow
- LoadImageA
- SetWindowTextA
- GetSystemMetrics
- ReleaseCapture
- DefMDIChildProcA
- OpenClipboard
- CheckRadioButton
- DispatchMessageA
- PostMessageA
- FreeDDElParam
- IsDlgButtonChecked
- GetSysColorBrush
- ShowWindow
- LoadAcceleratorsA
- CheckDlgButton
- GetCursorPos
- SetWindowPos
- GetSysColor
- DefWindowProcA
- EndDialog
- GetDlgItem
- TranslateAcceleratorA
- EmptyClipboard
- EnableMenuItem
- ReleaseDC
- PeekMessageA
- SetScrollPos
- CreateWindowExA
- GetClipboardData
- GetWindowLongA
- EnumPropsA
- CreateAcceleratorTableA
- SetCursorPos
- InvalidateRect
- MessageBoxA
- GetScrollInfo
- SetRect
- RegisterClipboardFormatA
- TrackPopupMenuEx
- GetKeyboardLayout
- OffsetRect
- GetMenu
- SetDlgItemInt
- GetForegroundWindow
- ShowCursor
- TranslateMessage
- GetDC
- BeginPaint
- SendMessageA
- GetClientRect
- wsprintfA
- LoadIconA
- IsClipboardFormatAvailable
- LoadBitmapA
- GetFocus
- DeleteMenu
- LoadStringA
- GetSubMenu
- DrawTextA
- KillTimer
- GetTopWindow
- SendDlgItemMessageA
- PostQuitMessage
- RegisterClassExA
- InsertMenuItemA
- PackDDElParam
- GetWindowRect
- SetTimer
- GetDlgItemInt
- CloseClipboard
- GetMessageA
- SetCursor
- DestroyWindow
- EndPaint
- USER32.dll
- TextOutA
- UpdateColors
- ExtTextOutA
- GetStockObject
- EndDoc
- SetTextAlign
- GetTextMetricsA
- CreatePen
- GetTextExtentPointA
- SelectPalette
- RealizePalette
- StartDocA
- CreateCompatibleBitmap
- PlayEnhMetaFile
- GetKerningPairsA
- CreateCompatibleDC
- GetEnhMetaFileDescriptionA
- SelectObject
- DeleteObject
- SetBkMode
- CopyEnhMetaFileA
- SetBkColor
- SetDCBrushColor
- CreateFontIndirectA
- GetDeviceCaps
- CreateFontA
- CreateDIBSection
- DeleteDC
- SetTextColor
- StartPage
- GetEnhMetaFileA
- DeleteEnhMetaFile
- LineTo
- BitBlt
- EndPage
- MoveToEx
- CreatePolygonRgn
- GDI32.dll
- PrintDlgA
- GetSaveFileNameA
- GetOpenFileNameA
- COMDLG32.dll
- RegQueryValueExA
- RegOpenKeyExA
- ADVAPI32.dll
- SHGetDesktopFolder
- SHAppBarMessage
- SHBrowseForFolderA
- SHGetFileInfoA
- SHGetSpecialFolderLocation
- SHGetMalloc
- SHGetPathFromIDListA
- SHELL32.dll
- CoInitialize
- CoWaitForMultipleHandles
- ole32.dll
- ODBC32.dll
- GopherGetLocatorTypeW
- WININET.dll
- SHCreateStreamOnFileEx
- SHLWAPI.dll
- ImageList_Add
- ImageList_ReplaceIcon
- ImageList_Create
- COMCTL32.dll
- RpcServerUseProtseqEpA
- RPCRT4.dll
- GdipFree
- GdipCreateBitmapFromScan0
- GdipGetImageGraphicsContext
- GdipAlloc
- GdipDisposeImage
- GdipCloneImage
- gdiplus.dll
- glClear
- glNormal3f
- glBegin
- OPENGL32.dll
- ImmGetContext
- ImmIsIME
- ImmReleaseContext
- ImmGetDescriptionA
- ImmSetOpenStatus
- ImmGetConversionStatus
- ImmGetOpenStatus
- IMM32.dll
- InterlockedIncrement
