Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Tools.chm

Overview

General Information

Sample name:Tools.chm
Analysis ID:1566858
MD5:a2d8bd5d5663f55d04f0a7c707fd4519
SHA1:cad4045a7db598c972741225cb2acf3da16dfb88
SHA256:df3a27254716fcec426384f34ee4aec7ac5576e938f3dabc502c3a5fa18bfcef

Detection

Score:1
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Allocates memory with a write watch (potentially for evading sandboxes)
Queries the volume information (name, serial number etc) of a device

Classification

  • System is w10x64
  • hh.exe (PID: 2452 cmdline: "C:\Windows\hh.exe" C:\Users\user\Desktop\Tools.chm MD5: 2C8FE78D53C8CA27523A71DFD2938241)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: hh.exe, 00000000.00000002.3291864590.000001E18A85E000.00000004.00000020.00020000.00000000.sdmp, hh.exe, 00000000.00000002.3291304584.000001D986699000.00000004.00000800.00020000.00000000.sdmp, hh.exe, 00000000.00000002.3290120004.000001D982899000.00000004.00000020.00020000.00000000.sdmp, hh.exe, 00000000.00000002.3290120004.000001D982915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3
Source: hh.exe, 00000000.00000002.3291864590.000001E18A85E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3W
Source: hh.exe, 00000000.00000002.3291864590.000001E18A85E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3X
Source: hh.exe, 00000000.00000002.3290120004.000001D982915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3k
Source: hh.exe, 00000000.00000002.3290120004.000001D982915000.00000004.00000020.00020000.00000000.sdmp, hh.exe, 00000000.00000002.3291864590.000001E18A874000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3p
Source: hh.exe, 00000000.00000002.3290120004.000001D982899000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/tools/
Source: classification engineClassification label: clean1.winCHM@1/7@0/0
Source: C:\Windows\hh.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\HTML HelpJump to behavior
Source: C:\Windows\hh.exeFile created: C:\Users\user\AppData\Local\Temp\IMT91BB.tmpJump to behavior
Source: C:\Windows\hh.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\hh.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: itss.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: wininet.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: ieframe.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: msiso.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: mshtml.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: srpapi.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: d2d1.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: resourcepolicyclient.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: d3d10warp.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: dxcore.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: msimtf.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: msls31.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: mlang.dllJump to behavior
Source: C:\Windows\hh.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Windows\hh.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52A2AAAE-085D-4187-97EA-8C30DB990436}\InprocServer32Jump to behavior
Source: C:\Windows\hh.exeWindow found: window name: SysTabControl32Jump to behavior
Source: C:\Windows\hh.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Office\16.0\Access\Capabilities\UrlAssociationsJump to behavior
Source: C:\Windows\hh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\hh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\hh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\hh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\hh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\hh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\hh.exeMemory allocated: 1D986640000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\hh.exeMemory allocated: 1E18E7D0000 memory reserve | memory write watchJump to behavior
Source: C:\Windows\hh.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Windows\hh.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
Source: C:\Windows\hh.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
Source: C:\Windows\hh.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
Source: C:\Windows\hh.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\hh.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
Source: C:\Windows\hh.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Disable or Modify Tools
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Tools.chm0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.autoitscript.com/autoit3khh.exe, 00000000.00000002.3290120004.000001D982915000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    http://www.autoitscript.com/autoit3hh.exe, 00000000.00000002.3291864590.000001E18A85E000.00000004.00000020.00020000.00000000.sdmp, hh.exe, 00000000.00000002.3291304584.000001D986699000.00000004.00000800.00020000.00000000.sdmp, hh.exe, 00000000.00000002.3290120004.000001D982899000.00000004.00000020.00020000.00000000.sdmp, hh.exe, 00000000.00000002.3290120004.000001D982915000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      http://www.autoitscript.com/tools/hh.exe, 00000000.00000002.3290120004.000001D982899000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://www.autoitscript.com/autoit3phh.exe, 00000000.00000002.3290120004.000001D982915000.00000004.00000020.00020000.00000000.sdmp, hh.exe, 00000000.00000002.3291864590.000001E18A874000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://www.autoitscript.com/autoit3Whh.exe, 00000000.00000002.3291864590.000001E18A85E000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://www.autoitscript.com/autoit3Xhh.exe, 00000000.00000002.3291864590.000001E18A85E000.00000004.00000020.00020000.00000000.sdmpfalse
              high
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1566858
              Start date and time:2024-12-02 18:58:28 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 3m 46s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:5
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Tools.chm
              Detection:CLEAN
              Classification:clean1.winCHM@1/7@0/0
              EGA Information:Failed
              HCA Information:
              • Successful, ratio: 100%
              • Number of executed functions: 0
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .chm
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • VT rate limit hit for: Tools.chm
              TimeTypeDescription
              12:59:21API Interceptor1x Sleep call for process: hh.exe modified
              No context
              No context
              No context
              No context
              No context
              Process:C:\Windows\hh.exe
              File Type:data
              Category:dropped
              Size (bytes):49120
              Entropy (8bit):0.0017331682157558962
              Encrypted:false
              SSDEEP:3:Ztt:T
              MD5:0392ADA071EB68355BED625D8F9695F3
              SHA1:777253141235B6C6AC92E17E297A1482E82252CC
              SHA-256:B1313DD95EAF63F33F86F72F09E2ECD700D11159A8693210C37470FCB84038F7
              SHA-512:EF659EEFCAB16221783ECB258D19801A1FF063478698CF4FCE3C9F98059CA7B1D060B0449E6FD89D3B70439D9735FA1D50088568FF46C9927DE45808250AEC2E
              Malicious:false
              Reputation:high, very likely benign file
              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\hh.exe
              File Type:JPEG image data, JFIF standard 1.02, aspect ratio, density 100x100, segment length 16, baseline, precision 8, 1024x24, components 3
              Category:dropped
              Size (bytes):856
              Entropy (8bit):5.542372260188213
              Encrypted:false
              SSDEEP:24:tjnYjI/sU5fJTScvhemyEVccN+grRwfQ31FUcD:5YjI//hScBVccN+gr+/cD
              MD5:F9FFA1A2A3F52679C7603077DEED4A68
              SHA1:692744C333E3012C8063F20EB0F5BA721DB5485B
              SHA-256:301A6AF579625C056818FB2AA295C62DC76183EB9FFFC28BDF459564E4B12274
              SHA-512:9ECD527957A8CF3FA7AFCC0EEB50F27B582E94CC4676365D8765FBF97603F6F9D170115C071B10D130B8279A0E8CEB847CD60ED846D13C778357950813E5C2F6
              Malicious:false
              Reputation:low
              Preview:......JFIF.....d.d......Ducky.......<......Adobe.d.................................................................................................................................................................R............................................................................................?.....@lA....(.`......(.A."....@..@...(........8..(..(... P. p.".@..@..@...8..(!.. p. P."..............8!D......B.q..q..pB.............. P...!@(.`...6.@l........... @..... @..... @........(..6..`..l..Q.....(!DR..............@..@...8..8..8!......DC...............8........C.q..Q...@..@...(..8.@8.P. P. P..Q..q..Q...@.6....`.D(..l..Q..(...A....@..... @..... @..... @.X....... l....P. P.....(.PB.Q..q...@..................8.@8..(.q..q..Q...@..@...8..8.@8.p. p. pC.....@...8..(............ P. P. PB....8.@l.......P. ......(#`4T.. @..... @..... @.......
              Process:C:\Windows\hh.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):4128
              Entropy (8bit):5.438941984264733
              Encrypted:false
              SSDEEP:96:s5SJCJBJHJ0JJ4JwJaGJWoI5JFbxW4Je+JdiJiQJiGqaNgF/BEV:g6K/p0HE8aeWoIXFbEEVdqici7aN8/Bi
              MD5:CE9DF408BB2B70AB50C4093A5F5693D3
              SHA1:CC5742D649A97283294F3C3F945B3EFBDC444A0A
              SHA-256:0DC932B0F4ABF98FA4B2522A15995A47E03A4AAD5504141B7D69F968D39BF39F
              SHA-512:78C10A939A1371D67C143EAA05A94851C77D7C6CADBC78D01E53AEC3834CC04DE94E80D28214EC33E7224138F4BDA2CF4AA18CFC4F7F1738E5567ACA95EC4083
              Malicious:false
              Reputation:low
              Preview:/* Standard tags */..body{background-color:#FFFFFF;font-family: Verdana, Arial, Helvetica, sans-serif, "MS sans serif";font-size:x-small;font-weight:normal;color:#000000;}..table{font-family:Verdana, Arial, Helvetica, sans-serif, "MS sans serif";font-size:x-small;}..tr{font-family:Verdana, Arial, Helvetica, sans-serif, "MS sans serif";font-size:x-small;}..td{font-family:Verdana, Arial, Helvetica, sans-serif, "MS sans serif";font-size:x-small;}..b{font-weight:bold;}..p{...font-family:Verdana, Arial, Helvetica, sans-serif, "MS sans serif";...line-height: normal;...margin-top: 0.5em;...margin-bottom: 0.5em;........}..div{font-family:Verdana, Arial, Helvetica, sans-serif, "MS sans serif";}..a{font-family:Verdana, Arial, Helvetica, sans-serif, "MS sans serif";text-decoration:none;}..../* Normal body text links */..a:link {font-family:Verdana,Arial,Helvetica,sans-serif,"MS sans serif";text-decoration:none;color:#000099;}..a:visited{font-family:Verdana, Arial, Helvetica, sans-serif, "MS san
              Process:C:\Windows\hh.exe
              File Type:data
              Category:dropped
              Size (bytes):8276
              Entropy (8bit):0.6274991512679713
              Encrypted:false
              SSDEEP:12:m0l6eohI+KKe+KjK9zh+KlE/KlEvt+KlEvdX:SQ1V2FlEClEvt1lEvdX
              MD5:943D3CE711A5EBA4A01A9B4E8EDF1388
              SHA1:E8DFD5502B1413F4996CA43E2E76E45F2A32A1D7
              SHA-256:BBB45CCB31607F92D62EE94204B0E2E4CA802EA6AE6A7B8B6AEBFE99655FA920
              SHA-512:C969D0EF61FFAC73436EC7F094F9C737AD0F26D05EAA8AA506A919F31ACF22E237CBB088F7291C1883C8BF3ABE764F9895F921B4B37EE87A0353F8E4229E68E3
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:ITSP....T........ ..................................j..].!......."..T...............PMGL?................/....::DataSpace/NameList..4<(::DataSpace/Storage/MSCompressed/Content...,::DataSpace/Storage/MSCompressed/ControlData....)::DataSpace/Storage/MSCompressed/SpanInfo..../::DataSpace/Storage/MSCompressed/Transform/List..p&_::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/...i::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/ResetTable......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\hh.exe
              File Type:Composite Document File V2 Document, Cannot read section info
              Category:dropped
              Size (bytes):16384
              Entropy (8bit):0.3613836054883338
              Encrypted:false
              SSDEEP:3:YmsalTlLPltl2N81HRQjlORGt7RQ//W1XR9//3R9//3R9//:rl912N0xs+CFQXCB9Xh9Xh9X
              MD5:679672A5004E0AF50529F33DB5469699
              SHA1:427A4EC3281C9C4FAEB47A22FFBE7CA3E928AFB0
              SHA-256:205D000AA762F3A96AC3AD4B25D791B5F7FC8EFB9056B78F299F671A02B9FD21
              SHA-512:F8615C5E5CF768A94E06961C7C8BEF99BEB43E004A882A4E384F5DD56E047CA59B963A59971F78DCF4C35D1BB92D3A9BC7055BFA3A0D597635DE1A9CE06A3476
              Malicious:false
              Reputation:high, very likely benign file
              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\hh.exe
              File Type:data
              Category:dropped
              Size (bytes):512
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3::
              MD5:BF619EAC0CDF3F68D496EA9344137E8B
              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
              Malicious:false
              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Windows\hh.exe
              File Type:MS Windows HtmlHelp Data
              Category:dropped
              Size (bytes):8590
              Entropy (8bit):0.7893000069151963
              Encrypted:false
              SSDEEP:12:om6ysNMqiNMvyc0Ke0l6eohI+KKe+KjK9zh+KlE/KlEvt+KlEvdX:2x5yc0JQ1V2FlEClEvt1lEvdX
              MD5:192472EC8B8BF628A64E607AB67B47D5
              SHA1:798DB745C424ED1CE4904630C4D625EAAC47093A
              SHA-256:8D305C75DA32365C9CA9D95613E0E263FCB95AC25E7E5CFF0E79A7907BFB134D
              SHA-512:09205254B666035D2C89C10E99F8F76A8464D61406EC224D9D0B8EC3C51CE3CD7929983AAA33FC65B79D109E7D4D83C452B1C89B30D91B77C612F911F60B840E
              Malicious:false
              Preview:ITSF....`............ .....|.{.......".....|.{......."..`.......(.......:.......T .......................!......................,...................j..].!......."..T.....................U.n.c.o.m.p.r.e.s.s.e.d.....M.S.C.o.m.p.r.e.s.s.e.d...{.7.F.C.2.8.9.4.0.-.9.D.3.1.-.1.1.D.0.............LZXC....................ITSP....T........ ..................................j..].!......."..T...............PMGL?................/....::DataSpace/NameList..4<(::DataSpace/Storage/MSCompressed/Content...,::DataSpace/Storage/MSCompressed/ControlData....)::DataSpace/Storage/MSCompressed/SpanInfo..../::DataSpace/Storage/MSCompressed/Transform/List..p&_::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/...i::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/ResetTable............................................................................................................................................................
              File type:MS Windows HtmlHelp Data
              Entropy (8bit):5.9937618044338645
              TrID:
              • Windows HELP File (4004/1) 100.00%
              File name:Tools.chm
              File size:20'654 bytes
              MD5:a2d8bd5d5663f55d04f0a7c707fd4519
              SHA1:cad4045a7db598c972741225cb2acf3da16dfb88
              SHA256:df3a27254716fcec426384f34ee4aec7ac5576e938f3dabc502c3a5fa18bfcef
              SHA512:346bc55ab1fa8c32670cef21d3ccfd89eba77630467413759b0f8ce0851dd75d0fe589e7ba1c10b8832c4e1a3aec996033fbb29c7c2b5d3269d83c924d9a3266
              SSDEEP:384:RaliMj7MQe1CCsMHEySRY0Mzy3zAQ3xnvLnfDcLbAw0rXbMrxGK:RalPrtHySwqAQtznfQSrXsxL
              TLSH:1D92BF4123AA1202D1A68F3A3ED9FADDDE387D2EC7041215727FD53A9E48C0820D8EE5
              File Content Preview:ITSF....`.......G.'s.......|.{.......".....|.{......."..`...............x.......T........................P..............ITSP....T...........................................j..].!......."..T...............PMGL................./..../#IDXHDR...;.../#ITBITS..
              Icon Hash:56b6ae4c1b2b1b08
              NameTypePreview
              htmldirectory
              #TOPICSMatlab v4 mat-file (little endian) , numeric, rows 4294967295, columns 36, imaginary....$.......................Q...0...........c...........(...k...<.......X...}...H.......l..............
              #WINDOWSdata...................... %..................................................................................5...?........0..................................................................................
              $WWAssociativeLinksdirectory
              #URLSTRdata.........Table of Contents.hhc.........Index.hhk.........html/default.html.........html/license.html.........html/history.html.........html/PagefileConfig/default.html.........html/RemoteDelProf/default.html.
              $FIftiMaindata..(.....*..........*................................!......8... ...v......`........................................................................................................................................................................
              Table of Contents.hhcHTML document, ASCII text, with CRLF line terminators<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">..<HTML>..<HEAD>..<meta name="GENERATOR" content="Microsoft&reg; HTML Help Workshop 4.1">..<!-- Sitemap 1.0 -->..</HEAD><BODY>..<OBJECT type="text/site properties">...<param name="Window Styles" value="0x
              Index.hhkHTML document, ASCII text, with CRLF line terminators<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">..<HTML>..<HEAD>..<meta name="GENERATOR" content="Microsoft&reg; HTML Help Workshop 4.1">..<!-- Sitemap 1.0 -->..</HEAD><BODY>..<UL>..</UL>..</BODY></HTML>..
              $WWKeywordLinksdirectory
              #SYSTEMdata........5.J....HHA Version 4.74.8702...$......................'s.............html/default.html.....AutoIt Tools Help.....tools.....Help Window...................T#SMF.....................%....................
              #URLTBLdata..........e!5....K...{.A........K........Qr....1...*.....e............
              $OBJINSTX11 SNF font data, MSB first............_...w...$...bF.V.O.......................UU........................................................................................................................................................................................
              #IDXHDRdataT#SMF.....................%............................................................................................................................................................................................
              #STRINGSdata.Help Window.AutoIt Tools Help.Table of Contents.hhc.Index.hhk.html/default.html.AutoIt Tools Help.License.History.Utilities.PagefileConfig.RemoteDelProf.
              #ITBITSempty
              No network behavior found

              Click to jump to process

              Click to jump to process

              Target ID:0
              Start time:12:59:21
              Start date:02/12/2024
              Path:C:\Windows\hh.exe
              Wow64 process (32bit):false
              Commandline:"C:\Windows\hh.exe" C:\Users\user\Desktop\Tools.chm
              Imagebase:0x7ff7ad460000
              File size:18'432 bytes
              MD5 hash:2C8FE78D53C8CA27523A71DFD2938241
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:false

              No disassembly