- InterlockedDecrement
- InitializeCriticalSection
- DeleteCriticalSection
- EnterCriticalSection
- LeaveCriticalSection
- HeapFree
- TerminateProcess
- GetCurrentProcess
- UnhandledExceptionFilter
- SetUnhandledExceptionFilter
- IsDebuggerPresent
- GetCommandLineA
- GetStartupInfoA
- RtlUnwind
- RaiseException
- LCMapStringA
- WideCharToMultiByte
- MultiByteToWideChar
- LCMapStringW
- GetCPInfo
- SetHandleCount
- GetStdHandle
- GetFileType
- VirtualFree
- VirtualAlloc
- HeapReAlloc
- GetModuleHandleW
- ExitProcess
- WriteFile
- GetModuleFileNameA
- GetACP
- GetOEMCP
- IsValidCodePage
- TlsGetValue
- TlsAlloc
- TlsSetValue
- TlsFree
- SetLastError
- GetCurrentThreadId
- ReadFile
- GetConsoleCP
- GetConsoleMode
- FlushFileBuffers
- SetFilePointer
- FreeEnvironmentStringsA
- GetEnvironmentStrings
- FreeEnvironmentStringsW
- GetEnvironmentStringsW
- QueryPerformanceCounter
- GetCurrentProcessId
- GetSystemTimeAsFileTime
- HeapSize
- GetUserDefaultLCID
- EnumSystemLocalesA
- IsValidLocale
- GetStringTypeA
- GetStringTypeW
- InitializeCriticalSectionAndSpinCount
- WriteConsoleA
- GetConsoleOutputCP
- WriteConsoleW
- SetStdHandle
- CreateFileA
- GetLocaleInfoW
- SetEndOfFile
- GetProcessHeap
- .?AV_Locimp@locale@std@@
- Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
- .?AVtype_info@@
- abcdefghijklmnopqrstuvwxyz
- ABCDEFGHIJKLMNOPQRSTUVWXYZ
- abcdefghijklmnopqrstuvwxyz
- ABCDEFGHIJKLMNOPQRSTUVWXYZ
- .?AVbad_exception@std@@
- .?AV?$codecvt@DDH@std@@
- .?AVGdiplusBase@Gdiplus@@
- .?AVImage@Gdiplus@@
- .?AVBitmap@Gdiplus@@
- .?AV?$ctype@D@std@@
- .?AUctype_base@std@@
- .?AVcodecvt_base@std@@
- .?AVfacet@locale@std@@
- .?AV?$basic_ofstream@DU?$char_traits@D@std@@@std@@
- .?AV?$basic_filebuf@DU?$char_traits@D@std@@@std@@
- .?AV?$basic_ostream@DU?$char_traits@D@std@@@std@@
- .?AV?$basic_streambuf@DU?$char_traits@D@std@@@std@@
- .?AV?$basic_ios@DU?$char_traits@D@std@@@std@@
- .?AV?$_Iosb@H@std@@
- .?AVios_base@std@@
- .?AVruntime_error@std@@
- .?AVexception@std@@
- .?AVout_of_range@std@@
- .?AVlogic_error@std@@
- .?AVfailure@ios_base@std@@
- v'v]!
- W=~'`\*
- s)-:?
- =$aK|B
- F6[Nr:
- QlSq.
- Population
- .?AVlength_error@std@@
- .?AVbad_cast@std@@
- .?AVbad_alloc@std@@
- -:_^1
- TT.uvP
- F(null)
- mscoree.dll
- KERNEL32.DLL
- %.8x
- %.2x
- stream
- user32.dll
- SubnetPVersi Windows anda menyokong IPv6. Namun, protokol tersebut masih tidak dipasangFJika anda mahu guna IPv6, anda perlu pasangkannya secara manual dahulu,Baca FAQ di laman web untuk maklumat lanjut.
- Dibatalkan!
- Tegangkan
- Keperluan asas,Tiada adaptor WiFi yang bersesuaian dijumpai5Servis Windows WiFi diperlukan tetapi tidak berjalan.&Adakah anda mahu jalankannya sekarang?
- VS_VERSION_INFO
- StringFileInfo
- 040904b0
- CompanyName
- MaxProfit Group
- FileDescription
- MaxProfit Pro RU
- FileVersion
- 3.0.0.41
- InternalName
- MaxProfit
- LegalCopyright
- 2015 MaxProfit Group
- OriginalFilename
- MaxProfit.exe
- ProductName
- MaxProfit Pro RU
- ProductVersion
- 3.0.0.41
- VarFileInfo
- Translation
- • 0x418020 InitializeCriticalSection
- • 0x418024 Sleep
- • 0x418028 LeaveCriticalSection
- • 0x41802c GetProcAddress
- • 0x418030 IsValidCodePage
- • 0x418034 SetStdHandle
- • 0x418038 GetCommandLineA
- • 0x41803c LoadLibraryA
- • 0x418040 GetModuleHandleA
- • 0x418044 GetErrorMode
- • 0x418048 GetSystemTime
- • 0x41804c CreateThread
- • 0x418050 GetTickCount
- • 0x418054 UnlockFileEx
- • 0x418058 WaitForSingleObject
- • 0x41805c GetEnvironmentStringsW
- • 0x418060 GetCurrentProcess
- • 0x418064 GetProcessIoCounters
- • 0x418068 EnterCriticalSection
- • 0x41806c TryEnterCriticalSection
- • 0x418070 InterlockedIncrement
- • 0x418074 InterlockedDecrement
- • 0x418078 EncodePointer
- • 0x41807c DecodePointer
- • 0x418080 DeleteCriticalSection
- • 0x418084 GetLastError
- • 0x418088 HeapFree
- • 0x41808c HeapAlloc
- • 0x418090 ReadConsoleInputA
- • 0x418094 SetConsoleMode
- • 0x418098 GetConsoleMode
- • 0x41809c GetCommandLineW
- • 0x4180a0 HeapSetInformation
- • 0x4180a4 GetStartupInfoW
- • 0x4180a8 RaiseException
- • 0x4180ac RtlUnwind
- • 0x4180b0 WideCharToMultiByte
- • 0x4180b4 LCMapStringW
- • 0x4180b8 MultiByteToWideChar
- • 0x4180bc GetCPInfo
- • 0x4180c0 TerminateProcess
- • 0x4180c4 UnhandledExceptionFilter
- • 0x4180c8 SetUnhandledExceptionFilter
- • 0x4180cc IsDebuggerPresent
- • 0x4180d0 IsProcessorFeaturePresent
- • 0x4180d4 SetHandleCount
- • 0x4180d8 GetStdHandle
- • 0x4180dc InitializeCriticalSectionAndSpinCount
- • 0x4180e0 GetFileType
- • 0x4180e4 HeapCreate
- • 0x4180e8 GetModuleHandleW
- • 0x4180ec ExitProcess
- • 0x4180f0 WriteFile
- • 0x4180f4 GetModuleFileNameW
- • 0x4180f8 TlsAlloc
- • 0x4180fc TlsGetValue
- • 0x418100 TlsSetValue
- • 0x418104 TlsFree
- • 0x418108 SetLastError
- • 0x41810c GetCurrentThreadId
- • 0x418110 SetFilePointer
- • 0x418114 CreateFileW
- • 0x418118 CloseHandle
- • 0x41811c FreeEnvironmentStringsW
- • 0x418120 QueryPerformanceCounter
- • 0x418124 GetCurrentProcessId
- • 0x418128 GetSystemTimeAsFileTime
- • 0x41812c GetLocaleInfoW
- • 0x418130 HeapSize
- • 0x418134 GetConsoleCP
- • 0x418138 FlushFileBuffers
- • 0x41813c ReadFile
- • 0x418140 GetACP
- • 0x418144 GetOEMCP
- • 0x418148 GetUserDefaultLCID
- • 0x41814c GetLocaleInfoA
- • 0x418150 EnumSystemLocalesA
- • 0x418154 IsValidLocale
- • 0x418158 GetStringTypeW
- • 0x41815c HeapReAlloc
- • 0x418160 LoadLibraryW
- • 0x418164 WriteConsoleW
- |====================================================================|
- | |
- | All Password Found |
- | |
- | ! BANG BANG ! |
- | |
- |====================================================================|
- ------------------- Windows Secrets passwords -----------------
- [*] Local SAM hashes
- Hashes found !!!
- hashes:
- Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
- Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
- RICH:1000:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
- [*] LSA Secrets
- Password In Hex found !!!
- Category: DPAPI_SYSTEM
- password in hex: 010000009db1ffd48bbde26885aff1e4a61d0f23117627a7210a49aa937d4c738b487ee57615ae0b3721aa30
- [+] 2 passwords have been found.
- For more information launch it again with the -v option
- elapsed time = 160.155999899
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement