Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1502162
MD5:aeadec1696b55c6f2222a110fec044bb
SHA1:75587461a0368b3a242f0329435df075855255da
SHA256:2b933cada26bdd843c2929e0ef2a088366251077ed8d1e50ec91848f0b1bd67e
Tags:exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Creates multiple autostart registry keys
Found API chain indicative of debugger detection
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7748 cmdline: "C:\Users\user\Desktop\file.exe" MD5: AEADEC1696B55C6F2222A110FEC044BB)
    • msedge.exe (PID: 7764 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password MD5: 69222B8101B0601CC6663F8381E7E00F)
      • msedge.exe (PID: 8036 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=2120,i,14100662108306307512,17240055722320644546,262144 --disable-features=TranslateUI /prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
  • msedge.exe (PID: 8028 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate MD5: 69222B8101B0601CC6663F8381E7E00F)
    • msedge.exe (PID: 7484 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2756 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • msedge.exe (PID: 9076 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6932 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • msedge.exe (PID: 9092 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=3444 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • identity_helper.exe (PID: 9168 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7264 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8 MD5: 76C58E5BABFE4ACF0308AA646FC0F416)
    • identity_helper.exe (PID: 9188 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7264 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8 MD5: 76C58E5BABFE4ACF0308AA646FC0F416)
  • msedge.exe (PID: 8096 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • msedge.exe (PID: 404 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • msedge.exe (PID: 8044 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4184 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • identity_helper.exe (PID: 8932 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6164 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8 MD5: 76C58E5BABFE4ACF0308AA646FC0F416)
    • identity_helper.exe (PID: 8552 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6164 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8 MD5: 76C58E5BABFE4ACF0308AA646FC0F416)
  • msedge.exe (PID: 5164 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • msedge.exe (PID: 6780 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1952 --field-trial-handle=2088,i,17495144093669896207,16119466351810412879,262144 /prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
  • msedge.exe (PID: 4312 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • msedge.exe (PID: 2284 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1992,i,11980253433158085184,3980390935348244074,262144 /prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
  • msedge.exe (PID: 4080 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5 MD5: 69222B8101B0601CC6663F8381E7E00F)
    • msedge.exe (PID: 8484 cmdline: "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1972,i,10789157105983230292,1372337410351055034,262144 /prefetch:3 MD5: 69222B8101B0601CC6663F8381E7E00F)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeReversingLabs: Detection: 21%
Source: file.exeVirustotal: Detection: 21%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49759 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49760 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.4:49768 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.4:64527 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B3DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B3DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B468EE FindFirstFileW,FindClose,0_2_00B468EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B4698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00B4698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B3D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B3D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B3D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B3D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B49642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B49642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B4979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B49B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00B49B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B45C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00B45C97
Source: global trafficTCP traffic: 192.168.2.4:64515 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.4:52227 -> 1.1.1.1:53
Source: Joe Sandbox ViewIP Address: 152.195.19.97 152.195.19.97
Source: Joe Sandbox ViewIP Address: 13.107.246.60 13.107.246.60
Source: Joe Sandbox ViewIP Address: 162.159.61.3 162.159.61.3
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: global trafficHTTP traffic detected: GET /assets/arbitration_priority_list/4.0.5/asset?assetgroup=ArbitrationService HTTP/1.1Host: edgeassetservice.azureedge.netConnection: keep-aliveEdge-Asset-Group: ArbitrationServiceSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /assets/domains_config_gz/2.8.76/asset?assetgroup=EntityExtractionDomainsConfig HTTP/1.1Host: edgeassetservice.azureedge.netConnection: keep-aliveEdge-Asset-Group: EntityExtractionDomainsConfigSec-Mesh-Client-Edge-Version: 117.0.2045.47Sec-Mesh-Client-Edge-Channel: stableSec-Mesh-Client-OS: WindowsSec-Mesh-Client-OS-Version: 10.0.19045Sec-Mesh-Client-Arch: x86_64Sec-Mesh-Client-WebView: 0Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: OPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveAccept: */*Access-Control-Request-Method: POSTAccess-Control-Request-Headers: x-goog-authuserOrigin: https://accounts.google.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Sec-Fetch-Mode: corsSec-Fetch-Site: same-siteSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9
Source: global trafficHTTP traffic detected: OPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1Host: play.google.comConnection: keep-aliveAccept: */*Access-Control-Request-Method: POSTAccess-Control-Request-Headers: x-goog-authuserOrigin: https://accounts.google.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Sec-Fetch-Mode: corsSec-Fetch-Site: same-siteSec-Fetch-Dest: emptyReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.2045.47"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9
Source: global trafficHTTP traffic detected: GET /crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx HTTP/1.1Host: clients2.googleusercontent.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /assets/arbitration_priority_list/4.0.5/asset?assetgroup=ArbitrationService HTTP/1.1Host: edgeassetservice.azureedge.netConnection: keep-aliveEdge-Asset-Group: ArbitrationServiceSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /filestreamingservice/files/bdc392b9-6b81-4aaa-b3ee-2fffd9562edb?P1=1725698776&P2=404&P3=2&P4=T0O7OVcNgyThGUT1PRxzpOZDy9DwIq7Q90Q9eV%2f22u2Pgf1QBb5zYPg4O5bU%2fwcrr2pWcJF3YzR6rNzVruy9xw%3d%3d HTTP/1.1Host: msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.comConnection: keep-aliveMS-CV: Ubn9SXqUJ1SYulYQTz7C+9Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 184.28.90.27
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.174
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: unknownTCP traffic detected without corresponding DNS query: 142.250.65.164
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B4CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00B4CE44
Source: global trafficHTTP traffic detected: GET /assets/arbitration_priority_list/4.0.5/asset?assetgroup=ArbitrationService HTTP/1.1Host: edgeassetservice.azureedge.netConnection: keep-aliveEdge-Asset-Group: ArbitrationServiceSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /assets/domains_config_gz/2.8.76/asset?assetgroup=EntityExtractionDomainsConfig HTTP/1.1Host: edgeassetservice.azureedge.netConnection: keep-aliveEdge-Asset-Group: EntityExtractionDomainsConfigSec-Mesh-Client-Edge-Version: 117.0.2045.47Sec-Mesh-Client-Edge-Channel: stableSec-Mesh-Client-OS: WindowsSec-Mesh-Client-OS-Version: 10.0.19045Sec-Mesh-Client-Arch: x86_64Sec-Mesh-Client-WebView: 0Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
Source: global trafficHTTP traffic detected: GET /favicon.ico HTTP/1.1Host: www.google.comConnection: keep-alivesec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47sec-ch-ua-arch: "x86"sec-ch-ua-full-version: "117.0.2045.47"sec-ch-ua-platform-version: "10.0.0"sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"sec-ch-ua-bitness: "64"sec-ch-ua-model: ""sec-ch-ua-wow64: ?0sec-ch-ua-platform: "Windows"Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8Sec-Fetch-Site: same-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: imageReferer: https://accounts.google.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=s+gBg+wx87rhMr7&MD=hDHON5EA HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx HTTP/1.1Host: clients2.googleusercontent.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /assets/arbitration_priority_list/4.0.5/asset?assetgroup=ArbitrationService HTTP/1.1Host: edgeassetservice.azureedge.netConnection: keep-aliveEdge-Asset-Group: ArbitrationServiceSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /filestreamingservice/files/bdc392b9-6b81-4aaa-b3ee-2fffd9562edb?P1=1725698776&P2=404&P3=2&P4=T0O7OVcNgyThGUT1PRxzpOZDy9DwIq7Q90Q9eV%2f22u2Pgf1QBb5zYPg4O5bU%2fwcrr2pWcJF3YzR6rNzVruy9xw%3d%3d HTTP/1.1Host: msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.comConnection: keep-aliveMS-CV: Ubn9SXqUJ1SYulYQTz7C+9Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47Accept-Encoding: gzip, deflate, brAccept-Language: en-GB,en;q=0.9,en-US;q=0.8
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=s+gBg+wx87rhMr7&MD=hDHON5EA HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficDNS traffic detected: DNS query: bzib.nelreports.net
Source: global trafficDNS traffic detected: DNS query: chrome.cloudflare-dns.com
Source: global trafficDNS traffic detected: DNS query: clients2.googleusercontent.com
Source: unknownDoH DNS queries detected: name: bzib.nelreports.net
Source: unknownHTTP traffic detected: POST /dns-query HTTP/1.1Host: chrome.cloudflare-dns.comConnection: keep-aliveContent-Length: 128Accept: application/dns-messageAccept-Language: *User-Agent: ChromeAccept-Encoding: identityContent-Type: application/dns-message
Source: protocols.json.12.drString found in binary or memory: https://.onedrive.com
Source: protocols.json.12.drString found in binary or memory: https://.onedrive.live.com
Source: file.exe, 00000000.00000002.2902521983.00000000016CF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2902521983.00000000016A8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.c
Source: data_10.5.drString found in binary or memory: https://arc.msn.com/v4/api/selection?placement=88000360&nct=1&fmt=json&ADEFAB=1&OPSYS=WIN10&locale=e
Source: data_10.5.drString found in binary or memory: https://azureedge.net
Source: Reporting and NEL0.5.drString found in binary or memory: https://bzib.nelreports.net/api/report?cat=bingbusiness
Source: Web Data.3.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
Source: Web Data.3.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
Source: Network Persistent State0.12.drString found in binary or memory: https://chrome.cloudflare-dns.com
Source: manifest.json.12.drString found in binary or memory: https://chrome.google.com/webstore/
Source: manifest.json.12.drString found in binary or memory: https://chromewebstore.google.com/
Source: f8c8615c-e431-41e3-bc89-9681001aadda.tmp.13.drString found in binary or memory: https://clients2.google.com
Source: manifest.json0.12.drString found in binary or memory: https://clients2.google.com/service/update2/crx
Source: f8c8615c-e431-41e3-bc89-9681001aadda.tmp.13.drString found in binary or memory: https://clients2.googleusercontent.com
Source: manifest.json0.12.drString found in binary or memory: https://docs.google.com/
Source: manifest.json0.12.drString found in binary or memory: https://drive-autopush.corp.google.com/
Source: manifest.json0.12.drString found in binary or memory: https://drive-daily-0.corp.google.com/
Source: manifest.json0.12.drString found in binary or memory: https://drive-daily-1.corp.google.com/
Source: manifest.json0.12.drString found in binary or memory: https://drive-daily-2.corp.google.com/
Source: manifest.json0.12.drString found in binary or memory: https://drive-daily-3.corp.google.com/
Source: manifest.json0.12.drString found in binary or memory: https://drive-daily-4.corp.google.com/
Source: manifest.json0.12.drString found in binary or memory: https://drive-daily-5.corp.google.com/
Source: manifest.json0.12.drString found in binary or memory: https://drive-daily-6.corp.google.com/
Source: manifest.json0.12.drString found in binary or memory: https://drive-preprod.corp.google.com/
Source: manifest.json0.12.drString found in binary or memory: https://drive-staging.corp.google.com/
Source: manifest.json0.12.drString found in binary or memory: https://drive.google.com/
Source: Web Data.3.drString found in binary or memory: https://duckduckgo.com/ac/?q=
Source: Web Data.3.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
Source: Web Data.3.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
Source: data_10.5.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/arbitration_priority_list/4.0.5/asset?assetgroup=Arbit
Source: data_10.5.drString found in binary or memory: https://edgeassetservice.azureedge.net/assets/domains_config_gz/2.8.76/asset?assetgroup=EntityExtrac
Source: data_10.5.drString found in binary or memory: https://msn.com
Source: protocols.json.12.drString found in binary or memory: https://sharepoint.com
Source: content.js.12.dr, content_new.js.12.drString found in binary or memory: https://www.google.com/chrome
Source: Web Data.3.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
Source: f8c8615c-e431-41e3-bc89-9681001aadda.tmp.13.drString found in binary or memory: https://www.googleapis.com
Source: Top Sites.3.dr, Top Sites.12.drString found in binary or memory: https://www.office.com/
Source: Top Sites.3.dr, Top Sites.12.drString found in binary or memory: https://www.office.com/Office
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52233
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52234
Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64522 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64521 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64519 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64529 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
Source: unknownNetwork traffic detected: HTTP traffic on port 49756 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64518
Source: unknownNetwork traffic detected: HTTP traffic on port 52234 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64517
Source: unknownNetwork traffic detected: HTTP traffic on port 64518 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64519
Source: unknownNetwork traffic detected: HTTP traffic on port 64520 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64524 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64528 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49756
Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64527
Source: unknownNetwork traffic detected: HTTP traffic on port 52233 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64529
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64528
Source: unknownNetwork traffic detected: HTTP traffic on port 64517 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64523 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 64527 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64521
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64520
Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64523
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64522
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64524
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49759 version: TLS 1.2
Source: unknownHTTPS traffic detected: 184.28.90.27:443 -> 192.168.2.4:49760 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.4:49768 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.127.169.103:443 -> 192.168.2.4:64527 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B4EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B4EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B4ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B4ED6A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B4EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B4EAFF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B3AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00B3AA57
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B69576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B69576

System Summary

barindex
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: file.exe, 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_4d511c29-e
Source: file.exe, 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_9186fb0c-c
Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d3f26524-b
Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0f719b34-7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B3D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00B3D5EB
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B31201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00B31201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B3E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00B3E8F6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AD80600_2_00AD8060
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B420460_2_00B42046
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B382980_2_00B38298
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0E4FF0_2_00B0E4FF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0676B0_2_00B0676B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B648730_2_00B64873
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AFCAA00_2_00AFCAA0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ADCAF00_2_00ADCAF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AECC390_2_00AECC39
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B06DD90_2_00B06DD9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AD91C00_2_00AD91C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AEB1190_2_00AEB119
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF13940_2_00AF1394
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF17060_2_00AF1706
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF781B0_2_00AF781B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF19B00_2_00AF19B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AD79200_2_00AD7920
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AE997D0_2_00AE997D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF7A4A0_2_00AF7A4A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF7CA70_2_00AF7CA7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF1C770_2_00AF1C77
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B09EEE0_2_00B09EEE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B5BE440_2_00B5BE44
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF1F320_2_00AF1F32
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00AF0A30 appears 46 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 00AEF9F2 appears 31 times
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal76.evad.winEXE@98/528@23/10
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B437B5 GetLastError,FormatMessageW,0_2_00B437B5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B310BF AdjustTokenPrivileges,CloseHandle,0_2_00B310BF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B316C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00B316C3
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B451CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00B451CD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B5A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00B5A67C
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B4648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00B4648E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AD42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00AD42A2
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeFile created: C:\Users\user\AppData\Local\Microsoft\Edge\User Data KioskJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeFile created: C:\Users\user\AppData\Local\Temp\9df29a71-f1b7-4f01-9aa8-8543019f0ebc.tmpJump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Login Data.12.dr, Login Data.3.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: file.exeReversingLabs: Detection: 21%
Source: file.exeVirustotal: Detection: 21%
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=2120,i,14100662108306307512,17240055722320644546,262144 --disable-features=TranslateUI /prefetch:3
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2756 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:3
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6932 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=3444 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7264 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7264 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8
Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:3
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4184 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6164 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6164 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8
Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1952 --field-trial-handle=2088,i,17495144093669896207,16119466351810412879,262144 /prefetch:3
Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1992,i,11980253433158085184,3980390935348244074,262144 /prefetch:3
Source: unknownProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1972,i,10789157105983230292,1372337410351055034,262144 /prefetch:3
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/passwordJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=2120,i,14100662108306307512,17240055722320644546,262144 --disable-features=TranslateUI /prefetch:3Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2756 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:3Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4184 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6932 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=3444 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7264 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7264 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:3Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4184 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6164 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6164 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6164 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe "C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6164 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1952 --field-trial-handle=2088,i,17495144093669896207,16119466351810412879,262144 /prefetch:3
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1992,i,11980253433158085184,3980390935348244074,262144 /prefetch:3
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: unknown unknown
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeProcess created: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1972,i,10789157105983230292,1372337410351055034,262144 /prefetch:3
Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AD42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF0A76 push ecx; ret 0_2_00AF0A89

Boot Survival

barindex
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_5736606B9E4AF5D84DA5A728AAAD52EBJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_5736606B9E4AF5D84DA5A728AAAD52EBJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_5736606B9E4AF5D84DA5A728AAAD52EBJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868Jump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868Jump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AEF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AEF98E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B61C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B61C41
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96100
Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 6671Jump to behavior
Source: C:\Users\user\Desktop\file.exeAPI coverage: 4.0 %
Source: C:\Users\user\Desktop\file.exe TID: 7752Thread sleep time: -66710s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeThread sleep count: Count: 6671 delay: -10Jump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B3DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B3DBBE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B468EE FindFirstFileW,FindClose,0_2_00B468EE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B4698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00B4698F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B3D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B3D076
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B3D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B3D3A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B49642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B49642
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B4979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4979D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B49B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00B49B2B
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B45C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00B45C97
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AD42DE

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-96059
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B4EAA2 BlockInput,0_2_00B4EAA2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B02622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B02622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AD42DE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF4CE8 mov eax, dword ptr fs:[00000030h]0_2_00AF4CE8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B30B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00B30B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B02622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B02622
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AF083F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF09D5 SetUnhandledExceptionFilter,0_2_00AF09D5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00AF0C21

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeSection loaded: NULL target: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe protection: readonlyJump to behavior
Source: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeSection loaded: NULL target: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe protection: readonlyJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B31201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00B31201
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B12BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B12BA5
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AEF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AEF98E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B522DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00B522DA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B30B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00B30B62
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B31663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00B31663
Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: file.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AF0698 cpuid 0_2_00AF0698
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B48195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00B48195
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B2D27A GetUserNameW,0_2_00B2D27A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B0BB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00B0BB6F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00AD42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AD42DE
Source: file.exeBinary or memory string: WIN_81
Source: file.exeBinary or memory string: WIN_XP
Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: file.exeBinary or memory string: WIN_XPe
Source: file.exeBinary or memory string: WIN_VISTA
Source: file.exeBinary or memory string: WIN_7
Source: file.exeBinary or memory string: WIN_8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B51204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00B51204
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00B51806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00B51806
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job2
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt11
Registry Run Keys / Startup Folder
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
Access Token Manipulation
1
DLL Side-Loading
NTDS15
System Information Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
1
Masquerading
LSA Secrets22
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
Registry Run Keys / Startup Folder
2
Valid Accounts
Cached Domain Credentials22
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
Virtualization/Sandbox Evasion
DCSync2
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1502162 Sample: file.exe Startdate: 31/08/2024 Architecture: WINDOWS Score: 76 39 chrome.cloudflare-dns.com 2->39 57 Multi AV Scanner detection for submitted file 2->57 59 Binary is likely a compiled AutoIt script file 2->59 61 Machine Learning detection for sample 2->61 63 AI detected suspicious sample 2->63 8 file.exe 2->8         started        11 msedge.exe 25 366 2->11         started        14 msedge.exe 24 480 2->14         started        16 3 other processes 2->16 signatures3 process4 dnsIp5 65 Binary is likely a compiled AutoIt script file 8->65 67 Found API chain indicative of debugger detection 8->67 69 Found API chain indicative of sandbox detection 8->69 18 msedge.exe 3 22 8->18         started        53 192.168.2.4, 138, 443, 49529 unknown unknown 11->53 55 239.255.255.250 unknown Reserved 11->55 71 Creates multiple autostart registry keys 11->71 73 Maps a DLL or memory area into another process 11->73 20 msedge.exe 33 11->20         started        23 msedge.exe 11->23         started        25 msedge.exe 11->25         started        31 2 other processes 11->31 27 msedge.exe 14->27         started        29 msedge.exe 14->29         started        33 2 other processes 14->33 35 3 other processes 16->35 signatures6 process7 dnsIp8 37 msedge.exe 18->37         started        41 s-part-0032.t-0009.t-msedge.net 13.107.246.60, 443, 49747, 49748 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 20->41 43 142.250.65.164, 443, 49765 GOOGLEUS United States 20->43 49 6 other IPs or domains 20->49 45 googlehosted.l.googleusercontent.com 142.250.181.225, 443, 49778 GOOGLEUS United States 27->45 47 152.195.19.97, 443, 64522 EDGECASTUS United States 27->47 51 4 other IPs or domains 27->51 process9

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe21%ReversingLabs
file.exe21%VirustotalBrowse
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
chrome.cloudflare-dns.com0%VirustotalBrowse
googlehosted.l.googleusercontent.com0%VirustotalBrowse
s-part-0032.t-0009.t-msedge.net0%VirustotalBrowse
sni1gl.wpc.nucdn.net0%VirustotalBrowse
bzib.nelreports.net0%VirustotalBrowse
clients2.googleusercontent.com0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://chrome.cloudflare-dns.com0%URL Reputationsafe
https://duckduckgo.com/chrome_newtab0%URL Reputationsafe
https://duckduckgo.com/ac/?q=0%URL Reputationsafe
https://drive-daily-2.corp.google.com/0%URL Reputationsafe
https://drive-autopush.corp.google.com/0%URL Reputationsafe
https://drive-autopush.corp.google.com/0%URL Reputationsafe
https://drive-daily-4.corp.google.com/0%URL Reputationsafe
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%URL Reputationsafe
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
https://drive-daily-1.corp.google.com/0%URL Reputationsafe
https://drive-daily-5.corp.google.com/0%URL Reputationsafe
https://bzib.nelreports.net/api/report?cat=bingbusiness0%URL Reputationsafe
https://chrome.cloudflare-dns.com/dns-query0%URL Reputationsafe
https://drive-staging.corp.google.com/0%URL Reputationsafe
https://drive-daily-6.corp.google.com/0%URL Reputationsafe
https://drive-daily-0.corp.google.com/0%URL Reputationsafe
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
https://chromewebstore.google.com/0%URL Reputationsafe
https://drive-preprod.corp.google.com/0%URL Reputationsafe
https://drive-daily-3.corp.google.com/0%URL Reputationsafe
https://www.office.com/0%Avira URL Cloudsafe
https://www.office.com/Office0%Avira URL Cloudsafe
https://msn.com0%Avira URL Cloudsafe
https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
https://.onedrive.live.com0%Avira URL Cloudsafe
https://www.google.com/favicon.ico0%Avira URL Cloudsafe
https://docs.google.com/0%Avira URL Cloudsafe
https://www.google.com/chrome0%Avira URL Cloudsafe
https://www.office.com/Office0%VirustotalBrowse
https://drive.google.com/0%Avira URL Cloudsafe
https://msn.com0%VirustotalBrowse
https://www.google.com/favicon.ico0%VirustotalBrowse
https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
https://.onedrive.com0%Avira URL Cloudsafe
https://.onedrive.live.com1%VirustotalBrowse
https://clients2.googleusercontent.com0%Avira URL Cloudsafe
https://chrome.google.com/webstore/0%Avira URL Cloudsafe
https://drive.google.com/0%VirustotalBrowse
https://sharepoint.com0%Avira URL Cloudsafe
https://www.office.com/0%VirustotalBrowse
https://clients2.googleusercontent.com/crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx0%Avira URL Cloudsafe
https://docs.google.com/0%VirustotalBrowse
https://clients2.googleusercontent.com0%VirustotalBrowse
https://.onedrive.com0%VirustotalBrowse
https://www.google.com/chrome0%VirustotalBrowse
https://sharepoint.com0%VirustotalBrowse
https://chrome.google.com/webstore/0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
chrome.cloudflare-dns.com
172.64.41.3
truefalseunknown
googlehosted.l.googleusercontent.com
142.250.181.225
truefalseunknown
s-part-0032.t-0009.t-msedge.net
13.107.246.60
truefalseunknown
sni1gl.wpc.nucdn.net
152.199.21.175
truefalseunknown
clients2.googleusercontent.com
unknown
unknownfalseunknown
bzib.nelreports.net
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
https://www.google.com/favicon.icofalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://chrome.cloudflare-dns.com/dns-queryfalse
  • URL Reputation: safe
unknown
https://clients2.googleusercontent.com/crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crxfalse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://www.office.com/Top Sites.3.dr, Top Sites.12.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://chrome.cloudflare-dns.comNetwork Persistent State0.12.drfalse
  • URL Reputation: safe
unknown
https://duckduckgo.com/chrome_newtabWeb Data.3.drfalse
  • URL Reputation: safe
unknown
https://duckduckgo.com/ac/?q=Web Data.3.drfalse
  • URL Reputation: safe
unknown
https://msn.comdata_10.5.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.icoWeb Data.3.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://.onedrive.live.comprotocols.json.12.drfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://drive-daily-2.corp.google.com/manifest.json0.12.drfalse
  • URL Reputation: safe
unknown
https://drive-autopush.corp.google.com/manifest.json0.12.drfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
https://drive-daily-4.corp.google.com/manifest.json0.12.drfalse
  • URL Reputation: safe
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Web Data.3.drfalse
  • URL Reputation: safe
unknown
https://www.office.com/OfficeTop Sites.3.dr, Top Sites.12.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Web Data.3.drfalse
  • URL Reputation: safe
unknown
https://drive-daily-1.corp.google.com/manifest.json0.12.drfalse
  • URL Reputation: safe
unknown
https://drive-daily-5.corp.google.com/manifest.json0.12.drfalse
  • URL Reputation: safe
unknown
https://docs.google.com/manifest.json0.12.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://bzib.nelreports.net/api/report?cat=bingbusinessReporting and NEL0.5.drfalse
  • URL Reputation: safe
unknown
https://drive-staging.corp.google.com/manifest.json0.12.drfalse
  • URL Reputation: safe
unknown
https://www.google.com/chromecontent.js.12.dr, content_new.js.12.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://drive-daily-6.corp.google.com/manifest.json0.12.drfalse
  • URL Reputation: safe
unknown
https://drive.google.com/manifest.json0.12.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://drive-daily-0.corp.google.com/manifest.json0.12.drfalse
  • URL Reputation: safe
unknown
https://.onedrive.comprotocols.json.12.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchWeb Data.3.drfalse
  • URL Reputation: safe
unknown
https://chromewebstore.google.com/manifest.json.12.drfalse
  • URL Reputation: safe
unknown
https://drive-preprod.corp.google.com/manifest.json0.12.drfalse
  • URL Reputation: safe
unknown
https://clients2.googleusercontent.comf8c8615c-e431-41e3-bc89-9681001aadda.tmp.13.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://chrome.google.com/webstore/manifest.json.12.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://sharepoint.comprotocols.json.12.drfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://drive-daily-3.corp.google.com/manifest.json0.12.drfalse
  • URL Reputation: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
142.250.65.174
unknownUnited States
15169GOOGLEUSfalse
142.250.80.110
unknownUnited States
15169GOOGLEUSfalse
152.195.19.97
unknownUnited States
15133EDGECASTUSfalse
13.107.246.60
s-part-0032.t-0009.t-msedge.netUnited States
8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
162.159.61.3
unknownUnited States
13335CLOUDFLARENETUSfalse
142.250.181.225
googlehosted.l.googleusercontent.comUnited States
15169GOOGLEUSfalse
239.255.255.250
unknownReserved
unknownunknownfalse
142.250.65.164
unknownUnited States
15169GOOGLEUSfalse
172.64.41.3
chrome.cloudflare-dns.comUnited States
13335CLOUDFLARENETUSfalse
IP
192.168.2.4
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1502162
Start date and time:2024-08-31 10:45:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 55s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:26
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal76.evad.winEXE@98/528@23/10
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 97%
  • Number of executed functions: 41
  • Number of non-executed functions: 309
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 173.194.76.84, 13.107.42.16, 204.79.197.239, 13.107.21.239, 13.107.6.158, 2.19.126.152, 2.19.126.145, 142.250.185.195, 142.250.186.35, 204.79.197.200, 13.107.21.200, 20.74.47.205, 199.232.214.172, 192.229.221.95, 172.217.16.206, 142.250.181.234, 142.250.186.74, 142.250.186.138, 172.217.18.106, 142.250.185.106, 142.250.186.170, 142.250.185.202, 216.58.212.138, 172.217.16.138, 142.250.184.234, 172.217.23.106, 142.250.185.138, 142.250.185.74, 142.250.185.234, 142.250.185.170, 142.250.186.106, 142.250.80.35, 142.250.80.67, 142.251.40.99, 142.251.41.3, 142.250.65.163, 142.251.35.163, 23.54.161.105, 23.55.235.170
  • Excluded domains from analysis (whitelisted): cdp-f-ssl-tlu-net.trafficmanager.net, config.edge.skype.com.trafficmanager.net, slscr.update.microsoft.com, a416.dscd.akamai.net, edgeassetservice.afd.azureedge.net, arc.msn.com, iris-de-prod-azsc-v2-frc-b.francecentral.cloudapp.azure.com, dns.msftncsi.com, star.sf.tlu.dl.delivery.mp.microsoft.com.delivery.microsoft.com, cn-bing-com.cn.a-0001.a-msedge.net, clients2.google.com, ocsp.digicert.com, www.bing.com.edgekey.net, config-edge-skype.l-0007.l-msedge.net, msedge.b.tlu.dl.delivery.mp.microsoft.com, arc.trafficmanager.net, www.gstatic.com, l-0007.l-msedge.net, config.edge.skype.com, www.bing.com, edge-microsoft-com.dual-a-0036.a-msedge.net, a-0001.a-msedge.net, fs.microsoft.com, accounts.google.com, bzib.nelreports.net.akamaized.net, fonts.gstatic.com, wildcardtlu-ssl.ec.azureedge.net, ctldl.windowsupdate.com, b-0005.b-msedge.net, www.googleapis.com, www-www.bing.com.trafficmanager.net, edge.microsoft.com, business-bing-com.b-0005.b-msedge.net, fe3cr.delivery.mp
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing behavior information.
  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
  • Report size getting too big, too many NtOpenFile calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtWriteVirtualMemory calls found.
  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
TimeTypeDescription
09:46:04AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_5736606B9E4AF5D84DA5A728AAAD52EB "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
09:46:12AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_5736606B9E4AF5D84DA5A728AAAD52EB "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
09:46:20AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868 "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
09:46:34AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run MicrosoftEdgeAutoLaunch_C366A24065C39A1BE76E148DC2D0A868 "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
162.159.61.3file.exeGet hashmaliciousUnknownBrowse
    file.exeGet hashmaliciousUnknownBrowse
      file.exeGet hashmaliciousUnknownBrowse
        file.exeGet hashmaliciousUnknownBrowse
          file.exeGet hashmaliciousUnknownBrowse
            file.exeGet hashmaliciousUnknownBrowse
              file.exeGet hashmaliciousUnknownBrowse
                file.exeGet hashmaliciousUnknownBrowse
                  file.exeGet hashmaliciousUnknownBrowse
                    file.exeGet hashmaliciousUnknownBrowse
                      152.195.19.97http://ustteam.com/Get hashmaliciousUnknownBrowse
                      • www.ust.com/
                      13.107.246.60https://protect-us.mimecast.com/s/wFHoCqxrAnt7V914iZaD1vGet hashmaliciousUnknownBrowse
                      • www.mimecast.com/Customers/Support/Contact-support/
                      http://wellsfargo.dealogic.com/clientportal/Conferences/Registration/Form/368?menuItemId=5Get hashmaliciousUnknownBrowse
                      • wellsfargo.dealogic.com/clientportal/Conferences/Registration/Form/368?menuItemId=5
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      s-part-0032.t-0009.t-msedge.netfile.exeGet hashmaliciousUnknownBrowse
                      • 13.107.246.60
                      file.exeGet hashmaliciousUnknownBrowse
                      • 13.107.246.60
                      file.exeGet hashmaliciousUnknownBrowse
                      • 13.107.246.60
                      http://security-azure.b-cdn.net/Get hashmaliciousUnknownBrowse
                      • 13.107.246.60
                      file.exeGet hashmaliciousUnknownBrowse
                      • 13.107.246.60
                      https://login.ap-financier.com/TaqWmoGvGet hashmaliciousHTMLPhisherBrowse
                      • 13.107.246.60
                      https://spo.devgdmsuk.com/authorizeGet hashmaliciousHTMLPhisherBrowse
                      • 13.107.246.60
                      file.exeGet hashmaliciousUnknownBrowse
                      • 13.107.246.60
                      https://4271c5088749124ef40631cb8.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                      • 13.107.246.60
                      https://nam.safelink.emails.azure.net/redirect/?destination=https%3A%2F%2Fadmin.microsoft.com%2Fadminportal%2Fhome%3F%23%2Fsubscriptions&p=bT1lNDkwZjQyMi03YTgzLTQxZGUtOTA0My00NzMwNDhhZDBiOTUmcz0wMDAwMDAwMC0wMDAwLTAwMDAtMDAwMC0wMDAwMDAwMDAwMDAmdT1hZW8mbD1ob21lGet hashmaliciousUnknownBrowse
                      • 13.107.246.60
                      chrome.cloudflare-dns.comfile.exeGet hashmaliciousUnknownBrowse
                      • 162.159.61.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 162.159.61.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 162.159.61.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 162.159.61.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 162.159.61.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 162.159.61.3
                      sni1gl.wpc.nucdn.netfile.exeGet hashmaliciousUnknownBrowse
                      • 152.195.19.97
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.195.19.97
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.199.21.175
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.199.21.175
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.199.21.175
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.199.21.175
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.199.21.175
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.199.21.175
                      140-DEMNADA LABORAL- JUZGADO 03 CIVIL DEL CIRCUITO RAMA JUDICIAL.svgGet hashmaliciousAsyncRATBrowse
                      • 152.199.21.175
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.199.21.175
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUSdmhu7oz5yP.exeGet hashmaliciousDCRatBrowse
                      • 188.114.97.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      IrisMichael263Fiona.lib.exeGet hashmaliciousLummaCBrowse
                      • 188.114.96.3
                      http://flow-energy-3109.my.salesforce.comGet hashmaliciousUnknownBrowse
                      • 104.18.32.137
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      CLOUDFLARENETUSdmhu7oz5yP.exeGet hashmaliciousDCRatBrowse
                      • 188.114.97.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      IrisMichael263Fiona.lib.exeGet hashmaliciousLummaCBrowse
                      • 188.114.96.3
                      http://flow-energy-3109.my.salesforce.comGet hashmaliciousUnknownBrowse
                      • 104.18.32.137
                      file.exeGet hashmaliciousUnknownBrowse
                      • 172.64.41.3
                      MICROSOFT-CORP-MSN-AS-BLOCKUSfile.exeGet hashmaliciousUnknownBrowse
                      • 13.107.246.57
                      file.exeGet hashmaliciousUnknownBrowse
                      • 13.107.246.57
                      SecuriteInfo.com.Linux.Siggen.9999.15938.22369.elfGet hashmaliciousMiraiBrowse
                      • 20.65.255.2
                      SecuriteInfo.com.Linux.Siggen.9999.6222.10653.elfGet hashmaliciousMiraiBrowse
                      • 20.110.97.184
                      SecuriteInfo.com.Linux.Siggen.9999.28313.2324.elfGet hashmaliciousMiraiBrowse
                      • 20.54.143.248
                      SecuriteInfo.com.Linux.Siggen.9999.29618.24208.elfGet hashmaliciousMiraiBrowse
                      • 40.96.151.201
                      file.exeGet hashmaliciousUnknownBrowse
                      • 13.107.246.57
                      file.exeGet hashmaliciousUnknownBrowse
                      • 13.107.246.67
                      file.exeGet hashmaliciousUnknownBrowse
                      • 13.107.246.73
                      file.exeGet hashmaliciousUnknownBrowse
                      • 13.107.246.57
                      EDGECASTUSfile.exeGet hashmaliciousUnknownBrowse
                      • 152.195.19.97
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.195.19.97
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.195.19.97
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.195.19.97
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.195.19.97
                      file.exeGet hashmaliciousUnknownBrowse
                      • 152.195.19.97
                      http://security-azure.b-cdn.net/Get hashmaliciousUnknownBrowse
                      • 152.199.21.175
                      http://www.kraftpaints.ro/eve/pdfonline-3d2-new-bg2/pdfonline-3d2-new.bg2/pdfonline-3d2-newbg2/index.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 152.199.21.175
                      https://login.ap-financier.com/TaqWmoGvGet hashmaliciousHTMLPhisherBrowse
                      • 152.199.21.175
                      https://spo.devgdmsuk.com/authorizeGet hashmaliciousHTMLPhisherBrowse
                      • 152.199.21.175
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      28a2c9bd18a11de089ef85a160da29e4file.exeGet hashmaliciousUnknownBrowse
                      • 40.127.169.103
                      • 184.28.90.27
                      • 40.68.123.157
                      file.exeGet hashmaliciousUnknownBrowse
                      • 40.127.169.103
                      • 184.28.90.27
                      • 40.68.123.157
                      file.exeGet hashmaliciousUnknownBrowse
                      • 40.127.169.103
                      • 184.28.90.27
                      • 40.68.123.157
                      https://emp.eduyield.com/el?aid=28gedda0e6c-1865-11ef-80aa-0217a07992df&rid=33766156&pid=771868&cid=497&dest=google.com.////amp/s/thaiphong.com.vn/.dev/4vGsuwWa/ZGFubnkubXdpc2VuZXphQGluaGFiaXQuY29t$%C3%A3%E2%82%AC%E2%80%9AGet hashmaliciousUnknownBrowse
                      • 40.127.169.103
                      • 184.28.90.27
                      • 40.68.123.157
                      file.exeGet hashmaliciousUnknownBrowse
                      • 40.127.169.103
                      • 184.28.90.27
                      • 40.68.123.157
                      file.exeGet hashmaliciousUnknownBrowse
                      • 40.127.169.103
                      • 184.28.90.27
                      • 40.68.123.157
                      file.exeGet hashmaliciousUnknownBrowse
                      • 40.127.169.103
                      • 184.28.90.27
                      • 40.68.123.157
                      http://security-azure.b-cdn.net/Get hashmaliciousUnknownBrowse
                      • 40.127.169.103
                      • 184.28.90.27
                      • 40.68.123.157
                      http://flow-energy-3109.my.salesforce.comGet hashmaliciousUnknownBrowse
                      • 40.127.169.103
                      • 184.28.90.27
                      • 40.68.123.157
                      file.exeGet hashmaliciousUnknownBrowse
                      • 40.127.169.103
                      • 184.28.90.27
                      • 40.68.123.157
                      No context
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):21022
                      Entropy (8bit):6.065673136947576
                      Encrypted:false
                      SSDEEP:384:DtMGQ7LBjuYXGIgtDAW5u0TDJ2q03X8NBS9frAp0qLCvScdWFDVNMa2u:pMGQ7FCYXGIgtDAWtJ4nR0p0qLCvYDVt
                      MD5:1E1A6ABAC480BAC77045DC380035FD28
                      SHA1:81B40C059B66CF5CCAA832AAC8C9E0CC764351FE
                      SHA-256:633A259F7BA2D80B29832814E5CA4B81C64F44CE32A319F944ACE8CF2131DEC9
                      SHA-512:AF0B79ACFA8E35142F0C67E0A1DD71FA2422AFE27570EB81DA915375030C28FC4F017BD0368E637685E5CE7C3AD08F8CCC0475C48DA59A24E21E2C0CE563803C
                      Malicious:false
                      Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369567555595980","domain_actions_config":"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
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):21022
                      Entropy (8bit):6.065665375753458
                      Encrypted:false
                      SSDEEP:384:DtMGQ7LBjuYXGIgtDAW5u0TDJ2q03X8NBS9f/Ap0qLCvScdWFDVNMa2u:pMGQ7FCYXGIgtDAWtJ4nRwp0qLCvYDVt
                      MD5:68563489E205EE032B23B09EF015E122
                      SHA1:92D60D66A16F0B5BF52D1A89EBDE3C3A60DE2099
                      SHA-256:E2655502F037F205B98A7873AB45E873F552763E4546C11867CEF1C6D654DCDA
                      SHA-512:B41B3C5201779B2C73B12AE419420420A49F3CD808793E4E89A6769F2E2FDFB8B6AC0785AEF13C24542F7FA2AB30ECED12ADD9DDDA577D3F1041F6B44AD8F365
                      Malicious:false
                      Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369567555595980","domain_actions_config":"H4sIAAAAAAAAAL1dWZPktpH+KxP9ZDtU6GMujfykHY9txVpHyHIoYh2ODhBEkWiCAAdHVbEc/u+bCVb1dE8RqEqOdh806mbzw8VEXshM/PuKb27vha2luF9LHqKT96KVoru3G+mcquXVN/++4sOgleBBWeOvvvnn4YGs7wcLz8erb65+HMKPMVx9dVXbnisDT4wMa612TNj+6j9fUSA+xFpZPyH/9dVVQig59Wx4L5+Cwzjg799ubt/jJP48zeE9TuHwDjYBc/Ew+Ktvbv/z1ZWoe+rsjB4/7Abr5U+ajz9LXo9Px+21Mk1hoo/oX6HHjTLyKTjYyMJmCbLnO/hZMpjFAjSvxOIhbxgi5FK85m+ZCkuQu7UyKoxLO97yIFoYvbAluiw2oRoYgIQ2nG2AqJY2U+koRXQbbMm3fMsEX9JMK3GLbeAvNjhrlo5GOJiTA/oXLTdG6qXtmMBDiyS59PvY7eCklyb4QcfFi7tpdwu3VBt1XNorvM4+RiU6+CjD0kb+pHz7rRm3rXSyzABnWdKBG+Ijlx7hEE4QTzo+AB6fnDLLJBpo7PKv8Ob367/KjUg8mcY6CmCjTJCmtsWFOcUf5vj04cw0e1yZe2WAl8svFn5IC43jfc+dLnGrEyDwAicHCxNdhlrVa5LEtTgt5u2lAK02pd198r5dr5VYgHj55jUJZGTtlg0NlA7S5AnvB8l7z3olnPV2vfCLsugvBUH7vTVIe9Y151SnmS2Auyvcr5UGYXBvzT2s0L3fKpCZl+2D91MLf04NPNNUni9BZmDP4Sfjk2Ig7ktgg8r8InfhHz//zSP7e8bquWlsDJ411j
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):24354
                      Entropy (8bit):6.055658181289218
                      Encrypted:false
                      SSDEEP:384:DtMGQ7LBjuYXGIgtDAW5u0TDJ2q03X8NG9fsAaxqdqVEnzD9upmcaCvScdWFDVNL:pMGQ7FCYXGIgtDAWtJ4nTnaSnzD9upm5
                      MD5:8AE3391DCD83D50BD4610EF8DC8CE6B0
                      SHA1:6F71560295D343227B06249B8861255BEB78424E
                      SHA-256:F895D34DAB62605E552B724A97CC65F1C1AB74F24FB8E9CFC8512EC8857F6686
                      SHA-512:6BE2EA20107D84F600BD454103236B5F13106DF4C69EB7A4FBB2DDE007D9CC67DA3DECC19976C16E718570E7A42CB8026B469BF638AE8AD086F29EDEF884C3FE
                      Malicious:false
                      Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369567555595980","domain_actions_config":"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
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):3351
                      Entropy (8bit):5.6100940415082245
                      Encrypted:false
                      SSDEEP:96:0q8NkC1f5V964pEBBqvYtu8hJkqcDSDS4S4SDSzI4a:/8Nb3Va683kqo
                      MD5:EB619D2A21219B7554CEA572A815D012
                      SHA1:48A6208A57E6A0E5A1034D927AF7A10FD1807E14
                      SHA-256:1FD8D9381165A1244EE772A0B2033566822045A347D90E082953F5A4111EB0C9
                      SHA-512:1D36276B9603F3800699FB7155B0117F2CCCE5229D5AE6B06BC1A83ED47BA30B88FBCB50983806CEBE71544AE6AFCDF56872CEFDCB09D51083A1719A6F2EDF93
                      Malicious:false
                      Preview:{"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"policy":{"last_statist
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):107893
                      Entropy (8bit):4.640149995732079
                      Encrypted:false
                      SSDEEP:1536:B/lv4EsQMNeQ9s5VwB34PsiaR+tjvYArQdW+Iuh57P75:fwUQC5VwBIiElEd2K57P75
                      MD5:AD9FA3B6C5E14C97CFD9D9A6994CC84A
                      SHA1:EF063B4A4988723E0794662EC9D9831DB6566E83
                      SHA-256:DCC7F776DBDE2DB809D3402FC302DB414CF67FE5D57297DDDADCE1EE42CFCE8F
                      SHA-512:81D9D59657CAF5805D2D190E8533AF48ACEBFFF63409F5A620C4E08F868710301A0C622D7292168048A9BC16C0250669FAAA2DCBF40419740A083C6ED5D79CFA
                      Malicious:false
                      Preview:{"sites":[{"url":"24video.be"},{"url":"7dnifutbol.bg"},{"url":"6tv.dk"},{"url":"9kefa.com"},{"url":"aculpaedoslb.blogspot.pt"},{"url":"aek-live.gr"},{"url":"arcadepunk.co.uk"},{"url":"acidimg.cc"},{"url":"aazah.com"},{"url":"allehensbeverwijk.nl"},{"url":"amateurgonewild.org"},{"url":"aindasoudotempo.blogspot.com"},{"url":"anorthosis365.com"},{"url":"autoreview.bg"},{"url":"alivefoot.us"},{"url":"arbitro10.com"},{"url":"allhard.org"},{"url":"babesnude.info"},{"url":"aysel.today"},{"url":"animepornx.com"},{"url":"bahisideal20.com"},{"url":"analyseindustrie.nl"},{"url":"bahis10line.org"},{"url":"apoel365.net"},{"url":"bahissitelerisikayetleri.com"},{"url":"bambusratte.com"},{"url":"banzaj.pl"},{"url":"barlevegas.com"},{"url":"baston.info"},{"url":"atomcurve.com"},{"url":"atascadocherba.com"},{"url":"astrologer.gr"},{"url":"adultpicz.com"},{"url":"alleporno.com"},{"url":"beaver-tube.com"},{"url":"beachbabes.info"},{"url":"bearworldmagazine.com"},{"url":"bebegimdensonra.com"},{"url":"autoy
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):107893
                      Entropy (8bit):4.640149995732079
                      Encrypted:false
                      SSDEEP:1536:B/lv4EsQMNeQ9s5VwB34PsiaR+tjvYArQdW+Iuh57P75:fwUQC5VwBIiElEd2K57P75
                      MD5:AD9FA3B6C5E14C97CFD9D9A6994CC84A
                      SHA1:EF063B4A4988723E0794662EC9D9831DB6566E83
                      SHA-256:DCC7F776DBDE2DB809D3402FC302DB414CF67FE5D57297DDDADCE1EE42CFCE8F
                      SHA-512:81D9D59657CAF5805D2D190E8533AF48ACEBFFF63409F5A620C4E08F868710301A0C622D7292168048A9BC16C0250669FAAA2DCBF40419740A083C6ED5D79CFA
                      Malicious:false
                      Preview:{"sites":[{"url":"24video.be"},{"url":"7dnifutbol.bg"},{"url":"6tv.dk"},{"url":"9kefa.com"},{"url":"aculpaedoslb.blogspot.pt"},{"url":"aek-live.gr"},{"url":"arcadepunk.co.uk"},{"url":"acidimg.cc"},{"url":"aazah.com"},{"url":"allehensbeverwijk.nl"},{"url":"amateurgonewild.org"},{"url":"aindasoudotempo.blogspot.com"},{"url":"anorthosis365.com"},{"url":"autoreview.bg"},{"url":"alivefoot.us"},{"url":"arbitro10.com"},{"url":"allhard.org"},{"url":"babesnude.info"},{"url":"aysel.today"},{"url":"animepornx.com"},{"url":"bahisideal20.com"},{"url":"analyseindustrie.nl"},{"url":"bahis10line.org"},{"url":"apoel365.net"},{"url":"bahissitelerisikayetleri.com"},{"url":"bambusratte.com"},{"url":"banzaj.pl"},{"url":"barlevegas.com"},{"url":"baston.info"},{"url":"atomcurve.com"},{"url":"atascadocherba.com"},{"url":"astrologer.gr"},{"url":"adultpicz.com"},{"url":"alleporno.com"},{"url":"beaver-tube.com"},{"url":"beachbabes.info"},{"url":"bearworldmagazine.com"},{"url":"bebegimdensonra.com"},{"url":"autoy
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4194304
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3::
                      MD5:B5CFA9D6C8FEBD618F91AC2843D50A1C
                      SHA1:2BCCBD2F38F15C13EB7D5A89FD9D85F595E23BC3
                      SHA-256:BB9F8DF61474D25E71FA00722318CD387396CA1736605E1248821CC0DE3D3AF8
                      SHA-512:BD273BF4E10ED6E305ECB7B781CB065545FCE9BE9F1E2968DF22C3A98F82D719855AAFE5FF303D14EA623A5C55E51E924E10033A92A7A6B07725D7E9692B74F5
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4194304
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3::
                      MD5:B5CFA9D6C8FEBD618F91AC2843D50A1C
                      SHA1:2BCCBD2F38F15C13EB7D5A89FD9D85F595E23BC3
                      SHA-256:BB9F8DF61474D25E71FA00722318CD387396CA1736605E1248821CC0DE3D3AF8
                      SHA-512:BD273BF4E10ED6E305ECB7B781CB065545FCE9BE9F1E2968DF22C3A98F82D719855AAFE5FF303D14EA623A5C55E51E924E10033A92A7A6B07725D7E9692B74F5
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4194304
                      Entropy (8bit):0.04050142405786911
                      Encrypted:false
                      SSDEEP:192:MzUjLYiVWK+ggCdlqJtD+FX9XTokgV8vYhafvNEfbcRQM9Ecen8y08Tcm2RGOdB:sUjjlmqynhIuQ6ce08T2RGOD
                      MD5:3AF4C74F96DE18E003E1BD529B3477A9
                      SHA1:2D46DF74AFAD9A7070C86580DD2103ED72116149
                      SHA-256:D739B352247910377C88F89EDA749684E35F186256A01BD9686BC0D31405E295
                      SHA-512:A5C654ABE2088CBEB25B9637FE5269974CBE9F6A52482A25D528C11963BF5279AF07582EFE0DC648B7378189D2EAD77897E2540FBADB71AA80B853E4577A579B
                      Malicious:false
                      Preview:...@..@...@.....C.].....@................a...P..............`... ...i.y.........BrowserMetrics......i.y..Yd. .......A...................v.0.....UV&K.k<................UV&K.k<................UMA.PersistentHistograms.InitResult.....8...i.y.[".................................................i.y.Pq.30..............117.0.2045.47-64..".en-GB*...Windows NT..10.0.190452l..x86_64..?........".ptlqmq20,1(.0..8..B.......2.:.M..BU..Be...?j...GenuineIntel... .. ..........x86_64...J....k..^o..J..l.zL.^o..J....\.^o..J.....f.^o..J....?.^o..P.Z...b.INBXj....... .8.@................................*..$}.CG....L.T.w..Ucw.}....u.$r....9...>.........."....."...2...".*.:............B)..1.3.177.11.. .*.RegKeyNotFound2.windowsR...Z.........K@..$...SF@.......Y@.......Y@.......Y@........?........?.................?.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@................Y@.......Y@.......Y@........?........?z.......................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4194304
                      Entropy (8bit):0.46346007276902357
                      Encrypted:false
                      SSDEEP:3072:aN81xpa2vWbWKrMT+yBD02HXZifJkVsMvNnhxg1HFqTlLrwZYyEyYq2OvZDTf3k4:Zp1XZnhxaH2ihF49TaHyRt1QTFGk
                      MD5:93AA37B5D2610E7129B8DFEF4C1493B2
                      SHA1:519E9A27270168A192C6ED8EC1BC3556943ADEFA
                      SHA-256:98A0FAF9AAFFEE401556BAAFEEBA04EB5D12D55B528AD66D1036166220723BAE
                      SHA-512:A5FFDE31C43D2B241EFBEC06053F79025098A2739B6528559ABECBC1FA9B712A42685776E2069A34BBA76A5AE53CF1D757C92895AC6020A57282195C02E67188
                      Malicious:false
                      Preview:...@..@...@.....C.].....@................u...u..............`... ...i.y.........BrowserMetrics......i.y..Yd. .......A...................v.0.....UV&K.k<................UV&K.k<................UMA.PersistentHistograms.InitResult.....8...i.y.[".................................................i.y.Pq.30..............117.0.2045.47-64..".en-GB*...Windows NT..10.0.190452....x86_64..?........".ptlqmq20,1(.0..8..B....(.....10.0.19041.5462.Google Inc. (Google):bANGLE (Google, Vulkan 1.3.0 (SwiftShader Device (Subzero) (0x0000C0DE)), SwiftShader driver-5.0.0)M..BU..Be...?j...GenuineIntel... .. ..............x86_64...J....s..^o..J...W..^o..J..,jp..^o..J.......^o..J../T...^o..J...X.p.^o..J.....p.^o..J...c...^o..J...Y...^o..J.......^o..J..w....^o..J...G.Y.^o..J..A....^o..J....c..^o..J...c=..^o..J....J..^o..J...h8..^o..J..3.(..^o..J.......^o..J..!n...^o..J...S@".^o..J.......^o..J.......^o..J...j.8.^o..J..@....^o..J.......^o..J...b.J.^o..J..G....^o..J..8...^o..J...#...^o..J....k..^o..J..S..O.^o.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):280
                      Entropy (8bit):4.167640943410393
                      Encrypted:false
                      SSDEEP:3:FiWWltlcvkzfHSRqOFhJXI2EyBl+BVP/Sh/JzvKG9dScTIHUTHWcXcTtl:o1FfyRqsx+BVsJDd9QcE6HzWX
                      MD5:C3964D25C7087D71739E9E0FA3B9A81B
                      SHA1:C4A71107268F12A115B1A4C302EA01F7A0146306
                      SHA-256:D772DD7F356DD2FD657EC161A470107DA83B1547D9021D8B7A66A194A304E483
                      SHA-512:E25D64BFAF9471DA36FC8990FFEE4DF5A5EA650E4C487C24A496C89718DE0DB3633E02563083CCDB93CBA9324495B4D35FE979A8B1DBB14AD1F35F19EB4C16DC
                      Malicious:false
                      Preview:sdPC......................aW..J...I..."1SCRpGKHAwpF5kOwXUUSc/ojBrTkNG2SgkvqW1WE7kI="..................................................................................47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU=....................4eab5c9c-1f87-4136-b1f9-f044b766929e............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):20
                      Entropy (8bit):3.6219280948873624
                      Encrypted:false
                      SSDEEP:3:8g6Vvn:8g6Vv
                      MD5:9E4E94633B73F4A7680240A0FFD6CD2C
                      SHA1:E68E02453CE22736169A56FDB59043D33668368F
                      SHA-256:41C91A9C93D76295746A149DCE7EBB3B9EE2CB551D84365FFF108E59A61CC304
                      SHA-512:193011A756B2368956C71A9A3AE8BC9537D99F52218F124B2E64545EEB5227861D372639052B74D0DD956CB33CA72A9107E069F1EF332B9645044849D14AF337
                      Malicious:false
                      Preview:level=none expiry=0.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6526
                      Entropy (8bit):4.980370570569397
                      Encrypted:false
                      SSDEEP:96:stgqfais1jb9KfdfN8zLs85eh6Cb7/x+6MhmuecmAe+0QV2Mz7/EJ:stgcsCdfNkLs88bV+FiApPz7MJ
                      MD5:1D716339028C24DD3F82601C479019DF
                      SHA1:BF56EC987364DEE3F243569F0E98F8467038AD54
                      SHA-256:3B4A8776C8DF840109D9FA9C23906A08A2D5CFD9F5BFC68B95DFAC03E828E22D
                      SHA-512:F8FBF47D36E234AC390BA910304566116B1AA174C282DF700C44EDF6793C7E2F0E897B85D126F8BFABB4C86FCCBB6A3A2E9EEAB9742791518315FBAD7DE2B970
                      Malicious:false
                      Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369567554880710","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"domain_diversity":{"last_reporting_timestamp":"13369567555301746"},"download":{"default_directory":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\KioskDownloads\\","directory_upgrade":true},"dual_engine":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_version":
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):24799
                      Entropy (8bit):5.5661021422450245
                      Encrypted:false
                      SSDEEP:768:isXGq5WPRZf8j8F1+UoAYDCx9Tuqh0VfUC9xbog/OV8haSu7urwvpGtu8:isXGq5WPRZf8ju1jatIf3AtD
                      MD5:6ACD8853CC09CC0FA358BA18288F717D
                      SHA1:948E6E96D77A65CF79C9487D33F4AA62A0C1579C
                      SHA-256:BE7E1F3C801B6DD4270FE0AFA2BFBE8832A0679737F8CC4A67502F25D084DCA5
                      SHA-512:CAEA0BD05E4FBF577905ECFF0B4775C6023C4A39A18B9F174147B5A4BC968C3C8857B4F940E8D0E4BC41FEBBEB1F8E5A807AF30FECB2E925B739D5A0BC534DE7
                      Malicious:false
                      Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369567554350388","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369567554350388","location":5,"ma
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6290
                      Entropy (8bit):4.970855883998077
                      Encrypted:false
                      SSDEEP:96:stgqfais1jb9KfdfN8zLs85eh6Cb7/x+6MhmuecmAe+tt2Mz7/EJ:stgcsCdfNkLs88bV+FiAxPz7MJ
                      MD5:80C76B4A8511AB25C494D5F76A30B0D3
                      SHA1:2987E5FD94E520967551BB2ACC7FF121738DC980
                      SHA-256:228CF05C05E6335D7110CB08104B84400A5E31E2FDDAE2CDF5BB1514C11D1D04
                      SHA-512:0FAD958A3FFBBED747A33BA1C46185F56AC2A3A2920FF14D8E6F3E3FB892D46FD933170004EAEDE66135700533751520269755B21EB3E8E09690774D1258A688
                      Malicious:false
                      Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369567554880710","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"domain_diversity":{"last_reporting_timestamp":"13369567555301746"},"download":{"default_directory":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\KioskDownloads\\","directory_upgrade":true},"dual_engine":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_version":
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):24800
                      Entropy (8bit):5.566003081083276
                      Encrypted:false
                      SSDEEP:768:isXGq5WPRZfjj8F1+UoAYDCx9Tuqh0VfUC9xbog/OV8haSu7urwDpGtup:isXGq5WPRZfjju1jatIf3UtW
                      MD5:D2E11B5EBBA1854FF680B608BC391E9D
                      SHA1:D6E9E2D97FC83271172209D84D9D2C48E1BA6D82
                      SHA-256:E03C3E25EDF00A85832D38E91EB3C7FF5103B093A3B56847A42DDC4D2735CBAB
                      SHA-512:2C4AE067D4EC40A8BF54181434EBA5CED8A745F10C05FE7FDD0E5EC399F6FE5C9C8AD8237418E079C770BA4456AF58BF68BEC18EAB49977E6886455D73AF3CCF
                      Malicious:false
                      Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369567554350388","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369567554350388","location":5,"ma
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:modified
                      Size (bytes):12600
                      Entropy (8bit):5.3211405609864535
                      Encrypted:false
                      SSDEEP:192:ExAOEH/WCxkD7MDPSYAxmemxb7mngJdv9TXJ4MQmLu5/4eeNdl:EKOEOKSXs/J7mGnQmLu5/5eNdl
                      MD5:92A6D79DF2336AF387A60E21B49BB9D7
                      SHA1:D5C27BA2644B8DE6CB49A0A64FC3790C071EB968
                      SHA-256:98021125F545558165D6CEC56752A4C5BFB5290DD9D8E7C0088C99E2A3CEBD3D
                      SHA-512:074A15A94E318C32CC6151A0EE14F9FBA2676D4170F2B15CCD7A533D1C85879686EC647FE24751BA7F34F9FA79C0814AA85F19FDF667155B418CEC22BCC37A7F
                      Malicious:false
                      Preview:...m.................DB_VERSION.1.6/.................QUERY_TIMESTAMP:arbitration_priority_list4.*.*.13369567559736743.$QUERY:arbitration_priority_list4.*.*..[{"name":"arbitration_priority_list","url":"https://edgeassetservice.azureedge.net/assets/arbitration_priority_list/4.0.5/asset?assetgroup=ArbitrationService","version":{"major":4,"minor":0,"patch":5},"hash":"2DPW9BV28WrPpgGHdKsEvldNQvD7dA0AAxPa3B/lKN0=","size":11989}]..A./..............'ASSET_VERSION:arbitration_priority_list.4.0.5..ASSET:arbitration_priority_list.]{.. "configVersion": 32,.. "PrivilegedExperiences": [.. "ShorelinePrivilegedExperienceID",.. "SHOPPING_AUTO_SHOW_COUPONS_CHECKOUT",.. "SHOPPING_AUTO_SHOW_LOWER_PRICE_FOUND",.. "SHOPPING_AUTO_SHOW_BING_SEARCH",.. "SHOPPING_AUTO_SHOW_REBATES",.. "SHOPPING_AUTO_SHOW_REBATES_CONFIRMATION",.. "SHOPPING_AUTO_SHOW_REBATES_DEACTIVATED",.. "SHOPPING_AUTO_SHOW_REBATES_BING",.. "SHOPPING_AUTO_SHOW_REBATES_ORGANIC",.. "SHOPPING_AUTO_SHOW_PRICE_HIST
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):305
                      Entropy (8bit):5.150136684978024
                      Encrypted:false
                      SSDEEP:6:JQ63R1wkn23oH+TcwtOEh1ZB2KLl/Q6LQL+q2Pwkn23oH+TcwtOEh1tIFUv:n0fYebOEh1ZFLDQ+vYfYebOEh16FUv
                      MD5:F652C2F6B3D7C21A8B23683ACEF163E2
                      SHA1:2C7BD79BFC3FA94B74CC8794E4FF3EC5D228B30F
                      SHA-256:9E1F708BA813651B020A7B166C08DD6A462339220099A20795F4FBC98914A24F
                      SHA-512:2E4FFFC68985737A1424717F010A89F0F6E3AA391669F584638D527243AA9E70F9D4509D06E2A4EE7BEB31994AEC67EC87444650D02865980A4D8E247282B95C
                      Malicious:false
                      Preview:2024/08/31-04:45:59.003 239c Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Asset Store\assets.db since it was missing..2024/08/31-04:45:59.060 239c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Asset Store\assets.db/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):12288
                      Entropy (8bit):0.3202460253800455
                      Encrypted:false
                      SSDEEP:6:l9bNFlEuWk8TRH9MRumWEyE4gLueXdNOmWxFxCxmWxYgCxmW5y/mWz4ynLAtD/W4:TLiuWkMORuHEyESeXdwDQ3SOAtD/ie
                      MD5:40B18EC43DB334E7B3F6295C7626F28D
                      SHA1:0E46584B0E0A9703C6B2EC1D246F41E63AF2296F
                      SHA-256:85E961767239E90A361FB6AA0A3FD9DAA57CAAF9E30599BB70124F1954B751C8
                      SHA-512:8BDACDC4A9559E4273AD01407D5D411035EECD927385A51172F401558444AD29B5AD2DC5562D1101244665EBE86BBDDE072E75ECA050B051482005EB6A52CDBD
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):45056
                      Entropy (8bit):0.04415233582628785
                      Encrypted:false
                      SSDEEP:6:/Fii2VxOkM/lJ6tT/wAl8llkAJjOZ1Gkll1K+d8lR/lb:dsBEJ61/wAa+msL/4N
                      MD5:4C87940E97552281DB47689F41DA62E6
                      SHA1:F22D669B8D74DE51FE6C2CC0D2DBC92019667528
                      SHA-256:CC9DCC91D083819618ED989960BFAEB762971994E715E5EC53459CDA09CFF961
                      SHA-512:E65E8A1208FAA9626AB7A5AD7230184907D4219F290D3BC64098A51FE9CB03EBED022DA52FCD73942304D0FB46E4638FB7E0B4B4009B271BA787A3FB8E3E73A0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):0.09583535072553481
                      Encrypted:false
                      SSDEEP:24:aWrVV4XQ3eaPVHk+V4XeaPVHaUAPnQzLIoMmHVIRBNUeR9SuQzE/AbsljYT38EWn:7V4A3eslV4XesrAzNUeR90EO1T3lWp4
                      MD5:3B2CBD7C03B3CF022AAAB0C909763880
                      SHA1:AD11BE267B81B10FFD18EED6D113ECCC1360D0FA
                      SHA-256:623C0B136658819EE1E6559007AC0A29C9607FC49FBD9CFC936CAFF3D5EFA8F9
                      SHA-512:CB887CBE0A9569F41A6826C8DB9AA7B420D369B2902D09ED9B860D0CB6CF7EC6ED1FB519EA4B38E5372C95A369C193324A22437EB555E2016B0E4A2E6B08E3B2
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1056768
                      Entropy (8bit):0.2834761843835663
                      Encrypted:false
                      SSDEEP:192:sAGb901Dd5JZbtMsKAGb901Dd5JZbtMsRcLZZWZJZbtM4KLZZWZJZbtM4UJ7JWlq:skJtnKkJtnRIW3JtbeW3JtbW2JtR
                      MD5:CBB203AFE6B7446313231369442C50F5
                      SHA1:A45873B7D0150E4CB9A26A44C0EA1C057013DAE6
                      SHA-256:C5C6C72A80BA54BEE8D05FA97561EDB5B2AB8D6C2F6F84A157FEC4EAB7C97335
                      SHA-512:B7B052116110DCAA39B3AF6FC0D266614B4C4C6105B1FA6002FA2CE0537036E3D7A24657F849CE42AA301DCCD8BCD72BB10E2ECAFE701BC3B3ADCF757BE666AD
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4202496
                      Entropy (8bit):0.04312480187296375
                      Encrypted:false
                      SSDEEP:192:rH/WCxkD7MDPSYAxmemxb7mngJdv9TXJ4MQmLu5/4eeNd:rOKSXs/J7mGnQmLu5/5eNd
                      MD5:4D3862637A3E49DEA6B0E914424F7F3E
                      SHA1:2ADD705EDC5981DFA1DDA043EF8917DD416CA4B3
                      SHA-256:081133A6F01292BF3CDF0BFBAE44EEE97EC2920D820294EA0447EE2D71249D58
                      SHA-512:FA1B6C0C9D28F5686D65A17D43EC6473524C7D576CADA3BA68A94B85375C703E750F624CA82ED3A431DBF5A41203A974E041BFCC6681E04CFBE708B34A4AA861
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:gzip compressed data, was "asset", last modified: Fri Aug 2 18:10:34 2024, max compression, original size modulo 2^32 374872
                      Category:dropped
                      Size (bytes):70207
                      Entropy (8bit):7.995911906073242
                      Encrypted:true
                      SSDEEP:1536:VzseWV/dT2G9zm5w0vgxQUFm6SM6ZYRuB61K+aK+POIwPru:VoNQGIwvs6S9+I6RWPOIwTu
                      MD5:9F5A7E038BF08B13BD15338EC7BD4E16
                      SHA1:AB69D28EEA9AE289BB86159C341910538CDDE5B9
                      SHA-256:BA0BCBBF170ADB0B5119D19D56C2D004579507DFC4A9215BCCC8663C8A486AF8
                      SHA-512:48557ECD56DFD2157304FE752E15E44314667EFC79E6C21312723251E4E1F1BF5BE0A76F88F4B4D83FADB9D81BFB1835B1C0E5CFA7B07214A605F58064BB94B1
                      Malicious:false
                      Preview:.....!.f..asset.....6.0.W..3....[........9m;.....IH.E...j...}.....PR..w.gg.....@.P.*..?...x....?./.%..Q...x....}..9..e..f.8..Yb@g...i..$...I.......<....k...{..{.Qg..k..q.....i.Y}..._......\?....5 .5 .`..._i'@....H'.f!...x`...f......v.._1w.u.<.........5.:..^.Ua....H6...x....D:.R..L..2.,.s.f.......FE'..%{]-;+.`....N...=|.:q...9N.k..i.I.8E.i.I.s..Y...8..fe'...Xo...Xo...#.r$N.u2.o.]....^,.k....{E."......Q.N...AY..u.^o.............Z..ce.irN.{.O$.C.......HJ.HJ..J..hOgA.5.nW.\........}E.%-.A."a<..~.[O....~.......xX.G?Y.3O8d8I...&X....V4...0=.iS....].D.L@.YiS...<.W..W+..#mj...p..8^.\U;oV;W`..^..V...G..SC.9.....i%@g.iS=..`..#.H.p.q..E.q...)....).X..M.X.%.,i.%..V..6.nk.@1S@-..Y.6....K.n....:c.My.....h...9..q...f't.iS.v..6D7...d't.iS.v..F.....faG.t.f....lR.J@!l.0O..T.....T2...\.n..-....L..ES.9.:...B..P1@...P.l.fX.aV..Y6.B5......Mt..SS,l..+..J...).*i.6......8...:.Z...2.H.8..Z.>.5.Oi..N`:..6.i.n.h.l.e.h.T\.lr...TE+m.T..).D..F..+.6....J...x.`..`.m..H..i....p...v
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):524656
                      Entropy (8bit):5.027445846313988E-4
                      Encrypted:false
                      SSDEEP:3:Lsulg/l:Ls
                      MD5:7C4161167803FCE292905CA3F0509109
                      SHA1:488063B8EFE0D8C6B88768BC03F6051AF766E258
                      SHA-256:24FD0F785E728CFC85A820DC254D28FA8876FD69009A1F688EDEA66F9965C859
                      SHA-512:CC1EA35F24F9ADBFD99921DE5169B3FD4DB455B3F27C53CDD1A8F21605C154CD348BB74D5EE87D54A70AD5D2913366376DA6FF83ECA8405281C7ECCD5A88DDA3
                      Malicious:false
                      Preview:.........................................'..../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):24
                      Entropy (8bit):2.1431558784658327
                      Encrypted:false
                      SSDEEP:3:m+l:m
                      MD5:54CB446F628B2EA4A5BCE5769910512E
                      SHA1:C27CA848427FE87F5CF4D0E0E3CD57151B0D820D
                      SHA-256:FBCFE23A2ECB82B7100C50811691DDE0A33AA3DA8D176BE9882A9DB485DC0F2D
                      SHA-512:8F6ED2E91AED9BD415789B1DBE591E7EAB29F3F1B48FDFA5E864D7BF4AE554ACC5D82B4097A770DABC228523253623E4296C5023CF48252E1B94382C43123CB0
                      Malicious:false
                      Preview:0\r..m..................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48
                      Entropy (8bit):2.955557653394731
                      Encrypted:false
                      SSDEEP:3:S+HKu00E+2w:S+q17w
                      MD5:CA6CAB3ABD664D96B6DB25D9FC507E16
                      SHA1:4E2829BFDB93397AE2F7AA314CF2CB060D85DD18
                      SHA-256:805E56301F8494005EEA02EE8AE817B388A53E324CEC25E1D3BD0950F060659B
                      SHA-512:C2A85966DAB012AC504DC3C4BD62DAC4D8F8F2BBCE161B022143282AC561B482314D3E8F038C4B8F740FE121643A4ADF28FA2E775273DA4621C871BEBEC2D066
                      Malicious:false
                      Preview:(....>.boy retne........................bR..../.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48
                      Entropy (8bit):2.955557653394731
                      Encrypted:false
                      SSDEEP:3:S+HKu00E+2w:S+q17w
                      MD5:CA6CAB3ABD664D96B6DB25D9FC507E16
                      SHA1:4E2829BFDB93397AE2F7AA314CF2CB060D85DD18
                      SHA-256:805E56301F8494005EEA02EE8AE817B388A53E324CEC25E1D3BD0950F060659B
                      SHA-512:C2A85966DAB012AC504DC3C4BD62DAC4D8F8F2BBCE161B022143282AC561B482314D3E8F038C4B8F740FE121643A4ADF28FA2E775273DA4621C871BEBEC2D066
                      Malicious:false
                      Preview:(....>.boy retne........................bR..../.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):24
                      Entropy (8bit):2.1431558784658327
                      Encrypted:false
                      SSDEEP:3:m+l:m
                      MD5:54CB446F628B2EA4A5BCE5769910512E
                      SHA1:C27CA848427FE87F5CF4D0E0E3CD57151B0D820D
                      SHA-256:FBCFE23A2ECB82B7100C50811691DDE0A33AA3DA8D176BE9882A9DB485DC0F2D
                      SHA-512:8F6ED2E91AED9BD415789B1DBE591E7EAB29F3F1B48FDFA5E864D7BF4AE554ACC5D82B4097A770DABC228523253623E4296C5023CF48252E1B94382C43123CB0
                      Malicious:false
                      Preview:0\r..m..................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48
                      Entropy (8bit):2.955557653394731
                      Encrypted:false
                      SSDEEP:3:S+HKu00E+2w:S+q17w
                      MD5:CA6CAB3ABD664D96B6DB25D9FC507E16
                      SHA1:4E2829BFDB93397AE2F7AA314CF2CB060D85DD18
                      SHA-256:805E56301F8494005EEA02EE8AE817B388A53E324CEC25E1D3BD0950F060659B
                      SHA-512:C2A85966DAB012AC504DC3C4BD62DAC4D8F8F2BBCE161B022143282AC561B482314D3E8F038C4B8F740FE121643A4ADF28FA2E775273DA4621C871BEBEC2D066
                      Malicious:false
                      Preview:(....>.boy retne........................bR..../.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48
                      Entropy (8bit):2.955557653394731
                      Encrypted:false
                      SSDEEP:3:S+HKu00E+2w:S+q17w
                      MD5:CA6CAB3ABD664D96B6DB25D9FC507E16
                      SHA1:4E2829BFDB93397AE2F7AA314CF2CB060D85DD18
                      SHA-256:805E56301F8494005EEA02EE8AE817B388A53E324CEC25E1D3BD0950F060659B
                      SHA-512:C2A85966DAB012AC504DC3C4BD62DAC4D8F8F2BBCE161B022143282AC561B482314D3E8F038C4B8F740FE121643A4ADF28FA2E775273DA4621C871BEBEC2D066
                      Malicious:false
                      Preview:(....>.boy retne........................bR..../.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):0.0012471779557650352
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2zE:/M/xT02z
                      MD5:F50F89A0A91564D0B8A211F8921AA7DE
                      SHA1:112403A17DD69D5B9018B8CEDE023CB3B54EAB7D
                      SHA-256:B1E963D702392FB7224786E7D56D43973E9B9EFD1B89C17814D7C558FFC0CDEC
                      SHA-512:BF8CDA48CF1EC4E73F0DD1D4FA5562AF1836120214EDB74957430CD3E4A2783E801FA3F4ED2AFB375257CAEED4ABE958265237D6E0AACF35A9EDE7A2E8898D58
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):262512
                      Entropy (8bit):9.553120663130604E-4
                      Encrypted:false
                      SSDEEP:3:LsNlce/:Ls3c
                      MD5:8185DD16F807801DA1C8E81AD05EAA0A
                      SHA1:622DD0C583A95E4236E411BDAC336374BA852F17
                      SHA-256:D6B64B923B5F59F948FBA2334F6402A46E902C7032517C21E4F6557B2DEA0D1E
                      SHA-512:5D8B043B877B0784CC6F3B36D2DE26F75705F1D364CEFD4CB59361AABCE6574E574363F35B88D929B7570AE3A845560825F290456A3095DC12FBC5213E739F92
                      Malicious:false
                      Preview:............................................../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):33
                      Entropy (8bit):3.5394429593752084
                      Encrypted:false
                      SSDEEP:3:iWstvhYNrkUn:iptAd
                      MD5:F27314DD366903BBC6141EAE524B0FDE
                      SHA1:4714D4A11C53CF4258C3A0246B98E5F5A01FBC12
                      SHA-256:68C7AD234755B9EDB06832A084D092660970C89A7305E0C47D327B6AC50DD898
                      SHA-512:07A0D529D9458DE5E46385F2A9D77E0987567BA908B53DDB1F83D40D99A72E6B2E3586B9F79C2264A83422C4E7FC6559CAC029A6F969F793F7407212BB3ECD51
                      Malicious:false
                      Preview:...m.................DB_VERSION.1
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
                      Category:dropped
                      Size (bytes):32768
                      Entropy (8bit):0.494709561094235
                      Encrypted:false
                      SSDEEP:24:TLEC30OIcqIn2o0FUFlA2cs0US5S693Xlej2:ThLaJUnAg0UB6I
                      MD5:CF7760533536E2AF66EA68BC3561B74D
                      SHA1:E991DE2EA8F42AE7E0A96A3B3B8AF87A689C8CCD
                      SHA-256:E1F183FAE5652BA52F5363A7E28BF62B53E7781314C9AB76B5708AF9918BE066
                      SHA-512:38B15FE7503F6DFF9D39BC74AA0150A7FF038029F973BE9A37456CDE6807BCBDEAB06E624331C8DFDABE95A5973B0EE26A391DB2587E614A37ADD50046470162
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j...i............t...c................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
                      Category:dropped
                      Size (bytes):20480
                      Entropy (8bit):0.5094712832659277
                      Encrypted:false
                      SSDEEP:12:TLW4QpRSJDBJuqJSEDNvrWjJQ9Dl9np59yDLgHFUxOUDaaTXubHa7me5q4iZ7dV:TLqpR+DDNzWjJ0npnyXKUO8+j25XmL
                      MD5:D4971855DD087E30FC14DF1535B556B9
                      SHA1:9E00DEFC7E54C75163273184837B9D0263AA528C
                      SHA-256:EC7414FF1DB052E8E0E359801F863969866F19228F3D5C64F632D991C923F0D2
                      SHA-512:ACA411D7819B03EF9C9ACA292D91B1258238DF229B4E165A032DB645E66BFE1148FF3DCFDAC3126FCD34DBD0892F420148E280D9716C63AD9FCDD9E7CA58D71D
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j...%.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):375520
                      Entropy (8bit):5.354170661558957
                      Encrypted:false
                      SSDEEP:6144:0A/imBpx6WdPSxKWcHu5MURacq49QxxPnyEndBuHltBfdK5WNbsVEziP/CfXtLPz:0FdMyq49tEndBuHltBfdK5WNbsVEziPU
                      MD5:B1191E5DAFA0794F6CD35A035543EA10
                      SHA1:F1F80A5EA003BA370621E9E78584D1EBD454CE66
                      SHA-256:18DB600EED30AF8B8DFBE1C4BDFA98EC4C5EE7CFF7C95033886A692E637ED4FD
                      SHA-512:8EFD053414E48894660786A7ABA5959E77DC62A87371211E022D88C27651F69806B3B4BFA67F3F3B9954FFCAE2BE57288194BDAE610E6423BD11FE8D62810535
                      Malicious:false
                      Preview:...m.................DB_VERSION.1....q...............&QUERY_TIMESTAMP:domains_config_gz2.*.*.13369567559800585..QUERY:domains_config_gz2.*.*..[{"name":"domains_config_gz","url":"https://edgeassetservice.azureedge.net/assets/domains_config_gz/2.8.76/asset?assetgroup=EntityExtractionDomainsConfig","version":{"major":2,"minor":8,"patch":76},"hash":"78Xsq/1H+MXv88uuTT1Rx79Nu2ryKVXh2J6ZzLZd38w=","size":374872}]..*.`~...............ASSET_VERSION:domains_config_gz.2.8.76..ASSET:domains_config_gz...{"config": {"token_limit": 1600, "page_cutoff": 4320, "default_locale_map": {"bg": "bg-bg", "bs": "bs-ba", "el": "el-gr", "en": "en-us", "es": "es-mx", "et": "et-ee", "cs": "cs-cz", "da": "da-dk", "de": "de-de", "fa": "fa-ir", "fi": "fi-fi", "fr": "fr-fr", "he": "he-il", "hr": "hr-hr", "hu": "hu-hu", "id": "id-id", "is": "is-is", "it": "it-it", "ja": "ja-jp", "ko": "ko-kr", "lv": "lv-lv", "lt": "lt-lt", "mk": "mk-mk", "nl": "nl-nl", "nb": "nb-no", "no": "no-no", "pl": "pl-pl", "pt": "pt-pt", "ro": "
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):321
                      Entropy (8bit):5.232702218930228
                      Encrypted:false
                      SSDEEP:6:JQ6++q1wkn23oH+Tcwtj2WwnvB2KLl/Q6RtRN+q2Pwkn23oH+Tcwtj2WwnvIFUv:OyfYebjxwnvFLptRIvYfYebjxwnQFUv
                      MD5:401C396B3DA80187B86552C5814ACB0F
                      SHA1:4AA30B4F4EEAA93643B36FE546BA7EB59F4DC63B
                      SHA-256:F7DE342FD2EE449CA70D341582FF64B5BA9364CE79A243E974CBB367FBB56CEC
                      SHA-512:1894EA3B2C6059AC05800FA53A99EA628F97DEC3C305B8DEC72E69AEBAB7E974591B3068C9EA2EA93F5C5C4E823DE45021D114AF04D88436021C57F45C8A062B
                      Malicious:false
                      Preview:2024/08/31-04:45:59.029 23c8 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\EntityExtractionAssetStore.db since it was missing..2024/08/31-04:45:59.079 23c8 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\EntityExtractionAssetStore.db/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:modified
                      Size (bytes):358860
                      Entropy (8bit):5.324612422118813
                      Encrypted:false
                      SSDEEP:6144:CgimBVvUrsc6rRA81b/18jyJNjfvrfM6R2:C1gAg1zfvO
                      MD5:6FC3A68D5B2656D01CD20994F4FC1C44
                      SHA1:8A2984BCE1649B7E59D3CFBB282578DF5F4933E4
                      SHA-256:9A9BAF255721F695ACC6B6AB96B1C12B5016E7921DFC6B032B8F05A42CB836B6
                      SHA-512:2EFCF243AC6ED8FF1FC486F1705C79CA0AFE70BB42BC6295547CD3813EA8D2E9D296691DB068EFE7B8058D423890A1B47B942EDCFF8B9B5D45D91F46498E62F6
                      Malicious:false
                      Preview:{"aee_config":{"ar":{"price_regex":{"ae":"(((ae|aed|\\x{062F}\\x{0660}\\x{0625}\\x{0660}|\\x{062F}\\.\\x{0625}|dhs|dh)\\s*\\d{1,3})|(\\d{1,3}\\s*(ae|aed|\\x{062F}\\x{0660}\\x{0625}\\x{0660}|\\x{062F}\\.\\x{0625}|dhs|dh)))","dz":"(((dzd|da|\\x{062F}\\x{062C})\\s*\\d{1,3})|(\\d{1,3}\\s*(dzd|da|\\x{062F}\\x{062C})))","eg":"(((e\\x{00a3}|egp)\\s*\\d{1,3})|(\\d{1,3}\\s*(e\\x{00a3}|egp)))","ma":"(((mad|dhs|dh)\\s*\\d{1,3})|(\\d{1,3}\\s*(mad|dhs|dh)))","sa":"((\\d{1,3}\\s*(sar\\s*\\x{fdfc}|sar|sr|\\x{fdfc}|\\.\\x{0631}\\.\\x{0633}))|((sar\\s*\\x{fdfc}|sar|sr|\\x{fdfc}|\\.\\x{0631}\\.\\x{0633})\\s*\\d{1,3}))"},"product_terms":"((\\x{0623}\\x{0636}\\x{0641}\\s*\\x{0625}\\x{0644}\\x{0649}\\s*\\x{0627}\\x{0644}\\x{0639}\\x{0631}\\x{0628}\\x{0629})|(\\x{0623}\\x{0636}\\x{0641}\\s*\\x{0625}\\x{0644}\\x{0649}\\s*\\x{0627}\\x{0644}\\x{062D}\\x{0642}\\x{064A}\\x{0628}\\x{0629})|(\\x{0627}\\x{0634}\\x{062A}\\x{0631}\\x{064A}\\s*\\x{0627}\\x{0644}\\x{0622}\\x{0646})|(\\x{062E}\\x{064A}\\x{0627}\\x{0631}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):171
                      Entropy (8bit):1.8784775129881184
                      Encrypted:false
                      SSDEEP:3:FQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlX:qTCTCTCTCTCTCTCTCT
                      MD5:E952942B492DB39A75DD2669B98EBE74
                      SHA1:F6C4DEF325DCA0DFEC01759D7D8610837A370176
                      SHA-256:14F92B911F9FE774720461EEC5BB4761AE6BFC9445C67E30BF624A8694B4B1DA
                      SHA-512:9193E7BBE7EB633367B39513B48EFED11FD457DCED070A8708F8572D0AB248CBFF37254599A6BFB469637E0DCCBCD986347C6B6075C06FAE2AF08387B560DEA0
                      Malicious:false
                      Preview:.f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5...............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):293
                      Entropy (8bit):5.161201359185933
                      Encrypted:false
                      SSDEEP:6:JQnnq1wkn23oH+TcwttaVdg2KLl/QDuB+q2Pwkn23oH+TcwttaPrqIFUv:0fYebDLJMvYfYeb83FUv
                      MD5:CEC447CC0FDD0AF2384CCA12CAA5BA4A
                      SHA1:F8B9E83E2F659B4189A97C03D98D7F07DD603EAD
                      SHA-256:9341BFA6BF8B925C53896B34B17CFCB15AABBF24D6B03E508A1C40A30F8EBD5A
                      SHA-512:24896D8C4505078AB9BA65851F9ADE293CD5A053321864B7F0C5499381F9104470333EECBB567AAF6C9616BED80F6D56AF3F9D618E711E1DB966788D05EE13F2
                      Malicious:false
                      Preview:2024/08/31-04:45:54.440 1ca8 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension Rules since it was missing..2024/08/31-04:45:54.480 1ca8 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension Rules/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):171
                      Entropy (8bit):1.8784775129881184
                      Encrypted:false
                      SSDEEP:3:FQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlX:qTCTCTCTCTCTCTCTCT
                      MD5:E952942B492DB39A75DD2669B98EBE74
                      SHA1:F6C4DEF325DCA0DFEC01759D7D8610837A370176
                      SHA-256:14F92B911F9FE774720461EEC5BB4761AE6BFC9445C67E30BF624A8694B4B1DA
                      SHA-512:9193E7BBE7EB633367B39513B48EFED11FD457DCED070A8708F8572D0AB248CBFF37254599A6BFB469637E0DCCBCD986347C6B6075C06FAE2AF08387B560DEA0
                      Malicious:false
                      Preview:.f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5...............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):297
                      Entropy (8bit):5.172689329044954
                      Encrypted:false
                      SSDEEP:6:JQIq1wkn23oH+Tcwtt6FB2KLl/QVN+q2Pwkn23oH+Tcwtt65IFUv:xfYeb8FFLbvYfYeb8WFUv
                      MD5:92428DC38F268E8E60050736D88008B6
                      SHA1:3EADA2C9F320117930BB621819D18D4B018B6E7E
                      SHA-256:46211E2F7E4FFFD19282C8DD52BA156869FD5D45A0BABD8F8325EB34307B27C7
                      SHA-512:53D7C569E8C5A0182AA100E980ED7FC829A37A56E3BA7A6E4010034E08B003C7327FE0EC0A9C432D875F681EF8DBCF30EA7F3F43359049246C6854DCE4A67CD7
                      Malicious:false
                      Preview:2024/08/31-04:45:54.483 1ca8 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension Scripts since it was missing..2024/08/31-04:45:54.494 1ca8 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension Scripts/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):513
                      Entropy (8bit):1.8784775129881184
                      Encrypted:false
                      SSDEEP:6:qTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCTCT:qWWWWWWWWWWWWWWWWWWWWWWWWWW
                      MD5:C92EABB217D45C77F8D52725AD3758F0
                      SHA1:43B422AC002BB445E2E9B2C27D74C27CD70C9975
                      SHA-256:388C5C95F0F54F32B499C03A37AABFA5E0A31030EC70D0956A239942544B0EEA
                      SHA-512:DFD5D1C614F0EBFF97F354DFC23266655C336B9B7112781D7579057814B4503D4B63AB1263258BDA3358E5EE9457429C1A2451B22261A1F1E2D8657F31240D3C
                      Malicious:false
                      Preview:.f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5...............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):293
                      Entropy (8bit):5.202205795589905
                      Encrypted:false
                      SSDEEP:6:JQ0tmHM1wkn23oH+TcwttYg2KLl/Q2b4q2Pwkn23oH+TcwttNIFUv:PQHrfYebJLB4vYfYeb0FUv
                      MD5:8119E8573B7EDF547682B50365E217FE
                      SHA1:7906C7BE570D1C5522922B5A785673366523F193
                      SHA-256:17331736063A0A0932264FCF653033E2BDFC454FB00C22200A6EFB0D036FEBFF
                      SHA-512:DEF315C6C57CF16B0EE015F73AC98BBBFAB189800DD74C5682850BE79811F37AD23CDF1BE848610578E9FF7F142F17A18CF9C2B2AE8BA9BED9ACC10FD10EB71D
                      Malicious:false
                      Preview:2024/08/31-04:45:56.138 1ff4 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension State since it was missing..2024/08/31-04:45:56.367 1ff4 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Extension State/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):4096
                      Entropy (8bit):0.3169096321222068
                      Encrypted:false
                      SSDEEP:3:lSWbNFl/sl+ltl4ltllOl83/XWEEabIDWzdWuAzTgdWj3FtFIU:l9bNFlEs1ok8fDEPDadUTgd81Z
                      MD5:2554AD7847B0D04963FDAE908DB81074
                      SHA1:F84ABD8D05D7B0DFB693485614ECF5204989B74A
                      SHA-256:F6EF01E679B9096A7D8A0BD8151422543B51E65142119A9F3271F25F966E6C42
                      SHA-512:13009172518387D77A67BBF86719527077BE9534D90CB06E7F34E1CCE7C40B49A185D892EE859A8BAFB69D5EBB6D667831A0FAFBA28AC1F44570C8B68F8C90A4
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):32768
                      Entropy (8bit):0.40981274649195937
                      Encrypted:false
                      SSDEEP:24:TL1WK3iOvwxwwweePKmJIOAdQBVA/kjo/TJZwJ9OV3WOT/5eQQ:Tmm+/9ZW943WOT/
                      MD5:1A7F642FD4F71A656BE75B26B2D9ED79
                      SHA1:51BBF587FB0CCC2D726DDB95C96757CC2854CFAD
                      SHA-256:B96B6DDC10C29496069E16089DB0AB6911D7C13B82791868D583897C6D317977
                      SHA-512:FD14EADCF5F7AB271BE6D8EF682977D1A0B5199A142E4AB353614F2F96AE9B49A6F35A19CC237489F297141994A4A16B580F88FAC44486FCB22C05B2F1C3F7D1
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j............M.....8...b..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 10, cookie 0x8, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):20480
                      Entropy (8bit):0.6975083372685086
                      Encrypted:false
                      SSDEEP:24:LLiZxh0GY/l1rWR1PmCx9fZjsBX+T6UwcE85fBmI:EBmw6fU1zBmI
                      MD5:F5BBD8449A9C3AB28AC2DE45E9059B01
                      SHA1:C569D730853C33234AF2402E69C19E0C057EC165
                      SHA-256:825FF36C4431084C76F3D22CE0C75FA321EA680D1F8548706B43E60FCF5B566E
                      SHA-512:96ACDED5A51236630A64FAE91B8FA9FAB43E22E0C1BCB80C2DD8D4829E03FBFA75AA6438053599A42EC4BBCF805BF0B1E6DFF9069B2BA182AD0BB30F2542FD3F
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j..........g....._.c...~.2.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................s...;+...indexfavicon_bitmaps_icon_idfavico
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):0.0012471779557650352
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2zE:/M/xT02z
                      MD5:F50F89A0A91564D0B8A211F8921AA7DE
                      SHA1:112403A17DD69D5B9018B8CEDE023CB3B54EAB7D
                      SHA-256:B1E963D702392FB7224786E7D56D43973E9B9EFD1B89C17814D7C558FFC0CDEC
                      SHA-512:BF8CDA48CF1EC4E73F0DD1D4FA5562AF1836120214EDB74957430CD3E4A2783E801FA3F4ED2AFB375257CAEED4ABE958265237D6E0AACF35A9EDE7A2E8898D58
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):262512
                      Entropy (8bit):9.553120663130604E-4
                      Encrypted:false
                      SSDEEP:3:LsNlgt:Ls3
                      MD5:26F6BCF410A5B22B7319AE1ECD2D73C2
                      SHA1:91162F90E5EED217141F789F0FB03BC75ED7E099
                      SHA-256:8B86383C5CAFB87EE34B777AC53A77245BA65EFD2FA0243FFA794A8D495FEC44
                      SHA-512:18B72823BE4A0FA3EACD16F5F5FBA4C20F603A7FF6EADD27EFC4F42AFADD4422F25E7D63B7660EA43F1AFA8908DEC867F95C329119F85AC796397D69D2EC6AE3
                      Malicious:false
                      Preview:.........................................0..../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 38, cookie 0x1f, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):155648
                      Entropy (8bit):0.5407252242845243
                      Encrypted:false
                      SSDEEP:96:OgWyejzH+bDoYysX0IxQzZkHtpVJNlYDLjGQLBE3CeE0kE:OJhH+bDo3iN0Z2TVJkXBBE3yb
                      MD5:7B955D976803304F2C0505431A0CF1CF
                      SHA1:E29070081B18DA0EF9D98D4389091962E3D37216
                      SHA-256:987FB9BFC2A84C4C605DCB339D4935B52A969B24E70D6DEAC8946BA9A2B432DC
                      SHA-512:CE2F1709F39683BE4131125BED409103F5EDF1DED545649B186845817C0D69E3D0B832B236F7C4FC09AB7F7BB88E7C9F1E4F7047D1AF56D429752D4D8CBED47A
                      Malicious:false
                      Preview:SQLite format 3......@ .......&..................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8720
                      Entropy (8bit):0.21810997314429553
                      Encrypted:false
                      SSDEEP:3:EYMntFlljq7A/mhWJFuQ3yy7IOWU0HlQ/dweytllrE9SFcTp4AGbNCV9RUIPn:Ei75fOWHlQ/d0Xi99pEYZn
                      MD5:3DF87D106B06F4B01B3F7F4AB2D3E90A
                      SHA1:F63EBE8D846799C8F536115B0A8373E0E4B3AAB4
                      SHA-256:C74C5B9658DB7592186F83839A4FB1D45A1D6B02A74E36827F7498E6CD420538
                      SHA-512:3F946EF566267B3A7CFC20A3BB5CE80459D71936546EB8F92F13FE3F53BC0D5D51C443ABC8FED4916A46642202860F8E5E8DFD51C95AB0CE0F4850352DC6580B
                      Malicious:false
                      Preview:.................&....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):28672
                      Entropy (8bit):0.33890226319329847
                      Encrypted:false
                      SSDEEP:12:TLMfly7aoxrRGcAkSQdC6ae1//fxEjkE/RFL2iFV1eHFxOUwa5qgufTsZ75fOSI:TLYcjr0+Pdajk+FZH1W6UwccI5fBI
                      MD5:971F4C153D386AC7ED39363C31E854FC
                      SHA1:339841CA0088C9EABDE4AACC8567D2289CCB9544
                      SHA-256:B6468DA6EC0EAE580B251692CFE24620D39412954421BBFDECB13EF21BE7BC88
                      SHA-512:1A4DD0C2BE163AAB3B81D63DEB4A7DB6421612A6CF1A5685951F86B7D5A40B67FC6585B7E52AA0CC20FF47349F15DFF0C9038086E3A7C78AE0FFBEE6D8AA7F7E
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j..........g...:.8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):377
                      Entropy (8bit):5.242854246645478
                      Encrypted:false
                      SSDEEP:6:JQ4wR1wkn23oH+TcwtRage8Y55HEZzXELIx2KLl/Q4eSN+q2Pwkn23oH+TcwtRai:Zw0fYebRrcHEZrEkVLRei+vYfYebRrcU
                      MD5:4DEBCB1F1ABD86D18716E2A3630485FF
                      SHA1:F34214F576A3A22E3EE4B83699B04C0FD12FB3EA
                      SHA-256:9E81D2C37FF559F32567A60D6195C62063D11CC53902B2CE9DDDBE986FAE4494
                      SHA-512:02E20960A9A8731DB70CE85EA42C016D8E077EE38448A54FA559F384DFBF02688353E11A2E506AFB5C5FA6B0A37B5EDCC7DC2426C26C0306F53B03E148384EC1
                      Malicious:false
                      Preview:2024/08/31-04:45:57.176 1fec Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold since it was missing..2024/08/31-04:45:57.188 1fec Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):303
                      Entropy (8bit):5.246023003239997
                      Encrypted:false
                      SSDEEP:6:JQWt1wkn23oH+TcwtRa2jM8B2KLl/QYuq2Pwkn23oH+TcwtRa2jMGIFUv:3wfYebRjFLcvYfYebREFUv
                      MD5:A52EA1C21630F3C2AF2661443BA08928
                      SHA1:A077FAE848F39BB19F4108CC9AB779062A72C2DD
                      SHA-256:E7A046DAF4BB590CECDE4415F44FAAB676646147ED9BFEB31A25D1A481E1B0D2
                      SHA-512:511F41F16EF8198625EAE0DE55E6BBC993DD0D99D5AE5CA03781D87FF38CD24A9CB5E925058B8866DA9F6B6764CFD173B9732681A34D820BF84C90918B3C0E8A
                      Malicious:false
                      Preview:2024/08/31-04:45:54.765 920 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb since it was missing..2024/08/31-04:45:54.789 920 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):45056
                      Entropy (8bit):0.40293591932113104
                      Encrypted:false
                      SSDEEP:24:TLVgTjDk5Yk8k+/kCkzD3zzbLGfIzLihje90xq/WMFFfeFzfXVVlYWOT/CUFSe:Tmo9n+8dv/qALihje9kqL42WOT/9F
                      MD5:ADC0CFB8A1A20DE2C4AB738B413CBEA4
                      SHA1:238EF489E5FDC6EBB36F09D415FB353350E7097B
                      SHA-256:7C071E36A64FB1881258712C9880F155D9CBAC693BADCC391A1CB110C257CC37
                      SHA-512:38C8B7293B8F7BEF03299BAFB981EEEE309945B1BDE26ACDAD6FDD63247C21CA04D493A1DDAFC3B9A1904EFED998E9C7C0C8E98506FD4AC0AB252DFF34566B66
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.......=......\.t.+.>...,...=........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):40
                      Entropy (8bit):4.1275671571169275
                      Encrypted:false
                      SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                      MD5:20D4B8FA017A12A108C87F540836E250
                      SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                      SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                      SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                      Malicious:false
                      Preview:{"SDCH":{"dictionaries":{},"version":2}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):59
                      Entropy (8bit):4.619434150836742
                      Encrypted:false
                      SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                      MD5:2800881C775077E1C4B6E06BF4676DE4
                      SHA1:2873631068C8B3B9495638C865915BE822442C8B
                      SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                      SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                      Malicious:false
                      Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):111
                      Entropy (8bit):4.718418993774295
                      Encrypted:false
                      SSDEEP:3:YLb9N+eAXRfHDH2LS7PMVKJq0nMb1KKtiVY:YHpoeS7PMVKJTnMRK3VY
                      MD5:285252A2F6327D41EAB203DC2F402C67
                      SHA1:ACEDB7BA5FBC3CE914A8BF386A6F72CA7BAA33C6
                      SHA-256:5DFC321417FC31359F23320EA68014EBFD793C5BBED55F77DAB4180BBD4A2026
                      SHA-512:11CE7CB484FEE66894E63C31DB0D6B7EF66AD0327D4E7E2EB85F3BCC2E836A3A522C68D681E84542E471E54F765E091EFE1EE4065641B0299B15613EB32DCC0D
                      Malicious:false
                      Preview:{"net":{"http_server_properties":{"servers":[],"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                      Category:dropped
                      Size (bytes):20480
                      Entropy (8bit):0.6732424250451717
                      Encrypted:false
                      SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                      MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                      SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                      SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                      SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):59
                      Entropy (8bit):4.619434150836742
                      Encrypted:false
                      SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                      MD5:2800881C775077E1C4B6E06BF4676DE4
                      SHA1:2873631068C8B3B9495638C865915BE822442C8B
                      SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                      SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                      Malicious:false
                      Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):59
                      Entropy (8bit):4.619434150836742
                      Encrypted:false
                      SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                      MD5:2800881C775077E1C4B6E06BF4676DE4
                      SHA1:2873631068C8B3B9495638C865915BE822442C8B
                      SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                      SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                      Malicious:false
                      Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 6, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 6
                      Category:dropped
                      Size (bytes):36864
                      Entropy (8bit):0.7606403588613025
                      Encrypted:false
                      SSDEEP:48:TaIopKWurJNVr1GJmA8pv82pfurJNVrdHXuccaurJN2VrJ1n4n1GmzNGU1cSBkIV:uIEumQv8m1ccnvS63Nb
                      MD5:C5343AD25C7DDB1E6D4D5FE56DB224F7
                      SHA1:58CDA84A4B93B328AFA8D1C7AD30AFADABBBF3A0
                      SHA-256:1F999FFBC660C70265711DBF760B64232DDBA2858C970A79766F7E9FE83C9F46
                      SHA-512:88EDE5E61BFFDE634A18F0647E033CA1928BB05AB9EF2C2983F772682D68F5677F249774C2EADA93F7F09384B73855DD6D6E5C1DFE96BBA900E998F6F87B58A7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j..........g...D.........7............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):40
                      Entropy (8bit):4.1275671571169275
                      Encrypted:false
                      SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                      MD5:20D4B8FA017A12A108C87F540836E250
                      SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                      SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                      SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                      Malicious:false
                      Preview:{"SDCH":{"dictionaries":{},"version":2}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):36864
                      Entropy (8bit):0.36515621748816035
                      Encrypted:false
                      SSDEEP:24:TLH3lIIAoDJ84l5lDlnDMlRlyKDtM6UwccWfp15fBIe:Tb31DtX5nDOvyKDhU1cSB
                      MD5:25363ADC3C9D98BAD1A33D0792405CBF
                      SHA1:D06E343087D86EF1A06F7479D81B26C90A60B5C3
                      SHA-256:6E019B8B9E389216D5BDF1F2FE63F41EF98E71DA101F2A6BE04F41CC5954532D
                      SHA-512:CF7EEE35D0E00945AF221BEC531E8BF06C08880DA00BD103FA561BC069D7C6F955CBA3C1C152A4884601E5A670B7487D39B4AE9A4D554ED8C14F129A74E555F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.......X..g...}.....$.X..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):20480
                      Entropy (8bit):0.46731661083066856
                      Encrypted:false
                      SSDEEP:12:TL1QAFUxOUDaabZXiDiIF8izX4fhhdWeci2oesJaYi3is25q0S9K0xHZ75fOV:TLiOUOq0afDdWec9sJf5Q7J5fc
                      MD5:E93ACF0820CA08E5A5D2D159729F70E3
                      SHA1:2C1A4D4924B9AEC1A796F108607404B000877C5D
                      SHA-256:F2267FDA7F45499F7A01186B75CEFB799F8D2BC97E2E9B5068952D477294302C
                      SHA-512:3BF36C20E04DCF1C16DC794E272F82F68B0DE43F16B4A9746B63B6D6BBC953B00BD7111CDA7AFE85CEBB2C447145483A382B15E2B0A5B36026C3441635D4E50C
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6290
                      Entropy (8bit):4.970855883998077
                      Encrypted:false
                      SSDEEP:96:stgqfais1jb9KfdfN8zLs85eh6Cb7/x+6MhmuecmAe+tt2Mz7/EJ:stgcsCdfNkLs88bV+FiAxPz7MJ
                      MD5:80C76B4A8511AB25C494D5F76A30B0D3
                      SHA1:2987E5FD94E520967551BB2ACC7FF121738DC980
                      SHA-256:228CF05C05E6335D7110CB08104B84400A5E31E2FDDAE2CDF5BB1514C11D1D04
                      SHA-512:0FAD958A3FFBBED747A33BA1C46185F56AC2A3A2920FF14D8E6F3E3FB892D46FD933170004EAEDE66135700533751520269755B21EB3E8E09690774D1258A688
                      Malicious:false
                      Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369567554880710","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"domain_diversity":{"last_reporting_timestamp":"13369567555301746"},"download":{"default_directory":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\KioskDownloads\\","directory_upgrade":true},"dual_engine":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_version":
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6290
                      Entropy (8bit):4.970855883998077
                      Encrypted:false
                      SSDEEP:96:stgqfais1jb9KfdfN8zLs85eh6Cb7/x+6MhmuecmAe+tt2Mz7/EJ:stgcsCdfNkLs88bV+FiAxPz7MJ
                      MD5:80C76B4A8511AB25C494D5F76A30B0D3
                      SHA1:2987E5FD94E520967551BB2ACC7FF121738DC980
                      SHA-256:228CF05C05E6335D7110CB08104B84400A5E31E2FDDAE2CDF5BB1514C11D1D04
                      SHA-512:0FAD958A3FFBBED747A33BA1C46185F56AC2A3A2920FF14D8E6F3E3FB892D46FD933170004EAEDE66135700533751520269755B21EB3E8E09690774D1258A688
                      Malicious:false
                      Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369567554880710","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"domain_diversity":{"last_reporting_timestamp":"13369567555301746"},"download":{"default_directory":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\KioskDownloads\\","directory_upgrade":true},"dual_engine":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_version":
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6290
                      Entropy (8bit):4.970855883998077
                      Encrypted:false
                      SSDEEP:96:stgqfais1jb9KfdfN8zLs85eh6Cb7/x+6MhmuecmAe+tt2Mz7/EJ:stgcsCdfNkLs88bV+FiAxPz7MJ
                      MD5:80C76B4A8511AB25C494D5F76A30B0D3
                      SHA1:2987E5FD94E520967551BB2ACC7FF121738DC980
                      SHA-256:228CF05C05E6335D7110CB08104B84400A5E31E2FDDAE2CDF5BB1514C11D1D04
                      SHA-512:0FAD958A3FFBBED747A33BA1C46185F56AC2A3A2920FF14D8E6F3E3FB892D46FD933170004EAEDE66135700533751520269755B21EB3E8E09690774D1258A688
                      Malicious:false
                      Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369567554880710","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"domain_diversity":{"last_reporting_timestamp":"13369567555301746"},"download":{"default_directory":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\KioskDownloads\\","directory_upgrade":true},"dual_engine":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_version":
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):33
                      Entropy (8bit):4.051821770808046
                      Encrypted:false
                      SSDEEP:3:YVXADAEvTLSJ:Y9AcEvHSJ
                      MD5:2B432FEF211C69C745ACA86DE4F8E4AB
                      SHA1:4B92DA8D4C0188CF2409500ADCD2200444A82FCC
                      SHA-256:42B55D126D1E640B1ED7A6BDCB9A46C81DF461FA7E131F4F8C7108C2C61C14DE
                      SHA-512:948502DE4DC89A7E9D2E1660451FCD0F44FD3816072924A44F145D821D0363233CC92A377DBA3A0A9F849E3C17B1893070025C369C8120083A622D025FE1EACF
                      Malicious:false
                      Preview:{"preferred_apps":[],"version":1}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):182
                      Entropy (8bit):4.2629097520179995
                      Encrypted:false
                      SSDEEP:3:RGXKRjg0QwVIWRKXECSAV6jDyhjgHGAW+LB2Z4MKLFE1SwhiFAfXQmWyKBPMwRgK:z3frsUpAQQgHGwB26MK8Sw06fXQmWtRT
                      MD5:643E00B0186AA80523F8A6BED550A925
                      SHA1:EC4056125D6F1A8890FFE01BFFC973C2F6ABD115
                      SHA-256:A0C9ABAE18599F0A65FC654AD36251F6330794BEA66B718A09D8B297F3E38E87
                      SHA-512:D91A934EAF7D9D669B8AD4452234DE6B23D15237CB4D251F2C78C8339CEE7B4F9BA6B8597E35FE8C81B3D6F64AE707C68FF492903C0EDC3E4BAF2C6B747E247D
                      Malicious:false
                      Preview:Microsoft Edge settings and storage represent user-selected preferences and information and MUST not be extracted, overwritten or modified except through Microsoft Edge defined APIs.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):24799
                      Entropy (8bit):5.5661021422450245
                      Encrypted:false
                      SSDEEP:768:isXGq5WPRZf8j8F1+UoAYDCx9Tuqh0VfUC9xbog/OV8haSu7urwvpGtu8:isXGq5WPRZf8ju1jatIf3AtD
                      MD5:6ACD8853CC09CC0FA358BA18288F717D
                      SHA1:948E6E96D77A65CF79C9487D33F4AA62A0C1579C
                      SHA-256:BE7E1F3C801B6DD4270FE0AFA2BFBE8832A0679737F8CC4A67502F25D084DCA5
                      SHA-512:CAEA0BD05E4FBF577905ECFF0B4775C6023C4A39A18B9F174147B5A4BC968C3C8857B4F940E8D0E4BC41FEBBEB1F8E5A807AF30FECB2E925B739D5A0BC534DE7
                      Malicious:false
                      Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369567554350388","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369567554350388","location":5,"ma
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):24799
                      Entropy (8bit):5.5661021422450245
                      Encrypted:false
                      SSDEEP:768:isXGq5WPRZf8j8F1+UoAYDCx9Tuqh0VfUC9xbog/OV8haSu7urwvpGtu8:isXGq5WPRZf8ju1jatIf3AtD
                      MD5:6ACD8853CC09CC0FA358BA18288F717D
                      SHA1:948E6E96D77A65CF79C9487D33F4AA62A0C1579C
                      SHA-256:BE7E1F3C801B6DD4270FE0AFA2BFBE8832A0679737F8CC4A67502F25D084DCA5
                      SHA-512:CAEA0BD05E4FBF577905ECFF0B4775C6023C4A39A18B9F174147B5A4BC968C3C8857B4F940E8D0E4BC41FEBBEB1F8E5A807AF30FECB2E925B739D5A0BC534DE7
                      Malicious:false
                      Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369567554350388","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369567554350388","location":5,"ma
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):118
                      Entropy (8bit):3.160877598186631
                      Encrypted:false
                      SSDEEP:3:S8ltHlS+QUl1ASEGhTFljljljl:S85aEFljljljl
                      MD5:7733303DBE19B64C38F3DE4FE224BE9A
                      SHA1:8CA37B38028A2DB895A4570E0536859B3CC5C279
                      SHA-256:B10C1BA416A632CD57232C81A5C2E8EE76A716E0737D10EABE1D430BEC50739D
                      SHA-512:E8CD965BCA0480DB9808CB1B461AC5BF5935C3CBF31C10FDF090D406F4BC4F3187D717199DCF94197B8DF24C1D6E4FF07241D8CFFFD9AEE06CCE9674F0220E29
                      Malicious:false
                      Preview:*...#................version.1..namespace-..&f.................&f.................&f.................&f...............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):291
                      Entropy (8bit):5.176569993007573
                      Encrypted:false
                      SSDEEP:6:i8Semb1wkn23oH+TcwtSQM72KLlE8SYIq2Pwkn23oH+TcwtSQMxIFUv:i8TZfYeb0L68avYfYebrFUv
                      MD5:BE40A1BE23138C041E9361946BB7E63B
                      SHA1:169DCED50E43CBC25A108ED762CEE968F27BF918
                      SHA-256:D1E7A8C67A2D46BA39FA448A9251E713C0495F2CC85E367760D108CCF5033671
                      SHA-512:A573C6B9F89304887CECE2D3B4D6062D1B2C1D3E56A62F557A88B4CBD25035412856F28C66A54ED4FA0EC61032FB6581329686B138763CC2F02D14645E05AA39
                      Malicious:false
                      Preview:2024/08/31-04:46:11.959 920 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Session Storage since it was missing..2024/08/31-04:46:11.976 920 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Session Storage/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):20480
                      Entropy (8bit):0.44194574462308833
                      Encrypted:false
                      SSDEEP:12:TLiNCcUMskMVcIWGhWxBzEXx7AAQlvsdFxOUwa5qgufTJpbZ75fOS:TLisVMnYPhIY5Qlvsd6UwccNp15fB
                      MD5:B35F740AA7FFEA282E525838EABFE0A6
                      SHA1:A67822C17670CCE0BA72D3E9C8DA0CE755A3421A
                      SHA-256:5D599596D116802BAD422497CF68BE59EEB7A9135E3ED1C6BEACC48F73827161
                      SHA-512:05C0D33516B2C1AB6928FB34957AD3E03CB0A8B7EEC0FD627DD263589655A16DEA79100B6CC29095C3660C95FD2AFB2E4DD023F0597BD586DD664769CABB67F8
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j..........g....."....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):40
                      Entropy (8bit):3.473726825238924
                      Encrypted:false
                      SSDEEP:3:41tt0diERGn:et084G
                      MD5:148079685E25097536785F4536AF014B
                      SHA1:C5FF5B1B69487A9DD4D244D11BBAFA91708C1A41
                      SHA-256:F096BC366A931FBA656BDCD77B24AF15A5F29FC53281A727C79F82C608ECFAB8
                      SHA-512:C2556034EA51ABFBC172EB62FF11F5AC45C317F84F39D4B9E3DDBD0190DA6EF7FA03FE63631B97AB806430442974A07F8E81B5F7DC52D9F2FCDC669ADCA8D91F
                      Malicious:false
                      Preview:.On.!................database_metadata.1
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):321
                      Entropy (8bit):5.142891074439928
                      Encrypted:false
                      SSDEEP:6:JQUdD1wkn23oH+TcwtgUh2gr52KLl/Q9lL+q2Pwkn23oH+TcwtgUh2ghZIFUv:jyfYeb3hHJLKIvYfYeb3hHh2FUv
                      MD5:4AB897C6F1256439EE18D66AB93A084D
                      SHA1:9DAE3B29EE0336DAF0BE2E1F30B73397E8C3FBDA
                      SHA-256:886A9C668619E81C27BFF9055B4FB89403D56F8E6CA667C99BE2ED77C980EAFA
                      SHA-512:1340B646AEEDAF97F0EAE8EB22EA8D429A3CA92A599D7AF10003B5858B7FDB5A4FE96C5858E8DE86FE8F4FF2568C3B5AC27FB36A33E395990E3490B669A2DAC9
                      Malicious:false
                      Preview:2024/08/31-04:45:54.381 1c98 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Site Characteristics Database since it was missing..2024/08/31-04:45:54.641 1c98 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Site Characteristics Database/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):8.280239615765425E-4
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):524656
                      Entropy (8bit):5.027445846313988E-4
                      Encrypted:false
                      SSDEEP:3:LsulM9:LsH
                      MD5:64E8ABEAFB631D03B459D64EC5EF7370
                      SHA1:2C32B3CAECD84D80A0BB936DB521A04DEE56B90F
                      SHA-256:2B070745C4D975379F6329C134F85CA39C6947B823E2479F48A31587E2984C49
                      SHA-512:B0402BEABA7F72CC55761A690E61476E2847FB44D3F8F3960B8C5AD4A9D0FB62FC5F4108DC087E54B59E441517C07775662B01FC8FA279F08687DBCEA214CA51
                      Malicious:false
                      Preview:..........................................I.../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):24
                      Entropy (8bit):2.1431558784658327
                      Encrypted:false
                      SSDEEP:3:m+l:m
                      MD5:54CB446F628B2EA4A5BCE5769910512E
                      SHA1:C27CA848427FE87F5CF4D0E0E3CD57151B0D820D
                      SHA-256:FBCFE23A2ECB82B7100C50811691DDE0A33AA3DA8D176BE9882A9DB485DC0F2D
                      SHA-512:8F6ED2E91AED9BD415789B1DBE591E7EAB29F3F1B48FDFA5E864D7BF4AE554ACC5D82B4097A770DABC228523253623E4296C5023CF48252E1B94382C43123CB0
                      Malicious:false
                      Preview:0\r..m..................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48
                      Entropy (8bit):2.997224320061397
                      Encrypted:false
                      SSDEEP:3:OM0XTEQnewn:OM0Xgyewn
                      MD5:C5080327EA82B2785E8108F4E4B3C858
                      SHA1:6695EE50D99C46D585A3EA8CA07DCE51C79D541F
                      SHA-256:829DCA15DAFC86C5CE7F96101E41ACF3AB7E9F8F89749FDFF280EEB5C245515E
                      SHA-512:FDA7D07B76FC290B9B9301AD906E5783626A5BCA17EABEFCFB05EDE9A1192D86920DB52407EAF1AAC21B5DD6A4D112DD8D0D515877ABC2E438D8ECE96662C381
                      Malicious:false
                      Preview:(...SR..oy retne........................LB..../.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48
                      Entropy (8bit):2.997224320061397
                      Encrypted:false
                      SSDEEP:3:OM0XTEQnewn:OM0Xgyewn
                      MD5:C5080327EA82B2785E8108F4E4B3C858
                      SHA1:6695EE50D99C46D585A3EA8CA07DCE51C79D541F
                      SHA-256:829DCA15DAFC86C5CE7F96101E41ACF3AB7E9F8F89749FDFF280EEB5C245515E
                      SHA-512:FDA7D07B76FC290B9B9301AD906E5783626A5BCA17EABEFCFB05EDE9A1192D86920DB52407EAF1AAC21B5DD6A4D112DD8D0D515877ABC2E438D8ECE96662C381
                      Malicious:false
                      Preview:(...SR..oy retne........................LB..../.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):24
                      Entropy (8bit):2.1431558784658327
                      Encrypted:false
                      SSDEEP:3:m+l:m
                      MD5:54CB446F628B2EA4A5BCE5769910512E
                      SHA1:C27CA848427FE87F5CF4D0E0E3CD57151B0D820D
                      SHA-256:FBCFE23A2ECB82B7100C50811691DDE0A33AA3DA8D176BE9882A9DB485DC0F2D
                      SHA-512:8F6ED2E91AED9BD415789B1DBE591E7EAB29F3F1B48FDFA5E864D7BF4AE554ACC5D82B4097A770DABC228523253623E4296C5023CF48252E1B94382C43123CB0
                      Malicious:false
                      Preview:0\r..m..................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48
                      Entropy (8bit):2.9972243200613975
                      Encrypted:false
                      SSDEEP:3:h2AuTEh/T:8zgh/T
                      MD5:CF219FE573F2A4A0C6DC11EB2C9085E4
                      SHA1:5FC616DC88C5A42CC6D3814DB72985B4B7E75E6B
                      SHA-256:192A5814ECB7A4E89A0F9B32CB6846D65FCB9DCE07ED04F8CED0396B00B9EA7C
                      SHA-512:574460DC7CB2687DBB402A935E1BDC935EAAA1D3A13D87EFBD74DA6BC1898D26478547EF3D4F3D5DB9AAD4B667B2E42974B9A7DE782F57177CAED01E5316FBFC
                      Malicious:false
                      Preview:(.......oy retne........................}:..../.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):48
                      Entropy (8bit):2.9972243200613975
                      Encrypted:false
                      SSDEEP:3:h2AuTEh/T:8zgh/T
                      MD5:CF219FE573F2A4A0C6DC11EB2C9085E4
                      SHA1:5FC616DC88C5A42CC6D3814DB72985B4B7E75E6B
                      SHA-256:192A5814ECB7A4E89A0F9B32CB6846D65FCB9DCE07ED04F8CED0396B00B9EA7C
                      SHA-512:574460DC7CB2687DBB402A935E1BDC935EAAA1D3A13D87EFBD74DA6BC1898D26478547EF3D4F3D5DB9AAD4B667B2E42974B9A7DE782F57177CAED01E5316FBFC
                      Malicious:false
                      Preview:(.......oy retne........................}:..../.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):0.0012471779557650352
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2zE:/M/xT02z
                      MD5:F50F89A0A91564D0B8A211F8921AA7DE
                      SHA1:112403A17DD69D5B9018B8CEDE023CB3B54EAB7D
                      SHA-256:B1E963D702392FB7224786E7D56D43973E9B9EFD1B89C17814D7C558FFC0CDEC
                      SHA-512:BF8CDA48CF1EC4E73F0DD1D4FA5562AF1836120214EDB74957430CD3E4A2783E801FA3F4ED2AFB375257CAEED4ABE958265237D6E0AACF35A9EDE7A2E8898D58
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):262512
                      Entropy (8bit):9.47693366977411E-4
                      Encrypted:false
                      SSDEEP:3:LsNldBt:Ls3n
                      MD5:64EE0F90DD71E2CF3BA5E8CAD4774848
                      SHA1:F2863B28825A551A405D4B4BD9178C1B5D0351DA
                      SHA-256:EF8A2BDB5464AC04CA12A6971478B7CBB39462E0AB832D985E1BC362274AD78F
                      SHA-512:7A03057536ABE210831F65C8C18C591621DB9AA654309EB5A476C4AD11517F269FDC791876744FF84A699D88AF79DAACC2AE6C1BB425EE2E4D51AAE549BB0236
                      Malicious:false
                      Preview:............................................../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):0.0012471779557650352
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2zE:/M/xT02z
                      MD5:F50F89A0A91564D0B8A211F8921AA7DE
                      SHA1:112403A17DD69D5B9018B8CEDE023CB3B54EAB7D
                      SHA-256:B1E963D702392FB7224786E7D56D43973E9B9EFD1B89C17814D7C558FFC0CDEC
                      SHA-512:BF8CDA48CF1EC4E73F0DD1D4FA5562AF1836120214EDB74957430CD3E4A2783E801FA3F4ED2AFB375257CAEED4ABE958265237D6E0AACF35A9EDE7A2E8898D58
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):262512
                      Entropy (8bit):9.47693366977411E-4
                      Encrypted:false
                      SSDEEP:3:LsNlr:Ls3
                      MD5:77FACDF4CB941CA4EAC62090A20E7599
                      SHA1:36842B56544FE295A5CB85AF723DC7E70D12224B
                      SHA-256:9A0DD9FC01AFC28CD9BD625BB9D6034EAC32641989EF9730000439C701C0B719
                      SHA-512:66D7BB21BC3E97BDE250FAD790B53B20082B76B1309E2B85EC10BFFEF526E9F1BF741CF6EF3B7ADFCDDB1C623A1B22EB15717CFC9602EB92834785D7BCB1312B
                      Malicious:false
                      Preview:.........................................L..../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):403
                      Entropy (8bit):5.259841289641811
                      Encrypted:false
                      SSDEEP:6:JQiYSFB1wkn23oH+Tcwt0jqEKj3K/2jM8B2KLl/QwolM+q2Pwkn23oH+Tcwt0jqr:TTkfYebqqBvFLWM+vYfYebqqBQFUv
                      MD5:45FFA83B8AE12708877C836F8FE5DEDD
                      SHA1:4F6BF094E5BE952810A394CF9EC6D1EDE0EF62DC
                      SHA-256:682E00E9D4E45FB8C21104632EF3D85E774CEBDF81CF9F3D2A2C59FE2FCE8BB1
                      SHA-512:A42B92449B347469CF5023D8E3348A8E271416C32161432E728D030F48CCA706C9D29B7E00E4AE42D0C618C1DBA561F27A7DDA5C879296D34C652CABB96FBB6C
                      Malicious:false
                      Preview:2024/08/31-04:45:56.276 146c Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb since it was missing..2024/08/31-04:45:56.698 146c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):40
                      Entropy (8bit):4.1275671571169275
                      Encrypted:false
                      SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                      MD5:20D4B8FA017A12A108C87F540836E250
                      SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                      SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                      SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                      Malicious:false
                      Preview:{"SDCH":{"dictionaries":{},"version":2}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):59
                      Entropy (8bit):4.619434150836742
                      Encrypted:false
                      SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                      MD5:2800881C775077E1C4B6E06BF4676DE4
                      SHA1:2873631068C8B3B9495638C865915BE822442C8B
                      SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                      SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                      Malicious:false
                      Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):59
                      Entropy (8bit):4.619434150836742
                      Encrypted:false
                      SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                      MD5:2800881C775077E1C4B6E06BF4676DE4
                      SHA1:2873631068C8B3B9495638C865915BE822442C8B
                      SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                      SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                      Malicious:false
                      Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
                      Category:dropped
                      Size (bytes):36864
                      Entropy (8bit):0.5559635235158827
                      Encrypted:false
                      SSDEEP:48:T6IopKWurJNVr1GJmA8pv82pfurJNVrdHXuccaurJN2VrJ1n4n1GmzNGU1cSB:OIEumQv8m1ccnvS6
                      MD5:9AAAE8C040B616D1378F3E0E17689A29
                      SHA1:F91E7DE07F1DA14D15D067E1F50C3B84A328DBB7
                      SHA-256:5B94D63C31AE795661F69B9D10E8BFD115584CD6FEF5FBB7AA483FDC6A66945B
                      SHA-512:436202AB8B6BB0318A30946108E6722DFF781F462EE05980C14F57F347EDDCF8119E236C3290B580CEF6902E1B59FB4F546D6BD69F62479805B39AB0F3308EC1
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j..........g...D.........7............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):40
                      Entropy (8bit):4.1275671571169275
                      Encrypted:false
                      SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                      MD5:20D4B8FA017A12A108C87F540836E250
                      SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                      SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                      SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                      Malicious:false
                      Preview:{"SDCH":{"dictionaries":{},"version":2}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):36864
                      Entropy (8bit):0.36515621748816035
                      Encrypted:false
                      SSDEEP:24:TLH3lIIAoDJ84l5lDlnDMlRlyKDtM6UwccWfp15fBIe:Tb31DtX5nDOvyKDhU1cSB
                      MD5:25363ADC3C9D98BAD1A33D0792405CBF
                      SHA1:D06E343087D86EF1A06F7479D81B26C90A60B5C3
                      SHA-256:6E019B8B9E389216D5BDF1F2FE63F41EF98E71DA101F2A6BE04F41CC5954532D
                      SHA-512:CF7EEE35D0E00945AF221BEC531E8BF06C08880DA00BD103FA561BC069D7C6F955CBA3C1C152A4884601E5A670B7487D39B4AE9A4D554ED8C14F129A74E555F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.......X..g...}.....$.X..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):111
                      Entropy (8bit):4.718418993774295
                      Encrypted:false
                      SSDEEP:3:YLb9N+eAXRfHDH2LS7PMVKJq0nMb1KKtiVY:YHpoeS7PMVKJTnMRK3VY
                      MD5:285252A2F6327D41EAB203DC2F402C67
                      SHA1:ACEDB7BA5FBC3CE914A8BF386A6F72CA7BAA33C6
                      SHA-256:5DFC321417FC31359F23320EA68014EBFD793C5BBED55F77DAB4180BBD4A2026
                      SHA-512:11CE7CB484FEE66894E63C31DB0D6B7EF66AD0327D4E7E2EB85F3BCC2E836A3A522C68D681E84542E471E54F765E091EFE1EE4065641B0299B15613EB32DCC0D
                      Malicious:false
                      Preview:{"net":{"http_server_properties":{"servers":[],"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):59
                      Entropy (8bit):4.619434150836742
                      Encrypted:false
                      SSDEEP:3:YLbkVKJq0nMb1KKtiVY:YHkVKJTnMRK3VY
                      MD5:2800881C775077E1C4B6E06BF4676DE4
                      SHA1:2873631068C8B3B9495638C865915BE822442C8B
                      SHA-256:226EEC4486509917AA336AFEBD6FF65777B75B65F1FB06891D2A857A9421A974
                      SHA-512:E342407AB65CC68F1B3FD706CD0A37680A0864FFD30A6539730180EDE2CDCD732CC97AE0B9EF7DB12DA5C0F83E429DF0840DBF7596ACA859A0301665E517377B
                      Malicious:false
                      Preview:{"net":{"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):61
                      Entropy (8bit):3.7273991737283296
                      Encrypted:false
                      SSDEEP:3:S8ltHlS+QUl1ASEGhTFl:S85aEFl
                      MD5:9F7EADC15E13D0608B4E4D590499AE2E
                      SHA1:AFB27F5C20B117031328E12DD3111A7681FF8DB5
                      SHA-256:5C3A5B578AB9FE853EAD7040BC161929EA4F6902073BA2B8BB84487622B98923
                      SHA-512:88455784C705F565C70FA0A549C54E2492976E14643E9DD0A8E58C560D003914313DF483F096BD33EC718AEEC7667B8DE063A73627AA3436BA6E7E562E565B3F
                      Malicious:false
                      Preview:*...#................version.1..namespace-..&f...............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):389
                      Entropy (8bit):5.219197204390703
                      Encrypted:false
                      SSDEEP:6:i8dr1wkn23oH+Tcwt0jqEKj0QM72KLlE88Bq2Pwkn23oH+Tcwt0jqEKj0QMxIFUv:i88fYebqqB6L68OvYfYebqqBZFUv
                      MD5:E31C006694EA7A904BE05C0A3BC69227
                      SHA1:23BC4504C2F1EB16F961E0E5CED56C4E937D7747
                      SHA-256:A44A8E98D757FDAA0C10877382C6951FA68972F48ADC66A939DBB964036341BA
                      SHA-512:E3BC25C014FDB4DB144C67546C04F1404E14F872A4A1CECCCC1BD7BAD96300DE5AC79A3D1125468A14B0CF118CF271F00B281C00D01C7A2CAD3C3D71172EF4E6
                      Malicious:false
                      Preview:2024/08/31-04:46:12.166 920 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage since it was missing..2024/08/31-04:46:12.197 920 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):46
                      Entropy (8bit):4.019797536844534
                      Encrypted:false
                      SSDEEP:3:sLollttz6sjlGXU2tkn:qolXtWswXU2tkn
                      MD5:90881C9C26F29FCA29815A08BA858544
                      SHA1:06FEE974987B91D82C2839A4BB12991FA99E1BDD
                      SHA-256:A2CA52E34B6138624AC2DD20349CDE28482143B837DB40A7F0FBDA023077C26A
                      SHA-512:15F7F8197B4FC46C4C5C2570FB1F6DD73CB125F9EE53DFA67F5A0D944543C5347BDAB5CCE95E91DD6C948C9023E23C7F9D76CFF990E623178C92F8D49150A625
                      Malicious:false
                      Preview:...n'................_mts_schema_descriptor...
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):297
                      Entropy (8bit):5.220784663069611
                      Encrypted:false
                      SSDEEP:6:JQbXR1wkn23oH+Tcwtkx2KLl/QFpDM+q2Pwkn23oH+TcwtCIFUv:iX0fYebkVLSi+vYfYebLFUv
                      MD5:65A5F1128563DB53D96C0ADC5425D751
                      SHA1:1A848A8394C7052C28D9D5639F665FA5960359AC
                      SHA-256:844A021D9FBB13273301210B74C6FFBFE6903A75852BBF90BDD5134C2386DA00
                      SHA-512:3950248BE9F099BF0F7BE3E762B7AAE5C09BDC91F05D5B1B182ACA3770C71E8649A0DCE46F59E2ED0740A86F32D15CBF3ABD4374B887FB20E92C7C18B77AB9B7
                      Malicious:false
                      Preview:2024/08/31-04:45:54.378 1c1c Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Sync Data\LevelDB since it was missing..2024/08/31-04:45:54.450 1c1c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Sync Data\LevelDB/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):20480
                      Entropy (8bit):0.3528485475628876
                      Encrypted:false
                      SSDEEP:12:TLiN6CZhDu6MvDOF5yEHFxOUwa5qguYZ75fOSiPe2d:TLiwCZwE8I6Uwcco5fBtC
                      MD5:F2B4FB2D384AA4E4D6F4AEB0BBA217DC
                      SHA1:2CD70CFB3CE72D9B079170C360C1F563B6BF150E
                      SHA-256:1ECC07CD1D383472DAD33D2A5766625009EA5EACBAEDE2417ADA1842654CBBC8
                      SHA-512:48D03991660FA1598B3E002F5BC5F0F05E9696BCB2289240FA8CCBB2C030CDD23245D4ECC0C64DA1E7C54B092C3E60AE0427358F63087018BF0E6CEDC471DD34
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j..........g.....4....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):131072
                      Entropy (8bit):0.002110589502647469
                      Encrypted:false
                      SSDEEP:3:ImtV2Kvk:IiV2+
                      MD5:8BA769024245D733E6E412C00BAAF5D4
                      SHA1:5DA3EF6DFB4890EEF237722E20326FBF0A663566
                      SHA-256:61491B0EF19D59DFF8A68FB2E71B796E13017D67EAC06FEA8536A72C32801D59
                      SHA-512:0620CCDE44820C0A4B9006FAB113EC9207B779F4990A58BC6D1DF035FB385D4EFBA975BECFB7DF99A832B6E0C562DBFA5FB50A96413FBB675056EDF96A3BD610
                      Malicious:false
                      Preview:VLnk.....?........o..u>.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 4, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 4
                      Category:dropped
                      Size (bytes):182272
                      Entropy (8bit):1.0772143040865192
                      Encrypted:false
                      SSDEEP:192:erb2qAdB9TbTbuDDsnxCkOKSAE+WslKOMq+vVumYrSn66:e/2qOB1nxCkOKSAELyKOMq+vVumBp
                      MD5:63D39C290FDF76E529A4BACB77753FB6
                      SHA1:18038C105FE06689E836596FD620D1CD3863ED65
                      SHA-256:C9374D976700DF53C5E88B28E269615818A9A6DC2E8666EF6AAD20301A5CC15B
                      SHA-512:4D9CD50F914CE6527F732E920F916C6A13A076145B352163FEC1A8FB8BBCC2177F527B50B3DD3F43510BF6C49E8F2C1E505F436294F900167CEDD1ECF27589BE
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 10, database pages 7, cookie 0xb, schema 4, UTF-8, version-valid-for 10
                      Category:dropped
                      Size (bytes):14336
                      Entropy (8bit):0.7836182415564406
                      Encrypted:false
                      SSDEEP:24:LLqlCouxhK3thdkSdj5QjUsEGcGBXp22iSBgm+xjgm:uOK3tjkSdj5IUltGhp22iSBgm+xj/
                      MD5:AA9965434F66985F0979719F3035C6E1
                      SHA1:39FC31CBB2BB4F8FA8FB6C34154FB48FBCBAEEF4
                      SHA-256:F42877E694E9AFC76E1BBA279F6EC259E28A7E7C574EFDCC15D58EFAE06ECA09
                      SHA-512:201667EAA3DF7DBCCF296DE6FCF4E79897C1BB744E29EF37235C44821A18EAD78697DFEB9253AA01C0DC28E5758E2AF50852685CDC9ECA1010DBAEE642590CEA
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j..................n..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with very long lines (3951), with CRLF line terminators
                      Category:dropped
                      Size (bytes):11755
                      Entropy (8bit):5.190465908239046
                      Encrypted:false
                      SSDEEP:192:hH4vrmqRBB4W4PoiUDNaxvR5FCHFcoaSbqGEDI:hH4vrmUB6W4jR3GaSbqGEDI
                      MD5:07301A857C41B5854E6F84CA00B81EA0
                      SHA1:7441FC1018508FF4F3DBAA139A21634C08ED979C
                      SHA-256:2343C541E095E1D5F202E8D2A0807113E69E1969AF8E15E3644C51DB0BF33FBF
                      SHA-512:00ADE38E9D2F07C64648202F1D5F18A2DFB2781C0517EAEBCD567D8A77DBB7CB40A58B7C7D4EC03336A63A20D2E11DD64448F020C6FF72F06CA870AA2B4765E0
                      Malicious:false
                      Preview:{.. "DefaultCohort": {.. "21f3388b-c2a5-4791-8f6e-a4cad6d17f4f.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.BingHomePage.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Covid.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Finance.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Jobs.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.KnowledgeCard.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Local.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.NTP3PCLICK.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.NotifySearchPage.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Recipe.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.SearchPage.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Sports.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Travel.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Weather.Bubble": 1,.. "2cb2db96-3bd0-403e-abe2-9269b3761041.Bubble": 1,.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3:L:L
                      MD5:5058F1AF8388633F609CADB75A75DC9D
                      SHA1:3A52CE780950D4D969792A2559CD519D7EE8C727
                      SHA-256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
                      SHA-512:0B61241D7C17BCBB1BAEE7094D14B7C451EFECC7FFCBD92598A0F13D313CC9EBC2A07E61F007BAF58FBF94FF9A8695BDD5CAE7CE03BBF1E94E93613A00F25F21
                      Malicious:false
                      Preview:.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3:L:L
                      MD5:5058F1AF8388633F609CADB75A75DC9D
                      SHA1:3A52CE780950D4D969792A2559CD519D7EE8C727
                      SHA-256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
                      SHA-512:0B61241D7C17BCBB1BAEE7094D14B7C451EFECC7FFCBD92598A0F13D313CC9EBC2A07E61F007BAF58FBF94FF9A8695BDD5CAE7CE03BBF1E94E93613A00F25F21
                      Malicious:false
                      Preview:.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6424
                      Entropy (8bit):4.978402198564324
                      Encrypted:false
                      SSDEEP:96:stgqfais1jb9KfdfN8zLs85eh6Cb7/x+6MhmuecmAe++QV2Mz7/EJ:stgcsCdfNkLs88bV+FiATPz7MJ
                      MD5:FE3F1AFB1A861D22FCDB76ABB3318685
                      SHA1:B244CCE8E3BDAEDB05DA6ECEF0DA134C3221A118
                      SHA-256:F84E9A49DB9F88E4EEB16A1A0851AF07FBE9BC7FF13755F810DDC293335FF6EA
                      SHA-512:A48C906EDBDCE54A2C6D9DE0854598A45294F15C6705631AECC173DE275A241CBDF2771487DB491EDAC8BE22558BDE22221A82942D6FA9A020A9B29230BE3A1C
                      Malicious:false
                      Preview:{"aadc_info":{"age_group":0},"account_tracker_service_last_update":"13369567554880710","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"domain_diversity":{"last_reporting_timestamp":"13369567555301746"},"download":{"default_directory":"C:\\Users\\user\\AppData\\Local\\Microsoft\\Edge\\KioskDownloads\\","directory_upgrade":true},"dual_engine":{"consumer_mode":{"ie_user":false},"consumer_site_list_with_ie_entries":false,"consumer_sitelist_location":"","consumer_sitelist_version":"","external_consumer_shared_cookie_data":{},"shared_cookie_data":{},"sitelist_data_2":{},"sitelist_has_consumer_data":false,"sitelist_has_enterprise_data":false,"sitelist_location":"","sitelist_source":0,"sitelist_version":
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):16384
                      Entropy (8bit):0.35226517389931394
                      Encrypted:false
                      SSDEEP:12:TLC+waBg9LBgVDBgQjiZBgKuFtuQkMbmgcVAzO5kMCgGUg5OR:TLPdBgtBgJBgQjiZS53uQFE27MCgGZsR
                      MD5:D2CCDC36225684AAE8FA563AFEDB14E7
                      SHA1:3759649035F23004A4C30A14C5F0B54191BEBF80
                      SHA-256:080AEE864047C67CB1586A5BA5EDA007AFD18ECC2B702638287E386F159D7AEE
                      SHA-512:1A915AF643D688CA68AEDC1FF26C407D960D18DFDE838B417C437D7ADAC7B91C906E782DCC414784E64287915BD1DE5BB6A282E59AA9FEB8C384B4D4BC5F70EC
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.......Q......Q......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, writer version 2, read version 2, file counter 1, database pages 1, cookie 0, schema 0, unknown 0 encoding, version-valid-for 1
                      Category:dropped
                      Size (bytes):4096
                      Entropy (8bit):0.0905602561507182
                      Encrypted:false
                      SSDEEP:3:lSWFN3sl+ltlMWll:l9Fys1M
                      MD5:A8E75ACC11904CB877E15A0D0DE03941
                      SHA1:FBEE05EA246A7F08F7390237EA8B7E49204EF0E0
                      SHA-256:D78C40FEBE1BA7EC83660B78E3F6AB7BC45AB822B8F21B03B16B9CB4F3B3A259
                      SHA-512:A7B52B0575D451466A47AFFE3DCC0BC7FC9A6F8AB8194DA1F046AADA0EDDCCA76B4326AA9F19732BA50359B51EC72896BB8FA2FC23BAA6847C33AB51218511A4
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite Rollback Journal
                      Category:dropped
                      Size (bytes):512
                      Entropy (8bit):0.28499812076190567
                      Encrypted:false
                      SSDEEP:3:7FEG2l/TJPlFll:7+/l/T
                      MD5:2F9CDDEED1310F4511727339C673CC49
                      SHA1:0F7DD9706AB7FD9C19390B9F110B6EF555F7DF90
                      SHA-256:0D74594D67B82610C53529DFB59E7191F2AE42AB78F0FC1FE3A41D13EE77F621
                      SHA-512:C5C2517026DDC0E5B6306D78C80E4504B49CEEE3420B136EA34FE2DF929E32EC163AB050424737DD09E703DF5ED5F67D2D914997CCAFEDCEC23CCDCD4E2915AB
                      Malicious:false
                      Preview:.... .c.....6.L.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):32768
                      Entropy (8bit):0.049853797302745535
                      Encrypted:false
                      SSDEEP:6:GLW0zTvRCITW0zTvRCnqL9X8hslotGLNl0ml/XoQDeX:azTPzTCyGEjVl/XoQ
                      MD5:E659F98007D9688DE48DC94902D90855
                      SHA1:3947DE69D098B77DFCD1AF18F8757A6F33F047CB
                      SHA-256:FA63945D736CA2E72D09DACA8B93BA1294482B5A712FF2B7AA916610B6A37D1F
                      SHA-512:800BFBB38D27EFAEDE029E4C578E0E0DD076D6FE615C8645B46AE1F93CAB3EFE3623D11AB76C022E2D123A6F98644294F32EBBDBBD3C63686FB43368653E86C7
                      Malicious:false
                      Preview:..-......................%1Q.9.wj.%..A.8<...t....-......................%1Q.9.wj.%..A.8<...t..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite Write-Ahead Log, version 3007000
                      Category:dropped
                      Size (bytes):70072
                      Entropy (8bit):0.9977130130237
                      Encrypted:false
                      SSDEEP:48:Zezx6LlO+B0cbX+An9VAKAFXX+b2VAKAFXX+exOqVAKAFXX+JnUYVAKAFXX+eaMc:Ux+BulNsZNssO5NswNseA
                      MD5:6DAFC5E0DE5C6A5576F4971A4C79CEDA
                      SHA1:20437D57F8896AA96CCE4420FEDA7E73B860830D
                      SHA-256:226218DD2EB1EF9C9AD61419FF8D5F78604713824D7385F0255E9E1943C40A81
                      SHA-512:7162E0777A9C4C7E2C739F390097770242658714775F6F76D07F9BCB3E96D3A9095AA9A44A2C778A0032CB762CE8E083D12EA17582D29CFDE3DFEDBE4BFED935
                      Malicious:false
                      Preview:7....-..........j.%..A.8..1}..K ........j.%..A.8.y...?_.SQLite format 3......@ ..........................................................................j.............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:modified
                      Size (bytes):1566
                      Entropy (8bit):5.4788155571291535
                      Encrypted:false
                      SSDEEP:48:e8SSBStVgQAPkuHRHXxtIYjIYzzVFqk2MYjMYjyMAlkfAlk43:J0t+QzkIYjIYzzjb2MYjMYFYcY93
                      MD5:4215AB42E4CFA6FB521C301D95545A5A
                      SHA1:D159EE6FDBAFB4B355C268ADE174B7D77B7C384D
                      SHA-256:499F3543AC32C5E86259C9B0FA64CF39F43649D486E031971195D09DC48824FF
                      SHA-512:AFF5CE7068F909C9FA9E30DC2DD6426E0D07B69453F4412DC1ED6CC1EB25B325B30F247B12D0C783D0F397FBB2B87E1842595B91EAD9936957623F23833ADCB0
                      Malicious:false
                      Preview:A..r.................20_1_1...1.,U.................20_1_1...1Cc.T.................4_IPH_CompanionSidePanel...IPH_CompanionSidePanel.....$4_IPH_CompanionSidePanelRegionSearch(."IPH_CompanionSidePanelRegionSearch......4_IPH_DownloadToolbarButton...IPH_DownloadToolbarButton.....&4_IPH_FocusHelpBubbleScreenReaderPromo*.$IPH_FocusHelpBubbleScreenReaderPromo......4_IPH_GMCCastStartStop...IPH_GMCCastStartStop......4_IPH_HighEfficiencyMode...IPH_HighEfficiencyMode......4_IPH_LiveCaption...IPH_LiveCaption......4_IPH_PasswordsAccountStorage!..IPH_PasswordsAccountStorage....."4_IPH_PasswordsWebAppProfileSwitch&. IPH_PasswordsWebAppProfileSwitch.....-4_IPH_PriceInsightsPageActionIconLabelFeature1.+IPH_PriceInsightsPageActionIconLabelFeature......4_IPH_PriceTrackingChipFeature"..IPH_PriceTrackingChipFeature.....&4_IPH_PriceTrackingEmailConsentFeature*.$IPH_PriceTrackingEmailConsentFeature.....-4_IPH_PriceTrackingPageActionIconLabelFeature1.+IPH_PriceTrackingPageActionIconLabelFeature......4_IPH_De
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):293
                      Entropy (8bit):5.274299872771585
                      Encrypted:false
                      SSDEEP:6:JQaVuEdR1wkn23oH+Tcwt0rl2KLl/QPfRF39+q2Pwkn23oH+Tcwt0rK+IFUv:/VuESfYebeL0F34vYfYeb13FUv
                      MD5:D49F118B2BB8F2EA66B8CB5666026575
                      SHA1:035F542D8397A0B373B70CC63794FD95A11FD3A5
                      SHA-256:368BF58EC38E0C5B63420E0A0800722FCBD2E7B7A6B6CE82964AE5A696206CB1
                      SHA-512:DA4FF713CD2E4551D2330CC5437E598C0736EEE32B42C278B92FB3E67B6B8C8FDD3A158154758EB253EB384D2415698A44C333D33B6D825DAF58A092409F26DE
                      Malicious:false
                      Preview:2024/08/31-04:45:54.900 1c68 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\shared_proto_db since it was missing..2024/08/31-04:45:54.914 1c68 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\shared_proto_db/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):729
                      Entropy (8bit):3.958141412815535
                      Encrypted:false
                      SSDEEP:12:G0nYUtTNop//z3p/Wui+it/4JbZfPStub/RG0lbANqa:G0nYUtypD3RXi6FZfc25m
                      MD5:FBC524D02048C176A0A5D1B8B752932A
                      SHA1:294C48557549A4C978326D9B7969E293A024F157
                      SHA-256:F3FC95AE128DB918FC126F15CD9D96618482BA6ACCC622AAA19B10CE80B15EA0
                      SHA-512:9B6434442E11610B8B5DDA43AA56656599925C9C8F0A364DDB69D15B37A912D223EE600012468E0DB723CAF3546FFBDF56F085A0159EA7968BBACE894AAFF856
                      Malicious:false
                      Preview:.h.6.................__global... .t...................__global... .9..b.................33_..........................33_........v.................21_.....vuNX.................21_.....<...................20_.....,.1..................19_.....QL.s.................18_.....!....................3_.....n.b..................4_.........................37_.......`.................38_.....].$&.................39_.....4.9..................20_......R...................20_.......1..................19_......(...................18_.....:.=..................3_......W2..................4_.....)..>.................37_..........................38_.....h.#..................39_.....P"...................9_.........................9_.....
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):311
                      Entropy (8bit):5.252446182066081
                      Encrypted:false
                      SSDEEP:6:JQJ1wkn23oH+Tcwt0rzs52KLl/Q7F9+q2Pwkn23oH+Tcwt0rzAdIFUv:9fYeb99LQF4vYfYebyFUv
                      MD5:0B186BD2553E8B0B496A8A1EF4A5D875
                      SHA1:D15EEA2F1B2251A930F6F2474E996B18CA9163D2
                      SHA-256:4A47B9A26360E18024E9B8599E4AC363B6B7748ED8D2676B2682F3DE1857A5D8
                      SHA-512:A7CA75BA315761AD641B34535250AB26A87BF42F62CEE326747D0125357DAA09535B49DAC741B1819A3DFBA3A3DAFBFEC3E3FA4C331A0EB02C64DA659C815BC1
                      Malicious:false
                      Preview:2024/08/31-04:45:54.888 1c68 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\shared_proto_db\metadata since it was missing..2024/08/31-04:45:54.897 1c68 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\shared_proto_db\metadata/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):8.280239615765425E-4
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):262512
                      Entropy (8bit):8.81240594570408E-4
                      Encrypted:false
                      SSDEEP:3:LsNlkgHKl/:Ls3NK
                      MD5:7BDC843AD549F292DF8B5B6371517411
                      SHA1:4E9FFF94EE12EC966D54D335CC7EF24BDFE17808
                      SHA-256:F98C2D018D809AAD9470D56C2CDEFD640FA2739E0E5C54C62F08B9B58C8C72DA
                      SHA-512:5E860D343641FF2F5CE4692F7053266CE9443B8F88C347065A1E3D3B5AEC049B0DD78B68DA5C7A7C2AEB69D0C713BE6A299FE6766B93AE42E383E90B13DE1AA4
                      Malicious:false
                      Preview:.........................................f..../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):8.280239615765425E-4
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):262512
                      Entropy (8bit):8.81240594570408E-4
                      Encrypted:false
                      SSDEEP:3:LsNlXO:Ls3
                      MD5:A8EAF1E044630AE0F3034F1DA0AF9891
                      SHA1:8A7BD624C60DCA31E20664630DD40244469F6286
                      SHA-256:8C67EF072F73621160C5447F2FAA4B2282A7C94C48B6282A885E528A64BC64E7
                      SHA-512:2C7D4B01C2ABD62F2103CC04A62F76F0EDF935120BEF14568F0A233F03A235467C461B714D9B408C6DF6737D00641C8EEF74A813176EE047986AAFB34426BD93
                      Malicious:false
                      Preview:............................................../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):120
                      Entropy (8bit):3.32524464792714
                      Encrypted:false
                      SSDEEP:3:tbloIlrJFlXnpQoWcNylRjlgbYnPdJiG6R7lZAUAl:tbdlrYoWcV0n1IGi7kBl
                      MD5:A397E5983D4A1619E36143B4D804B870
                      SHA1:AA135A8CC2469CFD1EF2D7955F027D95BE5DFBD4
                      SHA-256:9C70F766D3B84FC2BB298EFA37CC9191F28BEC336329CC11468CFADBC3B137F4
                      SHA-512:4159EA654152D2810C95648694DD71957C84EA825FCCA87B36F7E3282A72B30EF741805C610C5FA847CA186E34BDE9C289AAA7B6931C5B257F1D11255CD2A816
                      Malicious:false
                      Preview:C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):13
                      Entropy (8bit):2.7192945256669794
                      Encrypted:false
                      SSDEEP:3:NYLFRQI:ap2I
                      MD5:BF16C04B916ACE92DB941EBB1AF3CB18
                      SHA1:FA8DAEAE881F91F61EE0EE21BE5156255429AA8A
                      SHA-256:7FC23C9028A316EC0AC25B09B5B0D61A1D21E58DFCF84C2A5F5B529129729098
                      SHA-512:F0B7DF5517596B38D57C57B5777E008D6229AB5B1841BBE74602C77EEA2252BF644B8650C7642BD466213F62E15CC7AB5A95B28E26D3907260ED1B96A74B65FB
                      Malicious:false
                      Preview:117.0.2045.47
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1371
                      Entropy (8bit):5.5210433207339165
                      Encrypted:false
                      SSDEEP:24:YpQBqDPak7u5rrt0+FzeQ19QcdGjyikbfpV4JdXBuBuwBSaCoNPnNhVBXbKQQRC0:YuBqDPaf5hv9zw4agBzBSt+VBHB0
                      MD5:BFA73B0AD418A4C01B9CE3491B970286
                      SHA1:9CE32508FABFEA568FE27FFF58802A244BAEF8FD
                      SHA-256:929B26CE417640829C6F57CA4AB1D9CD8B902535929E3B1FD2ADB692950EF1E8
                      SHA-512:889B87DA84E6D990BE787B7919FF27B65B51463EF393E034FF2C12BA6A256F40B45D398AA6F9986564782DDAEB7421531D4BC1F28E87536126C360CB288901C2
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369567553725893","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1725093953"},"user_experienc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1371
                      Entropy (8bit):5.5210433207339165
                      Encrypted:false
                      SSDEEP:24:YpQBqDPak7u5rrt0+FzeQ19QcdGjyikbfpV4JdXBuBuwBSaCoNPnNhVBXbKQQRC0:YuBqDPaf5hv9zw4agBzBSt+VBHB0
                      MD5:BFA73B0AD418A4C01B9CE3491B970286
                      SHA1:9CE32508FABFEA568FE27FFF58802A244BAEF8FD
                      SHA-256:929B26CE417640829C6F57CA4AB1D9CD8B902535929E3B1FD2ADB692950EF1E8
                      SHA-512:889B87DA84E6D990BE787B7919FF27B65B51463EF393E034FF2C12BA6A256F40B45D398AA6F9986564782DDAEB7421531D4BC1F28E87536126C360CB288901C2
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369567553725893","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1725093953"},"user_experienc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1371
                      Entropy (8bit):5.5210433207339165
                      Encrypted:false
                      SSDEEP:24:YpQBqDPak7u5rrt0+FzeQ19QcdGjyikbfpV4JdXBuBuwBSaCoNPnNhVBXbKQQRC0:YuBqDPaf5hv9zw4agBzBSt+VBHB0
                      MD5:BFA73B0AD418A4C01B9CE3491B970286
                      SHA1:9CE32508FABFEA568FE27FFF58802A244BAEF8FD
                      SHA-256:929B26CE417640829C6F57CA4AB1D9CD8B902535929E3B1FD2ADB692950EF1E8
                      SHA-512:889B87DA84E6D990BE787B7919FF27B65B51463EF393E034FF2C12BA6A256F40B45D398AA6F9986564782DDAEB7421531D4BC1F28E87536126C360CB288901C2
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369567553725893","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1725093953"},"user_experienc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1371
                      Entropy (8bit):5.5210433207339165
                      Encrypted:false
                      SSDEEP:24:YpQBqDPak7u5rrt0+FzeQ19QcdGjyikbfpV4JdXBuBuwBSaCoNPnNhVBXbKQQRC0:YuBqDPaf5hv9zw4agBzBSt+VBHB0
                      MD5:BFA73B0AD418A4C01B9CE3491B970286
                      SHA1:9CE32508FABFEA568FE27FFF58802A244BAEF8FD
                      SHA-256:929B26CE417640829C6F57CA4AB1D9CD8B902535929E3B1FD2ADB692950EF1E8
                      SHA-512:889B87DA84E6D990BE787B7919FF27B65B51463EF393E034FF2C12BA6A256F40B45D398AA6F9986564782DDAEB7421531D4BC1F28E87536126C360CB288901C2
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369567553725893","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1725093953"},"user_experienc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1371
                      Entropy (8bit):5.5210433207339165
                      Encrypted:false
                      SSDEEP:24:YpQBqDPak7u5rrt0+FzeQ19QcdGjyikbfpV4JdXBuBuwBSaCoNPnNhVBXbKQQRC0:YuBqDPaf5hv9zw4agBzBSt+VBHB0
                      MD5:BFA73B0AD418A4C01B9CE3491B970286
                      SHA1:9CE32508FABFEA568FE27FFF58802A244BAEF8FD
                      SHA-256:929B26CE417640829C6F57CA4AB1D9CD8B902535929E3B1FD2ADB692950EF1E8
                      SHA-512:889B87DA84E6D990BE787B7919FF27B65B51463EF393E034FF2C12BA6A256F40B45D398AA6F9986564782DDAEB7421531D4BC1F28E87536126C360CB288901C2
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369567553725893","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1725093953"},"user_experienc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1371
                      Entropy (8bit):5.5210433207339165
                      Encrypted:false
                      SSDEEP:24:YpQBqDPak7u5rrt0+FzeQ19QcdGjyikbfpV4JdXBuBuwBSaCoNPnNhVBXbKQQRC0:YuBqDPaf5hv9zw4agBzBSt+VBHB0
                      MD5:BFA73B0AD418A4C01B9CE3491B970286
                      SHA1:9CE32508FABFEA568FE27FFF58802A244BAEF8FD
                      SHA-256:929B26CE417640829C6F57CA4AB1D9CD8B902535929E3B1FD2ADB692950EF1E8
                      SHA-512:889B87DA84E6D990BE787B7919FF27B65B51463EF393E034FF2C12BA6A256F40B45D398AA6F9986564782DDAEB7421531D4BC1F28E87536126C360CB288901C2
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369567553725893","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1725093953"},"user_experienc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1371
                      Entropy (8bit):5.5210433207339165
                      Encrypted:false
                      SSDEEP:24:YpQBqDPak7u5rrt0+FzeQ19QcdGjyikbfpV4JdXBuBuwBSaCoNPnNhVBXbKQQRC0:YuBqDPaf5hv9zw4agBzBSt+VBHB0
                      MD5:BFA73B0AD418A4C01B9CE3491B970286
                      SHA1:9CE32508FABFEA568FE27FFF58802A244BAEF8FD
                      SHA-256:929B26CE417640829C6F57CA4AB1D9CD8B902535929E3B1FD2ADB692950EF1E8
                      SHA-512:889B87DA84E6D990BE787B7919FF27B65B51463EF393E034FF2C12BA6A256F40B45D398AA6F9986564782DDAEB7421531D4BC1F28E87536126C360CB288901C2
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369567553725893","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1725093953"},"user_experienc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1371
                      Entropy (8bit):5.5210433207339165
                      Encrypted:false
                      SSDEEP:24:YpQBqDPak7u5rrt0+FzeQ19QcdGjyikbfpV4JdXBuBuwBSaCoNPnNhVBXbKQQRC0:YuBqDPaf5hv9zw4agBzBSt+VBHB0
                      MD5:BFA73B0AD418A4C01B9CE3491B970286
                      SHA1:9CE32508FABFEA568FE27FFF58802A244BAEF8FD
                      SHA-256:929B26CE417640829C6F57CA4AB1D9CD8B902535929E3B1FD2ADB692950EF1E8
                      SHA-512:889B87DA84E6D990BE787B7919FF27B65B51463EF393E034FF2C12BA6A256F40B45D398AA6F9986564782DDAEB7421531D4BC1F28E87536126C360CB288901C2
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369567553725893","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1725093953"},"user_experienc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1371
                      Entropy (8bit):5.5210433207339165
                      Encrypted:false
                      SSDEEP:24:YpQBqDPak7u5rrt0+FzeQ19QcdGjyikbfpV4JdXBuBuwBSaCoNPnNhVBXbKQQRC0:YuBqDPaf5hv9zw4agBzBSt+VBHB0
                      MD5:BFA73B0AD418A4C01B9CE3491B970286
                      SHA1:9CE32508FABFEA568FE27FFF58802A244BAEF8FD
                      SHA-256:929B26CE417640829C6F57CA4AB1D9CD8B902535929E3B1FD2ADB692950EF1E8
                      SHA-512:889B87DA84E6D990BE787B7919FF27B65B51463EF393E034FF2C12BA6A256F40B45D398AA6F9986564782DDAEB7421531D4BC1F28E87536126C360CB288901C2
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369567553725893","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1725093953"},"user_experienc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1371
                      Entropy (8bit):5.5210433207339165
                      Encrypted:false
                      SSDEEP:24:YpQBqDPak7u5rrt0+FzeQ19QcdGjyikbfpV4JdXBuBuwBSaCoNPnNhVBXbKQQRC0:YuBqDPaf5hv9zw4agBzBSt+VBHB0
                      MD5:BFA73B0AD418A4C01B9CE3491B970286
                      SHA1:9CE32508FABFEA568FE27FFF58802A244BAEF8FD
                      SHA-256:929B26CE417640829C6F57CA4AB1D9CD8B902535929E3B1FD2ADB692950EF1E8
                      SHA-512:889B87DA84E6D990BE787B7919FF27B65B51463EF393E034FF2C12BA6A256F40B45D398AA6F9986564782DDAEB7421531D4BC1F28E87536126C360CB288901C2
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369567553725893","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1725093953"},"user_experienc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1371
                      Entropy (8bit):5.5210433207339165
                      Encrypted:false
                      SSDEEP:24:YpQBqDPak7u5rrt0+FzeQ19QcdGjyikbfpV4JdXBuBuwBSaCoNPnNhVBXbKQQRC0:YuBqDPaf5hv9zw4agBzBSt+VBHB0
                      MD5:BFA73B0AD418A4C01B9CE3491B970286
                      SHA1:9CE32508FABFEA568FE27FFF58802A244BAEF8FD
                      SHA-256:929B26CE417640829C6F57CA4AB1D9CD8B902535929E3B1FD2ADB692950EF1E8
                      SHA-512:889B87DA84E6D990BE787B7919FF27B65B51463EF393E034FF2C12BA6A256F40B45D398AA6F9986564782DDAEB7421531D4BC1F28E87536126C360CB288901C2
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369567553725893","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1725093953"},"user_experienc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):20480
                      Entropy (8bit):0.46731661083066856
                      Encrypted:false
                      SSDEEP:12:TL1QAFUxOUDaabZXiDiIF8izX4fhhdWeci2oesJaYi3is25q0S9K0xHZ75fOV:TLiOUOq0afDdWec9sJf5Q7J5fc
                      MD5:E93ACF0820CA08E5A5D2D159729F70E3
                      SHA1:2C1A4D4924B9AEC1A796F108607404B000877C5D
                      SHA-256:F2267FDA7F45499F7A01186B75CEFB799F8D2BC97E2E9B5068952D477294302C
                      SHA-512:3BF36C20E04DCF1C16DC794E272F82F68B0DE43F16B4A9746B63B6D6BBC953B00BD7111CDA7AFE85CEBB2C447145483A382B15E2B0A5B36026C3441635D4E50C
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):8.280239615765425E-4
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):262512
                      Entropy (8bit):9.553120663130604E-4
                      Encrypted:false
                      SSDEEP:3:LsNlrw:Ls3
                      MD5:334022A234AAA3F6DD856A9E92407652
                      SHA1:9AF8D14915298F4E6234E07051F04284DC274154
                      SHA-256:77323D141752C880C168CD009AC3C2EE781E3F272A05C4653300DF08E3FD8282
                      SHA-512:3D0CBFAF33AF68737695F05640D3AB3FE0876F3647E1E22ADFE06EA29405FFF84E4E14C201E3D5C02F31120E95C099D0FD03CC713D541D0E57F179E780A91BE8
                      Malicious:false
                      Preview:............................................../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):47
                      Entropy (8bit):4.3818353308528755
                      Encrypted:false
                      SSDEEP:3:2jRo6jhM6ceYcUtS2djIn:5I2uxUt5Mn
                      MD5:48324111147DECC23AC222A361873FC5
                      SHA1:0DF8B2267ABBDBD11C422D23338262E3131A4223
                      SHA-256:D8D672F953E823063955BD9981532FC3453800C2E74C0CC3653D091088ABD3B3
                      SHA-512:E3B5DB7BA5E4E3DE3741F53D91B6B61D6EB9ECC8F4C07B6AE1C2293517F331B716114BAB41D7935888A266F7EBDA6FABA90023EFFEC850A929986053853F1E02
                      Malicious:false
                      Preview:customSettings_F95BA787499AB4FA9EFFF472CE383A14
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):35
                      Entropy (8bit):4.014438730983427
                      Encrypted:false
                      SSDEEP:3:YDMGA2ADH/AYKEqsYq:YQXT/bKE1F
                      MD5:BB57A76019EADEDC27F04EB2FB1F1841
                      SHA1:8B41A1B995D45B7A74A365B6B1F1F21F72F86760
                      SHA-256:2BAE8302F9BD2D87AE26ACF692663DF1639B8E2068157451DA4773BD8BD30A2B
                      SHA-512:A455D7F8E0BE9A27CFB7BE8FE0B0E722B35B4C8F206CAD99064473F15700023D5995CC2C4FAFDB8FBB50F0BAB3EC8B241E9A512C0766AAAE1A86C3472C589FFD
                      Malicious:false
                      Preview:{"forceServiceDetermination":false}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):29
                      Entropy (8bit):3.922828737239167
                      Encrypted:false
                      SSDEEP:3:2NGw+K+:fwZ+
                      MD5:7BAAFE811F480ACFCCCEE0D744355C79
                      SHA1:24B89AE82313084BB8BBEB9AD98A550F41DF7B27
                      SHA-256:D5743766AF0312C7B7728219FC24A03A4FB1C2A54A506F337953FBC2C1B847C7
                      SHA-512:70FE1C197AF507CC0D65E99807D245C896A40A4271BA1121F9B621980877B43019E584C48780951FC1AD2A5D7D146FC6EA4678139A5B38F9B6F7A5F1E2E86BA3
                      Malicious:false
                      Preview:customSynchronousLookupUris_0
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):35302
                      Entropy (8bit):7.99333285466604
                      Encrypted:true
                      SSDEEP:768:rRhaFePY38QBsj61g3g01LXoDGPpgb8KbMcnjrQCckBuJyqk3x8cBBT:rLP+TBK6ZQLXSsaMcnHQQcox80
                      MD5:0E06E28C3536360DE3486B1A9E5195E8
                      SHA1:EB768267F34EC16A6CCD1966DCA4C3C2870268AB
                      SHA-256:F2658B1C913A96E75B45E6ADB464C8D796B34AC43BAF1635AA32E16D1752971C
                      SHA-512:45F1E909599E2F63372867BC359CF72FD846619DFEB5359E52D5700E0B1BCFFE5FF07606511A3BFFDDD933A0507195439457E4E29A49EB6451F26186B7240041
                      Malicious:false
                      Preview:.......murmur3.....IN...9.......0..X..#l....C....]......pv..E..........,..?.N?....V..B-.*.F.1....g|..._.>'.-(V... .=.7P.m....#}.r.....>.LE...G.A.h5........J..=..L^-.Zl++,..h..o.y..~j.]u...W...&s.........M..........h3b..[.5.]..V^w.........a.*...6g3..%.gy../{|Z.B..X.}5.]..t.1.H&B.[.).$Y......2....L.t...{...[WE.yy.]..e.v0..\.J3..T.`1Lnh.../..-=w...W.&N7.nz.P...z......'i..R6....../....t.[..&-.....T&l..e....$.8.."....Iq....J.v..|.6.M...zE...a9uw..'.$6.L..m$......NB).JL.G.7}8(`....J.)b.E.m...c.0I.V...|$....;.k.......*8v..l.:..@.F.........K..2...%(...kA......LJd~._A.N.....$3...5....Z"...X=.....%.........6.k.....F..1..l,ia..i.i....y.M..Cl.....*...}.I..r..-+=b.6....%...#...W..K.....=.F....~.....[.......-...../;....~.09..d.....GR..H.lR...m.Huh9.:..A H./)..D.F..Y.n7.....7D.O.a;>Z.K....w...sq..qo3N...8@.zpD.Ku......+.Z=.zNFgP._@.z.ic.......3.....+..j...an%...X..7.q..A.l.7.S2..+....1.s.b..z...@v..!.y...N.C.XQ.p.\..x8(.<.....cq.(
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):18
                      Entropy (8bit):3.5724312513221195
                      Encrypted:false
                      SSDEEP:3:kDnaV6bVon:kDYa2
                      MD5:5692162977B015E31D5F35F50EFAB9CF
                      SHA1:705DC80E8B32AC8B68F7E13CF8A75DCCB251ED7D
                      SHA-256:42CCB5159B168DBE5D5DDF026E5F7ED3DBF50873CFE47C7C3EF0677BB07B90D4
                      SHA-512:32905A4CC5BCE0FE8502DDD32096F40106625218BEDC4E218A344225D6DF2595A7B70EEB3695DCEFDD894ECB2B66BED479654E8E07F02526648E07ACFE47838C
                      Malicious:false
                      Preview:edgeSettings_2.0-0
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):3581
                      Entropy (8bit):4.459693941095613
                      Encrypted:false
                      SSDEEP:96:JTMhnytNaSA4BOsNQNhnUZTFGKDIWHCgL5tfHaaJzRHF+P1sYmnfHUdT+GWBH7Y/:KyMot7vjFU
                      MD5:BDE38FAE28EC415384B8CFE052306D6C
                      SHA1:3019740AF622B58D573C00BF5C98DD77F3FBB5CD
                      SHA-256:1F4542614473AE103A5EE3DEEEC61D033A40271CFF891AAA6797534E4DBB4D20
                      SHA-512:9C369D69298EBF087412EDA782EE72AFE5448FD0D69EA5141C2744EA5F6C36CDF70A51845CDC174838BAC0ADABDFA70DF6AEDBF6E7867578AE7C4B7805A8B55E
                      Malicious:false
                      Preview:{"models":[],"geoidMaps":{"gw_my":"https://malaysia.smartscreen.microsoft.com/","gw_tw":"https://taiwan.smartscreen.microsoft.com/","gw_at":"https://austria.smartscreen.microsoft.com/","gw_es":"https://spain.smartscreen.microsoft.com/","gw_pl":"https://poland.smartscreen.microsoft.com/","gw_se":"https://sweden.smartscreen.microsoft.com/","gw_kr":"https://southkorea.smartscreen.microsoft.com/","gw_br":"https://brazil.smartscreen.microsoft.com/","au":"https://australia.smartscreen.microsoft.com/","dk":"https://denmark.smartscreen.microsoft.com/","gw_sg":"https://singapore.smartscreen.microsoft.com/","gw_fr":"https://france.smartscreen.microsoft.com/","gw_ca":"https://canada.smartscreen.microsoft.com/","test":"https://eu-9.smartscreen.microsoft.com/","gw_il":"https://israel.smartscreen.microsoft.com/","gw_au":"https://australia.smartscreen.microsoft.com/","gw_ffl4mod":"https://unitedstates4.ss.wd.microsoft.us/","gw_ffl4":"https://unitedstates1.ss.wd.microsoft.us/","gw_eu":"https://europe.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):47
                      Entropy (8bit):4.493433469104717
                      Encrypted:false
                      SSDEEP:3:kfKbQSQSuLA5:kyUc5
                      MD5:3F90757B200B52DCF5FDAC696EFD3D60
                      SHA1:569A2E1BED9ECCDF7CD03E270AEF2BD7FF9B0E77
                      SHA-256:1EE63F0A3502CFB7DF195FABBA41A7805008AB2CCCDAEB9AF990409D163D60C8
                      SHA-512:39252BBAA33130DF50F36178A8EAB1D09165666D8A229FBB3495DD01CBE964F87CD2E6FCD479DFCA36BE06309EF18FEDA7F14722C57545203BBA24972D4835C8
                      Malicious:false
                      Preview:synchronousLookupUris_636976985063396749.rel.v2
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):35302
                      Entropy (8bit):7.99333285466604
                      Encrypted:true
                      SSDEEP:768:rRhaFePY38QBsj61g3g01LXoDGPpgb8KbMcnjrQCckBuJyqk3x8cBBT:rLP+TBK6ZQLXSsaMcnHQQcox80
                      MD5:0E06E28C3536360DE3486B1A9E5195E8
                      SHA1:EB768267F34EC16A6CCD1966DCA4C3C2870268AB
                      SHA-256:F2658B1C913A96E75B45E6ADB464C8D796B34AC43BAF1635AA32E16D1752971C
                      SHA-512:45F1E909599E2F63372867BC359CF72FD846619DFEB5359E52D5700E0B1BCFFE5FF07606511A3BFFDDD933A0507195439457E4E29A49EB6451F26186B7240041
                      Malicious:false
                      Preview:.......murmur3.....IN...9.......0..X..#l....C....]......pv..E..........,..?.N?....V..B-.*.F.1....g|..._.>'.-(V... .=.7P.m....#}.r.....>.LE...G.A.h5........J..=..L^-.Zl++,..h..o.y..~j.]u...W...&s.........M..........h3b..[.5.]..V^w.........a.*...6g3..%.gy../{|Z.B..X.}5.]..t.1.H&B.[.).$Y......2....L.t...{...[WE.yy.]..e.v0..\.J3..T.`1Lnh.../..-=w...W.&N7.nz.P...z......'i..R6....../....t.[..&-.....T&l..e....$.8.."....Iq....J.v..|.6.M...zE...a9uw..'.$6.L..m$......NB).JL.G.7}8(`....J.)b.E.m...c.0I.V...|$....;.k.......*8v..l.:..@.F.........K..2...%(...kA......LJd~._A.N.....$3...5....Z"...X=.....%.........6.k.....F..1..l,ia..i.i....y.M..Cl.....*...}.I..r..-+=b.6....%...#...W..K.....=.F....~.....[.......-...../;....~.09..d.....GR..H.lR...m.Huh9.:..A H./)..D.F..Y.n7.....7D.O.a;>Z.K....w...sq..qo3N...8@.zpD.Ku......+.Z=.zNFgP._@.z.ic.......3.....+..j...an%...X..7.q..A.l.7.S2..+....1.s.b..z...@v..!.y...N.C.XQ.p.\..x8(.<.....cq.(
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):50
                      Entropy (8bit):3.9904355005135823
                      Encrypted:false
                      SSDEEP:3:0xXF/XctY5GUf+:0RFeUf+
                      MD5:E144AFBFB9EE10479AE2A9437D3FC9CA
                      SHA1:5AAAC173107C688C06944D746394C21535B0514B
                      SHA-256:EB28E8ED7C014F211BD81308853F407DF86AEBB5F80F8E4640C608CD772544C2
                      SHA-512:837D15B3477C95D2D71391D677463A497D8D9FFBD7EB42E412DA262C9B5C82F22CE4338A0BEAA22C81A06ECA2DF7A9A98B7D61ECACE5F087912FD9BA7914AF3F
                      Malicious:false
                      Preview:topTraffic_170540185939602997400506234197983529371
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):575056
                      Entropy (8bit):7.999649474060713
                      Encrypted:true
                      SSDEEP:12288:fXdhUG0PlM/EXEBQlbk19RrH76Im4u8C1jJodha:Ji80e9Rb7Tm4u8CnR
                      MD5:BE5D1A12C1644421F877787F8E76642D
                      SHA1:06C46A95B4BD5E145E015FA7E358A2D1AC52C809
                      SHA-256:C1CE928FBEF4EF5A4207ABAFD9AB6382CC29D11DDECC215314B0522749EF6A5A
                      SHA-512:FD5B100E2F192164B77F4140ADF6DE0322F34D7B6F0CF14AED91BACAB18BB8F195F161F7CF8FB10651122A598CE474AC4DC39EDF47B6A85C90C854C2A3170960
                      Malicious:false
                      Preview:...._+jE.`..}....S..1....G}s..E....y".Wh.^.W.H...-...#.A...KR...9b........>k......bU.IVo...D......Y..[l.yx.......'c=..I0.....E.d...-...1 ....m../C...OQ.........qW..<:N.....38.u..X-..s....<..U.,Mi..._.......`.Y/.........^..,.E..........j@..G8..N.... ..Ea...4.+.79k.!T.-5W..!..@+..!.P..LDG.....V."....L.... .(#..$..&......C.....%A.T}....K_.S..'Q.".d....s....(j.D!......Ov..)*d0)."(..%..-..G..L.}....i.....m9;.....t.w..0....f?..-..M.c.3.....N7K.T..D>.3.x...z..u$5!..4..T.....U.O^L{.5..=E..'..;.}(|.6.:..f!.>...?M.8......P.D.J.I4.<...*.y.E....>....i%.6..Y.@..n.....M..r..C.f.;..<..0.H...F....h.......HB1]1....u..:...H..k....B.Q..J...@}j~.#...'Y.J~....I...ub.&..L[z..1.W/.Ck....M.......[.......N.F..z*.{nZ~d.V.4.u.K.V.......X.<p..cz..>*....X...W..da3(..g..Z$.L4.j=~.p.l.\.[e.&&.Y ...U)..._.^r0.,.{_......`S..[....(.\..p.bt.g..%.$+....f.....d....Im..f...W ......G..i_8a..ae..7....pS.....z-H..A.s.4.3..O.r.....u.S......a.}..v.-/..... ...a.x#./:...sS&U.().xL...pg
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):86
                      Entropy (8bit):4.3751917412896075
                      Encrypted:false
                      SSDEEP:3:YQ3JYq9xSs0dMEJAELJ2rjozQan:YQ3Kq9X0dMgAEwjM
                      MD5:961E3604F228B0D10541EBF921500C86
                      SHA1:6E00570D9F78D9CFEBE67D4DA5EFE546543949A7
                      SHA-256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED
                      SHA-512:535F930AFD2EF50282715C7E48859CC2D7B354FF4E6C156B94D5A2815F589B33189FFEDFCAF4456525283E993087F9F560D84CFCF497D189AB8101510A09C472
                      Malicious:false
                      Preview:{"user_experience_metrics.stability.exited_cleanly":false,"variations_crash_streak":0}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):71334
                      Entropy (8bit):6.073104341884043
                      Encrypted:false
                      SSDEEP:1536:pMGQ5XMBGJYpoaqW87dwg6pBNYWVZcNTuklis1nzwpmfw5t:pMrJM8JYCaN87d16pHlPCRhnzwpmfS
                      MD5:7CBA1DE9D77A3CB03DD4BECF12674414
                      SHA1:832CD41C05870032691C32343E0CCEE7D4EDD82A
                      SHA-256:0E4E3532FA66800BE28859179CD15DDE0A3D5982E902E1A43193F06CBE99FDD4
                      SHA-512:120D173B1B79E564E1CEB4B9BA1393862D77637749CC52BDEFA77850D6FCA8174658CCA1AC409826A567FA60DA99E338BA2320A8046C9CC19669D7314DDB0CAF
                      Malicious:false
                      Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369567555595980","domain_actions_config":"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
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):21022
                      Entropy (8bit):6.065632645509822
                      Encrypted:false
                      SSDEEP:384:DtMGQ7LBjuYXGIgtDAW5u0TDJ2q03X8NBS9fsAp0qLCvScdWFDVNMa2u:pMGQ7FCYXGIgtDAWtJ4nRnp0qLCvYDVt
                      MD5:183378DBD41F0B9DD3755EED4BF174DF
                      SHA1:63A9AD7D826194E33A76BBEF0D43E5A766D56E99
                      SHA-256:3A43FC94688759D0C9687D4846C3C86060CD3A599DDEC77D0CBF66C3E3B2548A
                      SHA-512:A5A429C40BDBBB4F44A4F23695DFF25B4459A38C9379B1ECCBD5139AC2EA85F3A83BD9638C59ED2CDA5CA914F894FD17387AB222C2565014F7181BE2FD40921B
                      Malicious:false
                      Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369567555595980","domain_actions_config":"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
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):4251
                      Entropy (8bit):5.497895681143634
                      Encrypted:false
                      SSDEEP:96:0q8NkGS1f5V9658rh/cI9URoDotoeMYBBqvYtu8hJkqcDSDS4S4SDSzI4a:/8NBS3VVeoDUV683kqo
                      MD5:5297EA67C7310FF29E254FCFD226A192
                      SHA1:F375E77287E21EF2C3A558FEF034CE73CF64CF63
                      SHA-256:ADD1471364E523688551FB4596BC745BF7976F25DF5F706D88F84D8ACBE91F7B
                      SHA-512:2E966687C0DA5802E4D6E2B604697595EB40B5284064D748B50CFACB4B34FD13425FCF0D48C07886FB52588464057EAEA73727102525509C98C880A5C63BBFB0
                      Malicious:false
                      Preview:{"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fre":{"oem_bookmarks_set":true},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):71200
                      Entropy (8bit):6.072648057006543
                      Encrypted:false
                      SSDEEP:1536:pMGQ5XMBG8YpoaqW87dwg6pBNYWVZcNTuklis1nzwpmfw5t:pMrJM88YCaN87d16pHlPCRhnzwpmfS
                      MD5:8D4D29F7D9EB7041E9A9340674BD1818
                      SHA1:2BB28321C787F505CE914304C9F4A167C93E4136
                      SHA-256:18ED87C2879DA51F59D6618427A727025CC6BABC53ACAE46680BBC6B0057CEFE
                      SHA-512:573A40A38286855BA3B16A16C92D73113024C2EAE3F02179214B8F38D176B5F4CF1E9C4F451B9B98836E97B667D78792AE9396ABE9428FAB4F852E2618F7D4EA
                      Malicious:false
                      Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369567555595980","domain_actions_config":"H4sIAAAAAAAAAL1dWZPktpH+KxP9ZDtU6GMujfykHY9txVpHyHIoYh2ODhBEkWiCAAdHVbEc/u+bCVb1dE8RqEqOdh806mbzw8VEXshM/PuKb27vha2luF9LHqKT96KVoru3G+mcquXVN/++4sOgleBBWeOvvvnn4YGs7wcLz8erb65+HMKPMVx9dVXbnisDT4wMa612TNj+6j9fUSA+xFpZPyH/9dVVQig59Wx4L5+Cwzjg799ubt/jJP48zeE9TuHwDjYBc/Ew+Ktvbv/z1ZWoe+rsjB4/7Abr5U+ajz9LXo9Px+21Mk1hoo/oX6HHjTLyKTjYyMJmCbLnO/hZMpjFAjSvxOIhbxgi5FK85m+ZCkuQu7UyKoxLO97yIFoYvbAluiw2oRoYgIQ2nG2AqJY2U+koRXQbbMm3fMsEX9JMK3GLbeAvNjhrlo5GOJiTA/oXLTdG6qXtmMBDiyS59PvY7eCklyb4QcfFi7tpdwu3VBt1XNorvM4+RiU6+CjD0kb+pHz7rRm3rXSyzABnWdKBG+Ijlx7hEE4QTzo+AB6fnDLLJBpo7PKv8Ob367/KjUg8mcY6CmCjTJCmtsWFOcUf5vj04cw0e1yZe2WAl8svFn5IC43jfc+dLnGrEyDwAicHCxNdhlrVa5LEtTgt5u2lAK02pd198r5dr5VYgHj55jUJZGTtlg0NlA7S5AnvB8l7z3olnPV2vfCLsugvBUH7vTVIe9Y151SnmS2Auyvcr5UGYXBvzT2s0L3fKpCZl+2D91MLf04NPNNUni9BZmDP4Sfjk2Ig7ktgg8r8InfhHz//zSP7e8bquWlsDJ411j
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2958
                      Entropy (8bit):5.583457613120962
                      Encrypted:false
                      SSDEEP:48:YuBqDPEFMsFiHC0af5hv9z3e4akHB+cdrxsvBSttxR9VlaJkXPScxwlR7m8XB0:Xq8NkC1f5V964FBBqvYt99VwJkqc+7Da
                      MD5:70092A845453B6587DCF1912679A3C76
                      SHA1:9489764E61EDCD7739173D6D16D27E8F82A463B1
                      SHA-256:9CF4863145F269B9EEBD4721E54C57127397CE9B060FBF5B9226A6E455CFE2F1
                      SHA-512:A5A6C8D1598A68A612C6F330F70294A2113CFE9E76321932A11D7802BDC04B58499C3C6EA0E49935FC758D2666979BE4A29A8FDA4A10C9E0725650A833D122D0
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"policy":{"last_statistics_update":"13369567553772876"},"profile":{"info_ca
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1371
                      Entropy (8bit):5.5210433207339165
                      Encrypted:false
                      SSDEEP:24:YpQBqDPak7u5rrt0+FzeQ19QcdGjyikbfpV4JdXBuBuwBSaCoNPnNhVBXbKQQRC0:YuBqDPaf5hv9zw4agBzBSt+VBHB0
                      MD5:BFA73B0AD418A4C01B9CE3491B970286
                      SHA1:9CE32508FABFEA568FE27FFF58802A244BAEF8FD
                      SHA-256:929B26CE417640829C6F57CA4AB1D9CD8B902535929E3B1FD2ADB692950EF1E8
                      SHA-512:889B87DA84E6D990BE787B7919FF27B65B51463EF393E034FF2C12BA6A256F40B45D398AA6F9986564782DDAEB7421531D4BC1F28E87536126C360CB288901C2
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false}},"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"profile":{"info_cache":{},"profile_counts_reported":"13369567553725893","profiles_order":[]},"smartscreen":{"enabled":true,"pua_protection_enabled":true},"telemetry_client":{"install_source_name":"windows","os_integration_level":5,"updater_version":"1.3.177.11","windows_update_applied":false},"uninstall_metrics":{"installation_date2":"1725093953"},"user_experienc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2958
                      Entropy (8bit):5.583457613120962
                      Encrypted:false
                      SSDEEP:48:YuBqDPEFMsFiHC0af5hv9z3e4akHB+cdrxsvBSttxR9VlaJkXPScxwlR7m8XB0:Xq8NkC1f5V964FBBqvYt99VwJkqc+7Da
                      MD5:70092A845453B6587DCF1912679A3C76
                      SHA1:9489764E61EDCD7739173D6D16D27E8F82A463B1
                      SHA-256:9CF4863145F269B9EEBD4721E54C57127397CE9B060FBF5B9226A6E455CFE2F1
                      SHA-512:A5A6C8D1598A68A612C6F330F70294A2113CFE9E76321932A11D7802BDC04B58499C3C6EA0E49935FC758D2666979BE4A29A8FDA4A10C9E0725650A833D122D0
                      Malicious:false
                      Preview:{"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAABioo0QqFiDWteSDiGyUUN8GIZA5xnOAolGS5mH9o1iTAAAAAAOgAAAAAIAACAAAAAx7JLXFBzxJtcQHdnBKkhf3gnw+6DldTt57b8EkvrrbTAAAACA34i/AJX3kc1tz7MVRkJkNh8G7IvdlSLKsn6r1p3gSP1183R6yw6xfZopX7TpZ4lAAAAA6J6hr7BR2dmSLUYd7IEL/BRV284RM7FjOiuezYFwLbY7ekJR3oZPxzcsFOwbq+DzyKQcwGaD1s+voG0Op9bAUA=="},"policy":{"last_statistics_update":"13369567553772876"},"profile":{"info_ca
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):9432
                      Entropy (8bit):5.83083270294433
                      Encrypted:false
                      SSDEEP:192:fsNwhNeiRUIh1dQ5T1jkqN96qRAq1k8SPxVLZ7VTiB:fsNwrV3u5hgqN96q3QxVNZTiB
                      MD5:8D048B18F1B7C49D27C841A4752A3D5E
                      SHA1:8EEB4037F05712AB1DE1EDDEDB222A6DA2B9CB34
                      SHA-256:EFDA69B5720126BC6A22A0CD4777504771345BD5E1DB94BAE575C2E59B8A7936
                      SHA-512:940CD4B9F0A693036D5430BE2D706134C2E64AB4CD42AC0945A7E5FF14C61480B46AE57B43928A028D6214CE339CAF1CB873B69DE13477FD30850261E4CC7315
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fire_local_softlanding_notification":false,"fre":{"oem_bookmarks_set":true,"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):8333
                      Entropy (8bit):5.798141471984911
                      Encrypted:false
                      SSDEEP:192:fsNwhNeiRUIQQpkqY6qRAq1k8SPxVLZ7VTiQ:fsNwrVt6qY6q3QxVNZTiQ
                      MD5:126D0316C9658101C8DF0EB4766EDF48
                      SHA1:3EB8B9E6C4D939281EADD94B148BCE81DB3260C5
                      SHA-256:400510E1E79E6F23200CED0D6AC794E6F2AC66F551B7DC3BDADA78D159B12F1A
                      SHA-512:DC308688A8C1A35AFBF9D4D37ADD57ACBB6A78DB6038BA0399B5279CA1FE51701D1F0481FFC64F0EF1CEECA85AEE6C22251132678952DD3AEBD0AACDE2B86436
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fire_local_softlanding_notification":false,"fre":{"oem_bookmarks_set":true,"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):9432
                      Entropy (8bit):5.830930860707242
                      Encrypted:false
                      SSDEEP:192:fsNwhNeiRUIh1dQ5BjplkqN96qRAq1k8SPxVLZ7VTiB:fsNwrV3u5lp2qN96q3QxVNZTiB
                      MD5:E59FB1DD90B7BEA89F62320758DCF8BB
                      SHA1:70506FC233E65ACCA039A28C8AA816C5E40EC6E6
                      SHA-256:267972D5E39FB3C87A82206B3725058045BCD90A2CC5DF51F74DAC5F4A52C025
                      SHA-512:D46896295664ED757FA4EB4A56D9818EF5FAD47D80FB223B59C653E3451D9DD99AFDE861922537705C9F6FFB848ED2D5F7BDBA49BB61885D1F4339275367F2CC
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fire_local_softlanding_notification":false,"fre":{"oem_bookmarks_set":true,"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:modified
                      Size (bytes):9448
                      Entropy (8bit):5.8322060821539825
                      Encrypted:false
                      SSDEEP:192:fsNwhNeiRUIh1dQ5CyKkqhC96qRAq1k8SPxVLZ7VTiB:fsNwrV3u55JqhC96q3QxVNZTiB
                      MD5:9C4B04AC34639940C2C4444D0CC0E427
                      SHA1:8A18C4D4EF8A9820E32240CCF5697DAA61F67867
                      SHA-256:023BE760B79C9AA906BCDF4D9FB12C101AA5140D931D8D773D6F92471AC34464
                      SHA-512:A8911FD77B8F0732D810290A6B52356B99BFDB8B3C0FB60F339F804775FD6FFA456D1F4DB537493D4D82D425C69F742C6A37C7A0B712248D000871F0C9427835
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fire_local_softlanding_notification":false,"fre":{"oem_bookmarks_set":true,"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):8251
                      Entropy (8bit):5.804383748775228
                      Encrypted:false
                      SSDEEP:192:fsNAhNeiRUxQQpkqY6qRAq1k8SPxVLZ7VTiQ:fsNArut6qY6q3QxVNZTiQ
                      MD5:7D25D6378EE60E9A142EEC82C4F6F3B5
                      SHA1:2848EBE9272B34B4E3EA3E5F28F51D0B0F71D97A
                      SHA-256:AA5609069983B4A2E6EBAD4DDA5EB3D85A104F56515F39EBD1B5C9A9EBF0898C
                      SHA-512:B0BB077A256B25004FA341A3D3D174F905A7FC8D67BD2A576F3331A5C0F5C2007237DB9DB0EED69223EB08C57CD5E13ECB86672F509266EACE15EE1EB7FA28C3
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Ve
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:modified
                      Size (bytes):60023
                      Entropy (8bit):6.081009334835943
                      Encrypted:false
                      SSDEEP:1536:EMGQ5XMBGyaf8dP0SSO7efy03FDnUNzER:EMrJM8zkdP0SH7h03GNzER
                      MD5:F398D0DA2293AFB58194E0B0DCED3255
                      SHA1:1E3A798AC60D1A081F6AC6D93C77DF765BAE39CA
                      SHA-256:D2FF67387B1FF857D55BACC9A47EB4B484C0A66238E1AB23A7E43D611130DAE0
                      SHA-512:904B3A2972F5AD78A3DBA693542BEFFED2B3EFFC07CC50323EB73EC3187E849C22020C45F9058AB3DB0237E5724A0981D122F04015426F3C1C1B0998C11936E8
                      Malicious:false
                      Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369567573522479","browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"domain_actions_config":"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
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:modified
                      Size (bytes):9432
                      Entropy (8bit):5.830930860707242
                      Encrypted:false
                      SSDEEP:192:fsNwhNeiRUIh1dQ5BjplkqN96qRAq1k8SPxVLZ7VTiB:fsNwrV3u5lp2qN96q3QxVNZTiB
                      MD5:E59FB1DD90B7BEA89F62320758DCF8BB
                      SHA1:70506FC233E65ACCA039A28C8AA816C5E40EC6E6
                      SHA-256:267972D5E39FB3C87A82206B3725058045BCD90A2CC5DF51F74DAC5F4A52C025
                      SHA-512:D46896295664ED757FA4EB4A56D9818EF5FAD47D80FB223B59C653E3451D9DD99AFDE861922537705C9F6FFB848ED2D5F7BDBA49BB61885D1F4339275367F2CC
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fire_local_softlanding_notification":false,"fre":{"oem_bookmarks_set":true,"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):9448
                      Entropy (8bit):5.8322060821539825
                      Encrypted:false
                      SSDEEP:192:fsNwhNeiRUIh1dQ5CyKkqhC96qRAq1k8SPxVLZ7VTiB:fsNwrV3u55JqhC96q3QxVNZTiB
                      MD5:9C4B04AC34639940C2C4444D0CC0E427
                      SHA1:8A18C4D4EF8A9820E32240CCF5697DAA61F67867
                      SHA-256:023BE760B79C9AA906BCDF4D9FB12C101AA5140D931D8D773D6F92471AC34464
                      SHA-512:A8911FD77B8F0732D810290A6B52356B99BFDB8B3C0FB60F339F804775FD6FFA456D1F4DB537493D4D82D425C69F742C6A37C7A0B712248D000871F0C9427835
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fire_local_softlanding_notification":false,"fre":{"oem_bookmarks_set":true,"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):107893
                      Entropy (8bit):4.640145133154881
                      Encrypted:false
                      SSDEEP:1536:B/lv4EsQMNeQ9s5VwB34PsiaR+tjvYArQdW+Iuh57P7Y:fwUQC5VwBIiElEd2K57P7Y
                      MD5:46BC3CA050C9032312C051408F8C6227
                      SHA1:4EC92F610AC217A2AB2927A8B71AD8BF5157D72D
                      SHA-256:CB9C9EED0F363C3193E8676B326299AED296899E17323BA2D48619BAF5249FC6
                      SHA-512:BB3126EBAD87C08B80CF3125BCDF838CEB7012F72B142B6CE67C8DAB7E57C52478876CAF19ECAC5670D5A0C2C3505F92DFB2E3013791359BFDD7094B29FC157F
                      Malicious:false
                      Preview:{"sites":[{"url":"24video.be"},{"url":"7dnifutbol.bg"},{"url":"6tv.dk"},{"url":"9kefa.com"},{"url":"aculpaedoslb.blogspot.pt"},{"url":"aek-live.gr"},{"url":"arcadepunk.co.uk"},{"url":"acidimg.cc"},{"url":"aazah.com"},{"url":"allehensbeverwijk.nl"},{"url":"amateurgonewild.org"},{"url":"aindasoudotempo.blogspot.com"},{"url":"anorthosis365.com"},{"url":"autoreview.bg"},{"url":"alivefoot.us"},{"url":"arbitro10.com"},{"url":"allhard.org"},{"url":"babesnude.info"},{"url":"aysel.today"},{"url":"animepornx.com"},{"url":"bahisideal20.com"},{"url":"analyseindustrie.nl"},{"url":"bahis10line.org"},{"url":"apoel365.net"},{"url":"bahissitelerisikayetleri.com"},{"url":"bambusratte.com"},{"url":"banzaj.pl"},{"url":"barlevegas.com"},{"url":"baston.info"},{"url":"atomcurve.com"},{"url":"atascadocherba.com"},{"url":"astrologer.gr"},{"url":"adultpicz.com"},{"url":"alleporno.com"},{"url":"beaver-tube.com"},{"url":"beachbabes.info"},{"url":"bearworldmagazine.com"},{"url":"bebegimdensonra.com"},{"url":"autoy
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):107893
                      Entropy (8bit):4.640145133154881
                      Encrypted:false
                      SSDEEP:1536:B/lv4EsQMNeQ9s5VwB34PsiaR+tjvYArQdW+Iuh57P7Y:fwUQC5VwBIiElEd2K57P7Y
                      MD5:46BC3CA050C9032312C051408F8C6227
                      SHA1:4EC92F610AC217A2AB2927A8B71AD8BF5157D72D
                      SHA-256:CB9C9EED0F363C3193E8676B326299AED296899E17323BA2D48619BAF5249FC6
                      SHA-512:BB3126EBAD87C08B80CF3125BCDF838CEB7012F72B142B6CE67C8DAB7E57C52478876CAF19ECAC5670D5A0C2C3505F92DFB2E3013791359BFDD7094B29FC157F
                      Malicious:false
                      Preview:{"sites":[{"url":"24video.be"},{"url":"7dnifutbol.bg"},{"url":"6tv.dk"},{"url":"9kefa.com"},{"url":"aculpaedoslb.blogspot.pt"},{"url":"aek-live.gr"},{"url":"arcadepunk.co.uk"},{"url":"acidimg.cc"},{"url":"aazah.com"},{"url":"allehensbeverwijk.nl"},{"url":"amateurgonewild.org"},{"url":"aindasoudotempo.blogspot.com"},{"url":"anorthosis365.com"},{"url":"autoreview.bg"},{"url":"alivefoot.us"},{"url":"arbitro10.com"},{"url":"allhard.org"},{"url":"babesnude.info"},{"url":"aysel.today"},{"url":"animepornx.com"},{"url":"bahisideal20.com"},{"url":"analyseindustrie.nl"},{"url":"bahis10line.org"},{"url":"apoel365.net"},{"url":"bahissitelerisikayetleri.com"},{"url":"bambusratte.com"},{"url":"banzaj.pl"},{"url":"barlevegas.com"},{"url":"baston.info"},{"url":"atomcurve.com"},{"url":"atascadocherba.com"},{"url":"astrologer.gr"},{"url":"adultpicz.com"},{"url":"alleporno.com"},{"url":"beaver-tube.com"},{"url":"beachbabes.info"},{"url":"bearworldmagazine.com"},{"url":"bebegimdensonra.com"},{"url":"autoy
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4194304
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3::
                      MD5:B5CFA9D6C8FEBD618F91AC2843D50A1C
                      SHA1:2BCCBD2F38F15C13EB7D5A89FD9D85F595E23BC3
                      SHA-256:BB9F8DF61474D25E71FA00722318CD387396CA1736605E1248821CC0DE3D3AF8
                      SHA-512:BD273BF4E10ED6E305ECB7B781CB065545FCE9BE9F1E2968DF22C3A98F82D719855AAFE5FF303D14EA623A5C55E51E924E10033A92A7A6B07725D7E9692B74F5
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4194304
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3::
                      MD5:B5CFA9D6C8FEBD618F91AC2843D50A1C
                      SHA1:2BCCBD2F38F15C13EB7D5A89FD9D85F595E23BC3
                      SHA-256:BB9F8DF61474D25E71FA00722318CD387396CA1736605E1248821CC0DE3D3AF8
                      SHA-512:BD273BF4E10ED6E305ECB7B781CB065545FCE9BE9F1E2968DF22C3A98F82D719855AAFE5FF303D14EA623A5C55E51E924E10033A92A7A6B07725D7E9692B74F5
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4194304
                      Entropy (8bit):0.31146293256499485
                      Encrypted:false
                      SSDEEP:3072:EFy6+u3m1QX/qaXE35F0guMFeaUH5atkeoo77lLYrfJimtJptjFqN7fFkZxQ/shr:S/n0mH5atlVwQ/4aHjBC
                      MD5:786FBD76768364C7DB40EBB004E1E0FE
                      SHA1:A139FDAA5E1B103D12B372748CD389B3D2D7583E
                      SHA-256:087443E1D427F0619B93246727941D9998822A9E7B194ED639F7C59615D729B3
                      SHA-512:608AF7E10123ED65AFDC8CC14DB13C567C33BCF93697F5D6AF7A049D52E153416F2D2AD3D18425CB77FCC5C6950F5DF157BDAD8D08ACC28554467B33C4FD4F1D
                      Malicious:false
                      Preview:...@..@...@.....C.].....@...............`O...J..............`... ...i.y.........BrowserMetrics......i.y..Yd. .......A...................v.0.....UV&K.k<................UV&K.k<................UMA.PersistentHistograms.InitResult.....8...i.y.[".................................................i.y.Pq.30..............117.0.2045.47-64..".en-GB*...Windows NT..10.0.190452....x86_64..?........".ptlqmq20,1(.0..8..B....(.....10.0.19041.5462.Google Inc. (Google):bANGLE (Google, Vulkan 1.3.0 (SwiftShader Device (Subzero) (0x0000C0DE)), SwiftShader driver-5.0.0)M..BU..Be...?j...GenuineIntel... .. ..............x86_64...J../T...^o..J...Y...^o..J..w....^o..J..A....^o..J....c..^o..J...c=..^o..J....J..^o..J..3.(..^o..J.......^o..J...#...^o..J....k..^o..J....-..^o..J..S..O.^o..J..l.zL.^o..J..1.9..^o..J..@."..^o..J..?U...^o..J..aV...^o..J..z{...^o..J..n....^o..J..0....^o..J...@...^o..J...I.r.^o..J......^o..J..ZK...^o..J.....^o..J..@N...^o..J.......^o..J...'x#.^o..J......^o..J....\.^o..J.....f.^o.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4194304
                      Entropy (8bit):0.039701814035005736
                      Encrypted:false
                      SSDEEP:192:kL0EbtmqvDtKX7mJEa3XxxTVwg7XXiV0DA5DhAVNak+O1gQtD7rFq01n8y08TcmQ:c0EtxeQtCnhUcago7RX108T2RGOD
                      MD5:86E341DC4D7F47818B87B5C2CA765930
                      SHA1:6426C5F01FDBE718E033BE66F92064C26C46240C
                      SHA-256:8EDE52ECF4B01D6FA69C319E85244312682832B3C136442D65CEA71FC3E4EF03
                      SHA-512:F9BAF9A808F824540A0D46D8D12E36A64939636F2C17B0C3C973A8DA7E99E7927D1A94F366B14D39AB8C57F59B9B27C23DA5B444070D903BA7B88CD4E1A9FA69
                      Malicious:false
                      Preview:...@..@...@.....C.].....@...............0`...O..............`... ...i.y.........BrowserMetrics......i.y..Yd. .......A...................v.0.....UV&K.k<................UV&K.k<................UMA.PersistentHistograms.InitResult.....8...i.y.[".................................................i.y.Pq.30....q.........117.0.2045.47-64..".en-GB*...Windows NT..10.0.190452l..x86_64..?........".ptlqmq20,1(.0..8..B.......2.:.M..BU..Be...?j...GenuineIntel... .. ..........x86_64...J....k..^o..J..l.zL.^o..J....\.^o..J.....f.^o..J....?.^o..P.Z...b.INBXj....... .8.@............./......................w..U].0r........>.........."....."...2...".*.:............B)..1.3.147.37.. .*.RegKeyNotFound2.windowsR...Z.....K7..E@..$...SF@.......Y@.......Y@.......Y@........?........?.................?.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@................Y@.......Y@.......Y@........?........?z...........................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4194304
                      Entropy (8bit):0.038856199513015534
                      Encrypted:false
                      SSDEEP:192:vps0EbtmqvD3KX7iJEa3Xxx7UpXxgg6zfhj1NExjnu1gQMZ7pZOdq2n8y08Tcm2D:C0Et3eZVQh5I6gFpkh08T2RGOD
                      MD5:2CD5E8530D72395E2593A21C04E1C344
                      SHA1:1EFD11F21BAAAB1432ADE36A2EA35EA9A04A7FE9
                      SHA-256:A648022DD40B41E8DCDB089487A1841112D487D2E1F4FE26A525EA78BC2E28FF
                      SHA-512:FED8EAA17CDED4A83E17CB948A9B84D6D61064C54E8662752AE6C930D3B1FB56BC3A8AECC7D53AA455B826C5090CE046F088767EC4C5DFB313B813DD84CBB302
                      Malicious:false
                      Preview:...@..@...@.....C.].....@...............8^...M..............`... ...i.y.........BrowserMetrics......i.y..Yd. .......A...................v.0.....UV&K.k<................UV&K.k<................UMA.PersistentHistograms.InitResult.....8...i.y.[".................................................i.y.Pq.30....}.........117.0.2045.47-64..".en-GB*...Windows NT..10.0.190452l..x86_64..?........".ptlqmq20,1(.0..8..B.......2.:.M..BU..Be...?j...GenuineIntel... .. ..........x86_64...J....k..^o..J..l.zL.^o..J...I.r.^o..J....\.^o..J.....f.^o..J....?.^o..P.Z...b.INBXj....... .8.@............./......................w..U].0r........>.........."....."...2...".*.:............B)..1.3.147.37.. .*.RegKeyNotFound2.windowsR...Z.....K7..E@..$...SF@.......Y@.......Y@.......Y@........?........?.................?.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@................Y@.......Y@.......Y@........?........?z...............................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4194304
                      Entropy (8bit):0.03915847570933531
                      Encrypted:false
                      SSDEEP:192:x70EbtmqvDHKX7KJw3BhESXBtghwwhTlNEdbJvs1gQMlBJ9+qYn8y08Tcm2RGOdB:50EtnzX7h5gtMgBByn08T2RGOD
                      MD5:428CCCBF3E8FB305573EB404847CCFF6
                      SHA1:1798BA1636E2CB8A43AE7B60D52DC2979D6D2CD9
                      SHA-256:D38ABE169EDE84DD2EEDC40EA8B7B9C72FE90E459D86A734EFB44FA4231335CF
                      SHA-512:BC5B10209C74FEC475206F19EAF23C80019398DE055B53FE8F6527270303426F403F939328EE82DE51775BAE3FFDF40CED8704128118ED48423E14EBDFE15A58
                      Malicious:false
                      Preview:...@..@...@.....C.].....@................^...N..............`... ...i.y.........BrowserMetrics......i.y..Yd. .......A...................v.0.....UV&K.k<................UV&K.k<................UMA.PersistentHistograms.InitResult.....8...i.y.[".................................................i.y.Pq.30....q.........117.0.2045.47-64..".en-GB*...Windows NT..10.0.190452l..x86_64..?........".ptlqmq20,1(.0..8..B.......2.:.M..BU..Be...?j...GenuineIntel... .. ..........x86_64...J....k..^o..J..l.zL.^o..J....\.^o..J.....f.^o..J....?.^o..P.Z...b.INBXj....... .8.@............./......................w..U].0r........>.........."....."...2...".*.:............B)..1.3.147.37.. .*.RegKeyNotFound2.windowsR...Z.....K7..E@..$...SF@.......Y@.......Y@.......Y@........?........?.................?.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@.......Y@................Y@.......Y@.......Y@........?........?z...........................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):16384
                      Entropy (8bit):0.3553968406659012
                      Encrypted:false
                      SSDEEP:12:biUXhV0xosU8xCe+JKlkQuMRxCb8ZXfgYJ0IJpP0KLsyW1L7Fx6:bFRqxosU8xWMk8xVZ4YWI30otWn
                      MD5:CFAB81B800EDABACBF6CB61AA78D5258
                      SHA1:2730D4DA1BE7238D701DC84EB708A064B8D1CF27
                      SHA-256:452A5479B9A2E03612576C30D30E6F51F51274CD30EF576EA1E71D20C657376F
                      SHA-512:EC188B0EE4D3DAABC26799B34EE471BEE988BDD7CEB011ED7DF3D4CF26F98932BBBB4B70DC2B7FD4DF9A3981B3CE22F4B5BE4A0DB97514D526E521575EFB2EC6
                      Malicious:false
                      Preview:...@.@...@..............@...................................`... ...i.y.........CrashpadMetrics.....i.y..Yd.h.......A.......e............,.........W.......................W....................Microsoft.UMA.PersistentAllocator.CrashpadMetrics.UsedPct.......h...i.y.[".................................!...&...+...0...6...;...@...E...K...P...U...Z...`...e...........i.y..Yd.........A............................E.[4.f..................E.[4.f.................Microsoft.UMA.PersistentAllocator.CrashpadMetrics.Errors............i.y..Yd.........A..................._..-`....h-.....................h-....................Crashpad.HandlerLifetimeMilestone.......0...i.y.[".........................................i.y..Yd.@.......C...........................VM....],................WM....],................Stability.BrowserExitCodes...... ...i.y......VM....],........H...i.y.1U!S............................................................ ...i.y...0...WM....],........................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):280
                      Entropy (8bit):3.060980776278344
                      Encrypted:false
                      SSDEEP:3:FiWWltl/9UgBVP/Sh/JzvLi2RRIxINXj1J1:o1//BVsJDG2Yq
                      MD5:74B32A83C9311607EB525C6E23854EE0
                      SHA1:C345A4A3BB52D7CD94EA63B75A424BE7B52CFCD2
                      SHA-256:06509A7E418D9CCE502E897EAEEE8C6E3DCB1D0622B421DD968AF3916A5BFF90
                      SHA-512:ADC193A89F0E476E7326B4EA0472814FE6DD0C16FC010AAF7B4CF78567D5DF6A1574C1CE99A63018AFE7E9AD68918147880621A3C00FAA7AD1014A0056B4B9C4
                      Malicious:false
                      Preview:sdPC......................5.y&.K.?....................................................................................................................................47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU=....................48ea0ba2-e9bb-4568-92cb-0f42a5c5d505............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):9295
                      Entropy (8bit):5.17934462526076
                      Encrypted:false
                      SSDEEP:96:sV/qlkJ14b9kfdAGcYuXj4SSiJ4YlsY5Th6Cp9/x+6M8muecmAeC4/e4zvra2X6p:sV/PJvdAGcPTOiJ4YlsYPpj+FVA0aFBf
                      MD5:BD77CD2997F88BE7BA59643BFD3A9A71
                      SHA1:EFA4C567BAB68F3715096486D5A23BDB840C9832
                      SHA-256:B302A1D479618FA45ACE86EEBACA214B4631908157C29F249FE0F6C2151FE224
                      SHA-512:241DC69FE8300CF0C8E063136D32B52DF9FB9FF07619A4181F267A6CCF389F831334FBBFD71F0571483C964956EED1249E1F965ECFFB4961FDDF41236EED5698
                      Malicious:false
                      Preview:{"aadc_info":{"age_group":0},"account_id_migration_state":2,"account_tracker_service_last_update":"13369567573027812","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"data_reduction":{"daily_original_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","5826"],"daily_received_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):8568
                      Entropy (8bit):5.068681340998719
                      Encrypted:false
                      SSDEEP:96:sV/qlkJ14b9kfdAGcYuXjaYlsY5Th6Cp9/x+6M8muecmAeCFe4zvra2X6gE5AtE7:sV/PJvdAGcPTaYlsYPpj+FVAdaFBf
                      MD5:B384276A2BE6E9A07598809EEA1B27DA
                      SHA1:B5093744688BE3FD26A4E2FDF0B23EC2FBDD6093
                      SHA-256:B76ABA6B6AC2179190AFA09110D6E9C96C8878B3D95D69392B1072A421D0F63C
                      SHA-512:823CD1B749598774345AA0F5FA20842FEA4179BF10E57A7E5D1AFB3D16CB156ABA74DB8EC330BA35CF715157667DF059ADB14A997680157A73D62D80B55CF275
                      Malicious:false
                      Preview:{"aadc_info":{"age_group":0},"account_id_migration_state":2,"account_tracker_service_last_update":"13369567573027812","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"data_reduction":{"daily_original_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","5826"],"daily_received_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):9333
                      Entropy (8bit):5.177846689736886
                      Encrypted:false
                      SSDEEP:96:sV/qlkJ14b9kfdAGcYuXj4SSiJ4YlsY5Th6Cp9/x+6M8muecmAeCA/e4zvra2X6p:sV/PJvdAGcPTOiJ4YlsYPpj+FVAsaFBf
                      MD5:120552E2C3FF73A27E9C97ABE0D31BD4
                      SHA1:959F43B88E4D9D881E4FBC72CEF8ED830EB88196
                      SHA-256:4E7336074F4E9B8783624D2B205D820FA8D710A47D8640812B655C351F8BF35E
                      SHA-512:3B602B24D4048EAEA670808CCCD5913E673AF1E463534E90B8004D6CC2B9B0546C84293B1C8F1CFF8AC55BCAECA714C332D7F5A3720C82898D459EA26C5EF7AA
                      Malicious:false
                      Preview:{"aadc_info":{"age_group":0},"account_id_migration_state":2,"account_tracker_service_last_update":"13369567573027812","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"data_reduction":{"daily_original_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","5826"],"daily_received_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3:L:L
                      MD5:5058F1AF8388633F609CADB75A75DC9D
                      SHA1:3A52CE780950D4D969792A2559CD519D7EE8C727
                      SHA-256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
                      SHA-512:0B61241D7C17BCBB1BAEE7094D14B7C451EFECC7FFCBD92598A0F13D313CC9EBC2A07E61F007BAF58FBF94FF9A8695BDD5CAE7CE03BBF1E94E93613A00F25F21
                      Malicious:false
                      Preview:.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):28366
                      Entropy (8bit):5.558478946270267
                      Encrypted:false
                      SSDEEP:768:UvcgvY7pLGLvy7WPDvffC8F1+UoAYDCx9Tuqh0VfUC9xbog/OVyncJerwmxo2pZ8:UvcgvEcvy7WPDvffCu1javcJ7+ta
                      MD5:D904A2C75E03F11CB2CB5C4B5C573BA3
                      SHA1:DB0B823461FBBE3498757A331E064DC93175699B
                      SHA-256:25822623A07CEAE4CFC5648CB2D37C6DDED5DC2EAD87C70455A421A2E19B29A0
                      SHA-512:D25E16CA83177F574CE22AE1FDA2CD96205B509D088782703E956FCA2106F3C72F7D671D639FCD71FF975180C3E9754C2C6ECEA002AFC297AA408871D9A11EA1
                      Malicious:false
                      Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369567572805802","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369567572805802","location":5,"ma
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:modified
                      Size (bytes):12600
                      Entropy (8bit):5.321965364039211
                      Encrypted:false
                      SSDEEP:192:SEAOEH/WCxkD7MDPSYAxmemxb7mngJdv9TXJ4MQmLu5/4eeNdl:S3OEOKSXs/J7mGnQmLu5/5eNdl
                      MD5:50097903477950FE6C271C3476951C4A
                      SHA1:0FD83A021EF3A82C456326E07B217EC5D5EF62B3
                      SHA-256:72F39BACF8AD0069CAA4B31017258C1484D3CDB98724934DDC77B0570AF3CD7B
                      SHA-512:CDF0376C5E442098D6EB1D30970DF3D339229AC961160CFA5AF846BFA75A1FF6B27525D792BF9BEE51E975127170D37B348F03FD66A2907EBA28F39DE6AC489D
                      Malicious:false
                      Preview:...m.................DB_VERSION.1?...................QUERY_TIMESTAMP:arbitration_priority_list4.*.*.13369567575427372.$QUERY:arbitration_priority_list4.*.*..[{"name":"arbitration_priority_list","url":"https://edgeassetservice.azureedge.net/assets/arbitration_priority_list/4.0.5/asset?assetgroup=ArbitrationService","version":{"major":4,"minor":0,"patch":5},"hash":"2DPW9BV28WrPpgGHdKsEvldNQvD7dA0AAxPa3B/lKN0=","size":11989}]..A./..............'ASSET_VERSION:arbitration_priority_list.4.0.5..ASSET:arbitration_priority_list.]{.. "configVersion": 32,.. "PrivilegedExperiences": [.. "ShorelinePrivilegedExperienceID",.. "SHOPPING_AUTO_SHOW_COUPONS_CHECKOUT",.. "SHOPPING_AUTO_SHOW_LOWER_PRICE_FOUND",.. "SHOPPING_AUTO_SHOW_BING_SEARCH",.. "SHOPPING_AUTO_SHOW_REBATES",.. "SHOPPING_AUTO_SHOW_REBATES_CONFIRMATION",.. "SHOPPING_AUTO_SHOW_REBATES_DEACTIVATED",.. "SHOPPING_AUTO_SHOW_REBATES_BING",.. "SHOPPING_AUTO_SHOW_REBATES_ORGANIC",.. "SHOPPING_AUTO_SHOW_PRICE_HIST
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):293
                      Entropy (8bit):5.136593707740258
                      Encrypted:false
                      SSDEEP:6:i8q1wkn23oH+Tcwt9Eh1ZB2KLlE8HOq2Pwkn23oH+Tcwt9Eh1tIFUv:i81fYeb9Eh1ZFL68uvYfYeb9Eh16FUv
                      MD5:97B1FD9FE4CA5BCFC59B766086D5AD9B
                      SHA1:902C7C6D06172FD9130012FA258BC951F9D2AC7F
                      SHA-256:7E3AADEAE24D41AD757F4AD71F01023541CBD37D214A783D84FA6E068D2CB7A7
                      SHA-512:01BC3B9CA8570340E74E85F7728514D0CB7C988B30F0D44A67F4365EE3CE26FB9004DB0133D3776DFAE765377712C80A9DD7A3C2583D12C5151F9C5825C7F892
                      Malicious:false
                      Preview:2024/08/31-04:46:14.592 2180 Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db since it was missing..2024/08/31-04:46:14.739 2180 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Asset Store\assets.db/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):12288
                      Entropy (8bit):0.3202460253800455
                      Encrypted:false
                      SSDEEP:6:l9bNFlEuWk8TRH9MRumWEyE4gLueXdNOmWxFxCxmWxYgCxmW5y/mWz4ynLAtD/W4:TLiuWkMORuHEyESeXdwDQ3SOAtD/ie
                      MD5:40B18EC43DB334E7B3F6295C7626F28D
                      SHA1:0E46584B0E0A9703C6B2EC1D246F41E63AF2296F
                      SHA-256:85E961767239E90A361FB6AA0A3FD9DAA57CAAF9E30599BB70124F1954B751C8
                      SHA-512:8BDACDC4A9559E4273AD01407D5D411035EECD927385A51172F401558444AD29B5AD2DC5562D1101244665EBE86BBDDE072E75ECA050B051482005EB6A52CDBD
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):8.280239615765425E-4
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):262512
                      Entropy (8bit):8.81240594570408E-4
                      Encrypted:false
                      SSDEEP:3:LsNlh5ell:Ls3C
                      MD5:37E03E80EA2BBD1071CFC91F8D238E5C
                      SHA1:3A2F649B92DAB11656786379BB9F675CB9D509B7
                      SHA-256:DA372F4CAA16B924EBA70DDC64D839DC2E7809F5B0C403C80230447EB8B695CC
                      SHA-512:1C2BB3ABCB7B8AEEFC78CAB0F5C192E995E225472800A8925F34F6967B4E52AE4B4B344F6CCF9EBF23312B8BC4223D43C4ED648A08ACFC6BA61601BD7A4599F4
                      Malicious:false
                      Preview:............................................./.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):33
                      Entropy (8bit):3.5394429593752084
                      Encrypted:false
                      SSDEEP:3:iWstvhYNrkUn:iptAd
                      MD5:F27314DD366903BBC6141EAE524B0FDE
                      SHA1:4714D4A11C53CF4258C3A0246B98E5F5A01FBC12
                      SHA-256:68C7AD234755B9EDB06832A084D092660970C89A7305E0C47D327B6AC50DD898
                      SHA-512:07A0D529D9458DE5E46385F2A9D77E0987567BA908B53DDB1F83D40D99A72E6B2E3586B9F79C2264A83422C4E7FC6559CAC029A6F969F793F7407212BB3ECD51
                      Malicious:false
                      Preview:...m.................DB_VERSION.1
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):305
                      Entropy (8bit):5.212279723630094
                      Encrypted:false
                      SSDEEP:6:i8J1wkn23oH+TcwtnG2tbB2KLlE8TtXjL+q2Pwkn23oH+TcwtnG2tMsIFUv:i8cfYebn9VFL68ZX3+vYfYebn9GFUv
                      MD5:1F027694927958250B1906BE388EBBCA
                      SHA1:632D2CFE588D18012600ABF0EB78373C84E9AC05
                      SHA-256:4E5E98758FD4EC9DE342CDE0708C24A41FA9CD9517FA7417BFF7BA85913A4E77
                      SHA-512:C71E5CDB1403D3F23C8A4A4A071ACE372AE4F4FF130EE25AA7A77DA60546EBC1920CCEB6AE88E2637D30962AC7DF110B42E053E06902CD6CD5E785F440FC7B5B
                      Malicious:false
                      Preview:2024/08/31-04:46:12.804 203c Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons/coupons_data.db since it was missing..2024/08/31-04:46:12.895 203c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\EdgeCoupons/coupons_data.db/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 14, database pages 8, cookie 0xe, schema 4, UTF-8, version-valid-for 14
                      Category:dropped
                      Size (bytes):32768
                      Entropy (8bit):0.494709561094235
                      Encrypted:false
                      SSDEEP:24:TLEC30OIcqIn2o0FUFlA2cs0US5S693Xlej2:ThLaJUnAg0UB6I
                      MD5:CF7760533536E2AF66EA68BC3561B74D
                      SHA1:E991DE2EA8F42AE7E0A96A3B3B8AF87A689C8CCD
                      SHA-256:E1F183FAE5652BA52F5363A7E28BF62B53E7781314C9AB76B5708AF9918BE066
                      SHA-512:38B15FE7503F6DFF9D39BC74AA0150A7FF038029F973BE9A37456CDE6807BCBDEAB06E624331C8DFDABE95A5973B0EE26A391DB2587E614A37ADD50046470162
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j...i............t...c................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 5, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 5
                      Category:dropped
                      Size (bytes):20480
                      Entropy (8bit):0.5094712832659277
                      Encrypted:false
                      SSDEEP:12:TLW4QpRSJDBJuqJSEDNvrWjJQ9Dl9np59yDLgHFUxOUDaaTXubHa7me5q4iZ7dV:TLqpR+DDNzWjJ0npnyXKUO8+j25XmL
                      MD5:D4971855DD087E30FC14DF1535B556B9
                      SHA1:9E00DEFC7E54C75163273184837B9D0263AA528C
                      SHA-256:EC7414FF1DB052E8E0E359801F863969866F19228F3D5C64F632D991C923F0D2
                      SHA-512:ACA411D7819B03EF9C9ACA292D91B1258238DF229B4E165A032DB645E66BFE1148FF3DCFDAC3126FCD34DBD0892F420148E280D9716C63AD9FCDD9E7CA58D71D
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j...%.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):209
                      Entropy (8bit):1.8784775129881184
                      Encrypted:false
                      SSDEEP:3:FQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlX:qTCTCTCTCTCTCTCTCTCTCT
                      MD5:478D49D9CCB25AC14589F834EA70FB9E
                      SHA1:5D30E87D66E279F8815AFFE4C691AAF1D577A21E
                      SHA-256:BB6CC6DF54CF476D95409032C79E065F4E10D512E73F7E16018E550456F753D5
                      SHA-512:FB5431054A23D3C532568B1F150873D9130DBC4A88BE19BC2A4907D0DC2888C5B55993154EAD4A6C466E2173092B8705684A6802B850F051639E1F2457387471
                      Malicious:false
                      Preview:.f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5...............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):281
                      Entropy (8bit):5.181195737161249
                      Encrypted:false
                      SSDEEP:6:i8Mx1wkn23oH+Tcwt8aVdg2KLlE8d+q2Pwkn23oH+Tcwt8aPrqIFUv:i8MUfYeb0L68d+vYfYebL3FUv
                      MD5:213D5D7B877204329B7003797813F9FA
                      SHA1:5459A2A204CE5825DE4E843524A47E7D19B9191D
                      SHA-256:38D66E7997DA1476576F9384FEAF5C8F125BDA040171114AA4FF259D69723484
                      SHA-512:E387E84CC10AA35F901EE0410FCDF86E05036D6D7D307BDC4687CFFD6FC4C00E6AE829946CCB99D5CF91556455CC8EB1FDED41F3AAA59C9CA24D85D61A76F9FD
                      Malicious:false
                      Preview:2024/08/31-04:46:12.836 229c Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules since it was missing..2024/08/31-04:46:12.846 229c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):209
                      Entropy (8bit):1.8784775129881184
                      Encrypted:false
                      SSDEEP:3:FQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlXNQxlX:qTCTCTCTCTCTCTCTCTCTCT
                      MD5:478D49D9CCB25AC14589F834EA70FB9E
                      SHA1:5D30E87D66E279F8815AFFE4C691AAF1D577A21E
                      SHA-256:BB6CC6DF54CF476D95409032C79E065F4E10D512E73F7E16018E550456F753D5
                      SHA-512:FB5431054A23D3C532568B1F150873D9130DBC4A88BE19BC2A4907D0DC2888C5B55993154EAD4A6C466E2173092B8705684A6802B850F051639E1F2457387471
                      Malicious:false
                      Preview:.f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5...............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):285
                      Entropy (8bit):5.169227818161924
                      Encrypted:false
                      SSDEEP:6:i881wkn23oH+Tcwt86FB2KLlE8si+q2Pwkn23oH+Tcwt865IFUv:i8bfYeb/FFL68si+vYfYeb/WFUv
                      MD5:12E4011DB4A4D852366854A3F4EA48D3
                      SHA1:51F6E15F9598D51827A64D9EAD650A3DF3AD95D3
                      SHA-256:3E1AC4F99E9887E3016D84065189F7D25F9BD80F885C2531FE2687DD067A60F3
                      SHA-512:095F22DA049B98402CFF936C59D5196CB0575941E37E310351EB82AD7572B64D641D2D08BEE3AF7C327C5F88C234BF2BFFC988AA53C7F099A55A721D9A3D96AC
                      Malicious:false
                      Preview:2024/08/31-04:46:12.852 229c Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts since it was missing..2024/08/31-04:46:12.884 229c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1197
                      Entropy (8bit):1.8784775129881184
                      Encrypted:false
                      SSDEEP:12:qWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWW:
                      MD5:A2A3B1383E3AAC2430F44FC7BF3E447E
                      SHA1:B807210A1205126A107A5FE25F070D2879407AA4
                      SHA-256:90685D4E050DA5B6E6F7A42A1EE21264A68F1734FD3BD4A0E044BB53791020A2
                      SHA-512:396FAB9625A2FF396222DBC86A0E2CDE724C83F3130EE099F2872AED2F2F2ECE13B0853D635F589B70BD1B5E586C05A3231D68CAF9E46B6E2DAC105A10D0A1C8
                      Malicious:false
                      Preview:.f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5................f.5........
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):322
                      Entropy (8bit):5.147870981776265
                      Encrypted:false
                      SSDEEP:6:i8MV/jM+q2Pwkn23oH+Tcwt8NIFUt8B8MVsFZZmw+B8MVsFMMVkwOwkn23oH+TcN:i8MV7M+vYfYebpFUt8B8MVkZ/+B8MVku
                      MD5:AC0E812BD1C41E38C1A218CCE0F4F385
                      SHA1:83AE883F2FB1A82059FF360CFD7AE15E857FDCAA
                      SHA-256:45083AD757729AE2AD32BF5EBB71878CFFBBCE209947924DF721C096FAD9FB21
                      SHA-512:8B0DDA23AD71AA760914FA2ABF70AC2A3633E35A48BF942B4578983C3E7F6DCB0119AB0A4EDA61223CD8E97A12AA20E22598F491DCAC9F50395D5B30BA27F076
                      Malicious:false
                      Preview:2024/08/31-04:46:13.019 228c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State/MANIFEST-000001.2024/08/31-04:46:13.020 228c Recovering log #3.2024/08/31-04:46:13.020 228c Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):322
                      Entropy (8bit):5.147870981776265
                      Encrypted:false
                      SSDEEP:6:i8MV/jM+q2Pwkn23oH+Tcwt8NIFUt8B8MVsFZZmw+B8MVsFMMVkwOwkn23oH+TcN:i8MV7M+vYfYebpFUt8B8MVkZ/+B8MVku
                      MD5:AC0E812BD1C41E38C1A218CCE0F4F385
                      SHA1:83AE883F2FB1A82059FF360CFD7AE15E857FDCAA
                      SHA-256:45083AD757729AE2AD32BF5EBB71878CFFBBCE209947924DF721C096FAD9FB21
                      SHA-512:8B0DDA23AD71AA760914FA2ABF70AC2A3633E35A48BF942B4578983C3E7F6DCB0119AB0A4EDA61223CD8E97A12AA20E22598F491DCAC9F50395D5B30BA27F076
                      Malicious:false
                      Preview:2024/08/31-04:46:13.019 228c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State/MANIFEST-000001.2024/08/31-04:46:13.020 228c Recovering log #3.2024/08/31-04:46:13.020 228c Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 1, database pages 1, cookie 0x1, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):4096
                      Entropy (8bit):0.3169096321222068
                      Encrypted:false
                      SSDEEP:3:lSWbNFl/sl+ltl4ltllOl83/XWEEabIDWzdWuAzTgdWj3FtFIU:l9bNFlEs1ok8fDEPDadUTgd81Z
                      MD5:2554AD7847B0D04963FDAE908DB81074
                      SHA1:F84ABD8D05D7B0DFB693485614ECF5204989B74A
                      SHA-256:F6EF01E679B9096A7D8A0BD8151422543B51E65142119A9F3271F25F966E6C42
                      SHA-512:13009172518387D77A67BBF86719527077BE9534D90CB06E7F34E1CCE7C40B49A185D892EE859A8BAFB69D5EBB6D667831A0FAFBA28AC1F44570C8B68F8C90A4
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 8, cookie 0x8, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):32768
                      Entropy (8bit):0.40981274649195937
                      Encrypted:false
                      SSDEEP:24:TL1WK3iOvwxwwweePKmJIOAdQBVA/kjo/TJZwJ9OV3WOT/5eQQ:Tmm+/9ZW943WOT/
                      MD5:1A7F642FD4F71A656BE75B26B2D9ED79
                      SHA1:51BBF587FB0CCC2D726DDB95C96757CC2854CFAD
                      SHA-256:B96B6DDC10C29496069E16089DB0AB6911D7C13B82791868D583897C6D317977
                      SHA-512:FD14EADCF5F7AB271BE6D8EF682977D1A0B5199A142E4AB353614F2F96AE9B49A6F35A19CC237489F297141994A4A16B580F88FAC44486FCB22C05B2F1C3F7D1
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j............M.....8...b..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):429
                      Entropy (8bit):5.809210454117189
                      Encrypted:false
                      SSDEEP:6:Y8U0vEjrAWT0VAUD9lpMXO4SrqiweVHUSENjrAWT0HQQ9/LZyVMQ3xqiweVHlrSQ:Y8U5j0pqCjJA7tNj0pHx/LZ4hcdQ
                      MD5:5D1D9020CCEFD76CA661902E0C229087
                      SHA1:DCF2AA4A1C626EC7FFD9ABD284D29B269D78FCB6
                      SHA-256:B829B0DF7E3F2391BFBA70090EB4CE2BA6A978CCD665EEBF1073849BDD4B8FB9
                      SHA-512:5F6E72720E64A7AC19F191F0179992745D5136D41DCDC13C5C3C2E35A71EB227570BD47C7B376658EF670B75929ABEEBD8EF470D1E24B595A11D320EC1479E3C
                      Malicious:false
                      Preview:{"file_hashes":[{"block_hashes":["OdZL4YFLwCTKbdslekC6/+U9KTtDUk+T+nnpVOeRzUc=","6RbL+qKART8FehO4s7U0u67iEI8/jaN+8Kg3kII+uy4=","CuN6+RcZAysZCfrzCZ8KdWDkQqyaIstSrcmsZ/c2MVs="],"block_size":4096,"path":"content.js"},{"block_hashes":["OdZL4YFLwCTKbdslekC6/+U9KTtDUk+T+nnpVOeRzUc=","UL53sQ5hOhAmII/Yx6muXikzahxM+k5gEmVOh7xJ3Rw=","u6MdmVNzBUfDzMwv2LEJ6pXR8k0nnvpYRwOL8aApwP8="],"block_size":4096,"path":"content_new.js"}],"version":2}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 39, 1st free page 10, free pages 4, cookie 0x45, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):159744
                      Entropy (8bit):0.5241404324800358
                      Encrypted:false
                      SSDEEP:96:56U+bGzPDLjGQLBE3up+U0jBo4tgi3JMe9xJDECVjN:5R+GPXBBE3upb0HtTTDxVj
                      MD5:241322143A01979D346689D9448AC8C0
                      SHA1:DD95F97EE1CCB8FD9026D2156DE9CB8137B816D1
                      SHA-256:65EEBDEC4F48A111AC596212A1D71C3A5CFA996797500E5344EEABDFA02527C8
                      SHA-512:9C7241462A9DADEF25D8EEB1C14BABFBA65C451EBAFBC068B9856E4EF0EB6F894A44686CBB0D1F46C7F546335D0C53A3E386E6C1A017082DE127F8F9C0A54BD2
                      Malicious:false
                      Preview:SQLite format 3......@ .......'...........E......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8720
                      Entropy (8bit):0.3283577581710296
                      Encrypted:false
                      SSDEEP:6:vHA/J3+t76Y4QZZofU99pO0BYvubqR4EZY4QZvGe5p:vghHQws9Ld7OBQZGmp
                      MD5:2610CF35793E1D160B573620DA5AAE5D
                      SHA1:37299908F1BA3C2779DEA72AA2D429FA41E5C8DF
                      SHA-256:626BA0C7B29C16AB684737F418CDE7F1524A7997179C9EAF190DB7030E8998AB
                      SHA-512:91D3DA819CC38C620D9551746AB6A135F553B4B50ACB853CA2D55FD62247E1B2AA31FE8FF7AD35DDB6B4092B8893A47C9CBC595B1D7661AD4FB4143806C4F7B6
                      Malicious:false
                      Preview:............]......'....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):28672
                      Entropy (8bit):0.33890226319329847
                      Encrypted:false
                      SSDEEP:12:TLMfly7aoxrRGcAkSQdC6ae1//fxEjkE/RFL2iFV1eHFxOUwa5qgufTsZ75fOSI:TLYcjr0+Pdajk+FZH1W6UwccI5fBI
                      MD5:971F4C153D386AC7ED39363C31E854FC
                      SHA1:339841CA0088C9EABDE4AACC8567D2289CCB9544
                      SHA-256:B6468DA6EC0EAE580B251692CFE24620D39412954421BBFDECB13EF21BE7BC88
                      SHA-512:1A4DD0C2BE163AAB3B81D63DEB4A7DB6421612A6CF1A5685951F86B7D5A40B67FC6585B7E52AA0CC20FF47349F15DFF0C9038086E3A7C78AE0FFBEE6D8AA7F7E
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j..........g...:.8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):406
                      Entropy (8bit):5.249403563611066
                      Encrypted:false
                      SSDEEP:12:i8MsOvYfYeb8rcHEZrELFUt8B8WW/+B8Wq5JfYeb8rcHEZrEZSJ:iYfYeb8nZrExg8X/0JfYeb8nZrEZe
                      MD5:32D5E633998F7B7B961B9AD01E107516
                      SHA1:86727C8894468E73559A2DB70A3807360EE8F33F
                      SHA-256:97BF4647F52961B4E894095E46DAE7D505F4C46DC00C3AA2936FDFB0BD1A5E49
                      SHA-512:B3C80FDCCEC1827B468BA0ABF25FE0188F39D94C6C18A6F1F43E2BB8CF56FE625D34489781001DDC54948B1C4410D304780CE591D96A7EBBB6F33BF4AA24574F
                      Malicious:false
                      Preview:2024/08/31-04:46:13.999 1d34 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold/MANIFEST-000001.2024/08/31-04:46:14.000 1d34 Recovering log #3.2024/08/31-04:46:14.000 1d34 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):406
                      Entropy (8bit):5.249403563611066
                      Encrypted:false
                      SSDEEP:12:i8MsOvYfYeb8rcHEZrELFUt8B8WW/+B8Wq5JfYeb8rcHEZrEZSJ:iYfYeb8nZrExg8X/0JfYeb8nZrEZe
                      MD5:32D5E633998F7B7B961B9AD01E107516
                      SHA1:86727C8894468E73559A2DB70A3807360EE8F33F
                      SHA-256:97BF4647F52961B4E894095E46DAE7D505F4C46DC00C3AA2936FDFB0BD1A5E49
                      SHA-512:B3C80FDCCEC1827B468BA0ABF25FE0188F39D94C6C18A6F1F43E2BB8CF56FE625D34489781001DDC54948B1C4410D304780CE591D96A7EBBB6F33BF4AA24574F
                      Malicious:false
                      Preview:2024/08/31-04:46:13.999 1d34 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold/MANIFEST-000001.2024/08/31-04:46:14.000 1d34 Recovering log #3.2024/08/31-04:46:14.000 1d34 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):334
                      Entropy (8bit):5.181126837059197
                      Encrypted:false
                      SSDEEP:6:i8MdvtXAq2Pwkn23oH+Tcwt8a2jMGIFUt8B8Md3Zmw+B8MdzkwOwkn23oH+Tcwtw:i8MdvtQvYfYeb8EFUt8B8Md3/+B8MdzE
                      MD5:90831F02467BC93FDB06FC350F70EFD3
                      SHA1:7314E3EDC608A1E4311D828FFA8EB957AC57AFB5
                      SHA-256:010D7D1CD3B33DBAD143F57959520942CE13A7B3B50CD3157B9A6809F4E02FB2
                      SHA-512:C6C9C24F3DC1704BEEE9E674E4BC586D7D82280FFDE6E5D680604CC6449958FE3C6A23A1F6DCD0A21D291E6EF17BA807839CF6F0D138EDABCEE6DE79834224DD
                      Malicious:false
                      Preview:2024/08/31-04:46:13.879 22b0 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb/MANIFEST-000001.2024/08/31-04:46:13.880 22b0 Recovering log #3.2024/08/31-04:46:13.882 22b0 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):334
                      Entropy (8bit):5.181126837059197
                      Encrypted:false
                      SSDEEP:6:i8MdvtXAq2Pwkn23oH+Tcwt8a2jMGIFUt8B8Md3Zmw+B8MdzkwOwkn23oH+Tcwtw:i8MdvtQvYfYeb8EFUt8B8Md3/+B8MdzE
                      MD5:90831F02467BC93FDB06FC350F70EFD3
                      SHA1:7314E3EDC608A1E4311D828FFA8EB957AC57AFB5
                      SHA-256:010D7D1CD3B33DBAD143F57959520942CE13A7B3B50CD3157B9A6809F4E02FB2
                      SHA-512:C6C9C24F3DC1704BEEE9E674E4BC586D7D82280FFDE6E5D680604CC6449958FE3C6A23A1F6DCD0A21D291E6EF17BA807839CF6F0D138EDABCEE6DE79834224DD
                      Malicious:false
                      Preview:2024/08/31-04:46:13.879 22b0 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb/MANIFEST-000001.2024/08/31-04:46:13.880 22b0 Recovering log #3.2024/08/31-04:46:13.882 22b0 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 2, database pages 28, cookie 0x1d, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):57344
                      Entropy (8bit):0.863060653641558
                      Encrypted:false
                      SSDEEP:96:u7/KLPeymOT7ynlm+yKwt7izhGnvgbn8MouB6wznP:u74CnlmVizhGE7IwD
                      MD5:C681C90B3AAD7F7E4AF8664DE16971DF
                      SHA1:9F72588CEA6569261291B19E06043A1EFC3653BC
                      SHA-256:ADB987BF641B2531991B8DE5B10244C3FE1ACFA7AD7A61A65D2E2D8E7AB34C1D
                      SHA-512:4696BF334961E4C9757BAC40C41B4FBE3E0B9F821BD242CE6967B347053787BE54D1270D7166745126AFA42E8193AC2E695B0D8F11DE8F0B2876628B7C128942
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 11, cookie 0x6, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):45056
                      Entropy (8bit):0.40293591932113104
                      Encrypted:false
                      SSDEEP:24:TLVgTjDk5Yk8k+/kCkzD3zzbLGfIzLihje90xq/WMFFfeFzfXVVlYWOT/CUFSe:Tmo9n+8dv/qALihje9kqL42WOT/9F
                      MD5:ADC0CFB8A1A20DE2C4AB738B413CBEA4
                      SHA1:238EF489E5FDC6EBB36F09D415FB353350E7097B
                      SHA-256:7C071E36A64FB1881258712C9880F155D9CBAC693BADCC391A1CB110C257CC37
                      SHA-512:38C8B7293B8F7BEF03299BAFB981EEEE309945B1BDE26ACDAD6FDD63247C21CA04D493A1DDAFC3B9A1904EFED998E9C7C0C8E98506FD4AC0AB252DFF34566B66
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.......=......\.t.+.>...,...=........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):40
                      Entropy (8bit):4.1275671571169275
                      Encrypted:false
                      SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                      MD5:20D4B8FA017A12A108C87F540836E250
                      SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                      SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                      SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                      Malicious:false
                      Preview:{"SDCH":{"dictionaries":{},"version":2}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
                      Category:dropped
                      Size (bytes):20480
                      Entropy (8bit):0.6732424250451717
                      Encrypted:false
                      SSDEEP:24:TLO1nKbXYFpFNYcoqT1kwE6UwpQ9YHVXxZ6HfB:Tq1KLopF+SawLUO1Xj8B
                      MD5:CFFF4E2B77FC5A18AB6323AF9BF95339
                      SHA1:3AA2C2115A8EB4516049600E8832E9BFFE0C2412
                      SHA-256:EC8B67EF7331A87086A6CC085B085A6B7FFFD325E1B3C90BD3B9B1B119F696AE
                      SHA-512:0BFDC8D28D09558AA97F4235728AD656FE9F6F2C61DDA2D09B416F89AB60038537B7513B070B907E57032A68B9717F03575DB6778B68386254C8157559A3F1BC
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j...$......g..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):61
                      Entropy (8bit):3.926136109079379
                      Encrypted:false
                      SSDEEP:3:YLb9N+eAXRfHDH2LSL:YHpoeSL
                      MD5:4DF4574BFBB7E0B0BC56C2C9B12B6C47
                      SHA1:81EFCBD3E3DA8221444A21F45305AF6FA4B71907
                      SHA-256:E1B77550222C2451772C958E44026ABE518A2C8766862F331765788DDD196377
                      SHA-512:78B14F60F2D80400FE50360CF303A961685396B7697775D078825A29B717081442D357C2039AD0984D4B622976B0314EDE8F478CDE320DAEC118DA546CB0682A
                      Malicious:false
                      Preview:{"net":{"http_server_properties":{"servers":[],"version":5}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):61
                      Entropy (8bit):3.926136109079379
                      Encrypted:false
                      SSDEEP:3:YLb9N+eAXRfHDH2LSL:YHpoeSL
                      MD5:4DF4574BFBB7E0B0BC56C2C9B12B6C47
                      SHA1:81EFCBD3E3DA8221444A21F45305AF6FA4B71907
                      SHA-256:E1B77550222C2451772C958E44026ABE518A2C8766862F331765788DDD196377
                      SHA-512:78B14F60F2D80400FE50360CF303A961685396B7697775D078825A29B717081442D357C2039AD0984D4B622976B0314EDE8F478CDE320DAEC118DA546CB0682A
                      Malicious:false
                      Preview:{"net":{"http_server_properties":{"servers":[],"version":5}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):61
                      Entropy (8bit):3.926136109079379
                      Encrypted:false
                      SSDEEP:3:YLb9N+eAXRfHDH2LSL:YHpoeSL
                      MD5:4DF4574BFBB7E0B0BC56C2C9B12B6C47
                      SHA1:81EFCBD3E3DA8221444A21F45305AF6FA4B71907
                      SHA-256:E1B77550222C2451772C958E44026ABE518A2C8766862F331765788DDD196377
                      SHA-512:78B14F60F2D80400FE50360CF303A961685396B7697775D078825A29B717081442D357C2039AD0984D4B622976B0314EDE8F478CDE320DAEC118DA546CB0682A
                      Malicious:false
                      Preview:{"net":{"http_server_properties":{"servers":[],"version":5}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3035005, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
                      Category:dropped
                      Size (bytes):36864
                      Entropy (8bit):0.555790634850688
                      Encrypted:false
                      SSDEEP:48:TsIopKWurJNVr1GJmA8pv82pfurJNVrdHXuccaurJN2VrJ1n4n1GmzNGU1cSB:QIEumQv8m1ccnvS6
                      MD5:0247E46DE79B6CD1BF08CAF7782F7793
                      SHA1:B3A63ED5BE3D8EC6E3949FC5E2D21D97ACC873A6
                      SHA-256:AAD0053186875205E014AB98AE8C18A6233CB715DD3AF44E7E8EB259AEAB5EEA
                      SHA-512:148804598D2A9EA182BD2ADC71663D481F88683CE3D672CE12A43E53B0D34FD70458BE5AAA781B20833E963804E7F4562855F2D18F7731B7C2EAEA5D6D52FBB6
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................O}.........g...D.........7............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):40
                      Entropy (8bit):4.1275671571169275
                      Encrypted:false
                      SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                      MD5:20D4B8FA017A12A108C87F540836E250
                      SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                      SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                      SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                      Malicious:false
                      Preview:{"SDCH":{"dictionaries":{},"version":2}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):203
                      Entropy (8bit):5.4042796420747425
                      Encrypted:false
                      SSDEEP:6:YAQN1iL50xHA9vh8wXwlmUUAnIMp5sXX2SQ:Y45Sg9vt+UAnIXZQ
                      MD5:24D66E5F1B8C76C76511DA68057CDE5E
                      SHA1:70225FEC1AE3FEF8D8A767D9EA0B0E108BF8F10D
                      SHA-256:D5CB3A4A104E2EC4F13E8B4CDF3BD469E0AB638713928BEA1EAEAF03998B794C
                      SHA-512:1CA093B4BB4E0B3EE0B791AD0E6B39AC9640CEB6ED005BD10A10B4AF904858F4898D86D26B60B625CDA9425FF317C6B9FE0DF2E12C897A52720AF775B19491AA
                      Malicious:false
                      Preview:{"expect_ct":[],"sts":[{"expiry":1727869700.805692,"host":"dUymlFcJcEIuWrPNRCRXYtREHxXDHdPfT47kO1IQnQ0=","mode":"force-https","sts_include_subdomains":true,"sts_observed":1696333700.805702}],"version":2}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):203
                      Entropy (8bit):5.4042796420747425
                      Encrypted:false
                      SSDEEP:6:YAQN1iL50xHA9vh8wXwlmUUAnIMp5sXX2SQ:Y45Sg9vt+UAnIXZQ
                      MD5:24D66E5F1B8C76C76511DA68057CDE5E
                      SHA1:70225FEC1AE3FEF8D8A767D9EA0B0E108BF8F10D
                      SHA-256:D5CB3A4A104E2EC4F13E8B4CDF3BD469E0AB638713928BEA1EAEAF03998B794C
                      SHA-512:1CA093B4BB4E0B3EE0B791AD0E6B39AC9640CEB6ED005BD10A10B4AF904858F4898D86D26B60B625CDA9425FF317C6B9FE0DF2E12C897A52720AF775B19491AA
                      Malicious:false
                      Preview:{"expect_ct":[],"sts":[{"expiry":1727869700.805692,"host":"dUymlFcJcEIuWrPNRCRXYtREHxXDHdPfT47kO1IQnQ0=","mode":"force-https","sts_include_subdomains":true,"sts_observed":1696333700.805702}],"version":2}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):36864
                      Entropy (8bit):0.36515621748816035
                      Encrypted:false
                      SSDEEP:24:TLH3lIIAoDJ84l5lDlnDMlRlyKDtM6UwccWfp15fBIe:Tb31DtX5nDOvyKDhU1cSB
                      MD5:25363ADC3C9D98BAD1A33D0792405CBF
                      SHA1:D06E343087D86EF1A06F7479D81B26C90A60B5C3
                      SHA-256:6E019B8B9E389216D5BDF1F2FE63F41EF98E71DA101F2A6BE04F41CC5954532D
                      SHA-512:CF7EEE35D0E00945AF221BEC531E8BF06C08880DA00BD103FA561BC069D7C6F955CBA3C1C152A4884601E5A670B7487D39B4AE9A4D554ED8C14F129A74E555F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.......X..g...}.....$.X..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):188
                      Entropy (8bit):5.423404609678128
                      Encrypted:false
                      SSDEEP:3:YWRAWNjBSVVLTRn0xmuRA9E+L3x8HQXwlm9yJUA6XcIR6RX77XMqGwmvXjz2SQ:YWyWN1iL50xHA9vh8wXwlmUUAnIMp5sO
                      MD5:6833E2FEEACF2930174137246FC7E09F
                      SHA1:7707DD22D2CFD3C3B79D727C93AE1D3DFD90B307
                      SHA-256:839EB286A9A424BFB655D9DA050BE4CAE90B3DE4894CFE1F352919B551F17C0C
                      SHA-512:B987F42C327EA83EE824E0E9BBC2AE5727CBB3B8DF29659C7E11798E24D5F8A94A05644200B6B57754876050E805EEAB90A0DAC437296BFED54C49535AF133C0
                      Malicious:false
                      Preview:{"sts":[{"expiry":1727869700.805692,"host":"dUymlFcJcEIuWrPNRCRXYtREHxXDHdPfT47kO1IQnQ0=","mode":"force-https","sts_include_subdomains":true,"sts_observed":1696333700.805702}],"version":2}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):111
                      Entropy (8bit):4.718418993774295
                      Encrypted:false
                      SSDEEP:3:YLb9N+eAXRfHDH2LS7PMVKJq0nMb1KKtiVY:YHpoeS7PMVKJTnMRK3VY
                      MD5:285252A2F6327D41EAB203DC2F402C67
                      SHA1:ACEDB7BA5FBC3CE914A8BF386A6F72CA7BAA33C6
                      SHA-256:5DFC321417FC31359F23320EA68014EBFD793C5BBED55F77DAB4180BBD4A2026
                      SHA-512:11CE7CB484FEE66894E63C31DB0D6B7EF66AD0327D4E7E2EB85F3BCC2E836A3A522C68D681E84542E471E54F765E091EFE1EE4065641B0299B15613EB32DCC0D
                      Malicious:false
                      Preview:{"net":{"http_server_properties":{"servers":[],"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):881
                      Entropy (8bit):5.306284554129009
                      Encrypted:false
                      SSDEEP:24:YXsiZVMdBs8SyZFRudFGcsnZFGJ/dbG7nby:YXsW8s8/fcdsZgzbZ
                      MD5:3D69FD3EC9481001C8EB000AB9BD4DBC
                      SHA1:AAE17C607F5AE534CF290A6E8DB90700571EC057
                      SHA-256:2D734EB41A039E4F60B764A907471A80B25DD6F898CDE74592C2B8BD376BDD6D
                      SHA-512:998655F51877F60AFA6F85E4B63528B7AC2DBC421E54C5770754E87BB6BA1D337585FD44A51971D2A216F9E86430265A95F3AD5DBE46BC3A8D8BB238D2340DFB
                      Malicious:false
                      Preview:{"net":{"http_server_properties":{"servers":[{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13372159574728305","port":443,"protocol_str":"quic"}],"anonymization":["GAAAABIAAABodHRwczovL2dvb2dsZS5jb20AAA==",false],"server":"https://clients2.google.com"},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13372159575956556","port":443,"protocol_str":"quic"}],"anonymization":["JAAAAB0AAABodHRwczovL2dvb2dsZXVzZXJjb250ZW50LmNvbQAAAA==",false],"server":"https://clients2.googleusercontent.com"},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13372159577968534","port":443,"protocol_str":"quic"}],"anonymization":["IAAAABoAAABodHRwczovL3d3dy5nb29nbGVhcGlzLmNvbQAA",false],"server":"https://www.googleapis.com"}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):20480
                      Entropy (8bit):0.46731661083066856
                      Encrypted:false
                      SSDEEP:12:TL1QAFUxOUDaabZXiDiIF8izX4fhhdWeci2oesJaYi3is25q0S9K0xHZ75fOV:TLiOUOq0afDdWec9sJf5Q7J5fc
                      MD5:E93ACF0820CA08E5A5D2D159729F70E3
                      SHA1:2C1A4D4924B9AEC1A796F108607404B000877C5D
                      SHA-256:F2267FDA7F45499F7A01186B75CEFB799F8D2BC97E2E9B5068952D477294302C
                      SHA-512:3BF36C20E04DCF1C16DC794E272F82F68B0DE43F16B4A9746B63B6D6BBC953B00BD7111CDA7AFE85CEBB2C447145483A382B15E2B0A5B36026C3441635D4E50C
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):8568
                      Entropy (8bit):5.068681340998719
                      Encrypted:false
                      SSDEEP:96:sV/qlkJ14b9kfdAGcYuXjaYlsY5Th6Cp9/x+6M8muecmAeCFe4zvra2X6gE5AtE7:sV/PJvdAGcPTaYlsYPpj+FVAdaFBf
                      MD5:B384276A2BE6E9A07598809EEA1B27DA
                      SHA1:B5093744688BE3FD26A4E2FDF0B23EC2FBDD6093
                      SHA-256:B76ABA6B6AC2179190AFA09110D6E9C96C8878B3D95D69392B1072A421D0F63C
                      SHA-512:823CD1B749598774345AA0F5FA20842FEA4179BF10E57A7E5D1AFB3D16CB156ABA74DB8EC330BA35CF715157667DF059ADB14A997680157A73D62D80B55CF275
                      Malicious:false
                      Preview:{"aadc_info":{"age_group":0},"account_id_migration_state":2,"account_tracker_service_last_update":"13369567573027812","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"data_reduction":{"daily_original_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","5826"],"daily_received_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):8568
                      Entropy (8bit):5.068681340998719
                      Encrypted:false
                      SSDEEP:96:sV/qlkJ14b9kfdAGcYuXjaYlsY5Th6Cp9/x+6M8muecmAeCFe4zvra2X6gE5AtE7:sV/PJvdAGcPTaYlsYPpj+FVAdaFBf
                      MD5:B384276A2BE6E9A07598809EEA1B27DA
                      SHA1:B5093744688BE3FD26A4E2FDF0B23EC2FBDD6093
                      SHA-256:B76ABA6B6AC2179190AFA09110D6E9C96C8878B3D95D69392B1072A421D0F63C
                      SHA-512:823CD1B749598774345AA0F5FA20842FEA4179BF10E57A7E5D1AFB3D16CB156ABA74DB8EC330BA35CF715157667DF059ADB14A997680157A73D62D80B55CF275
                      Malicious:false
                      Preview:{"aadc_info":{"age_group":0},"account_id_migration_state":2,"account_tracker_service_last_update":"13369567573027812","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"data_reduction":{"daily_original_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","5826"],"daily_received_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):8568
                      Entropy (8bit):5.068681340998719
                      Encrypted:false
                      SSDEEP:96:sV/qlkJ14b9kfdAGcYuXjaYlsY5Th6Cp9/x+6M8muecmAeCFe4zvra2X6gE5AtE7:sV/PJvdAGcPTaYlsYPpj+FVAdaFBf
                      MD5:B384276A2BE6E9A07598809EEA1B27DA
                      SHA1:B5093744688BE3FD26A4E2FDF0B23EC2FBDD6093
                      SHA-256:B76ABA6B6AC2179190AFA09110D6E9C96C8878B3D95D69392B1072A421D0F63C
                      SHA-512:823CD1B749598774345AA0F5FA20842FEA4179BF10E57A7E5D1AFB3D16CB156ABA74DB8EC330BA35CF715157667DF059ADB14A997680157A73D62D80B55CF275
                      Malicious:false
                      Preview:{"aadc_info":{"age_group":0},"account_id_migration_state":2,"account_tracker_service_last_update":"13369567573027812","alternate_error_pages":{"backup":true},"apps":{"shortcuts_arch":"","shortcuts_version":0},"arbitration_using_experiment_config":false,"browser":{"available_dark_theme_options":"All","has_seen_welcome_page":false},"continuous_migration":{"ci_correction_for_holdout_treatment_state":1},"countryid_at_install":17224,"custom_links":{"list":[]},"data_reduction":{"daily_original_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","5826"],"daily_received_length":["0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","0","
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):33
                      Entropy (8bit):4.051821770808046
                      Encrypted:false
                      SSDEEP:3:YVXADAEvTLSJ:Y9AcEvHSJ
                      MD5:2B432FEF211C69C745ACA86DE4F8E4AB
                      SHA1:4B92DA8D4C0188CF2409500ADCD2200444A82FCC
                      SHA-256:42B55D126D1E640B1ED7A6BDCB9A46C81DF461FA7E131F4F8C7108C2C61C14DE
                      SHA-512:948502DE4DC89A7E9D2E1660451FCD0F44FD3816072924A44F145D821D0363233CC92A377DBA3A0A9F849E3C17B1893070025C369C8120083A622D025FE1EACF
                      Malicious:false
                      Preview:{"preferred_apps":[],"version":1}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):28366
                      Entropy (8bit):5.558478946270267
                      Encrypted:false
                      SSDEEP:768:UvcgvY7pLGLvy7WPDvffC8F1+UoAYDCx9Tuqh0VfUC9xbog/OVyncJerwmxo2pZ8:UvcgvEcvy7WPDvffCu1javcJ7+ta
                      MD5:D904A2C75E03F11CB2CB5C4B5C573BA3
                      SHA1:DB0B823461FBBE3498757A331E064DC93175699B
                      SHA-256:25822623A07CEAE4CFC5648CB2D37C6DDED5DC2EAD87C70455A421A2E19B29A0
                      SHA-512:D25E16CA83177F574CE22AE1FDA2CD96205B509D088782703E956FCA2106F3C72F7D671D639FCD71FF975180C3E9754C2C6ECEA002AFC297AA408871D9A11EA1
                      Malicious:false
                      Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369567572805802","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369567572805802","location":5,"ma
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):28366
                      Entropy (8bit):5.558478946270267
                      Encrypted:false
                      SSDEEP:768:UvcgvY7pLGLvy7WPDvffC8F1+UoAYDCx9Tuqh0VfUC9xbog/OVyncJerwmxo2pZ8:UvcgvEcvy7WPDvffCu1javcJ7+ta
                      MD5:D904A2C75E03F11CB2CB5C4B5C573BA3
                      SHA1:DB0B823461FBBE3498757A331E064DC93175699B
                      SHA-256:25822623A07CEAE4CFC5648CB2D37C6DDED5DC2EAD87C70455A421A2E19B29A0
                      SHA-512:D25E16CA83177F574CE22AE1FDA2CD96205B509D088782703E956FCA2106F3C72F7D671D639FCD71FF975180C3E9754C2C6ECEA002AFC297AA408871D9A11EA1
                      Malicious:false
                      Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369567572805802","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369567572805802","location":5,"ma
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):232
                      Entropy (8bit):2.7061121767675385
                      Encrypted:false
                      SSDEEP:3:S8ltHlS+QUl1ASEGhTFljljljljljljljljljl:S85aEFljljljljljljljljljl
                      MD5:8A30A1FDD0459D9EA8B1E78A8E636856
                      SHA1:9D7225E97F9CFCFB225CFBFD0B0BBA21D4EFDD20
                      SHA-256:88FE1D31608930F2738D102D45C75DC77ACDF01A1B69BFB7E7C0281575B75E33
                      SHA-512:B529BCE870CD8165BF82F3EBF94F07552467BD0993B9D35145182E54E26FB2AE8E7BB167D88267B632757E2146F27DFDDF8867DB0C66E5DCC306DB12EC6B7BEF
                      Malicious:false
                      Preview:*...#................version.1..namespace-..&f.................&f.................&f.................&f.................&f.................&f.................&f.................&f.................&f.................&f...............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):322
                      Entropy (8bit):5.166199885466605
                      Encrypted:false
                      SSDEEP:6:iSFq2Pwkn23oH+TcwtrQMxIFUt8BS7HVXZmw+BS5zkwOwkn23oH+TcwtrQMFLJ:iSFvYfYebCFUt8BS7HVX/+BSZ5JfYebf
                      MD5:F928C29E9E7247195ACB62BD24AAD665
                      SHA1:2E8A158E969174C12059F752566C8FE1F2F572C8
                      SHA-256:8D6DCA9E2E23749D2D5834505EB93657B4C48CF60E380024B4D9D9DE3107DA3F
                      SHA-512:4DBE697737776C94EA5AC8194490CC29906C1542D7320535CCF416392817643728B419A29A6BCC3D4DD19341F916866C42B4C5516481EB8D1571D08E62E3C486
                      Malicious:false
                      Preview:2024/08/31-04:46:29.054 22b0 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage/MANIFEST-000001.2024/08/31-04:46:29.057 22b0 Recovering log #3.2024/08/31-04:46:29.060 22b0 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):322
                      Entropy (8bit):5.166199885466605
                      Encrypted:false
                      SSDEEP:6:iSFq2Pwkn23oH+TcwtrQMxIFUt8BS7HVXZmw+BS5zkwOwkn23oH+TcwtrQMFLJ:iSFvYfYebCFUt8BS7HVX/+BSZ5JfYebf
                      MD5:F928C29E9E7247195ACB62BD24AAD665
                      SHA1:2E8A158E969174C12059F752566C8FE1F2F572C8
                      SHA-256:8D6DCA9E2E23749D2D5834505EB93657B4C48CF60E380024B4D9D9DE3107DA3F
                      SHA-512:4DBE697737776C94EA5AC8194490CC29906C1542D7320535CCF416392817643728B419A29A6BCC3D4DD19341F916866C42B4C5516481EB8D1571D08E62E3C486
                      Malicious:false
                      Preview:2024/08/31-04:46:29.054 22b0 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage/MANIFEST-000001.2024/08/31-04:46:29.057 22b0 Recovering log #3.2024/08/31-04:46:29.060 22b0 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):350
                      Entropy (8bit):5.166987645944813
                      Encrypted:false
                      SSDEEP:6:i8Oi+q2Pwkn23oH+Tcwt7Uh2ghZIFUt8B8rmZmw+B8riVkwOwkn23oH+Tcwt7Uh9:i8J+vYfYebIhHh2FUt8B8S/+B8uV5Jf0
                      MD5:D29D7AC5A6AEA9A64DEB7780C95E13F6
                      SHA1:89421966F9C9FD4FB72761FC076A1F0F21928F21
                      SHA-256:BD5FBCCE1539331BB1E9229F415132CDE12C36F9C06E135FE707B03CE1701125
                      SHA-512:11B07E8D9A6E80CA8A2B8A87144D33278465FA0107E21786F3448BA83A03B3898CDD04245FA080970B8449FCD6928341D4332A8127E00F94BC9272FF942FCB60
                      Malicious:false
                      Preview:2024/08/31-04:46:12.824 229c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database/MANIFEST-000001.2024/08/31-04:46:12.825 229c Recovering log #3.2024/08/31-04:46:12.825 229c Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):350
                      Entropy (8bit):5.166987645944813
                      Encrypted:false
                      SSDEEP:6:i8Oi+q2Pwkn23oH+Tcwt7Uh2ghZIFUt8B8rmZmw+B8riVkwOwkn23oH+Tcwt7Uh9:i8J+vYfYebIhHh2FUt8B8S/+B8uV5Jf0
                      MD5:D29D7AC5A6AEA9A64DEB7780C95E13F6
                      SHA1:89421966F9C9FD4FB72761FC076A1F0F21928F21
                      SHA-256:BD5FBCCE1539331BB1E9229F415132CDE12C36F9C06E135FE707B03CE1701125
                      SHA-512:11B07E8D9A6E80CA8A2B8A87144D33278465FA0107E21786F3448BA83A03B3898CDD04245FA080970B8449FCD6928341D4332A8127E00F94BC9272FF942FCB60
                      Malicious:false
                      Preview:2024/08/31-04:46:12.824 229c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database/MANIFEST-000001.2024/08/31-04:46:12.825 229c Recovering log #3.2024/08/31-04:46:12.825 229c Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):8.280239615765425E-4
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):524656
                      Entropy (8bit):5.027445846313988E-4
                      Encrypted:false
                      SSDEEP:3:LsulHl/:LsIl
                      MD5:A7318B97D84A1BC92162DD83C13802F4
                      SHA1:9DA5129D0C5EA51BC3D0B7F9544293495D7B31A3
                      SHA-256:DB73E322D84CBF3DBE135D048EEEF5638EE889F913D499BEC7FEC50B8FA51052
                      SHA-512:26D6C51326CF7C81585F5D552135E246D769D693C5CB961F786D91899165A947E4A64050997DF070FB31B563F80E56579F75077682A492F846854B920C731564
                      Malicious:false
                      Preview:.........................................S.../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):0.0012471779557650352
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2zE:/M/xT02z
                      MD5:F50F89A0A91564D0B8A211F8921AA7DE
                      SHA1:112403A17DD69D5B9018B8CEDE023CB3B54EAB7D
                      SHA-256:B1E963D702392FB7224786E7D56D43973E9B9EFD1B89C17814D7C558FFC0CDEC
                      SHA-512:BF8CDA48CF1EC4E73F0DD1D4FA5562AF1836120214EDB74957430CD3E4A2783E801FA3F4ED2AFB375257CAEED4ABE958265237D6E0AACF35A9EDE7A2E8898D58
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):262512
                      Entropy (8bit):9.47693366977411E-4
                      Encrypted:false
                      SSDEEP:3:LsNlYoBt:Ls3P
                      MD5:5FDD3F375D407F48462145C2B194A453
                      SHA1:93058E65E01AD18D48430AF5AE7DF9ABF44675DC
                      SHA-256:890ED920F66E1F70FCD00751AD9E6A0248E12FF153D6E02BE3A527F38B25FBA7
                      SHA-512:20EC394E2718DAC7090AA0936F0F06C168253AFCBF0DD1885151CDA534AC9D7B17C2026710468C7F222971A29E78A4711F4045FEC3F5BA9DF39484277A537A1E
                      Malicious:false
                      Preview:........................................@...../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):0.0012471779557650352
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2zE:/M/xT02z
                      MD5:F50F89A0A91564D0B8A211F8921AA7DE
                      SHA1:112403A17DD69D5B9018B8CEDE023CB3B54EAB7D
                      SHA-256:B1E963D702392FB7224786E7D56D43973E9B9EFD1B89C17814D7C558FFC0CDEC
                      SHA-512:BF8CDA48CF1EC4E73F0DD1D4FA5562AF1836120214EDB74957430CD3E4A2783E801FA3F4ED2AFB375257CAEED4ABE958265237D6E0AACF35A9EDE7A2E8898D58
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):432
                      Entropy (8bit):5.25021402719329
                      Encrypted:false
                      SSDEEP:12:i8M1OvYfYebvqBQFUt8B8Ml/+B8Mdb5JfYebvqBvJ:AMYfYebvZg8sJfYebvk
                      MD5:CDE88D3EF73969446CB014579381B019
                      SHA1:8C6684F7D3355F5EB8DF2D23BADC6DEFC5488AD6
                      SHA-256:E3517F6C5BD6575EE42A1C94B2E99864E7263C9DFC07FD5152B3F441A23AAFC2
                      SHA-512:FE77405DD18CCB6D09E4DC076F36AA5F1F203BCB9522647BA824DF9350246B9A7965130648F5ED2951CFC4D6808733BFF58D3C6D216FABBC53297957B5FEBB94
                      Malicious:false
                      Preview:2024/08/31-04:46:13.901 22b0 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb/MANIFEST-000001.2024/08/31-04:46:13.905 22b0 Recovering log #3.2024/08/31-04:46:13.910 22b0 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):432
                      Entropy (8bit):5.25021402719329
                      Encrypted:false
                      SSDEEP:12:i8M1OvYfYebvqBQFUt8B8Ml/+B8Mdb5JfYebvqBvJ:AMYfYebvZg8sJfYebvk
                      MD5:CDE88D3EF73969446CB014579381B019
                      SHA1:8C6684F7D3355F5EB8DF2D23BADC6DEFC5488AD6
                      SHA-256:E3517F6C5BD6575EE42A1C94B2E99864E7263C9DFC07FD5152B3F441A23AAFC2
                      SHA-512:FE77405DD18CCB6D09E4DC076F36AA5F1F203BCB9522647BA824DF9350246B9A7965130648F5ED2951CFC4D6808733BFF58D3C6D216FABBC53297957B5FEBB94
                      Malicious:false
                      Preview:2024/08/31-04:46:13.901 22b0 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb/MANIFEST-000001.2024/08/31-04:46:13.905 22b0 Recovering log #3.2024/08/31-04:46:13.910 22b0 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):111
                      Entropy (8bit):4.718418993774295
                      Encrypted:false
                      SSDEEP:3:YLb9N+eAXRfHDH2LS7PMVKJq0nMb1KKtiVY:YHpoeS7PMVKJTnMRK3VY
                      MD5:285252A2F6327D41EAB203DC2F402C67
                      SHA1:ACEDB7BA5FBC3CE914A8BF386A6F72CA7BAA33C6
                      SHA-256:5DFC321417FC31359F23320EA68014EBFD793C5BBED55F77DAB4180BBD4A2026
                      SHA-512:11CE7CB484FEE66894E63C31DB0D6B7EF66AD0327D4E7E2EB85F3BCC2E836A3A522C68D681E84542E471E54F765E091EFE1EE4065641B0299B15613EB32DCC0D
                      Malicious:false
                      Preview:{"net":{"http_server_properties":{"servers":[],"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):40
                      Entropy (8bit):4.1275671571169275
                      Encrypted:false
                      SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                      MD5:20D4B8FA017A12A108C87F540836E250
                      SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                      SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                      SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                      Malicious:false
                      Preview:{"SDCH":{"dictionaries":{},"version":2}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):193
                      Entropy (8bit):4.864047146590611
                      Encrypted:false
                      SSDEEP:6:YHpoueH2a9a1o3/QBR70S7PMVKJTnMRK3VY:YH/u2caq3QH7E4T3y
                      MD5:18D8AE83268DD3A59C64AAD659CF2FD3
                      SHA1:018C9736438D095A67B1C9953082F671C2FDB681
                      SHA-256:D659029D35ADEBB7918AF32FFF3202C63D8047043A8BDF329B2A97751CF95056
                      SHA-512:BB0962F930E9844E8C0E9CD209C07F46259E4C7677D5443B7AEE90DCF7B7E8F9960C5E3FCB8A83B9BB40862FBE0442C547083A9FD421D86674B88B2BEBBEB2FB
                      Malicious:false
                      Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):193
                      Entropy (8bit):4.864047146590611
                      Encrypted:false
                      SSDEEP:6:YHpoueH2a9a1o3/QBR70S7PMVKJTnMRK3VY:YH/u2caq3QH7E4T3y
                      MD5:18D8AE83268DD3A59C64AAD659CF2FD3
                      SHA1:018C9736438D095A67B1C9953082F671C2FDB681
                      SHA-256:D659029D35ADEBB7918AF32FFF3202C63D8047043A8BDF329B2A97751CF95056
                      SHA-512:BB0962F930E9844E8C0E9CD209C07F46259E4C7677D5443B7AEE90DCF7B7E8F9960C5E3FCB8A83B9BB40862FBE0442C547083A9FD421D86674B88B2BEBBEB2FB
                      Malicious:false
                      Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3035005, file counter 4, database pages 9, cookie 0x4, schema 4, UTF-8, version-valid-for 4
                      Category:dropped
                      Size (bytes):36864
                      Entropy (8bit):0.555790634850688
                      Encrypted:false
                      SSDEEP:48:TsIopKWurJNVr1GJmA8pv82pfurJNVrdHXuccaurJN2VrJ1n4n1GmzNGU1cSB:QIEumQv8m1ccnvS6
                      MD5:0247E46DE79B6CD1BF08CAF7782F7793
                      SHA1:B3A63ED5BE3D8EC6E3949FC5E2D21D97ACC873A6
                      SHA-256:AAD0053186875205E014AB98AE8C18A6233CB715DD3AF44E7E8EB259AEAB5EEA
                      SHA-512:148804598D2A9EA182BD2ADC71663D481F88683CE3D672CE12A43E53B0D34FD70458BE5AAA781B20833E963804E7F4562855F2D18F7731B7C2EAEA5D6D52FBB6
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................O}.........g...D.........7............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):40
                      Entropy (8bit):4.1275671571169275
                      Encrypted:false
                      SSDEEP:3:Y2ktGMxkAXWMSN:Y2xFMSN
                      MD5:20D4B8FA017A12A108C87F540836E250
                      SHA1:1AC617FAC131262B6D3CE1F52F5907E31D5F6F00
                      SHA-256:6028BD681DBF11A0A58DDE8A0CD884115C04CAA59D080BA51BDE1B086CE0079D
                      SHA-512:507B2B8A8A168FF8F2BDAFA5D9D341C44501A5F17D9F63F3D43BD586BC9E8AE33221887869FA86F845B7D067CB7D2A7009EFD71DDA36E03A40A74FEE04B86856
                      Malicious:false
                      Preview:{"SDCH":{"dictionaries":{},"version":2}}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 3, database pages 9, cookie 0x6, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):36864
                      Entropy (8bit):0.36515621748816035
                      Encrypted:false
                      SSDEEP:24:TLH3lIIAoDJ84l5lDlnDMlRlyKDtM6UwccWfp15fBIe:Tb31DtX5nDOvyKDhU1cSB
                      MD5:25363ADC3C9D98BAD1A33D0792405CBF
                      SHA1:D06E343087D86EF1A06F7479D81B26C90A60B5C3
                      SHA-256:6E019B8B9E389216D5BDF1F2FE63F41EF98E71DA101F2A6BE04F41CC5954532D
                      SHA-512:CF7EEE35D0E00945AF221BEC531E8BF06C08880DA00BD103FA561BC069D7C6F955CBA3C1C152A4884601E5A670B7487D39B4AE9A4D554ED8C14F129A74E555F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.......X..g...}.....$.X..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2
                      Entropy (8bit):1.0
                      Encrypted:false
                      SSDEEP:3:H:H
                      MD5:D751713988987E9331980363E24189CE
                      SHA1:97D170E1550EEE4AFC0AF065B78CDA302A97674C
                      SHA-256:4F53CDA18C2BAA0C0354BB5F9A3ECBE5ED12AB4D8E11BA873C2F11161202B945
                      SHA-512:B25B294CB4DEB69EA00A4C3CF3113904801B6015E5956BD019A8570B1FE1D6040E944EF3CDEE16D0A46503CA6E659A25F21CF9CEDDC13F352A3C98138C15D6AF
                      Malicious:false
                      Preview:[]
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):80
                      Entropy (8bit):3.4921535629071894
                      Encrypted:false
                      SSDEEP:3:S8ltHlS+QUl1ASEGhTFljl:S85aEFljl
                      MD5:69449520FD9C139C534E2970342C6BD8
                      SHA1:230FE369A09DEF748F8CC23AD70FD19ED8D1B885
                      SHA-256:3F2E9648DFDB2DDB8E9D607E8802FEF05AFA447E17733DD3FD6D933E7CA49277
                      SHA-512:EA34C39AEA13B281A6067DE20AD0CDA84135E70C97DB3CDD59E25E6536B19F7781E5FC0CA4A11C3618D43FC3BD3FBC120DD5C1C47821A248B8AD351F9F4E6367
                      Malicious:false
                      Preview:*...#................version.1..namespace-..&f.................&f...............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):420
                      Entropy (8bit):5.24873447015857
                      Encrypted:false
                      SSDEEP:12:iSsvYfYebvqBZFUt8BSI/+BSy5JfYebvqBaJ:uYfYebvyg8kJfYebvL
                      MD5:AAC2A872B5BA48105BD0B480614A2A20
                      SHA1:BC37A5095BDB8E5BA3BFA21EDACD9C37AF545CB9
                      SHA-256:23697A4AF305AE512A8CAFE91ED14AA1023EFD273A1323598658BF86F37E075A
                      SHA-512:7C1C926CB58F66068FC93399ABF6B5A4B07D60F09031FEC46E52FD3697B2845B908CA2D32ACDF046391CA19C5E3512386DF90949D87F358F5BCDD852133CD3CA
                      Malicious:false
                      Preview:2024/08/31-04:46:29.105 22b0 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage/MANIFEST-000001.2024/08/31-04:46:29.106 22b0 Recovering log #3.2024/08/31-04:46:29.108 22b0 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):420
                      Entropy (8bit):5.24873447015857
                      Encrypted:false
                      SSDEEP:12:iSsvYfYebvqBZFUt8BSI/+BSy5JfYebvqBaJ:uYfYebvyg8kJfYebvL
                      MD5:AAC2A872B5BA48105BD0B480614A2A20
                      SHA1:BC37A5095BDB8E5BA3BFA21EDACD9C37AF545CB9
                      SHA-256:23697A4AF305AE512A8CAFE91ED14AA1023EFD273A1323598658BF86F37E075A
                      SHA-512:7C1C926CB58F66068FC93399ABF6B5A4B07D60F09031FEC46E52FD3697B2845B908CA2D32ACDF046391CA19C5E3512386DF90949D87F358F5BCDD852133CD3CA
                      Malicious:false
                      Preview:2024/08/31-04:46:29.105 22b0 Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage/MANIFEST-000001.2024/08/31-04:46:29.106 22b0 Recovering log #3.2024/08/31-04:46:29.108 22b0 Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):326
                      Entropy (8bit):5.202456763514577
                      Encrypted:false
                      SSDEEP:6:i8MT+q2Pwkn23oH+TcwtpIFUt8B8MJvWZmw+B8MJqVkwOwkn23oH+Tcwta/WLJ:i8MT+vYfYebmFUt8B8MJvW/+B8MJqV5d
                      MD5:5884CC1FDC2B4425408A30400645B31D
                      SHA1:BF617FA64A34BD2D5F9DC1AC94FEC54A0C111EA4
                      SHA-256:8F6772FFAD8374B09E7D246122F414C1D1FABA3BB30ADAFCF63668FB33528D24
                      SHA-512:7F6374ED0FF6975B1DA5F8D14FDEE912A2D6C6F1FAB58B266B47C417A1924FF1051510C59503E0D8D94A6487F0C41F924C10E82BA1EFEC86D3CCA1A0DAB1F1BF
                      Malicious:false
                      Preview:2024/08/31-04:46:13.502 213c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB/MANIFEST-000001.2024/08/31-04:46:13.510 213c Recovering log #3.2024/08/31-04:46:13.510 213c Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):326
                      Entropy (8bit):5.202456763514577
                      Encrypted:false
                      SSDEEP:6:i8MT+q2Pwkn23oH+TcwtpIFUt8B8MJvWZmw+B8MJqVkwOwkn23oH+Tcwta/WLJ:i8MT+vYfYebmFUt8B8MJvW/+B8MJqV5d
                      MD5:5884CC1FDC2B4425408A30400645B31D
                      SHA1:BF617FA64A34BD2D5F9DC1AC94FEC54A0C111EA4
                      SHA-256:8F6772FFAD8374B09E7D246122F414C1D1FABA3BB30ADAFCF63668FB33528D24
                      SHA-512:7F6374ED0FF6975B1DA5F8D14FDEE912A2D6C6F1FAB58B266B47C417A1924FF1051510C59503E0D8D94A6487F0C41F924C10E82BA1EFEC86D3CCA1A0DAB1F1BF
                      Malicious:false
                      Preview:2024/08/31-04:46:13.502 213c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB/MANIFEST-000001.2024/08/31-04:46:13.510 213c Recovering log #3.2024/08/31-04:46:13.510 213c Reusing old log C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB/000003.log .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 7, 1st free page 5, free pages 2, cookie 0x5, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):28672
                      Entropy (8bit):0.26707851465859517
                      Encrypted:false
                      SSDEEP:12:TLPp5yN8h6MvDOH+FxOUwa5qVZ7Nkl25Pe2d:TLh8Gxk+6Uwc8NlYC
                      MD5:04F8B790DF73BD7CD01238F4681C3F44
                      SHA1:DF12D0A21935FC01B36A24BF72AB9640FEBB2077
                      SHA-256:96BD789329E46DD9D83002DC40676922A48A3601BF4B5D7376748B34ECE247A0
                      SHA-512:0DD492C371D310121F7FD57D29F8CE92AA2536A74923AC27F9C4C0C1580C849D7779348FC80410DEBB5EEE14F357EBDF33BF670D1E7B6CCDF15D69AC127AB7C3
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j..........g.......j.j................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 4, database pages 87, cookie 0x66, schema 4, UTF-8, version-valid-for 4
                      Category:dropped
                      Size (bytes):180224
                      Entropy (8bit):0.9237410161604507
                      Encrypted:false
                      SSDEEP:192:vyMUfTfnGCTjHbRJkkqtXaWTK+hGgH+6e7E:vyffrnzkkqtXnTK+hNH+5
                      MD5:C97C2FBAAEA45BB3C728D02689216CB2
                      SHA1:CA75AE4F32B49EA8EE1C3FDC4A6A6729460AE9F2
                      SHA-256:DB3E522850328F9150FF442E3680DF9F8A332B504ECECE26F4983D79C0D1482B
                      SHA-512:5CDF0D3D8069092E9656482D2F4BEAAAF0E58CA20B6066FE0EAB0C84EB60DBCF292EC5A6988F93A8077087FD80E887371EF67A443CCDC99CCFDBE42E708D938E
                      Malicious:false
                      Preview:SQLite format 3......@ .......W...........f......................................................j............O........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2568
                      Entropy (8bit):0.06569804787746028
                      Encrypted:false
                      SSDEEP:3:QDrlll2l/l1lhtlmDrn:Q3/4F3W3n
                      MD5:48071E7074D19B8803324F608170D754
                      SHA1:99ED819B1182B668A8024282DEAC4E901F10C051
                      SHA-256:4D66542983DD03C7B2523EFC35D4159A6DCA9F57A517360FE069A09E9BA5096C
                      SHA-512:E9FBD75D8D4E88C452EF0C392313F94F14AECF9DA27D77BC63A5BD9604C78F702413AD386E8B76E564997FEA855BB7BF189A3829CEA46B72D84AD9EE5522BD27
                      Malicious:false
                      Preview:..............&N...W....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with very long lines (3951), with CRLF line terminators
                      Category:dropped
                      Size (bytes):11755
                      Entropy (8bit):5.190465908239046
                      Encrypted:false
                      SSDEEP:192:hH4vrmqRBB4W4PoiUDNaxvR5FCHFcoaSbqGEDI:hH4vrmUB6W4jR3GaSbqGEDI
                      MD5:07301A857C41B5854E6F84CA00B81EA0
                      SHA1:7441FC1018508FF4F3DBAA139A21634C08ED979C
                      SHA-256:2343C541E095E1D5F202E8D2A0807113E69E1969AF8E15E3644C51DB0BF33FBF
                      SHA-512:00ADE38E9D2F07C64648202F1D5F18A2DFB2781C0517EAEBCD567D8A77DBB7CB40A58B7C7D4EC03336A63A20D2E11DD64448F020C6FF72F06CA870AA2B4765E0
                      Malicious:false
                      Preview:{.. "DefaultCohort": {.. "21f3388b-c2a5-4791-8f6e-a4cad6d17f4f.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.BingHomePage.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Covid.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Finance.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Jobs.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.KnowledgeCard.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Local.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.NTP3PCLICK.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.NotifySearchPage.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Recipe.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.SearchPage.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Sports.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Travel.Bubble": 1,.. "2354565a-f412-4654-b89c-f92eaa9dbd20.Weather.Bubble": 1,.. "2cb2db96-3bd0-403e-abe2-9269b3761041.Bubble": 1,.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3:L:L
                      MD5:5058F1AF8388633F609CADB75A75DC9D
                      SHA1:3A52CE780950D4D969792A2559CD519D7EE8C727
                      SHA-256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
                      SHA-512:0B61241D7C17BCBB1BAEE7094D14B7C451EFECC7FFCBD92598A0F13D313CC9EBC2A07E61F007BAF58FBF94FF9A8695BDD5CAE7CE03BBF1E94E93613A00F25F21
                      Malicious:false
                      Preview:.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):30210
                      Entropy (8bit):5.566408813662749
                      Encrypted:false
                      SSDEEP:768:UvcgvY7pLGLvy7WPDvfsC8F1+UoAYDCx9Tuqh0VfUC9xbog/OVAyVncJerwmxt27:UvcgvEcvy7WPDvfsCu1jaFyVcJ7zt5
                      MD5:8583E2CF38D194EC194C9D2C8645D664
                      SHA1:B178664963D5A2B83F8F6FA07D41CA5FE5679550
                      SHA-256:829A0E85E6C753481E9FC31E6FDC3A8510D2A97CF1A86360CBC503DDF7098C98
                      SHA-512:CB393B2553BFF7489362F46B9736FD60D66619C9562A06BCC4C4745926CC97526E4E0222A8FBDA80BCBAD157C053AC7A49856211F140B3DAE142FB73E5B6171A
                      Malicious:false
                      Preview:{"edge_fundamentals_appdefaults":{"ess_lightweight_version":101},"ess_kv_states":{"restore_on_startup":{"closed_notification":false,"decrypt_success":true,"key":"restore_on_startup","notification_popup_count":0},"startup_urls":{"closed_notification":false,"decrypt_success":true,"key":"startup_urls","notification_popup_count":0},"template_url_data":{"closed_notification":false,"decrypt_success":true,"key":"template_url_data","notification_popup_count":0}},"extensions":{"settings":{"ahfgeienlihckogmohjhadlkjgocpleb":{"active_permissions":{"api":["management","system.display","system.storage","webstorePrivate","system.cpu","system.memory","system.network"],"explicit_host":[],"manifest_permissions":[],"scriptable_host":[]},"app_launcher_ordinal":"t","commands":{},"content_settings":[],"creation_flags":1,"events":[],"first_install_time":"13369567572805802","from_webstore":false,"incognito_content_settings":[],"incognito_preferences":{},"last_update_time":"13369567572805802","location":5,"ma
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):16384
                      Entropy (8bit):0.35226517389931394
                      Encrypted:false
                      SSDEEP:12:TLC+waBg9LBgVDBgQjiZBgKuFtuQkMbmgcVAzO5kMCgGUg5OR:TLPdBgtBgJBgQjiZS53uQFE27MCgGZsR
                      MD5:D2CCDC36225684AAE8FA563AFEDB14E7
                      SHA1:3759649035F23004A4C30A14C5F0B54191BEBF80
                      SHA-256:080AEE864047C67CB1586A5BA5EDA007AFD18ECC2B702638287E386F159D7AEE
                      SHA-512:1A915AF643D688CA68AEDC1FF26C407D960D18DFDE838B417C437D7ADAC7B91C906E782DCC414784E64287915BD1DE5BB6A282E59AA9FEB8C384B4D4BC5F70EC
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.......Q......Q......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):32768
                      Entropy (8bit):0.017262956703125623
                      Encrypted:false
                      SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                      MD5:B7C14EC6110FA820CA6B65F5AEC85911
                      SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                      SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                      SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                      Malicious:false
                      Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):155
                      Entropy (8bit):4.304843117213832
                      Encrypted:false
                      SSDEEP:3:VVXntjQPEnjQz/l3seGKT9rcQ6xCyOtlTxotl:/XntM+il3sedhOvOu
                      MD5:D7C7C69F37127F01EEF68AF165DE9E1F
                      SHA1:0C90AB8FCA494A51525CE4FBEBDF2BD2973161F3
                      SHA-256:9A4AD4B6B7120E789F3C307A446052FEBD05ABCC2CD4FD6B755BF164CBB628CB
                      SHA-512:D57D5CBE8BA72D09395405CF5070C2FE1E97D4606A286F2F92ED05DC25800E512EAD020662108D7386F6CE9FAC667550AF40462DAF3E45930790B0CB563FAA4D
                      Malicious:false
                      Preview:A..r.................20_1_1...1.,U.................20_1_1...1I\".0................39_config..........6.....n ...1u}.=...............u}.=...............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):281
                      Entropy (8bit):5.256655165062507
                      Encrypted:false
                      SSDEEP:6:i8MXAR1wkn23oH+Tcwtfrl2KLlE8MwL+q2Pwkn23oH+TcwtfrK+IFUv:i8MQ0fYeb1L68Mw+vYfYeb23FUv
                      MD5:C8D60C17A5EC9230339AA9CF646914D8
                      SHA1:4485D3A9E82F29003137F88DFF5D53F1994B6525
                      SHA-256:1105D3CD526DFA1CBD173D4DCE6AB5DDF82FFE943D03F97184AE7E6E25A2BB8A
                      SHA-512:23ED822C5DF81228E2B8EF0704BD550E8F38ACC0DDF76F926ECA1D590FEC32F1336455C6788CFB53CC0AED4FBF239B6224A4996CB19BC4641BFF8CC718ACD54B
                      Malicious:false
                      Preview:2024/08/31-04:46:13.294 203c Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db since it was missing..2024/08/31-04:46:13.597 203c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):617
                      Entropy (8bit):3.9275169283101077
                      Encrypted:false
                      SSDEEP:12:G0nYUtTNVrPzl6/5/Xt21tzJ3PEWXZi+5uh/2Rdj0QWQ0:G0nYUtPrPJ6B/XMtzNP9i+4hORdZx0
                      MD5:A21ADD072F290BB8025555CE1EF9014C
                      SHA1:BC07D222EF610DCE637F72866D14D7560926EB5C
                      SHA-256:1D64B6F3EBA3FC479C8A8A34AB1D17D263E71AC35707450E323DA7E482E48195
                      SHA-512:164C693EE34EE72E4401DFF69B7E4CFE2BA100E7F3C8D2665B91BFC200011F808FEF9EB878656CE54478EF7F6B814EAD722C4EDC74F7300BA5E1B696F6CA1CCF
                      Malicious:false
                      Preview:.h.6.................__global... .t...................__global... .9..b.................33_..........................33_......ah0.................20_.....s/<..................19_........e.................18_......E...................37_.....`0M..................38_......Hf..................39_.......w<.................20_.........................20_..........................19_.....}....................18_......m=.................37_.....uTN..................38_.......h.................39_........I.................21_......j...................21_.....dz.|.................9_.....'\c..................9_.....
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):16
                      Entropy (8bit):3.2743974703476995
                      Encrypted:false
                      SSDEEP:3:1sjgWIV//Uv:1qIFUv
                      MD5:46295CAC801E5D4857D09837238A6394
                      SHA1:44E0FA1B517DBF802B18FAF0785EEEA6AC51594B
                      SHA-256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
                      SHA-512:8969402593F927350E2CEB4B5BC2A277F3754697C1961E3D6237DA322257FBAB42909E1A742E22223447F3A4805F8D8EF525432A7C3515A549E984D3EFF72B23
                      Malicious:false
                      Preview:MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):299
                      Entropy (8bit):5.199048964973614
                      Encrypted:false
                      SSDEEP:6:i8l1wkn23oH+Tcwtfrzs52KLlE8MVsWGjL+q2Pwkn23oH+TcwtfrzAdIFUv:i8YfYebs9L68MVsWi+vYfYeb9FUv
                      MD5:E234D18F7D8102A160A02C82E481DA60
                      SHA1:FB6698FABD529DDAB6951FB3F1D7DC4898728CB5
                      SHA-256:0B9A0776ED51C3BEE31663008A30A68524309AB2595AAA271F14EC76F52764C4
                      SHA-512:CF2AC906C573FDEF4CDC233DEBEF6D1632B0D5CC9B29E5A89677CFEFD67807E2F2FDBE906C53BA2F3E1B719F51B69E1BB9EAEB2DFC21A66BB0D45048CBE3AD79
                      Malicious:false
                      Preview:2024/08/31-04:46:12.956 203c Creating DB C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata since it was missing..2024/08/31-04:46:13.009 203c Reusing MANIFEST C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata/MANIFEST-000001.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:OpenPGP Secret Key
                      Category:dropped
                      Size (bytes):41
                      Entropy (8bit):4.704993772857998
                      Encrypted:false
                      SSDEEP:3:scoBAIxQRDKIVjn:scoBY7jn
                      MD5:5AF87DFD673BA2115E2FCF5CFDB727AB
                      SHA1:D5B5BBF396DC291274584EF71F444F420B6056F1
                      SHA-256:F9D31B278E215EB0D0E9CD709EDFA037E828F36214AB7906F612160FEAD4B2B4
                      SHA-512:DE34583A7DBAFE4DD0DC0601E8F6906B9BC6A00C56C9323561204F77ABBC0DC9007C480FFE4092FF2F194D54616CAF50AECBD4A1E9583CAE0C76AD6DD7C2375B
                      Malicious:false
                      Preview:.|.."....leveldb.BytewiseComparator......
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):8.280239615765425E-4
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):262512
                      Entropy (8bit):9.553120663130604E-4
                      Encrypted:false
                      SSDEEP:3:LsNlJ0y:Ls3
                      MD5:098E4CBFC1C69FA45459C43E52C0FFBF
                      SHA1:73420A4FC5E7E35B52EB6175F2377A6AA13441D5
                      SHA-256:58B8438F0EE5AADBE01BE67A0B480B79C8AA8B89FC3FB03259B268FC38AEE624
                      SHA-512:12EAFC637B2CCB72AF74BA19D79C5A4DC401C4D8A16428D093711D8EEE4D40694E88971FC4255A14A848A7819D7E463EAEA4B6E605717FCAD9AE562ED7DBF461
                      Malicious:false
                      Preview:........................................%9..../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):8.280239615765425E-4
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):262512
                      Entropy (8bit):9.553120663130604E-4
                      Encrypted:false
                      SSDEEP:3:LsNlrt:Ls3r
                      MD5:41DDCEA0FD4545427B86B9F35032A61D
                      SHA1:DED36E776A4B1EB36F5EEF5E2C7895966BFEFE7F
                      SHA-256:E671A44681F17518B095E62CFD4E71BDB859D2E7CA889F75BFF60A491B8BBECD
                      SHA-512:0D694C401CAF3FFEB5C5389E167743AD101105D2B10F0D64A167279D742F717B94D015936D9CA6FDF2B52A2998432E707C00CF1816C4C41AAAC0179BC494A2E8
                      Malicious:false
                      Preview:............................................../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):120
                      Entropy (8bit):3.32524464792714
                      Encrypted:false
                      SSDEEP:3:tbloIlrJFlXnpQoWcNylRjlgbYnPdJiG6R7lZAUAl:tbdlrYoWcV0n1IGi7kBl
                      MD5:A397E5983D4A1619E36143B4D804B870
                      SHA1:AA135A8CC2469CFD1EF2D7955F027D95BE5DFBD4
                      SHA-256:9C70F766D3B84FC2BB298EFA37CC9191F28BEC336329CC11468CFADBC3B137F4
                      SHA-512:4159EA654152D2810C95648694DD71957C84EA825FCCA87B36F7E3282A72B30EF741805C610C5FA847CA186E34BDE9C289AAA7B6931C5B257F1D11255CD2A816
                      Malicious:false
                      Preview:C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):13
                      Entropy (8bit):2.7192945256669794
                      Encrypted:false
                      SSDEEP:3:NYLFRQI:ap2I
                      MD5:BF16C04B916ACE92DB941EBB1AF3CB18
                      SHA1:FA8DAEAE881F91F61EE0EE21BE5156255429AA8A
                      SHA-256:7FC23C9028A316EC0AC25B09B5B0D61A1D21E58DFCF84C2A5F5B529129729098
                      SHA-512:F0B7DF5517596B38D57C57B5777E008D6229AB5B1841BBE74602C77EEA2252BF644B8650C7642BD466213F62E15CC7AB5A95B28E26D3907260ED1B96A74B65FB
                      Malicious:false
                      Preview:117.0.2045.47
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):6820
                      Entropy (8bit):5.790663807729309
                      Encrypted:false
                      SSDEEP:96:iaqkHf5t5ih/cI9URLl8RotoHMFVvlwhge4IbONIeTC6XQS0qGqk+Z4uj+rjEYVt:akhieiRU4hA6qRAq1k8SPxVLZ7VTiq
                      MD5:62E48070CEF8E54FCD37B70DA8130EFB
                      SHA1:84F43A3ECCFC417F4AF16BE6E0573269DF879EFE
                      SHA-256:000434B61AD6F74A7517665988A1FAC579AC4BF03BD6B104FD1D2C94ACB347E8
                      SHA-512:5F92509C5E12F4ADEBAE256C3E595E130C621F77894A1AA2125889F80792A2CECDCF3EBF07FA18333BBC0855B86BDEDF9736A14967AA41A5C776A7AC16022547
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false}},"fire_local_softlanding_notification":false,"fre":{"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration_on_os_version":"10 OS Version 2009 (Build 19045.2006)","last_edgeuwp_pin_migration_success":false},"os_crypt":{"audit_enabled":true,"encrypted_key":"RFBBUEkBAAAA0Iyd3wEV0RGMegDAT8KX6wEAAAD42vrFtLtXQqo4qdrU3HSHEAAAAB4AAABNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAAAAQZgAAAAEAACAAAACNhDceh741FGPkhA4LogNx5F7r9p6iLP54ndyaen6VIgAAAAA
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 2, database pages 5, cookie 0x2, schema 4, UTF-8, version-valid-for 2
                      Category:dropped
                      Size (bytes):20480
                      Entropy (8bit):0.46731661083066856
                      Encrypted:false
                      SSDEEP:12:TL1QAFUxOUDaabZXiDiIF8izX4fhhdWeci2oesJaYi3is25q0S9K0xHZ75fOV:TLiOUOq0afDdWec9sJf5Q7J5fc
                      MD5:E93ACF0820CA08E5A5D2D159729F70E3
                      SHA1:2C1A4D4924B9AEC1A796F108607404B000877C5D
                      SHA-256:F2267FDA7F45499F7A01186B75CEFB799F8D2BC97E2E9B5068952D477294302C
                      SHA-512:3BF36C20E04DCF1C16DC794E272F82F68B0DE43F16B4A9746B63B6D6BBC953B00BD7111CDA7AFE85CEBB2C447145483A382B15E2B0A5B36026C3441635D4E50C
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 512, next free block index 3284796609, field type 0
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.01057775872642915
                      Encrypted:false
                      SSDEEP:3:MsFl:/F
                      MD5:CF89D16BB9107C631DAABF0C0EE58EFB
                      SHA1:3AE5D3A7CF1F94A56E42F9A58D90A0B9616AE74B
                      SHA-256:D6A5FE39CD672781B256E0E3102F7022635F1D4BB7CFCC90A80FFFE4D0F3877E
                      SHA-512:8CB5B059C8105EB91E74A7D5952437AAA1ADA89763C5843E7B0F1B93D9EBE15ED40F287C652229291FAC02D712CF7FF5ECECEF276BA0D7DDC35558A3EC3F77B0
                      Malicious:false
                      Preview:............$...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):270336
                      Entropy (8bit):8.280239615765425E-4
                      Encrypted:false
                      SSDEEP:3:MsEllllkEthXllkl2:/M/xT02
                      MD5:D0D388F3865D0523E451D6BA0BE34CC4
                      SHA1:8571C6A52AACC2747C048E3419E5657B74612995
                      SHA-256:902F30C1FB0597D0734BC34B979EC5D131F8F39A4B71B338083821216EC8D61B
                      SHA-512:376011D00DE659EB6082A74E862CFAC97A9BB508E0B740761505142E2D24EC1C30AA61EFBC1C0DD08FF0F34734444DE7F77DD90A6CA42B48A4C7FAD5F0BDDD17
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.011852361981932763
                      Encrypted:false
                      SSDEEP:3:MsHlDll:/H
                      MD5:0962291D6D367570BEE5454721C17E11
                      SHA1:59D10A893EF321A706A9255176761366115BEDCB
                      SHA-256:EC1702806F4CC7C42A82FC2B38E89835FDE7C64BB32060E0823C9077CA92EFB7
                      SHA-512:F555E961B69E09628EAF9C61F465871E6984CD4D31014F954BB747351DAD9CEA6D17C1DB4BCA2C1EB7F187CB5F3C0518748C339C8B43BBD1DBD94AEAA16F58ED
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):8192
                      Entropy (8bit):0.012340643231932763
                      Encrypted:false
                      SSDEEP:3:MsGl3ll:/y
                      MD5:41876349CB12D6DB992F1309F22DF3F0
                      SHA1:5CF26B3420FC0302CD0A71E8D029739B8765BE27
                      SHA-256:E09F42C398D688DCE168570291F1F92D079987DEDA3099A34ADB9E8C0522B30C
                      SHA-512:E9A4FC1F7CB6AE2901F8E02354A92C4AAA7A53C640DCF692DB42A27A5ACC2A3BFB25A0DE0EB08AB53983132016E7D43132EA4292E439BB636AAFD53FB6EF907E
                      Malicious:false
                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:FoxPro FPT, blocks size 768, next free block index 3284796353, field type 0
                      Category:dropped
                      Size (bytes):262512
                      Entropy (8bit):9.553120663130604E-4
                      Encrypted:false
                      SSDEEP:3:LsNlZpl:Ls3Z
                      MD5:323065D11E004E60071C598979900414
                      SHA1:993BD7AF2AEF16279AE046879DAAFEBC5A4C092F
                      SHA-256:95CDF6E8BA84C898CFF0BEF4E6B699F2B37E1AFC831CD97CD09C7BED196FE0FB
                      SHA-512:8C9366D9D3BF275A37569CA104DA4B51FDB7C2BE5CA5385469E344946C2C60C3BB35AC0321C1E0155DC9CA3EAE533C285AE319BC23E4E945263864B511569501
                      Malicious:false
                      Preview:............................................../.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):29
                      Entropy (8bit):3.922828737239167
                      Encrypted:false
                      SSDEEP:3:2NGw+K+:fwZ+
                      MD5:7BAAFE811F480ACFCCCEE0D744355C79
                      SHA1:24B89AE82313084BB8BBEB9AD98A550F41DF7B27
                      SHA-256:D5743766AF0312C7B7728219FC24A03A4FB1C2A54A506F337953FBC2C1B847C7
                      SHA-512:70FE1C197AF507CC0D65E99807D245C896A40A4271BA1121F9B621980877B43019E584C48780951FC1AD2A5D7D146FC6EA4678139A5B38F9B6F7A5F1E2E86BA3
                      Malicious:false
                      Preview:customSynchronousLookupUris_0
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):35302
                      Entropy (8bit):7.99333285466604
                      Encrypted:true
                      SSDEEP:768:rRhaFePY38QBsj61g3g01LXoDGPpgb8KbMcnjrQCckBuJyqk3x8cBBT:rLP+TBK6ZQLXSsaMcnHQQcox80
                      MD5:0E06E28C3536360DE3486B1A9E5195E8
                      SHA1:EB768267F34EC16A6CCD1966DCA4C3C2870268AB
                      SHA-256:F2658B1C913A96E75B45E6ADB464C8D796B34AC43BAF1635AA32E16D1752971C
                      SHA-512:45F1E909599E2F63372867BC359CF72FD846619DFEB5359E52D5700E0B1BCFFE5FF07606511A3BFFDDD933A0507195439457E4E29A49EB6451F26186B7240041
                      Malicious:false
                      Preview:.......murmur3.....IN...9.......0..X..#l....C....]......pv..E..........,..?.N?....V..B-.*.F.1....g|..._.>'.-(V... .=.7P.m....#}.r.....>.LE...G.A.h5........J..=..L^-.Zl++,..h..o.y..~j.]u...W...&s.........M..........h3b..[.5.]..V^w.........a.*...6g3..%.gy../{|Z.B..X.}5.]..t.1.H&B.[.).$Y......2....L.t...{...[WE.yy.]..e.v0..\.J3..T.`1Lnh.../..-=w...W.&N7.nz.P...z......'i..R6....../....t.[..&-.....T&l..e....$.8.."....Iq....J.v..|.6.M...zE...a9uw..'.$6.L..m$......NB).JL.G.7}8(`....J.)b.E.m...c.0I.V...|$....;.k.......*8v..l.:..@.F.........K..2...%(...kA......LJd~._A.N.....$3...5....Z"...X=.....%.........6.k.....F..1..l,ia..i.i....y.M..Cl.....*...}.I..r..-+=b.6....%...#...W..K.....=.F....~.....[.......-...../;....~.09..d.....GR..H.lR...m.Huh9.:..A H./)..D.F..Y.n7.....7D.O.a;>Z.K....w...sq..qo3N...8@.zpD.Ku......+.Z=.zNFgP._@.z.ic.......3.....+..j...an%...X..7.q..A.l.7.S2..+....1.s.b..z...@v..!.y...N.C.XQ.p.\..x8(.<.....cq.(
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):18
                      Entropy (8bit):3.5724312513221195
                      Encrypted:false
                      SSDEEP:3:kDnaV6bVon:kDYa2
                      MD5:5692162977B015E31D5F35F50EFAB9CF
                      SHA1:705DC80E8B32AC8B68F7E13CF8A75DCCB251ED7D
                      SHA-256:42CCB5159B168DBE5D5DDF026E5F7ED3DBF50873CFE47C7C3EF0677BB07B90D4
                      SHA-512:32905A4CC5BCE0FE8502DDD32096F40106625218BEDC4E218A344225D6DF2595A7B70EEB3695DCEFDD894ECB2B66BED479654E8E07F02526648E07ACFE47838C
                      Malicious:false
                      Preview:edgeSettings_2.0-0
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):3581
                      Entropy (8bit):4.459693941095613
                      Encrypted:false
                      SSDEEP:96:JTMhnytNaSA4BOsNQNhnUZTFGKDIWHCgL5tfHaaJzRHF+P1sYmnfHUdT+GWBH7Y/:KyMot7vjFU
                      MD5:BDE38FAE28EC415384B8CFE052306D6C
                      SHA1:3019740AF622B58D573C00BF5C98DD77F3FBB5CD
                      SHA-256:1F4542614473AE103A5EE3DEEEC61D033A40271CFF891AAA6797534E4DBB4D20
                      SHA-512:9C369D69298EBF087412EDA782EE72AFE5448FD0D69EA5141C2744EA5F6C36CDF70A51845CDC174838BAC0ADABDFA70DF6AEDBF6E7867578AE7C4B7805A8B55E
                      Malicious:false
                      Preview:{"models":[],"geoidMaps":{"gw_my":"https://malaysia.smartscreen.microsoft.com/","gw_tw":"https://taiwan.smartscreen.microsoft.com/","gw_at":"https://austria.smartscreen.microsoft.com/","gw_es":"https://spain.smartscreen.microsoft.com/","gw_pl":"https://poland.smartscreen.microsoft.com/","gw_se":"https://sweden.smartscreen.microsoft.com/","gw_kr":"https://southkorea.smartscreen.microsoft.com/","gw_br":"https://brazil.smartscreen.microsoft.com/","au":"https://australia.smartscreen.microsoft.com/","dk":"https://denmark.smartscreen.microsoft.com/","gw_sg":"https://singapore.smartscreen.microsoft.com/","gw_fr":"https://france.smartscreen.microsoft.com/","gw_ca":"https://canada.smartscreen.microsoft.com/","test":"https://eu-9.smartscreen.microsoft.com/","gw_il":"https://israel.smartscreen.microsoft.com/","gw_au":"https://australia.smartscreen.microsoft.com/","gw_ffl4mod":"https://unitedstates4.ss.wd.microsoft.us/","gw_ffl4":"https://unitedstates1.ss.wd.microsoft.us/","gw_eu":"https://europe.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):47
                      Entropy (8bit):4.493433469104717
                      Encrypted:false
                      SSDEEP:3:kfKbQSQSuLA5:kyUc5
                      MD5:3F90757B200B52DCF5FDAC696EFD3D60
                      SHA1:569A2E1BED9ECCDF7CD03E270AEF2BD7FF9B0E77
                      SHA-256:1EE63F0A3502CFB7DF195FABBA41A7805008AB2CCCDAEB9AF990409D163D60C8
                      SHA-512:39252BBAA33130DF50F36178A8EAB1D09165666D8A229FBB3495DD01CBE964F87CD2E6FCD479DFCA36BE06309EF18FEDA7F14722C57545203BBA24972D4835C8
                      Malicious:false
                      Preview:synchronousLookupUris_636976985063396749.rel.v2
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):35302
                      Entropy (8bit):7.99333285466604
                      Encrypted:true
                      SSDEEP:768:rRhaFePY38QBsj61g3g01LXoDGPpgb8KbMcnjrQCckBuJyqk3x8cBBT:rLP+TBK6ZQLXSsaMcnHQQcox80
                      MD5:0E06E28C3536360DE3486B1A9E5195E8
                      SHA1:EB768267F34EC16A6CCD1966DCA4C3C2870268AB
                      SHA-256:F2658B1C913A96E75B45E6ADB464C8D796B34AC43BAF1635AA32E16D1752971C
                      SHA-512:45F1E909599E2F63372867BC359CF72FD846619DFEB5359E52D5700E0B1BCFFE5FF07606511A3BFFDDD933A0507195439457E4E29A49EB6451F26186B7240041
                      Malicious:false
                      Preview:.......murmur3.....IN...9.......0..X..#l....C....]......pv..E..........,..?.N?....V..B-.*.F.1....g|..._.>'.-(V... .=.7P.m....#}.r.....>.LE...G.A.h5........J..=..L^-.Zl++,..h..o.y..~j.]u...W...&s.........M..........h3b..[.5.]..V^w.........a.*...6g3..%.gy../{|Z.B..X.}5.]..t.1.H&B.[.).$Y......2....L.t...{...[WE.yy.]..e.v0..\.J3..T.`1Lnh.../..-=w...W.&N7.nz.P...z......'i..R6....../....t.[..&-.....T&l..e....$.8.."....Iq....J.v..|.6.M...zE...a9uw..'.$6.L..m$......NB).JL.G.7}8(`....J.)b.E.m...c.0I.V...|$....;.k.......*8v..l.:..@.F.........K..2...%(...kA......LJd~._A.N.....$3...5....Z"...X=.....%.........6.k.....F..1..l,ia..i.i....y.M..Cl.....*...}.I..r..-+=b.6....%...#...W..K.....=.F....~.....[.......-...../;....~.09..d.....GR..H.lR...m.Huh9.:..A H./)..D.F..Y.n7.....7D.O.a;>Z.K....w...sq..qo3N...8@.zpD.Ku......+.Z=.zNFgP._@.z.ic.......3.....+..j...an%...X..7.q..A.l.7.S2..+....1.s.b..z...@v..!.y...N.C.XQ.p.\..x8(.<.....cq.(
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):86
                      Entropy (8bit):4.389669793590032
                      Encrypted:false
                      SSDEEP:3:YQ3JYq9xSs0dMEJAELJ25AmIpozQOn:YQ3Kq9X0dMgAEiLIMn
                      MD5:03B6D5E81A4DC4D4E6C27BE1E932B9D9
                      SHA1:3C5EF0615314BDB136AB57C90359F1839BDD5C93
                      SHA-256:73B017F7C5ECD629AD41D14147D53F7D3D070C5967E1E571811A6DB39F06EACC
                      SHA-512:0037EB23CCDBDDE93CFEB7B9A223D59D0872D4EC7F5E3CA4F7767A7301E96E1AF1175980DC4F08531D5571AFB94DF789567588DEB2D6D611C57EE4CC05376547
                      Malicious:false
                      Preview:{"user_experience_metrics.stability.exited_cleanly":true,"variations_crash_streak":15}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):24701
                      Entropy (8bit):6.052218490120633
                      Encrypted:false
                      SSDEEP:768:EMGQ7FCYXGIgtDAWtJ4nbKYNzn0h02tdp:EMGQ5XMBGnNzgR
                      MD5:08EA37A184E927946F923597E1FF010E
                      SHA1:83933D97355B908A5D2311AA2BF7D6286A4A1AFE
                      SHA-256:4F79EDA9F7066DED7CCEFC1D15C7A13E17B10A2A3621F92DF9A4B547731A8AAE
                      SHA-512:0985F5A8F4E0F0BAAAC0700E1F79E96D17CF85F8D89C3E652C3F86194542DDC101DF26F5024B7A02D83A916E179443D1469AFF9672DFDE75A54A92B9AD18515F
                      Malicious:false
                      Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369567573522479","browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"domain_actions_config":"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
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):8333
                      Entropy (8bit):5.798149990237534
                      Encrypted:false
                      SSDEEP:192:fsNwhNeiRUIFQEkqY6qRAq1k8SPxVLZ7VTiB:fsNwrVafqY6q3QxVNZTiB
                      MD5:0BCCFD918E79BF62037ED5B57E48EC87
                      SHA1:4C59C5124F1CC0A819FA3DC3C496706D8151EB7C
                      SHA-256:07D1D01C1BCA5E28E5F0CA7CB091510331B1B8A464A9ECB3E60F4D5D1404EA64
                      SHA-512:856F7B6629BB7EE34DC0A17D75C94BA4ADA4BB718FD147F463FE6AD1CF42C8C0D026E0B02EF4B73FA1DBB1BBFAE47A9A33062808C9AEC2F0A61128457F6892AE
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fire_local_softlanding_notification":false,"fre":{"oem_bookmarks_set":true,"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):22003
                      Entropy (8bit):6.058563023670039
                      Encrypted:false
                      SSDEEP:384:0tMGQ7LBjuYXGIgtDAW5u0TDJ2q03XsNwObh6q3+Mh0lkdHd5qe:EMGQ7FCYXGIgtDAWtJ4n4h6qrh02tdp
                      MD5:CB7288603ABA14F11A1A0E9A34644400
                      SHA1:8020B95BA32C2357FECC3AA3CFA3695CD081B7F1
                      SHA-256:CFD5BE1DF12BD67E5C8D3BF085623D3F70F0C22A35BE89DE241C2AC56307D268
                      SHA-512:2AD848EFB06F90F8A29FBFB7D53CABE9FD3399516EA73C257A830DB6919380C831201D0F36FEA8801F4746B2FBD91390AAD66A12AC56EB128B492BB918CDB0BA
                      Malicious:false
                      Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369567573522479","browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"domain_actions_config":"H4sIAAAAAAAAAL1dWZPktpH+KxP9ZDtU6GMujfykHY9txVpHyHIoYh2ODhBEkWiCAAdHVbEc/u+bCVb1dE8RqEqOdh806mbzw8VEXshM/PuKb27vha2luF9LHqKT96KVoru3G+mcquXVN/++4sOgleBBWeOvvvnn4YGs7wcLz8erb65+HMKPMVx9dVXbnisDT4wMa612TNj+6j9fUSA+xFpZPyH/9dVVQig59Wx4L5+Cwzjg799ubt/jJP48zeE9TuHwDjYBc/Ew+Ktvbv/z1ZWoe+rsjB4/7Abr5U+ajz9LXo9Px+21Mk1hoo/oX6HHjTLyKTjYyMJmCbLnO/hZMpjFAjSvxOIhbxgi5FK85m+ZCkuQu7UyKoxLO97yIFoYvbAluiw2oRoYgIQ2nG2AqJY2U+koRXQbbMm3fMsEX9JMK3GLbeAvNjhrlo5GOJiTA/oXLTdG6qXtmMBDiyS59PvY7eCklyb4QcfFi7tpdwu3VBt1XNorvM4+RiU6+CjD0kb+pHz7rRm3rXSyzABnWdKBG+Ijlx7hEE4QTzo+AB6fnDLLJBpo7PKv8Ob367/KjUg8mcY6CmCjTJCmtsWFOcUf5vj04cw0e1yZe2WAl8svFn5IC43jfc+dLnGrEyDwAicHCxNdhlrVa5LEtTgt5u2lAK02pd1
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:modified
                      Size (bytes):9432
                      Entropy (8bit):5.83083270294433
                      Encrypted:false
                      SSDEEP:192:fsNwhNeiRUIh1dQ5T1jkqN96qRAq1k8SPxVLZ7VTiB:fsNwrV3u5hgqN96q3QxVNZTiB
                      MD5:8D048B18F1B7C49D27C841A4752A3D5E
                      SHA1:8EEB4037F05712AB1DE1EDDEDB222A6DA2B9CB34
                      SHA-256:EFDA69B5720126BC6A22A0CD4777504771345BD5E1DB94BAE575C2E59B8A7936
                      SHA-512:940CD4B9F0A693036D5430BE2D706134C2E64AB4CD42AC0945A7E5FF14C61480B46AE57B43928A028D6214CE339CAF1CB873B69DE13477FD30850261E4CC7315
                      Malicious:false
                      Preview:{"browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"dual_engine":{"ie_to_edge":{"redirection_mode":0}},"edge":{"perf_center":{"efficiency_mode_v2_is_active":false,"perf_game_mode":true,"performance_mode":3,"performance_mode_is_on":false,"performance_mode_main_toggle":false},"tab_stabs":{"closed_without_unfreeze_never_unfrozen":0,"closed_without_unfreeze_previously_unfrozen":0,"discard_without_unfreeze_never_unfrozen":0,"discard_without_unfreeze_previously_unfrozen":0},"tab_stats":{"frozen_daily":0,"unfrozen_daily":0}},"fire_local_softlanding_notification":false,"fre":{"oem_bookmarks_set":true,"soft_landing_bubble":{"bubble_response":0,"has_user_seen_bubble":true,"is_bubble_triggered":0}},"hardware_acceleration_mode_previous":true,"legacy":{"profile":{"name":{"migrated":true}}},"migration":{"last_edgeuwp_pin_migration_on_edge_version":"92.0.902.67","last_edgeuwp_pin_migration
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):59895
                      Entropy (8bit):6.080631487292075
                      Encrypted:false
                      SSDEEP:1536:EMGQ5XMBGvaf8dP0SSO7efy03FDnUNzER:EMrJM8ikdP0SH7h03GNzER
                      MD5:3CD59CF79F2C9F74F39055EF1DB32A6E
                      SHA1:F3A84FC3F722A8BEEB5AC4035F33D2A11B6F07A9
                      SHA-256:918CB2DB6CED9755E335C5756CF021C6EAE60505875057E86B3FEF084951B073
                      SHA-512:D09F7B7F9D74DE7F92A8314CAB18D872446853FE17B296C40F8280C438E1DC359D23DFB4662258AE9D9054BEC0BA8B2BF57C845B39EC869B3D6F0EB40374E310
                      Malicious:false
                      Preview:{"abusive_adblocker_etag":"\"5E25271B8190D943537AD3FDB50874FC133E8B4A00380E2A6A888D63386F728B\"","apps_count_check_time":"13369567573522479","browser":{"last_redirect_origin":""},"data_use_measurement":{"data_used":{"services":{"background":{},"foreground":{}},"user":{"background":{},"foreground":{}}}},"domain_actions_config":"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
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):2278
                      Entropy (8bit):3.8497486524103994
                      Encrypted:false
                      SSDEEP:48:uiTrlKxrgxsJxl9Il8ugQxIqa0olV3FI0IairXd1rc:mf9YD6qa041I0Bi0
                      MD5:39B3CFD1B1078B2905F3532D7AF638C4
                      SHA1:4C27465A4365D0AE27418DB66F251ED71C873E9C
                      SHA-256:86E046158916906BF07608548668DDD46BCF6894FACD93425EA8E68F1BD47C1F
                      SHA-512:96B04FB8EEE3262FC014B154FD34682576951E1722558C7CFA8BE75B0D5608537E6E12DE3D834E69565397E05F570FE618858E8DCF1D18F3502EF1B63FFD0250
                      Malicious:false
                      Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".W.i.p.w.W.M.+.N.H.l.b.C.D.m.s.Z.p.8.S.O.s.j.h.t.F.B.s.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".g.H.g.f.l.I.r.7.2.g.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.A.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.+.N.r.6.x.b.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):4622
                      Entropy (8bit):3.9918586587543254
                      Encrypted:false
                      SSDEEP:96:2YDRqqd9ip0XkexO6umAJQHveN6z0d98dG:2+qqSp0XpxO6AQHmMon2G
                      MD5:BC678AED17010C143098E72DAF4F843C
                      SHA1:41D9956AC65AA44DB0FA31FEB592D824F4710ECF
                      SHA-256:DFCBCB304F480D7925BE3CD4B886019E90471281B9A5329C17EB857BC88E557F
                      SHA-512:8E9E07718BBE9D8C1EF97376083328F232DCDE30AA5BFBBD499B1DB5A1E2D3564EB7C2CFFD1B9867642E8A9B1B650FF59E937DA202D761252364CD0583BAE720
                      Malicious:false
                      Preview:{.".T.B.D.a.t.a.S.t.o.r.e.O.b.j.e.c.t.".:.{.".H.e.a.d.e.r.".:.{.".O.b.j.e.c.t.T.y.p.e.".:.".T.o.k.e.n.R.e.s.p.o.n.s.e.".,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.a.j.o.r.".:.2.,.".S.c.h.e.m.a.V.e.r.s.i.o.n.M.i.n.o.r.".:.1.}.,.".O.b.j.e.c.t.D.a.t.a.".:.{.".S.y.s.t.e.m.D.e.f.i.n.e.d.P.r.o.p.e.r.t.i.e.s.".:.{.".R.e.q.u.e.s.t.I.n.d.e.x.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".z.3.U.T.q.T.b.3.7./.u.z.h.i.f.l.b.4.0.f.z.h.D.r.E.s.w.=.".}.,.".E.x.p.i.r.a.t.i.o.n.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.h.Q.c.e.o.L.7.2.g.E.=.".}.,.".S.t.a.t.u.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.f.a.l.s.e.,.".V.a.l.u.e.".:.".A.w.A.A.A.A.=.=.".}.,.".R.e.s.p.o.n.s.e.B.y.t.e.s.".:.{.".T.y.p.e.".:.".I.n.l.i.n.e.B.y.t.e.s.".,.".I.s.P.r.o.t.e.c.t.e.d.".:.t.r.u.e.,.".V.a.l.u.e.".:.".A.Q.A.A.A.N.C.M.n.d.8.B.F.d.E.R.j.H.o.A.w.E./.C.l.+.s.B.A.A.A.A.+.N.r.6.x.b.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:Google Chrome extension, version 3
                      Category:dropped
                      Size (bytes):11185
                      Entropy (8bit):7.951995436832936
                      Encrypted:false
                      SSDEEP:192:YEKh1jNlwQbamjq6Bcykrs3kAVg55GzVQM5F+XwsxNv7/lsoltBq0WG4ZeJTmrRb:fKT/BAzA05Gn5F+XV7NNltrWG4kJTm1b
                      MD5:78E47DDA17341BED7BE45DCCFD89AC87
                      SHA1:1AFDE30E46997452D11E4A2ADBBF35CCE7A1404F
                      SHA-256:67D161098BE68CD24FEBC0C7B48F515F199DDA72F20AE3BBB97FCF2542BB0550
                      SHA-512:9574A66D3756540479DC955C4057144283E09CAE11CE11EBCE801053BB48E536E67DC823B91895A9E3EE8D3CB27C065D5E9030C39A26CBF3F201348385B418A5
                      Malicious:false
                      Preview:Cr24..............0.."0...*.H.............0.........N.......E#......9e.u.q...VYY..@.+.C..k.O..bK.`..6.G..%.....3Z...e _.6....F..1p..K.Z......./ .3...OT..`..0...Y...FT..43.th.y...}....p.L...2S.&i.`..o...f.oH.....N..:..ijT.3.F{.0.,.f?'f.CQt;b_"Pc.. ..~S.I.c.8Z.;.....{G.a......k...>.`.o..%.$>;.....g.............jg?.R..@.:..........&..{...x@.Py..;kT....%F".S..w...N....9...A..@X.t!i.@..1;......1E..X.....[.~$....J......;=T.;)k..Y...$......S......M.P..P..>..=..u.....2p...w.9..1qw.a\A..Vj .C.....A..Cf1.r6.A...L. _m...[..l.Wr_../.. .B..9!.!+..ZG.K.......0.."0...*.H.............0.........^SUd%Q.L].......Cl2o...\[.....'*...;R=....N.C5....d. .....J.C>u.kr..Y..syJC.XS.q..E.n?....(G.5..)2.G..!.M.SS.{..U....!.EE..M[.#qs.A.1...g)nQ.c..G....Bd..7... .O.BI..KXQ..4.d.K.0......g.....-p....Z.E{...M&.~n.TE7..{0....5.#.C+3.y)pd9.e.........@..3.9..B.....I....2nX........2.?.~..S....]G.N.....Lr.O.Ve....9..D1.G..W)...P.?=.#..7.R.lz..a.wX.e..h.h.~....v..RP.@X....d.G
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:Google Chrome extension, version 3
                      Category:dropped
                      Size (bytes):135751
                      Entropy (8bit):7.804610863392373
                      Encrypted:false
                      SSDEEP:1536:h+OX7O5AeBWdSq2Zso2iDNjF3dNUPOTy61NVo8OJXhQXXUWFMOiiBIHWI7YyjM/8:pVdSj9hjVn6Oj5fOJR+k0iiW2IPMaIul
                      MD5:83EF25FBEE6866A64F09323BFE1536E0
                      SHA1:24E8BD033CD15E3CF4F4FF4C8123E1868544AC65
                      SHA-256:F421D74829F2923FD9E5A06153E4E42DB011824C33475E564B17091598996E6F
                      SHA-512:C699D1C9649977731EEA0CB4740C4BEAACEEC82AECC43F9F2B1E5625C487C0BC45FA08A1152A35EFBDB3DB73B8AF3625206315D1F9645A24E1969316F9F5B38C
                      Malicious:false
                      Preview:Cr24..............0.."0...*.H.............0.........^...1"...w.g..t..2J.G1.)X4..=&.?[j,Lz..j.u.e[I.q*Ba/X...P.h..L.....2%3_o.......H.)'.=.e...?.......j..3UH.|.X.M..u..s[.*..?$....F%....I....)..,-./.e5).f..O.q.^........9..(.._.ph2..^.YBPXf_8....h[.v...S.*1`.#..5.SF.:f-.#.65.i..b.]9...y2.'....k[..........1...c@e.J.~..A...(9=...I.N.e..T......6.7..*.Kk?....]<.S(.....9}........$..6...:...9..b|B..8..I..7.8K\.KIn7.:.!^;.H........8.....,.\....b..uC...e?..E.U.........P..G..u!+......C.)Kw...............4..Qye..=$..Q.......?Oi.,O.RW6.k.+.&. .wu..tf....[0Y0...*.H.=....*.H.=....B..............r...2..+Y.I...k..bR.j5Sl..8.......H"i.-l..`.Q.{...G0E. ..r.....p..~..3.1.vD.i.]...~...!...<..4KV.~y.).`........>E.NT.%1".%............o.....J._.H.B..w..C......UU.&C..fB&..|..i..J......I.??^.Z.....Y....0^......?...o.....O.~......W.....~.......R..z.Ma...u]..*..-.n....2s<....E..6.<..W.H.qh....:j.y...N.D.]Nj....../..a...{....g.....f).~._....1q..L..#.G...Q.w...J."
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3:L:L
                      MD5:5058F1AF8388633F609CADB75A75DC9D
                      SHA1:3A52CE780950D4D969792A2559CD519D7EE8C727
                      SHA-256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
                      SHA-512:0B61241D7C17BCBB1BAEE7094D14B7C451EFECC7FFCBD92598A0F13D313CC9EBC2A07E61F007BAF58FBF94FF9A8695BDD5CAE7CE03BBF1E94E93613A00F25F21
                      Malicious:false
                      Preview:.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:very short file (no magic)
                      Category:dropped
                      Size (bytes):1
                      Entropy (8bit):0.0
                      Encrypted:false
                      SSDEEP:3:L:L
                      MD5:5058F1AF8388633F609CADB75A75DC9D
                      SHA1:3A52CE780950D4D969792A2559CD519D7EE8C727
                      SHA-256:CDB4EE2AEA69CC6A83331BBE96DC2CAA9A299D21329EFB0336FC02A82E1839A8
                      SHA-512:0B61241D7C17BCBB1BAEE7094D14B7C451EFECC7FFCBD92598A0F13D313CC9EBC2A07E61F007BAF58FBF94FF9A8695BDD5CAE7CE03BBF1E94E93613A00F25F21
                      Malicious:false
                      Preview:.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):22465
                      Entropy (8bit):7.792434406814338
                      Encrypted:false
                      SSDEEP:384:Vt71+czeWhU6yVS2Ddc0fp/9yYoIJgWUeJuDzeG0LOsr2h9ltQYX9hVPz/HG1pBu:j4sBwVPDdFhVyYoPWUiuXeG0K5dQYXFr
                      MD5:D246E8DC614619AD838C649E09969503
                      SHA1:70B7CF937136E17D8CF325B7212F58CBA5975B53
                      SHA-256:9DD9FBA7C78050B841643E8D12E58BA9CCA9084C98039F1EBFF13245655652E1
                      SHA-512:736933316EE05520E7839DB46DA466EF94E5624BA61B414452B818B47D18DCD80D3404B750269DA04912DDE8F23118F6DFC9752C7BDF1AFC5E07016D9C055FDB
                      Malicious:false
                      Preview:..{"Version":0,"ContentType":"CRLSet","Sequence":172,"DeltaFrom":0,"NumParents":202,"BlockedSPKIs":["Jdoa1Yu/z7In2HI7GFfUwY57qnQXtPnv+TZrXoafizk=","j1kfeqTcPv6UkMOKRpLJAR7RKPHeWVVpQG13tvofa0w=","BN3pqpp59hSYaCMl+ghwJ2cH+5ypU4QSC0aJMmhJT8k=","DEPqi83p/DvKFlZkrIIVVn40idU5OgyB4aeRQZkuGVM=","eBpM8ukkUvPuAdDDgaQhTzkEFlw5CtvWH80RJE4Jstw=","/NdsyiNH5c1bOTR/Uc9DZUtpor/JBzZwpr5H2HAebg4=","wO0gU0a7veButWD1zuAqNjTiR0p+ds+PvvVjuxF90OM=","fNKVt1VEgIq9lAlGbwg3xarcAuM7YVDGZE3goJZZ8jw=","lo26afv/Fb83YgiUMa3lp+rUt+rxvnACaBC8V9HGT24=","0x7DkoW3pTGdAVfbQg7YfHQ+Mzu8d/h3H3BGT0NqYEk=","h7/Yr6OvW0KdCamqVO5hNk9a4REx5Dj8QQlTQ80WsTU=","li5LVLuYp+5dX+uWM/mR08MwDpUU2t57DU+CjHlPjoc=","6EnHF2yT32X2S2FpgjZuVmMReBK2+ivAyPqK6u5Bgcw=","oM9T9CJlHjkxeuMa9kV3vkUPo3biie2DQrf8EzxpdBk=","r1kVGOLmxg67/AkHr6pJvEBR1F5/IUq/7nUS7gD2Ye0=","LcTLWR9+8GY0QWRrz1wOnbze13ygKUUZPO/G7bF0BhQ=","TNsGDzz+TD0/XjHDAP1oqR4NHl9Gtk5IlfIOG1z4Jp8=","qbVam1Uxu/fHGh5JIO/nlsK2eWj1Wmzly2IXLtmUW8o=","NuqWEoyJg5+2IfitDh7gucIgb2Kre02ixnZYk8m3ztI=","nFmjzK
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):66
                      Entropy (8bit):3.782311074154073
                      Encrypted:false
                      SSDEEP:3:SRA7thSVkCh8Wh5mthARdZ:SWn1i8Waa
                      MD5:33FC4BF1927352BC1845ACDDE3A6BA63
                      SHA1:63AC2F004AC10198E729E9CCF55F6AC4F7F3C622
                      SHA-256:4ED04E713C9D8F5D80E83645B62F1BE84EC0516D37F339B3D443D8F792DEA113
                      SHA-512:7E38E264713750BAF58DD9AD779885A7AAE5A6FCB825EAA44B3CF814DD09CD0BF8F95B5AB5DB600D19A64B02EC2155B4C9A3BC2A86E9B18EECE8B3100E8C2FF1
                      Malicious:false
                      Preview:1.44C48B9ECD87ACDDD850F9AA5E1C9D48B7A398DEC13D376CD62D55DADBD464A5
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):113
                      Entropy (8bit):4.605066571713889
                      Encrypted:false
                      SSDEEP:3:3FFhAWAUNXxAujmZ2+mvbhifFXAuArmvD2S3zsFXMdgSFv:3FFWe9TK37ArdS34Ma+
                      MD5:B6911958067E8D96526537FAED1BB9EF
                      SHA1:A47B5BE4FE5BC13948F891D8F92917E3A11EBB6E
                      SHA-256:341B28D49C6B736574539180DD6DE17C20831995FE29E7BC986449FBC5CAA648
                      SHA-512:62802F6F6481ACB8B99A21631365C50A58EAF8FFDF7D9287D492A7B815C837D6A6377342E24350805FB8A01B7E67816C333EC98DCD16854894AEB7271EA39062
                      Malicious:false
                      Preview:{.. "description": "Microsoft CRLSet",.. "name": "MicrosoftCRLSet",.. "version": "6498.2023.8.1"..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):66
                      Entropy (8bit):3.87107305218322
                      Encrypted:false
                      SSDEEP:3:SddQLtQSnUunhU1mWrO2V:S/QZHThyay
                      MD5:0C9218609241DBAA26EBA66D5AAF08AB
                      SHA1:31F1437C07241E5F075268212C11A566CEB514EC
                      SHA-256:52493422AC4C18918DC91EF5C4D0E50C130EA3AA99915FA542B890A79EA94F2B
                      SHA-512:5D25A1FB8D9E902647673975F13D7CA11E1F00F3C19449973D6B466D333198768E777B8CAE5BECEF5C66C9A0C0EF320A65116B5070C66E3B9844461BB0FFA47F
                      Malicious:false
                      Preview:1.8BFD50D350D47445B57BB1D61BBDE41CEDA7AC43DC81FCE95BF1AC646D97D2A0
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):134
                      Entropy (8bit):4.405914533496662
                      Encrypted:false
                      SSDEEP:3:3FFhAWAUNhRKpEbXKS2XAXMWxQHJCzhiFfASvAcWxQHJCr2SkhSA:3FFWeRl2QIpCU4SvrpCSSkhSA
                      MD5:58D3CA1189DF439D0538A75912496BCF
                      SHA1:99AF5B6A006A6929CC08744D1B54E3623FEC2F36
                      SHA-256:A946DB31A6A985BDB64EA9F403294B479571CA3C22215742BDC26EA1CF123437
                      SHA-512:AFD7F140E89472D4827156EC1C48DA488B0D06DAAA737351C7BEC6BC12EDFC4443460C4AC169287350934CA66FB2F883347ED8084C62CAF9F883A736243194A2
                      Malicious:false
                      Preview:{.. "description" : "AutoLaunch Protocols Preregistration",.. "name" : "Protocol Preregistration",.. "version" : "1.0.0.8"..}
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):3164
                      Entropy (8bit):4.532278538438865
                      Encrypted:false
                      SSDEEP:48:O//uidcRcrcNc0cTc8cs+PcrcNc0cTc8csLcrcNc0cTc8cstcrcNc0cTc8csH:O//uWJ2UH
                      MD5:6BBB18BB210B0AF189F5D76A65F7AD80
                      SHA1:87B804075E78AF64293611A637504273FADFE718
                      SHA-256:01594D510A1BBC016897EC89402553ECA423DFDC8B82BAFBC5653BF0C976F57C
                      SHA-512:4788EDCFA3911C3BB2BE8FC447166C330E8AC389F74E8C44E13238EAD2FA45C8538AEE325BD0D1CC40D91AD47DEA1AA94A92148A62983144FDECFF2130EE120D
                      Malicious:false
                      Preview:{.. "allow": [.. {.. "origins": [.. "https://.get.microsoft.com",.. "https://.apps.microsoft.com".. ],.. "protocol": "ms-windows-store".. },.. {.. "origins": [.. "https://.onedrive.com",.. "https://.onedrive.live.com",.. "https://sharepoint.com".. ],.. "protocol": "ms-word".. },.. {.. "origins": [.. "https://[a-z1-9-]*word-edit.officeapps.live.com",.. "https://[a-z1-9-]*word-view.officeapps.live.com",.. "https://[a-z1-9-]*onenote.officeapps.live.com",.. "https://[a-z1-9-]*eap.officeapps.live.com",.. "https://[a-z1-9-]*shared.officeapps.live.com",.. "https://[a-z1-9-]*afhs.officeapps.live.com",.. "https://[a-z1-9-]*vhs.officeapps.live.com",.. "https://[a-z1-9-]*optin.online.office.com".. ],.. "use_regex": true,.. "protocol": "ms-word".. },.. {.. "origins": [.. "https://.onedrive.com",.. "https://.onedrive.li
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):476
                      Entropy (8bit):5.365330188154901
                      Encrypted:false
                      SSDEEP:12:YpjMgL0Dkv/Pj2VekH/J56s/Pj2Va2Rc+v0Dkv/Pj2V1Dx56s/C:YpYE08SeW5xS8+v08S1V5M
                      MD5:AE403C49F2D2EDBDEA991DB12DBA776A
                      SHA1:074388CAAFF58F6A40906863BECBE0414092D79B
                      SHA-256:666194F55EACDB772AECAC171E02BF19F6B5B075E25071CB4C9CCC1C504262DF
                      SHA-512:D756ECD510E3D84F435B06B6BB4EEB9D49814A63F56528629B35B35F986F785BBC7A9C95AB5133F57A87FC6063EB14928307041F608684E7BD1F73839DC3E72C
                      Malicious:false
                      Preview:{"logTime": "0831/084559", "correlationVector":"BC55F0FDCEB148DCA94334CF30A5094F","action":"FETCH_UX_CONFIG", "result":""}.{"logTime": "0831/084614", "correlationVector":"6ZiiF0kSfWkPKkuwHsnVcs","action":"EXTENSION_UPDATER", "result":""}.{"logTime": "0831/084614", "correlationVector":"796BEE82006D419C9E4B950BA402E81C","action":"FETCH_UX_CONFIG", "result":""}.{"logTime": "0831/084614", "correlationVector":"Ubn9SXqUJ1SYulYQTz7C+9","action":"EXTENSION_UPDATER", "result":""}.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:Google Chrome extension, version 3
                      Category:dropped
                      Size (bytes):11185
                      Entropy (8bit):7.951995436832936
                      Encrypted:false
                      SSDEEP:192:YEKh1jNlwQbamjq6Bcykrs3kAVg55GzVQM5F+XwsxNv7/lsoltBq0WG4ZeJTmrRb:fKT/BAzA05Gn5F+XV7NNltrWG4kJTm1b
                      MD5:78E47DDA17341BED7BE45DCCFD89AC87
                      SHA1:1AFDE30E46997452D11E4A2ADBBF35CCE7A1404F
                      SHA-256:67D161098BE68CD24FEBC0C7B48F515F199DDA72F20AE3BBB97FCF2542BB0550
                      SHA-512:9574A66D3756540479DC955C4057144283E09CAE11CE11EBCE801053BB48E536E67DC823B91895A9E3EE8D3CB27C065D5E9030C39A26CBF3F201348385B418A5
                      Malicious:false
                      Preview:Cr24..............0.."0...*.H.............0.........N.......E#......9e.u.q...VYY..@.+.C..k.O..bK.`..6.G..%.....3Z...e _.6....F..1p..K.Z......./ .3...OT..`..0...Y...FT..43.th.y...}....p.L...2S.&i.`..o...f.oH.....N..:..ijT.3.F{.0.,.f?'f.CQt;b_"Pc.. ..~S.I.c.8Z.;.....{G.a......k...>.`.o..%.$>;.....g.............jg?.R..@.:..........&..{...x@.Py..;kT....%F".S..w...N....9...A..@X.t!i.@..1;......1E..X.....[.~$....J......;=T.;)k..Y...$......S......M.P..P..>..=..u.....2p...w.9..1qw.a\A..Vj .C.....A..Cf1.r6.A...L. _m...[..l.Wr_../.. .B..9!.!+..ZG.K.......0.."0...*.H.............0.........^SUd%Q.L].......Cl2o...\[.....'*...;R=....N.C5....d. .....J.C>u.kr..Y..syJC.XS.q..E.n?....(G.5..)2.G..!.M.SS.{..U....!.EE..M[.#qs.A.1...g)nQ.c..G....Bd..7... .O.BI..KXQ..4.d.K.0......g.....-p....Z.E{...M&.~n.TE7..{0....5.#.C+3.y)pd9.e.........@..3.9..B.....I....2nX........2.?.~..S....]G.N.....Lr.O.Ve....9..D1.G..W)...P.?=.#..7.R.lz..a.wX.e..h.h.~....v..RP.@X....d.G
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1753
                      Entropy (8bit):5.8889033066924155
                      Encrypted:false
                      SSDEEP:48:Pxpr7Xka2NXDpfsBJODI19Kg1JqcJW9O//JE3ZBDcpu/x:L3XgNSz9/4kIO3u3Xgpq
                      MD5:738E757B92939B24CDBBD0EFC2601315
                      SHA1:77058CBAFA625AAFBEA867052136C11AD3332143
                      SHA-256:D23B2BA94BA22BBB681E6362AE5870ACD8A3280FA9E7241B86A9E12982968947
                      SHA-512:DCA3E12DD5A9F1802DB6D11B009FCE2B787E79B9F730094367C9F26D1D87AF1EA072FF5B10888648FB1231DD83475CF45594BB0C9915B655EE363A3127A5FFC2
                      Malicious:false
                      Preview:[.. {.. "description": "treehash per file",.. "signed_content": {.. "payload": "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",.. "signatures": [.. {.. "header": {.. "kid": "publisher".. },.. "protected": "eyJhbGciOiJSUzI1NiJ9",.. "signature": "UglEEilkOml5P1W0X6wc-_dB87PQB73uMir11923av57zPKujb4IUe_lbGpn7cRZsy6x-8i9eEKxAW7L2TSmYqrcp4XtiON6ppcf27FWACXOUJDax9wlMr-EOtyZhykCnB9vR
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:Unicode text, UTF-8 text, with very long lines (8031), with no line terminators
                      Category:dropped
                      Size (bytes):9815
                      Entropy (8bit):6.1716321262973315
                      Encrypted:false
                      SSDEEP:192:+ThBV4L3npstQp6VRtROQGZ0UyVg4jq4HWeGBnUi65Ep4HdlyKyjFN3zEScQZBMX:+ThBVq3npozftROQIyVfjRZGB365Ey97
                      MD5:3D20584F7F6C8EAC79E17CCA4207FB79
                      SHA1:3C16DCC27AE52431C8CDD92FBAAB0341524D3092
                      SHA-256:0D40A5153CB66B5BDE64906CA3AE750494098F68AD0B4D091256939EEA243643
                      SHA-512:315D1B4CC2E70C72D7EB7D51E0F304F6E64AC13AE301FD2E46D585243A6C936B2AD35A0964745D291AE9B317C316A29760B9B9782C88CC6A68599DB531F87D59
                      Malicious:false
                      Preview:(()=>{"use strict";var e={1:(e,o)=>{Object.defineProperty(o,"__esModule",{value:!0}),o.newCwsPromotionalButtonCta=o.chromeToEdgeCwsButtonCtaMapping=void 0,o.chromeToEdgeCwsButtonCtaMapping={"...... ... Chrome":"...... ....","........ .. Chrome":".....",........:"..........",".......... .. Chrome":"..........","Chrome . .....":"...","Chrome .... ....":"....","Afegeix a Chrome":"Obt.n","Suprimeix de Chrome":"Suprimeix","P.idat do Chromu":"Z.skat","Odstranit z Chromu":"Odebrat","F.j til Chrome":"F.","Fjern fra Chrome":"Fjerne",Hinzuf.gen:"Abrufen","Aus Chrome entfernen":"Entfernen","Add to Chrome":"Get","Remove from Chrome":"Remove","A.adir a Chrome":"Obtener",Desinstalar:"Quitar","Agregar a Chrome":"Obtener","Eliminar de Chrome":"Quitar","Lisa Chrome'i":"Hangi","Chrome'ist eemaldamine":"Eemalda",.......H:"........","......... ... .. Chr
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:Unicode text, UTF-8 text, with very long lines (8604), with no line terminators
                      Category:dropped
                      Size (bytes):10388
                      Entropy (8bit):6.174387413738973
                      Encrypted:false
                      SSDEEP:192:+ThBV4L3npstQp6VRtROQGZ0UyVg4jq4HWeGBnUi65Ep4HdlyKyjFN3EbmE1F4fn:+ThBVq3npozftROQIyVfjRZGB365Ey9+
                      MD5:3DE1E7D989C232FC1B58F4E32DE15D64
                      SHA1:42B152EA7E7F31A964914F344543B8BF14B5F558
                      SHA-256:D4AA4602A1590A4B8A1BCE8B8D670264C9FB532ADC97A72BC10C43343650385A
                      SHA-512:177E5BDF3A1149B0229B6297BAF7B122602F7BD753F96AA41CCF2D15B2BCF6AF368A39BB20336CCCE121645EC097F6BEDB94666C74ACB6174EB728FBFC43BC2A
                      Malicious:false
                      Preview:(()=>{"use strict";var e={1:(e,o)=>{Object.defineProperty(o,"__esModule",{value:!0}),o.newCwsPromotionalButtonCta=o.chromeToEdgeCwsButtonCtaMapping=void 0,o.chromeToEdgeCwsButtonCtaMapping={"...... ... Chrome":"...... ....","........ .. Chrome":".....",........:"..........",".......... .. Chrome":"..........","Chrome . .....":"...","Chrome .... ....":"....","Afegeix a Chrome":"Obt.n","Suprimeix de Chrome":"Suprimeix","P.idat do Chromu":"Z.skat","Odstranit z Chromu":"Odebrat","F.j til Chrome":"F.","Fjern fra Chrome":"Fjerne",Hinzuf.gen:"Abrufen","Aus Chrome entfernen":"Entfernen","Add to Chrome":"Get","Remove from Chrome":"Remove","A.adir a Chrome":"Obtener",Desinstalar:"Quitar","Agregar a Chrome":"Obtener","Eliminar de Chrome":"Quitar","Lisa Chrome'i":"Hangi","Chrome'ist eemaldamine":"Eemalda",.......H:"........","......... ... .. Chr
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):962
                      Entropy (8bit):5.698567446030411
                      Encrypted:false
                      SSDEEP:24:1Hg9+D3DRnbuF2+sUrzUu+Y9VwE+Fg41T1O:NBqY+6E+F7JO
                      MD5:E805E9E69FD6ECDCA65136957B1FB3BE
                      SHA1:2356F60884130C86A45D4B232A26062C7830E622
                      SHA-256:5694C91F7D165C6F25DAF0825C18B373B0A81EA122C89DA60438CD487455FD6A
                      SHA-512:049662EF470D2B9E030A06006894041AE6F787449E4AB1FBF4959ADCB88C6BB87A957490212697815BB3627763C01B7B243CF4E3C4620173A95795884D998A75
                      Malicious:false
                      Preview:{.. "content_scripts": [ {.. "js": [ "content.js" ],.. "matches": [ "https://chrome.google.com/webstore/*" ].. }, {.. "js": [ "content_new.js" ],.. "matches": [ "https://chromewebstore.google.com/*" ].. } ],.. "description": "Edge relevant text changes on select websites to improve user experience and precisely surfaces the action they want to take.",.. "key": "MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAu06p2Mjoy6yJDUUjCe8Hnqvtmjll73XqcbylxFZZWe+MCEAEK+1D0Nxrp0+IuWJL02CU3jbuR5KrJYoezA36M1oSGY5lIF/9NhXWEx5GrosxcBjxqEsdWv/eDoOOEbIvIO0ziMv7T1SUnmAA07wwq8DXWYuwlkZU/PA0Mxx0aNZ5+QyMfYqRmMpwxkwPG8gyU7kmacxgCY1v7PmmZo1vSIEOBYrxl064w5Q6s/dpalSJM9qeRnvRMLsszGY/J2bjQ1F0O2JfIlBjCOUg/89+U8ZJ1mObOFrKO4um8QnenXtH0WGmsvb5qBNrvbWNPuFgr2+w5JYlpSQ+O8zUCb8QZwIDAQAB",.. "manifest_version": 3,.. "name": "Edge relevant text changes",.. "update_url": "https://edge.microsoft.com/extensionwebstorebase/v1/crx",.. "version": "1.2.1"..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:Google Chrome extension, version 3
                      Category:dropped
                      Size (bytes):135751
                      Entropy (8bit):7.804610863392373
                      Encrypted:false
                      SSDEEP:1536:h+OX7O5AeBWdSq2Zso2iDNjF3dNUPOTy61NVo8OJXhQXXUWFMOiiBIHWI7YyjM/8:pVdSj9hjVn6Oj5fOJR+k0iiW2IPMaIul
                      MD5:83EF25FBEE6866A64F09323BFE1536E0
                      SHA1:24E8BD033CD15E3CF4F4FF4C8123E1868544AC65
                      SHA-256:F421D74829F2923FD9E5A06153E4E42DB011824C33475E564B17091598996E6F
                      SHA-512:C699D1C9649977731EEA0CB4740C4BEAACEEC82AECC43F9F2B1E5625C487C0BC45FA08A1152A35EFBDB3DB73B8AF3625206315D1F9645A24E1969316F9F5B38C
                      Malicious:false
                      Preview:Cr24..............0.."0...*.H.............0.........^...1"...w.g..t..2J.G1.)X4..=&.?[j,Lz..j.u.e[I.q*Ba/X...P.h..L.....2%3_o.......H.)'.=.e...?.......j..3UH.|.X.M..u..s[.*..?$....F%....I....)..,-./.e5).f..O.q.^........9..(.._.ph2..^.YBPXf_8....h[.v...S.*1`.#..5.SF.:f-.#.65.i..b.]9...y2.'....k[..........1...c@e.J.~..A...(9=...I.N.e..T......6.7..*.Kk?....]<.S(.....9}........$..6...:...9..b|B..8..I..7.8K\.KIn7.:.!^;.H........8.....,.\....b..uC...e?..E.U.........P..G..u!+......C.)Kw...............4..Qye..=$..Q.......?Oi.,O.RW6.k.+.&. .wu..tf....[0Y0...*.H.=....*.H.=....B..............r...2..+Y.I...k..bR.j5Sl..8.......H"i.-l..`.Q.{...G0E. ..r.....p..~..3.1.vD.i.]...~...!...<..4KV.~y.).`........>E.NT.%1".%............o.....J._.H.B..w..C......UU.&C..fB&..|..i..J......I.??^.Z.....Y....0^......?...o.....O.~......W.....~.......R..z.Ma...u]..*..-.n....2s<....E..6.<..W.H.qh....:j.y...N.D.]Nj....../..a...{....g.....f).~._....1q..L..#.G...Q.w...J."
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
                      Category:dropped
                      Size (bytes):4982
                      Entropy (8bit):7.929761711048726
                      Encrypted:false
                      SSDEEP:96:L7Rf7U1ylWb3KfyEfOXE+PIcvBirQFiAql1ZwKREkXCSAk:pTvWqfD+gl0sAql1u7kySAk
                      MD5:913064ADAAA4C4FA2A9D011B66B33183
                      SHA1:99EA751AC2597A080706C690612AEEEE43161FC1
                      SHA-256:AFB4CE8882EF7AE80976EBA7D87F6E07FCDDC8E9E84747E8D747D1E996DEA8EB
                      SHA-512:162BF69B1AD5122C6154C111816E4B87A8222E6994A72743ED5382D571D293E1467A2ED2FC6CC27789B644943CF617A56DA530B6A6142680C5B2497579A632B5
                      Malicious:false
                      Preview:.PNG........IHDR..............>a....=IDATx..]}...U..;...O.Q..QH.I(....v..E....GUb*..R[.4@%..hK..B..(.B..". ....&)U#.%...jZ...JC.8.....{.cfvgf.3;.....}ow.....{...P.B...*T.P.B...*Tx...=.Q..wv.w.....|.e.1.$.P.?..l_\.n.}...~.g.....Q...A.f....m.....{,...C2 %..X.......FE.1.N..f...Q..D.K87.....:g..Q.{............3@$.8.....{.....q....G.. .....5..y......)XK..F...D.......... ."8...J#.eM.i....H.E.....a.RIP.`......)..T.....! .[p`X.`..L.a....e. .T..2.....H..p$..02...j....\..........s{...Ymm~.a........f.$./.[.{..C.2:.0..6..]....`....NW.....0..o.T..$;k.2......_...k..{,.+........{..6...L..... .dw...l$..}...K...EV....0......P...e....k....+Go....qw.9.1...X2\..qfw0v.....N...{...l.."....f.A..I..+#.v....'..~E.N-k.........{...l.$..ga..1...$......x$X=}.N..S..B$p..`..`.ZG:c..RA.(.0......Gg.A.I..>...3u.u........_..KO.m.........C...,..c.......0...@_..m...-..7.......4LZ......j@.......\..'....u. QJ.:G..I`.w'B0..w.H..'b.0- ......|..}./.....e..,.K.1........W.u.v. ...\.o
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):908
                      Entropy (8bit):4.512512697156616
                      Encrypted:false
                      SSDEEP:12:1HASvgMTCBxNB+kCIww3v+BBJ/wjsV8lCBxeBeRiGTCSU8biHULaBg/4srCBhUJJ:1HAkkJ+kCIwEg/wwbw0PXa22QLWmSDg
                      MD5:12403EBCCE3AE8287A9E823C0256D205
                      SHA1:C82D43C501FAE24BFE05DB8B8F95ED1C9AC54037
                      SHA-256:B40BDE5B612CFFF936370B32FB0C58CC205FC89937729504C6C0B527B60E2CBA
                      SHA-512:153401ECDB13086D2F65F9B9F20ACB3CEFE5E2AEFF1C31BA021BE35BF08AB0634812C33D1D34DA270E5693A8048FC5E2085E30974F6A703F75EA1622A0CA0FFD
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "SKEP NUWE".. },.. "explanationofflinedisabled": {.. "message": "Jy is vanlyn. As jy Google Dokumente sonder 'n internetverbinding wil gebruik, moet jy die volgende keer as jy aan die internet gekoppel is na instellings op die Google Dokumente-tuisblad gaan en vanlynsinkronisering aanskakel.".. },.. "explanationofflineenabled": {.. "message": "Jy is vanlyn, maar jy kan nog steeds beskikbare l.ers redigeer of nuwes skep.".. },.. "extdesc": {.. "message": "Skep, wysig en bekyk jou dokumente, sigblaaie en aanbiedings . alles sonder toegang tot die internet.".. },.. "extname": {.. "message": "Google Vanlyn Dokumente".. },.. "learnmore": {.. "message": "Kom meer te wete".. },.. "popuphelptext": {.. "message": "Skryf, redigeer en werk saam, waar jy ook al is, met of sonder 'n internetverbinding.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1285
                      Entropy (8bit):4.702209356847184
                      Encrypted:false
                      SSDEEP:24:1HAn6bfEpxtmqMI91ivWjm/6GcCIoToCZzlgkX/Mj:W6bMt3MITFjm/Pcd4oCZhg6k
                      MD5:9721EBCE89EC51EB2BAEB4159E2E4D8C
                      SHA1:58979859B28513608626B563138097DC19236F1F
                      SHA-256:3D0361A85ADFCD35D0DE74135723A75B646965E775188F7DCDD35E3E42DB788E
                      SHA-512:FA3689E8663565D3C1C923C81A620B006EA69C99FB1EB15D07F8F45192ED9175A6A92315FA424159C1163382A3707B25B5FC23E590300C62CBE2DACE79D84871
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "... ...".. },.. "explanationofflinedisabled": {.. "message": "..... .. .... Google ..... ........ ..... ..... .Google .... ... .. .. .. ..... .... ....... .. ....... ... .. .. ..... .. ..... ....".. },.. "explanationofflineenabled": {.. "message": "..... .. .... ... .. .... .... ..... .... ... ..... .... .....".. },.. "extdesc": {.. "message": "...... ..... .... ... .. ..... ...... ..... .... .. ..... . .... .. ...... .....".. },.. "extname": {.. "message": "..... .. Goog
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1244
                      Entropy (8bit):4.5533961615623735
                      Encrypted:false
                      SSDEEP:12:1HASvgPCBxNhieFTr9ogjIxurIyJCCBxeh6wAZKn7uCSUhStuysUm+WCBhSueW1Y:1HAgJzoaC6VEn7Css8yoXzzd
                      MD5:3EC93EA8F8422FDA079F8E5B3F386A73
                      SHA1:24640131CCFB21D9BC3373C0661DA02D50350C15
                      SHA-256:ABD0919121956AB535E6A235DE67764F46CFC944071FCF2302148F5FB0E8C65A
                      SHA-512:F40E879F85BC9B8120A9B7357ED44C22C075BF065F45BEA42BD5316AF929CBD035D5D6C35734E454AEF5B79D378E51A77A71FA23F9EBD0B3754159718FCEB95C
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "..... ....".. },.. "explanationofflinedisabled": {.. "message": "... ... ...... ........ ....... Google ... ..... .......... ..... ... ......... .. ...... ........ ........ Google ..... ........ ... ..... .. ..... ....... .... .... .... ..........".. },.. "explanationofflineenabled": {.. "message": "... ... ...... .... .. .... ....... ..... ....... ....... .. ..... ..... ......".. },.. "extdesc": {.. "message": "..... ......... ...... ........ ....... ......... ........ ....... .. ... ... ..... .........".. },.. "extname": {.. "message": "....... Google ... ......".. },.. "learnmore": {.. "messa
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):977
                      Entropy (8bit):4.867640976960053
                      Encrypted:false
                      SSDEEP:24:1HAWNjbwlmyuAoW32Md+80cVLdUSERHtRo3SjX:J3wlzs42m+8TV+S4H0CjX
                      MD5:9A798FD298008074E59ECC253E2F2933
                      SHA1:1E93DA985E880F3D3350FC94F5CCC498EFC8C813
                      SHA-256:628145F4281FA825D75F1E332998904466ABD050E8B0DC8BB9B6A20488D78A66
                      SHA-512:9094480379F5AB711B3C32C55FD162290CB0031644EA09A145E2EF315DA12F2E55369D824AF218C3A7C37DD9A276AEEC127D8B3627D3AB45A14B0191ED2BBE70
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "YEN.S.N. YARADIN".. },.. "explanationofflinedisabled": {.. "message": "Oflayns.n.z. Google S.n.di internet ba.lant.s. olmadan istifad. etm.k ist.yirsinizs., Google S.n.din .sas s.hif.sind. ayarlara gedin v. n.vb.ti d.f. internet. qo.ulanda oflayn sinxronizasiyan. aktiv edin.".. },.. "explanationofflineenabled": {.. "message": "Oflayns.n.z, amma m.vcud fayllar. redakt. ed. v. yenil.rini yarada bil.rsiniz.".. },.. "extdesc": {.. "message": "S.n.d, c.dv.l v. t.qdimatlar.n ham.s.n. internet olmadan redakt. edin, yarad.n v. bax.n.".. },.. "extname": {.. "message": "Google S.n.d Oflayn".. },.. "learnmore": {.. "message": ".trafl. M.lumat".. },.. "popuphelptext": {.. "message": "Harda olma..n.zdan v. internet. qo.ulu olub-olmad...n.zdan as.l. olmayaraq, yaz.n, redakt. edin v. .m.kda.l.q edin.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):3107
                      Entropy (8bit):3.535189746470889
                      Encrypted:false
                      SSDEEP:48:YOWdTQ0QRk+QyJQAy6Qg4QWSe+QECTQLHQlQIfyQ0fnWQjQDrTQik+QvkZTQ+89b:GdTbyRvwgbCTEHQhyVues9oOT3rOCkV
                      MD5:68884DFDA320B85F9FC5244C2DD00568
                      SHA1:FD9C01E03320560CBBB91DC3D1917C96D792A549
                      SHA-256:DDF16859A15F3EB3334D6241975CA3988AC3EAFC3D96452AC3A4AFD3644C8550
                      SHA-512:7FF0FBD555B1F9A9A4E36B745CBFCAD47B33024664F0D99E8C080BE541420D1955D35D04B5E973C07725573E592CD0DD84FDBB867C63482BAFF6929ADA27CCDE
                      Malicious:false
                      Preview:{"createnew":{"message":"\u0421\u0422\u0412\u0410\u0420\u042b\u0426\u042c \u041d\u041e\u0412\u042b"},"explanationofflinedisabled":{"message":"\u0412\u044b \u045e \u043f\u0430\u0437\u0430\u0441\u0435\u0442\u043a\u0430\u0432\u044b\u043c \u0440\u044d\u0436\u044b\u043c\u0435. \u041a\u0430\u0431 \u043a\u0430\u0440\u044b\u0441\u0442\u0430\u0446\u0446\u0430 \u0414\u0430\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u043c\u0456 Google \u0431\u0435\u0437 \u043f\u0430\u0434\u043a\u043b\u044e\u0447\u044d\u043d\u043d\u044f \u0434\u0430 \u0456\u043d\u0442\u044d\u0440\u043d\u044d\u0442\u0443, \u043f\u0435\u0440\u0430\u0439\u0434\u0437\u0456\u0446\u0435 \u0434\u0430 \u043d\u0430\u043b\u0430\u0434 \u043d\u0430 \u0433\u0430\u043b\u043e\u045e\u043d\u0430\u0439 \u0441\u0442\u0430\u0440\u043e\u043d\u0446\u044b \u0414\u0430\u043a\u0443\u043c\u0435\u043d\u0442\u0430\u045e Google \u0456 \u045e\u043a\u043b\u044e\u0447\u044b\u0446\u0435 \u0441\u0456\u043d\u0445\u0440\u0430\u043d\u0456\u0437\u0430\u0446\u044b\u044e
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1389
                      Entropy (8bit):4.561317517930672
                      Encrypted:false
                      SSDEEP:24:1HAp1DQqUfZ+Yann08VOeadclUZbyMzZzsYvwUNn7nOyRK8/nn08V7:g1UTfZ+Ya08Uey3tflCRE08h
                      MD5:2E6423F38E148AC5A5A041B1D5989CC0
                      SHA1:88966FFE39510C06CD9F710DFAC8545672FFDCEB
                      SHA-256:AC4A8B5B7C0B0DD1C07910F30DCFBDF1BCB701CFCFD182B6153FD3911D566C0E
                      SHA-512:891FCDC6F07337970518322C69C6026896DD3588F41F1E6C8A1D91204412CAE01808F87F9F2DEA1754458D70F51C3CEF5F12A9E3FC011165A42B0844C75EC683
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": ".........".. },.. "explanationofflinedisabled": {.. "message": "...... .... .. .. .......... Google ......... ... ........ ......, ........ ........... . ......... ........ .. Google ......... . ........ ...... .............. ......... ..., ...... ..... ...... . .........".. },.. "explanationofflineenabled": {.. "message": "...... ..., .. ... ...... .. ........... ......... ....... ... .. ......... .....".. },.. "extdesc": {.. "message": "............, .......... . ............ ...... ........., .......... ....... . ........... . ...... .... ... ...... .. .........".. },..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1763
                      Entropy (8bit):4.25392954144533
                      Encrypted:false
                      SSDEEP:24:1HABGtNOtIyHmVd+q+3X2AFl2DhrR7FAWS9+SMzI8QVAEq8yB0XtfOyvU7D:oshmm/+H2Ml2DrFPS9+S99EzBd7D
                      MD5:651375C6AF22E2BCD228347A45E3C2C9
                      SHA1:109AC3A912326171D77869854D7300385F6E628C
                      SHA-256:1DBF38E425C5C7FC39E8077A837DF0443692463BA1FBE94E288AB5A93242C46E
                      SHA-512:958AA7CF645FAB991F2ECA0937BA734861B373FB1C8BCC001599BE57C65E0917F7833A971D93A7A6423C5F54A4839D3A4D5F100C26EFA0D2A068516953989F9D
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": ".... .... ....".. },.. "explanationofflinedisabled": {.. "message": ".... ....... ....... .... ......... ..... ..... Google ........ ....... ...., Google .......... ........ ....... ... ... .... ... .... ... ........... .... ....... .... ... ...... ..... .... .....".. },.. "explanationofflineenabled": {.. "message": ".... ....... ......, ...... .... .... ...... .......... ........ .... .. .... .... .... .... .......".. },.. "extdesc":
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):930
                      Entropy (8bit):4.569672473374877
                      Encrypted:false
                      SSDEEP:12:1HASvggoSCBxNFT0sXuqgEHQ2fTq9blUJYUJaw9CBxejZFPLOjCSUuE44pMiiDat:1HAtqs+BEHGpURxSp1iUPWCAXtRKe
                      MD5:D177261FFE5F8AB4B3796D26835F8331
                      SHA1:4BE708E2FFE0F018AC183003B74353AD646C1657
                      SHA-256:D6E65238187A430FF29D4C10CF1C46B3F0FA4B91A5900A17C5DFD16E67FFC9BD
                      SHA-512:E7D730304AED78C0F4A78DADBF835A22B3D8114FB41D67B2B26F4FE938B572763D3E127B7C1C81EBE7D538DA976A7A1E7ADC40F918F88AFADEA2201AE8AB47D0
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CREA'N UN DE NOU".. },.. "explanationofflinedisabled": {.. "message": "No tens connexi.. Per utilitzar Documents de Google sense connexi. a Internet, ves a la configuraci. de la p.gina d'inici d'aquest servei i activa l'opci. per sincronitzar-se sense connexi. la propera vegada que estiguis connectat a la xarxa.".. },.. "explanationofflineenabled": {.. "message": "Tot i que no tens connexi., pots editar o crear fitxers.".. },.. "extdesc": {.. "message": "Edita, crea i consulta documents, fulls de c.lcul i presentacions, tot sense acc.s a Internet.".. },.. "extname": {.. "message": "Documents de Google sense connexi.".. },.. "learnmore": {.. "message": "M.s informaci.".. },.. "popuphelptext": {.. "message": "Escriu text, edita fitxers i col.labora-hi siguis on siguis, amb o sense connexi. a Internet.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):913
                      Entropy (8bit):4.947221919047
                      Encrypted:false
                      SSDEEP:12:1HASvgdsbCBxNBmobXP15Dxoo60n40h6qCBxeBeGG/9jZCSUKFPDLZ2B2hCBhPLm:1HApJmoZ5e50nzQhwAd7dvYB2kDSGGKs
                      MD5:CCB00C63E4814F7C46B06E4A142F2DE9
                      SHA1:860936B2A500CE09498B07A457E0CCA6B69C5C23
                      SHA-256:21AE66CE537095408D21670585AD12599B0F575FF2CB3EE34E3A48F8CC71CFAB
                      SHA-512:35839DAC6C985A6CA11C1BFF5B8B5E59DB501FCB91298E2C41CB0816B6101BF322445B249EAEA0CEF38F76D73A4E198F2B6E25EEA8D8A94EA6007D386D4F1055
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "VYTVO.IT".. },.. "explanationofflinedisabled": {.. "message": "Jste offline. Pokud chcete Dokumenty Google pou..vat bez p.ipojen. k.internetu, a. budete p...t. online, p.ejd.te do nastaven. na domovsk. str.nce Dokument. Google a.zapn.te offline synchronizaci.".. },.. "explanationofflineenabled": {.. "message": "Jste offline, ale st.le m..ete upravovat dostupn. soubory nebo vytv..et nov..".. },.. "extdesc": {.. "message": "Upravujte, vytv..ejte a.zobrazujte sv. dokumenty, tabulky a.prezentace . v.e bez p..stupu k.internetu.".. },.. "extname": {.. "message": "Dokumenty Google offline".. },.. "learnmore": {.. "message": "Dal.. informace".. },.. "popuphelptext": {.. "message": "Pi.te, upravujte a.spolupracujte kdekoli, s.p.ipojen.m k.internetu i.bez n.j.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):806
                      Entropy (8bit):4.815663786215102
                      Encrypted:false
                      SSDEEP:12:YGo35xMxy6gLr4Dn1eBVa1xzxyn1VFQB6FDVgdAJex9QH7uy+XJEjENK32J21j:Y735+yoeeRG54uDmdXx9Q7u3r83Xj
                      MD5:A86407C6F20818972B80B9384ACFBBED
                      SHA1:D1531CD0701371E95D2A6BB5EDCB79B949D65E7C
                      SHA-256:A482663292A913B02A9CDE4635C7C92270BF3C8726FD274475DC2C490019A7C9
                      SHA-512:D9FBF675514A890E9656F83572208830C6D977E34D5744C298A012515BC7EB5A17726ADD0D9078501393BABD65387C4F4D3AC0CC0F7C60C72E09F336DCA88DE7
                      Malicious:false
                      Preview:{"createnew":{"message":"CREU NEWYDD"},"explanationofflinedisabled":{"message":"Rydych chi all-lein. I ddefnyddio Dogfennau Google heb gysylltiad \u00e2'r rhyngrwyd, ewch i'r gosodiadau ar dudalen hafan Dogfennau Google a throi 'offine sync' ymlaen y tro nesaf y byddwch wedi'ch cysylltu \u00e2'r rhyngrwyd."},"explanationofflineenabled":{"message":"Rydych chi all-lein, ond gallwch barhau i olygu'r ffeiliau sydd ar gael neu greu rhai newydd."},"extdesc":{"message":"Gallwch olygu, creu a gweld eich dogfennau, taenlenni a chyflwyniadau \u2013 i gyd heb fynediad i'r rhyngrwyd."},"extname":{"message":"Dogfennau Google All-lein"},"learnmore":{"message":"DYSGU MWY"},"popuphelptext":{"message":"Ysgrifennwch, golygwch a chydweithiwch lle bynnag yr ydych, gyda chysylltiad \u00e2'r rhyngrwyd neu hebddo."}}.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):883
                      Entropy (8bit):4.5096240460083905
                      Encrypted:false
                      SSDEEP:24:1HA4EFkQdUULMnf1yo+9qgpukAXW9bGJTvDyqdr:zEFkegfw9qwAXWNs/yu
                      MD5:B922F7FD0E8CCAC31B411FC26542C5BA
                      SHA1:2D25E153983E311E44A3A348B7D97AF9AAD21A30
                      SHA-256:48847D57C75AF51A44CBF8F7EF1A4496C2007E58ED56D340724FDA1604FF9195
                      SHA-512:AD0954DEEB17AF04858DD5EC3D3B3DA12DFF7A666AF4061DEB6FD492992D95DB3BAF751AB6A59BEC7AB22117103A93496E07632C2FC724623BB3ACF2CA6093F3
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "OPRET NYT".. },.. "explanationofflinedisabled": {.. "message": "Du er offline. Hvis du vil bruge Google Docs uden en internetforbindelse, kan du g. til indstillinger p. startsiden for Google Docs og aktivere offlinesynkronisering, n.ste gang du har internetforbindelse.".. },.. "explanationofflineenabled": {.. "message": "Du er offline, men du kan stadig redigere tilg.ngelige filer eller oprette nye.".. },.. "extdesc": {.. "message": "Rediger, opret og se dine dokumenter, regneark og pr.sentationer helt uden internetadgang.".. },.. "extname": {.. "message": "Google Docs Offline".. },.. "learnmore": {.. "message": "F. flere oplysninger".. },.. "popuphelptext": {.. "message": "Skriv, rediger og samarbejd, uanset hvor du er, og uanset om du har internetforbindelse.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1031
                      Entropy (8bit):4.621865814402898
                      Encrypted:false
                      SSDEEP:24:1HA6sZnqWd77ykJzCkhRhoe1HMNaAJPwG/p98HKpy2kX/R:WZqWxykJzthRhoQma+tpyHX2O/R
                      MD5:D116453277CC860D196887CEC6432FFE
                      SHA1:0AE00288FDE696795CC62FD36EABC507AB6F4EA4
                      SHA-256:36AC525FA6E28F18572D71D75293970E0E1EAD68F358C20DA4FDC643EEA2C1C5
                      SHA-512:C788C3202A27EC220E3232AE25E3C855F3FDB8F124848F46A3D89510C564641A2DFEA86D5014CEA20D3D2D3C1405C96DBEB7CCAD910D65C55A32FDCA8A33FDD4
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "NEU ERSTELLEN".. },.. "explanationofflinedisabled": {.. "message": "Sie sind offline. Um Google Docs ohne Internetverbindung zu verwenden, gehen Sie auf der Google Docs-Startseite auf \"Einstellungen\" und schalten die Offlinesynchronisierung ein, wenn Sie das n.chste Mal mit dem Internet verbunden sind.".. },.. "explanationofflineenabled": {.. "message": "Sie sind offline, aber k.nnen weiterhin verf.gbare Dateien bearbeiten oder neue Dateien erstellen.".. },.. "extdesc": {.. "message": "Mit der Erweiterung k.nnen Sie Dokumente, Tabellen und Pr.sentationen bearbeiten, erstellen und aufrufen.. ganz ohne Internetverbindung.".. },.. "extname": {.. "message": "Google Docs Offline".. },.. "learnmore": {.. "message": "Weitere Informationen".. },.. "popuphelptext": {.. "message": "Mit oder ohne Internetverbindung: Sie k.nnen von .berall Dokumente erstellen, .ndern und zusammen mit anderen
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1613
                      Entropy (8bit):4.618182455684241
                      Encrypted:false
                      SSDEEP:24:1HAJKan4EITDZGoziRAc2Z8eEfkTJfLhGX7b0UBNoAcGpVyhxefSmuq:SKzTD0IK85JlwsGOUyaSk
                      MD5:9ABA4337C670C6349BA38FDDC27C2106
                      SHA1:1FC33BE9AB4AD99216629BC89FBB30E7AA42B812
                      SHA-256:37CA6AB271D6E7C9B00B846FDB969811C9CE7864A85B5714027050795EA24F00
                      SHA-512:8564F93AD8485C06034A89421CE74A4E719BBAC865E33A7ED0B87BAA80B7F7E54B240266F2EDB595DF4E6816144428DB8BE18A4252CBDCC1E37B9ECC9F9D7897
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": ".......... ....".. },.. "explanationofflinedisabled": {.. "message": "..... ..... ......... ... .. ............... .. ....... Google ..... ....... ... ........., ......... .... ......... .... ...... ...... ... ........ Google ... ............. ... ........... ..... ........ ... ....... .... ... .. ..... ............ ... ..........".. },.. "explanationofflineenabled": {.. "message": "..... ..... ........ .... ........ .. .............. .. ......... ...... . .. ............. ... .......".. },.. "extdesc": {.. "message": ".............., ............ ... ..... .. ......., .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):851
                      Entropy (8bit):4.4858053753176526
                      Encrypted:false
                      SSDEEP:12:1HASvgg4eCBxNdN3Pj1NzXW6iFryCBxesJGceKCSUuvNn3AwCBhUufz1tHaXRdAv:1HA3dj/BNzXviFrpj4sNQXJezAa6
                      MD5:07FFBE5F24CA348723FF8C6C488ABFB8
                      SHA1:6DC2851E39B2EE38F88CF5C35A90171DBEA5B690
                      SHA-256:6895648577286002F1DC9C3366F558484EB7020D52BBF64A296406E61D09599C
                      SHA-512:7ED2C8DB851A84F614D5DAF1D5FE633BD70301FD7FF8A6723430F05F642CEB3B1AD0A40DE65B224661C782FFCEC69D996EBE3E5BB6B2F478181E9A07D8CD41F6
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CREATE NEW".. },.. "explanationofflinedisabled": {.. "message": "You're offline. To use Google Docs without an internet connection, go to settings on the Google Docs homepage and turn on offline sync the next time you're connected to the internet.".. },.. "explanationofflineenabled": {.. "message": "You're offline, but you can still edit available files or create new ones.".. },.. "extdesc": {.. "message": "Edit, create, and view your documents, spreadsheets, and presentations . all without internet access.".. },.. "extname": {.. "message": "Google Docs Offline".. },.. "learnmore": {.. "message": "Learn More".. },.. "popuphelptext": {.. "message": "Write, edit, and collaborate wherever you are, with or without an internet connection.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):851
                      Entropy (8bit):4.4858053753176526
                      Encrypted:false
                      SSDEEP:12:1HASvgg4eCBxNdN3Pj1NzXW6iFryCBxesJGceKCSUuvNn3AwCBhUufz1tHaXRdAv:1HA3dj/BNzXviFrpj4sNQXJezAa6
                      MD5:07FFBE5F24CA348723FF8C6C488ABFB8
                      SHA1:6DC2851E39B2EE38F88CF5C35A90171DBEA5B690
                      SHA-256:6895648577286002F1DC9C3366F558484EB7020D52BBF64A296406E61D09599C
                      SHA-512:7ED2C8DB851A84F614D5DAF1D5FE633BD70301FD7FF8A6723430F05F642CEB3B1AD0A40DE65B224661C782FFCEC69D996EBE3E5BB6B2F478181E9A07D8CD41F6
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CREATE NEW".. },.. "explanationofflinedisabled": {.. "message": "You're offline. To use Google Docs without an internet connection, go to settings on the Google Docs homepage and turn on offline sync the next time you're connected to the internet.".. },.. "explanationofflineenabled": {.. "message": "You're offline, but you can still edit available files or create new ones.".. },.. "extdesc": {.. "message": "Edit, create, and view your documents, spreadsheets, and presentations . all without internet access.".. },.. "extname": {.. "message": "Google Docs Offline".. },.. "learnmore": {.. "message": "Learn More".. },.. "popuphelptext": {.. "message": "Write, edit, and collaborate wherever you are, with or without an internet connection.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):848
                      Entropy (8bit):4.494568170878587
                      Encrypted:false
                      SSDEEP:12:1HASvgg4eCBxNdN3vRyc1NzXW6iFrSCBxesJGceKCSUuvlvOgwCBhUufz1tnaXrQ:1HA3djfR3NzXviFrJj4sJXJ+bA6RM
                      MD5:3734D498FB377CF5E4E2508B8131C0FA
                      SHA1:AA23E39BFE526B5E3379DE04E00EACBA89C55ADE
                      SHA-256:AB5CDA04013DCE0195E80AF714FBF3A67675283768FFD062CF3CF16EDB49F5D4
                      SHA-512:56D9C792954214B0DE56558983F7EB7805AC330AF00E944E734340BE41C68E5DD03EDDB17A63BC2AB99BDD9BE1F2E2DA5BE8BA7C43D938A67151082A9041C7BA
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CREATE NEW".. },.. "explanationofflinedisabled": {.. "message": "You're offline. To use Google Docs without an Internet connection, go to settings on the Google Docs homepage and turn on offline sync the next time you're connected to the Internet.".. },.. "explanationofflineenabled": {.. "message": "You're offline, but you can still edit available files or create new ones.".. },.. "extdesc": {.. "message": "Edit, create and view your documents, spreadsheets and presentations . all without Internet access.".. },.. "extname": {.. "message": "Google Docs Offline".. },.. "learnmore": {.. "message": "Learn more".. },.. "popuphelptext": {.. "message": "Write, edit and collaborate wherever you are, with or without an Internet connection.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1425
                      Entropy (8bit):4.461560329690825
                      Encrypted:false
                      SSDEEP:24:1HA6Krbbds5Kna/BNzXviFrpsCxKU4irpNQ0+qWK5yOJAaCB7MAa6:BKrbBs5Kna/BNzXvi3sCxKZirA0jWK5m
                      MD5:578215FBB8C12CB7E6CD73FBD16EC994
                      SHA1:9471D71FA6D82CE1863B74E24237AD4FD9477187
                      SHA-256:102B586B197EA7D6EDFEB874B97F95B05D229EA6A92780EA8544C4FF1E6BC5B1
                      SHA-512:E698B1A6A6ED6963182F7D25AC12C6DE06C45D14499DDC91E81BDB35474E7EC9071CFEBD869B7D129CB2CD127BC1442C75E408E21EB8E5E6906A607A3982B212
                      Malicious:false
                      Preview:{.. "createNew": {.. "description": "Text shown in the extension pop up for creating a new document",.. "message": "CREATE NEW".. },.. "explanationOfflineDisabled": {.. "description": "Text shown in the extension popup when the user is offline and offline is disabled.",.. "message": "You're offline. To use Google Docs without an internet connection, go to settings on the Google Docs homepage and turn on offline sync the next time you're connected to the internet.".. },.. "explanationOfflineEnabled": {.. "description": "Text shown in the extension popup when the user is offline and offline is enabled.",.. "message": "You're offline, but you can still edit available files or create new ones.".. },.. "extDesc": {.. "description": "Extension description",.. "message": "Edit, create, and view your documents, spreadsheets, and presentations . all without internet access.".. },.. "extName": {.. "description": "Extension name",..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):961
                      Entropy (8bit):4.537633413451255
                      Encrypted:false
                      SSDEEP:12:1HASvggeCBxNFxcw2CVcfamedatqWCCBxeFxCF/m+rWAaFQbCSUuExqIQdO06stp:1HAqn0gcfa9dc/5mCpmIWck02USfWmk
                      MD5:F61916A206AC0E971CDCB63B29E580E3
                      SHA1:994B8C985DC1E161655D6E553146FB84D0030619
                      SHA-256:2008F4FAAB71AB8C76A5D8811AD40102C380B6B929CE0BCE9C378A7CADFC05EB
                      SHA-512:D9C63B2F99015355ACA04D74A27FD6B81170750C4B4BE7293390DC81EF4CD920EE9184B05C61DC8979B6C2783528949A4AE7180DBF460A2620DBB0D3FD7A05CF
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CREAR".. },.. "explanationofflinedisabled": {.. "message": "No tienes conexi.n. Para usar Documentos de Google sin conexi.n a Internet, ve a Configuraci.n en la p.gina principal de Documentos de Google y activa la sincronizaci.n sin conexi.n la pr.xima vez que te conectes a Internet.".. },.. "explanationofflineenabled": {.. "message": "No tienes conexi.n. Aun as., puedes crear archivos o editar los que est.n disponibles.".. },.. "extdesc": {.. "message": "Edita, crea y consulta tus documentos, hojas de c.lculo y presentaciones; todo ello, sin acceso a Internet.".. },.. "extname": {.. "message": "Documentos de Google sin conexi.n".. },.. "learnmore": {.. "message": "M.s informaci.n".. },.. "popuphelptext": {.. "message": "Escribe o edita contenido y colabora con otras personas desde cualquier lugar, con o sin conexi.n a Internet.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):959
                      Entropy (8bit):4.570019855018913
                      Encrypted:false
                      SSDEEP:24:1HARn05cfa9dcDmQOTtSprj0zaGUSjSGZ:+n0CfMcDmQOTQprj4qpC
                      MD5:535331F8FB98894877811B14994FEA9D
                      SHA1:42475E6AFB6A8AE41E2FC2B9949189EF9BBE09FB
                      SHA-256:90A560FF82605DB7EDA26C90331650FF9E42C0B596CEDB79B23598DEC1B4988F
                      SHA-512:2CE9C69E901AB5F766E6CFC1E592E1AF5A07AA78D154CCBB7898519A12E6B42A21C5052A86783ABE3E7A05043D4BD41B28960FEDDB30169FF7F7FE7208C8CFE9
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CREAR NUEVO".. },.. "explanationofflinedisabled": {.. "message": "No tienes conexi.n. Para usar Documentos de Google sin conexi.n a Internet, ve a la configuraci.n de la p.gina principal de Documentos de Google y activa la sincronizaci.n sin conexi.n la pr.xima vez que est.s conectado a Internet.".. },.. "explanationofflineenabled": {.. "message": "No tienes conexi.n, pero a.n puedes modificar los archivos disponibles o crear otros nuevos.".. },.. "extdesc": {.. "message": "Edita, crea y consulta tus documentos, hojas de c.lculo y presentaciones aunque no tengas acceso a Internet".. },.. "extname": {.. "message": "Documentos de Google sin conexi.n".. },.. "learnmore": {.. "message": "M.s informaci.n".. },.. "popuphelptext": {.. "message": "Escribe, modifica y colabora dondequiera que est.s, con conexi.n a Internet o sin ella.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):968
                      Entropy (8bit):4.633956349931516
                      Encrypted:false
                      SSDEEP:24:1HA5WG6t306+9sihHvMfdJLjUk4NJPNczGr:mWGY0cOUdJODPmzs
                      MD5:64204786E7A7C1ED9C241F1C59B81007
                      SHA1:586528E87CD670249A44FB9C54B1796E40CDB794
                      SHA-256:CC31B877238DA6C1D51D9A6155FDE565727A1956572F466C387B7E41C4923A29
                      SHA-512:44FCF93F3FB10A3DB68D74F9453995995AB2D16863EC89779DB451A4D90F19743B8F51095EEC3ECEF5BD0C5C60D1BF3DFB0D64DF288DCCFBE70C129AE350B2C6
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "LOO UUS".. },.. "explanationofflinedisabled": {.. "message": "Teil ei ole v.rgu.hendust. Teenuse Google.i dokumendid kasutamiseks ilma Interneti-.henduseta avage j.rgmine kord, kui olete Internetiga .hendatud, teenuse Google.i dokumendid avalehel seaded ja l.litage sisse v.rgu.henduseta s.nkroonimine.".. },.. "explanationofflineenabled": {.. "message": "Teil ei ole v.rgu.hendust, kuid saate endiselt saadaolevaid faile muuta v.i uusi luua.".. },.. "extdesc": {.. "message": "Saate luua, muuta ja vaadata oma dokumente, arvustustabeleid ning esitlusi ilma Interneti-.henduseta.".. },.. "extname": {.. "message": "V.rgu.henduseta Google.i dokumendid".. },.. "learnmore": {.. "message": "Lisateave".. },.. "popuphelptext": {.. "message": "Kirjutage, muutke ja tehke koost..d .ksk.ik kus olenemata sellest, kas teil on Interneti-.hendus.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):838
                      Entropy (8bit):4.4975520913636595
                      Encrypted:false
                      SSDEEP:24:YnmjggqTWngosqYQqE1kjO39m7OddC0vjWQMmWgqwgQ8KLcxOb:Ynmsgqyngosq9qxTOs0vjWQMbgqchb
                      MD5:29A1DA4ACB4C9D04F080BB101E204E93
                      SHA1:2D0E4587DDD4BAC1C90E79A88AF3BD2C140B53B1
                      SHA-256:A41670D52423BA69C7A65E7E153E7B9994E8DD0370C584BDA0714BD61C49C578
                      SHA-512:B7B7A5A0AA8F6724B0FA15D65F25286D9C66873F03080CBABA037BDEEA6AADC678AC4F083BC52C2DB01BEB1B41A755ED67BBDDB9C0FE4E35A004537A3F7FC458
                      Malicious:false
                      Preview:{"createnew":{"message":"SORTU"},"explanationofflinedisabled":{"message":"Ez zaude konektatuta Internetera. Google Dokumentuak konexiorik gabe erabiltzeko, joan Google Dokumentuak zerbitzuaren orri nagusiko ezarpenetara eta aktibatu konexiorik gabeko sinkronizazioa Internetera konektatzen zaren hurrengoan."},"explanationofflineenabled":{"message":"Ez zaude konektatuta Internetera, baina erabilgarri dauden fitxategiak edita ditzakezu, baita beste batzuk sortu ere."},"extdesc":{"message":"Editatu, sortu eta ikusi dokumentuak, kalkulu-orriak eta aurkezpenak Interneteko konexiorik gabe."},"extname":{"message":"Google Dokumentuak konexiorik gabe"},"learnmore":{"message":"Lortu informazio gehiago"},"popuphelptext":{"message":"Edonon zaudela ere, ez duzu zertan konektatuta egon idatzi, editatu eta lankidetzan jardun ahal izateko."}}.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1305
                      Entropy (8bit):4.673517697192589
                      Encrypted:false
                      SSDEEP:24:1HAX9yM7oiI99Rwx4xyQakJbfAEJhmq/RlBu92P7FbNcgYVJ0:JM7ovex4xyQaKjAEyq/p7taX0
                      MD5:097F3BA8DE41A0AAF436C783DCFE7EF3
                      SHA1:986B8CABD794E08C7AD41F0F35C93E4824AC84DF
                      SHA-256:7C4C09D19AC4DA30CC0F7F521825F44C4DFBC19482A127FBFB2B74B3468F48F1
                      SHA-512:8114EA7422E3B20AE3F08A3A64A6FFE1517A7579A3243919B8F789EB52C68D6F5A591F7B4D16CEE4BD337FF4DAF4057D81695732E5F7D9E761D04F859359FADB
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "..... ... ....".. },.. "explanationofflinedisabled": {.. "message": "...... ...... .... ....... .. ....... Google .... ..... ........ .... ... .. .. ....... ... ..... .. ....... .. .... .... ....... Google ..... . .......... ...... .. .... .....".. },.. "explanationofflineenabled": {.. "message": "...... ..... ... ...... ......... ......... .. .. .. ..... ..... ...... .... .. ........ ..... ..... .....".. },.. "extdesc": {.. "message": "...... ............ . ........ .. ....... ..... . ...... .... . ... ... ..... .... ...... .. ........".. },.. "extname": {.. "message": "....... Google .
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):911
                      Entropy (8bit):4.6294343834070935
                      Encrypted:false
                      SSDEEP:12:1HASvguCBxNMME2BESA7gPQk36xCBxeMMcXYBt+CSU1pfazCBhUunV1tLaX5GI2N:1HAVioESAsPf36O3Xst/p3J8JeEY
                      MD5:B38CBD6C2C5BFAA6EE252D573A0B12A1
                      SHA1:2E490D5A4942D2455C3E751F96BD9960F93C4B60
                      SHA-256:2D752A5DBE80E34EA9A18C958B4C754F3BC10D63279484E4DF5880B8FD1894D2
                      SHA-512:6E65207F4D8212736059CC802C6A7104E71A9CC0935E07BD13D17EC46EA26D10BC87AD923CD84D78781E4F93231A11CB9ED8D3558877B6B0D52C07CB005F1C0C
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "LUO UUSI".. },.. "explanationofflinedisabled": {.. "message": "Olet offline-tilassa. Jos haluat k.ytt.. Google Docsia ilman internetyhteytt., siirry Google Docsin etusivulle ja ota asetuksissa k.ytt..n offline-synkronointi, kun seuraavan kerran olet yhteydess. internetiin.".. },.. "explanationofflineenabled": {.. "message": "Olet offline-tilassa. Voit kuitenkin muokata k.ytett.viss. olevia tiedostoja tai luoda uusia.".. },.. "extdesc": {.. "message": "Muokkaa, luo ja katso dokumentteja, laskentataulukoita ja esityksi. ilman internetyhteytt..".. },.. "extname": {.. "message": "Google Docsin offline-tila".. },.. "learnmore": {.. "message": "Lis.tietoja".. },.. "popuphelptext": {.. "message": "Kirjoita, muokkaa ja tee yhteisty.t. paikasta riippumatta, my.s ilman internetyhteytt..".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):939
                      Entropy (8bit):4.451724169062555
                      Encrypted:false
                      SSDEEP:24:1HAXbH2eZXn6sjLITdRSJpGL/gWFJ3sqixO:ubHfZqsHIT/FLL3qO
                      MD5:FCEA43D62605860FFF41BE26BAD80169
                      SHA1:F25C2CE893D65666CC46EA267E3D1AA080A25F5B
                      SHA-256:F51EEB7AAF5F2103C1043D520E5A4DE0FA75E4DC375E23A2C2C4AFD4D9293A72
                      SHA-512:F66F113A26E5BCF54B9AAFA69DAE3C02C9C59BD5B9A05F829C92AF208C06DC8CCC7A1875CBB7B7CE425899E4BA27BFE8CE2CDAF43A00A1B9F95149E855989EE0
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "GUMAWA NG BAGO".. },.. "explanationofflinedisabled": {.. "message": "Naka-offline ka. Upang magamit ang Google Docs nang walang koneksyon sa internet, pumunta sa mga setting sa homepage ng Google Docs at i-on ang offline na pag-sync sa susunod na nakakonekta ka sa internet.".. },.. "explanationofflineenabled": {.. "message": "Naka-offline ka, ngunit maaari mo pa ring i-edit ang mga available na file o gumawa ng mga bago.".. },.. "extdesc": {.. "message": "I-edit, gawin, at tingnan ang iyong mga dokumento, spreadsheet, at presentation . lahat ng ito nang walang access sa internet.".. },.. "extname": {.. "message": "Google Docs Offline".. },.. "learnmore": {.. "message": "Matuto Pa".. },.. "popuphelptext": {.. "message": "Magsulat, mag-edit at makipag-collaborate nasaan ka man, nang mayroon o walang koneksyon sa internet.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):977
                      Entropy (8bit):4.622066056638277
                      Encrypted:false
                      SSDEEP:24:1HAdy42ArMdsH50Jd6Z1PCBolXAJ+GgNHp0X16M1J1:EyfArMS2Jd6Z1PCBolX2+vNmX16Y1
                      MD5:A58C0EEBD5DC6BB5D91DAF923BD3A2AA
                      SHA1:F169870EEED333363950D0BCD5A46D712231E2AE
                      SHA-256:0518287950A8B010FFC8D52554EB82E5D93B6C3571823B7CECA898906C11ABCC
                      SHA-512:B04AFD61DE490BC838354E8DC6C22BE5C7AC6E55386FFF78489031ACBE2DBF1EAA2652366F7A1E62CE87CFCCB75576DA3B2645FEA1645B0ECEB38B1FA3A409E8
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CR.ER".. },.. "explanationofflinedisabled": {.. "message": "Vous .tes hors connexion. Pour pouvoir utiliser Google.Docs sans connexion Internet, acc.dez aux param.tres de la page d'accueil de Google.Docs et activez la synchronisation hors connexion lors de votre prochaine connexion . Internet.".. },.. "explanationofflineenabled": {.. "message": "Vous .tes hors connexion, mais vous pouvez quand m.me modifier les fichiers disponibles ou cr.er des fichiers.".. },.. "extdesc": {.. "message": "Modifiez, cr.ez et consultez des documents, feuilles de calcul et pr.sentations, sans acc.s . Internet.".. },.. "extname": {.. "message": "Google.Docs hors connexion".. },.. "learnmore": {.. "message": "En savoir plus".. },.. "popuphelptext": {.. "message": "R.digez des documents, modifiez-les et collaborez o. que vous soyez, avec ou sans connexion Internet.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):972
                      Entropy (8bit):4.621319511196614
                      Encrypted:false
                      SSDEEP:24:1HAdyg2pwbv1V8Cd61PC/vT2fg3YHDyM1J1:EyHpwbpd61C/72Y3YOY1
                      MD5:6CAC04BDCC09034981B4AB567B00C296
                      SHA1:84F4D0E89E30ED7B7ACD7644E4867FFDB346D2A5
                      SHA-256:4CAA46656ECC46A420AA98D3307731E84F5AC1A89111D2E808A228C436D83834
                      SHA-512:160590B6EC3DCF48F3EA7A5BAA11A8F6FA4131059469623E00AD273606B468B3A6E56D199E97DAA0ECB6C526260EBAE008570223F2822811F441D1C900DC33D6
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CR.ER".. },.. "explanationofflinedisabled": {.. "message": "Vous .tes hors connexion. Pour utiliser Google.Documents sans connexion Internet, acc.dez aux param.tres sur la page d'accueil Google.Documents et activez la synchronisation hors ligne la prochaine fois que vous .tes connect. . Internet.".. },.. "explanationofflineenabled": {.. "message": "Vous .tes hors connexion, mais vous pouvez toujours modifier les fichiers disponibles ou en cr.er.".. },.. "extdesc": {.. "message": "Modifiez, cr.ez et consultez vos documents, vos feuilles de calcul et vos pr.sentations, le tout sans acc.s . Internet.".. },.. "extname": {.. "message": "Google.Documents hors connexion".. },.. "learnmore": {.. "message": "En savoir plus".. },.. "popuphelptext": {.. "message": ".crivez, modifiez et collaborez o. que vous soyez, avec ou sans connexion Internet.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):990
                      Entropy (8bit):4.497202347098541
                      Encrypted:false
                      SSDEEP:12:1HASvggECBxNbWVqMjlMgaPLqXPhTth0CBxebWbMRCSUCjAKFCSIj0tR7tCBhP1l:1HACzWsMlajIhJhHKWbFKFC0tR8oNK5
                      MD5:6BAAFEE2F718BEFBC7CD58A04CCC6C92
                      SHA1:CE0BDDDA2FA1F0AD222B604C13FF116CBB6D02CF
                      SHA-256:0CF098DFE5BBB46FC0132B3CF0C54B06B4D2C8390D847EE2A65D20F9B7480F4C
                      SHA-512:3DA23E74CD6CF9C0E2A0C4DBA60301281D362FB0A2A908F39A55ABDCA4CC69AD55638C63CC3BEFD44DC032F9CBB9E2FDC1B4C4ABE292917DF8272BA25B82AF20
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CREAR NOVO".. },.. "explanationofflinedisabled": {.. "message": "Est.s sen conexi.n. Para utilizar Documentos de Google sen conexi.n a Internet, accede .s opci.ns de configuraci.n na p.xina de inicio de Documentos de Google e activa a sincronizaci.n sen conexi.n a pr.xima vez que esteas conectado a Internet.".. },.. "explanationofflineenabled": {.. "message": "Est.s sen conexi.n. A.nda podes editar os ficheiros dispo.ibles ou crear outros novos.".. },.. "extdesc": {.. "message": "Modifica, crea e consulta os teus documentos, follas de c.lculo e presentaci.ns sen necesidade de acceder a Internet.".. },.. "extname": {.. "message": "Documentos de Google sen conexi.n".. },.. "learnmore": {.. "message": "M.is informaci.n".. },.. "popuphelptext": {.. "message": "Escribe, edita e colabora esteas onde esteas, tanto se tes conexi.n a Internet como se non a tes.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1658
                      Entropy (8bit):4.294833932445159
                      Encrypted:false
                      SSDEEP:24:1HA3k3FzEVeXWuvLujNzAK11RiqRC2sA0O3cEiZ7dPRFFOPtZdK0A41yG3BczKT3:Q4pE4rCjNjw6/0y+5j8ZHA4PBSKr
                      MD5:BC7E1D09028B085B74CB4E04D8A90814
                      SHA1:E28B2919F000B41B41209E56B7BF3A4448456CFE
                      SHA-256:FE8218DF25DB54E633927C4A1640B1A41B8E6CB3360FA386B5382F833B0B237C
                      SHA-512:040A8267D67DB05BBAA52F1FAC3460F58D35C5B73AA76BBF17FA78ACC6D3BFB796A870DD44638F9AC3967E35217578A20D6F0B975CEEEEDBADFC9F65BE7E72C9
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": ".... .....".. },.. "explanationofflinedisabled": {.. "message": "... ...... ... ........ ....... ... Google .......... ..... .... ...., ... .... .... ...... ........ .... ...... ... ...... Google ........ ...... .. ........ .. ... ... ...... ....... .... ....".. },.. "explanationofflineenabled": {.. "message": "... ...... .., ..... ... ... .. ...... ..... ....... ... ... .. .... ... ..... ... ...".. },.. "extdesc": {.. "message": "..... ........., ..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1672
                      Entropy (8bit):4.314484457325167
                      Encrypted:false
                      SSDEEP:48:46G2+ymELbLNzGVx/hXdDtxSRhqv7Qm6/7Lm:4GbxzGVzXdDtx+qzU/7C
                      MD5:98A7FC3E2E05AFFFC1CFE4A029F47476
                      SHA1:A17E077D6E6BA1D8A90C1F3FAF25D37B0FF5A6AD
                      SHA-256:D2D1AFA224CDA388FF1DC8FAC24CDA228D7CE09DE5D375947D7207FA4A6C4F8D
                      SHA-512:457E295C760ABFD29FC6BBBB7FC7D4959287BCA7FB0E3E99EB834087D17EED331DEF18138838D35C48C6DDC8A0134AFFFF1A5A24033F9B5607B355D3D48FDF88
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "... .....".. },.. "explanationofflinedisabled": {.. "message": ".. ...... .... ....... ....... .. .... Google ........ .. ..... .... .. ..., .... ... ....... .. ...... .... .. Google ........ .. ........ .. ...... ... .... .. ...... ....... .... .....".. },.. "explanationofflineenabled": {.. "message": ".. ...... ..., ..... .. .. .. ...... ...... ..... .. .... ... .. .. ...... ... .... ....".. },.. "extdesc": {.. "message": ".... .... ....... ...... ..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):935
                      Entropy (8bit):4.6369398601609735
                      Encrypted:false
                      SSDEEP:24:1HA7sR5k/I+UX/hrcySxG1fIZ3tp/S/d6Gpb+D:YsE/I+UX/hVSxQ03f/Sj+D
                      MD5:25CDFF9D60C5FC4740A48EF9804BF5C7
                      SHA1:4FADECC52FB43AEC084DF9FF86D2D465FBEBCDC0
                      SHA-256:73E6E246CEEAB9875625CD4889FBF931F93B7B9DEAA11288AE1A0F8A6E311E76
                      SHA-512:EF00B08496427FEB5A6B9FB3FE2E5404525BE7C329D9DD2A417480637FD91885837D134A26980DCF9F61E463E6CB68F09A24402805807E656AF16B116A75E02C
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "IZRADI NOVI".. },.. "explanationofflinedisabled": {.. "message": "Vi ste izvan mre.e. Da biste koristili Google dokumente bez internetske veze, idite na postavke na po.etnoj stranici Google dokumenata i uklju.ite izvanmre.nu sinkronizaciju sljede.i put kada se pove.ete s internetom.".. },.. "explanationofflineenabled": {.. "message": "Vi ste izvan mre.e, no i dalje mo.ete ure.ivati dostupne datoteke i izra.ivati nove.".. },.. "extdesc": {.. "message": "Uredite, izradite i pregledajte dokumente, prora.unske tablice i prezentacije . sve bez pristupa internetu.".. },.. "extname": {.. "message": "Google dokumenti izvanmre.no".. },.. "learnmore": {.. "message": "Saznajte vi.e".. },.. "popuphelptext": {.. "message": "Pi.ite, ure.ujte i sura.ujte gdje god se nalazili, povezani s internetom ili izvanmre.no.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1065
                      Entropy (8bit):4.816501737523951
                      Encrypted:false
                      SSDEEP:24:1HA6J54gEYwFFMxv4gvyB9FzmxlsN147g/zJcYwJgrus4QY2jom:NJ54gEYwUmgKHFzmsG7izJcYOgKgYjm
                      MD5:8930A51E3ACE3DD897C9E61A2AEA1D02
                      SHA1:4108506500C68C054BA03310C49FA5B8EE246EA4
                      SHA-256:958C0F664FCA20855FA84293566B2DDB7F297185619143457D6479E6AC81D240
                      SHA-512:126B80CD3428C0BC459EEAAFCBE4B9FDE2541A57F19F3EC7346BAF449F36DC073A9CF015594A57203255941551B25F6FAA6D2C73C57C44725F563883FF902606
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": ".J L.TREHOZ.SA".. },.. "explanationofflinedisabled": {.. "message": "Jelenleg offline .llapotban van. Ha a Google Dokumentumokat internetkapcsolat n.lk.l szeretn. haszn.lni, a legk.zelebbi internethaszn.lata sor.n nyissa meg a Google Dokumentumok kezd.oldal.n tal.lhat. be.ll.t.sokat, .s tiltsa le az offline szinkroniz.l.s be.ll.t.st.".. },.. "explanationofflineenabled": {.. "message": "Offline .llapotban van, de az el.rhet. f.jlokat .gy is szerkesztheti, valamint l.trehozhat .jakat.".. },.. "extdesc": {.. "message": "Szerkesszen, hozzon l.tre .s tekintsen meg dokumentumokat, t.bl.zatokat .s prezent.ci.kat . ak.r internetkapcsolat n.lk.l is.".. },.. "extname": {.. "message": "Google Dokumentumok Offline".. },.. "learnmore": {.. "message": "Tov.bbi inform.ci.".. },.. "popuphelptext": {.. "message": ".rjon, szerkesszen .s dolgozzon egy.tt m.sokkal
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2771
                      Entropy (8bit):3.7629875118570055
                      Encrypted:false
                      SSDEEP:48:Y0Fx+eiYZBZ7K1ZZ/5QQxTuDLoFZaIZSK7lq0iC0mlMO6M3ih1oAgC:lF2BTz6N/
                      MD5:55DE859AD778E0AA9D950EF505B29DA9
                      SHA1:4479BE637A50C9EE8A2F7690AD362A6A8FFC59B2
                      SHA-256:0B16E3F8BD904A767284345AE86A0A9927C47AFE89E05EA2B13AD80009BDF9E4
                      SHA-512:EDAB2FCC14CABB6D116E9C2907B42CFBC34F1D9035F43E454F1F4D1F3774C100CBADF6B4C81B025810ED90FA91C22F1AEFE83056E4543D92527E4FE81C7889A8
                      Malicious:false
                      Preview:{"createnew":{"message":"\u054d\u054f\u0535\u0542\u053e\u0535\u053c \u0546\u0548\u0550"},"explanationofflinedisabled":{"message":"Google \u0553\u0561\u057d\u057f\u0561\u0569\u0572\u0569\u0565\u0580\u0568 \u0576\u0561\u0587 \u0561\u0576\u0581\u0561\u0576\u0581 \u057c\u0565\u056a\u056b\u0574\u0578\u0582\u0574 \u0585\u0563\u057f\u0561\u0563\u0578\u0580\u056e\u0565\u056c\u0578\u0582 \u0570\u0561\u0574\u0561\u0580 \u0574\u056b\u0561\u0581\u0565\u0584 \u0570\u0561\u0574\u0561\u0581\u0561\u0576\u0581\u056b\u0576, \u0562\u0561\u0581\u0565\u0584 \u056e\u0561\u057c\u0561\u0575\u0578\u0582\u0569\u0575\u0561\u0576 \u0563\u056c\u056d\u0561\u057e\u0578\u0580 \u0567\u057b\u0568, \u0561\u0576\u0581\u0565\u0584 \u056f\u0561\u0580\u0563\u0561\u057e\u0578\u0580\u0578\u0582\u0574\u0576\u0565\u0580 \u0587 \u0574\u056b\u0561\u0581\u0580\u0565\u0584 \u0561\u0576\u0581\u0561\u0576\u0581 \u0570\u0561\u0574\u0561\u056a\u0561\u0574\u0561\u0581\u0578\u0582\u0574\u0568:"},"explanationofflineenabled":{"message":"\u
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):858
                      Entropy (8bit):4.474411340525479
                      Encrypted:false
                      SSDEEP:12:1HASvgJX4CBxNpXemNOAJRFqjRpCBxedIdjTi92OvbCSUuoi01uRwCBhUuvz1thK:1HARXzhXemNOQWGcEoeH1eXJNvT2
                      MD5:34D6EE258AF9429465AE6A078C2FB1F5
                      SHA1:612CAE151984449A4346A66C0A0DF4235D64D932
                      SHA-256:E3C86DDD2EFEBE88EED8484765A9868202546149753E03A61EB7C28FD62CFCA1
                      SHA-512:20427807B64A0F79A6349F8A923152D9647DA95C05DE19AD3A4BF7DB817E25227F3B99307C8745DD323A6591B515221BD2F1E92B6F1A1783BDFA7142E84601B1
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "BUAT BARU".. },.. "explanationofflinedisabled": {.. "message": "Anda sedang offline. Untuk menggunakan Google Dokumen tanpa koneksi internet, buka setelan di beranda Google Dokumen dan aktifkan sinkronisasi offline saat terhubung ke internet.".. },.. "explanationofflineenabled": {.. "message": "Anda sedang offline, namun Anda masih dapat mengedit file yang tersedia atau membuat file baru.".. },.. "extdesc": {.. "message": "Edit, buat, dan lihat dokumen, spreadsheet, dan presentasi . tanpa perlu akses internet.".. },.. "extname": {.. "message": "Google Dokumen Offline".. },.. "learnmore": {.. "message": "Pelajari Lebih Lanjut".. },.. "popuphelptext": {.. "message": "Tulis, edit, dan gabungkan di mana saja, dengan atau tanpa koneksi internet.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):954
                      Entropy (8bit):4.631887382471946
                      Encrypted:false
                      SSDEEP:12:YGXU2rOcxGe+J97f9TP2DBX9tMfxqbTMvOfWWgdraqlifVpm0Ekf95MwP9KkJ+je:YwBrD2J2DBLMfFuWvdpY94vioO+uh
                      MD5:1F565FB1C549B18AF8BBFED8DECD5D94
                      SHA1:B57F4BDAE06FF3DFC1EB3E56B6F2F204D6F63638
                      SHA-256:E16325D1A641EF7421F2BAFCD6433D53543C89D498DD96419B03CBA60B9C7D60
                      SHA-512:A60B8E042A9BCDCC136B87948E9924A0B24D67C6CA9803904B876F162A0AD82B9619F1316BE9FF107DD143B44F7E6F5DF604ABFE00818DEB40A7D62917CDA69F
                      Malicious:false
                      Preview:{"createnew":{"message":"B\u00daA TIL N\u00ddTT"},"explanationofflinedisabled":{"message":"\u00de\u00fa ert \u00e1n nettengingar. Til a\u00f0 nota Google skj\u00f6l \u00e1n nettengingar skaltu opna stillingarnar \u00e1 heimas\u00ed\u00f0u Google skjala og virkja samstillingu \u00e1n nettengingar n\u00e6st \u00feegar \u00fe\u00fa tengist netinu."},"explanationofflineenabled":{"message":"Engin nettenging. \u00de\u00fa getur samt sem \u00e1\u00f0ur breytt tilt\u00e6kum skr\u00e1m e\u00f0a b\u00fai\u00f0 til n\u00fdjar."},"extdesc":{"message":"Breyttu, b\u00fa\u00f0u til og sko\u00f0a\u00f0u skj\u00f6lin \u00fe\u00edn, t\u00f6flureikna og kynningar \u2014 allt \u00e1n nettengingar."},"extname":{"message":"Google skj\u00f6l \u00e1n nettengingar"},"learnmore":{"message":"Frekari uppl\u00fdsingar"},"popuphelptext":{"message":"Skrifa\u00f0u, breyttu og starfa\u00f0u me\u00f0 \u00f6\u00f0rum hvort sem nettenging er til sta\u00f0ar e\u00f0a ekki."}}.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):899
                      Entropy (8bit):4.474743599345443
                      Encrypted:false
                      SSDEEP:12:1HASvggrCBxNp8WJOJJrJ3WytVCBxep3bjP5CSUCjV8AgJJm2CBhr+z1tWgjqEOW:1HANXJOTBFtKa8Agju4NB3j
                      MD5:0D82B734EF045D5FE7AA680B6A12E711
                      SHA1:BD04F181E4EE09F02CD53161DCABCEF902423092
                      SHA-256:F41862665B13C0B4C4F562EF1743684CCE29D4BCF7FE3EA494208DF253E33885
                      SHA-512:01F305A280112482884485085494E871C66D40C0B03DE710B4E5F49C6A478D541C2C1FDA2CEAF4307900485946DEE9D905851E98A2EB237642C80D464D1B3ADA
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CREA NUOVO".. },.. "explanationofflinedisabled": {.. "message": "Sei offline. Per utilizzare Documenti Google senza una connessione Internet, apri le impostazioni nella home page di Documenti Google e attiva la sincronizzazione offline la prossima volta che ti colleghi a Internet.".. },.. "explanationofflineenabled": {.. "message": "Sei offline, ma puoi comunque modificare i file disponibili o crearne di nuovi.".. },.. "extdesc": {.. "message": "Modifica, crea e visualizza documenti, fogli di lavoro e presentazioni, senza accesso a Internet.".. },.. "extname": {.. "message": "Documenti Google offline".. },.. "learnmore": {.. "message": "Ulteriori informazioni".. },.. "popuphelptext": {.. "message": "Scrivi, modifica e collabora ovunque ti trovi, con o senza una connessione Internet.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2230
                      Entropy (8bit):3.8239097369647634
                      Encrypted:false
                      SSDEEP:24:YIiTVLrLD1MEzMEH82LBLjO5YaQEqLytLLBm3dnA5LcqLWAU75yxFLcx+UxWRJLI:YfTFf589rZNgNA12Qzt4/zRz2vc
                      MD5:26B1533C0852EE4661EC1A27BD87D6BF
                      SHA1:18234E3ABAF702DF9330552780C2F33B83A1188A
                      SHA-256:BBB81C32F482BA3216C9B1189C70CEF39CA8C2181AF3538FFA07B4C6AD52F06A
                      SHA-512:450BFAF0E8159A4FAE309737EA69CA8DD91CAAFD27EF662087C4E7716B2DCAD3172555898E75814D6F11487F4F254DE8625EF0CFEA8DF0133FC49E18EC7FD5D2
                      Malicious:false
                      Preview:{"createnew":{"message":"\u05d9\u05e6\u05d9\u05e8\u05ea \u05d7\u05d3\u05e9"},"explanationofflinedisabled":{"message":"\u05d0\u05d9\u05df \u05dc\u05da \u05d7\u05d9\u05d1\u05d5\u05e8 \u05dc\u05d0\u05d9\u05e0\u05d8\u05e8\u05e0\u05d8. \u05db\u05d3\u05d9 \u05dc\u05d4\u05e9\u05ea\u05de\u05e9 \u05d1-Google Docs \u05dc\u05dc\u05d0 \u05d7\u05d9\u05d1\u05d5\u05e8 \u05dc\u05d0\u05d9\u05e0\u05d8\u05e8\u05e0\u05d8, \u05d1\u05d4\u05ea\u05d7\u05d1\u05e8\u05d5\u05ea \u05d4\u05d1\u05d0\u05d4 \u05dc\u05d0\u05d9\u05e0\u05d8\u05e8\u05e0\u05d8, \u05d9\u05e9 \u05dc\u05e2\u05d1\u05d5\u05e8 \u05dc\u05e7\u05d8\u05e2 \u05d4\u05d4\u05d2\u05d3\u05e8\u05d5\u05ea \u05d1\u05d3\u05e3 \u05d4\u05d1\u05d9\u05ea \u05e9\u05dc Google Docs \u05d5\u05dc\u05d4\u05e4\u05e2\u05d9\u05dc \u05e1\u05e0\u05db\u05e8\u05d5\u05df \u05d1\u05de\u05e6\u05d1 \u05d0\u05d5\u05e4\u05dc\u05d9\u05d9\u05df."},"explanationofflineenabled":{"message":"\u05d0\u05d9\u05df \u05dc\u05da \u05d7\u05d9\u05d1\u05d5\u05e8 \u05dc\u05d0\u05d9\u05e0\u05d8\u05e
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1160
                      Entropy (8bit):5.292894989863142
                      Encrypted:false
                      SSDEEP:24:1HAoc3IiRF1viQ1RF3CMP3rnicCCAFrr1Oo0Y5ReXCCQkb:Dc3zF7F3CMTnOCAFVLHXCFb
                      MD5:15EC1963FC113D4AD6E7E59AE5DE7C0A
                      SHA1:4017FC6D8B302335469091B91D063B07C9E12109
                      SHA-256:34AC08F3C4F2D42962A3395508818B48CA323D22F498738CC9F09E78CB197D73
                      SHA-512:427251F471FA3B759CA1555E9600C10F755BC023701D058FF661BEC605B6AB94CFB3456C1FEA68D12B4D815FFBAFABCEB6C12311DD1199FC783ED6863AF97C0F
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "....".. },.. "explanationofflinedisabled": {.. "message": "....................... Google ............................... Google .............. [..] .......[.......] ...........".. },.. "explanationofflineenabled": {.. "message": ".............................................".. },.. "extdesc": {.. "message": ".........................................................".. },.. "extname": {.. "message": "Google ..... ......".. },.. "learnmore": {.. "message": "..".. },.. "popuphelp
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):3264
                      Entropy (8bit):3.586016059431306
                      Encrypted:false
                      SSDEEP:48:YGFbhVhVn0nM/XGbQTvxnItVJW/476CFdqaxWNlR:HFbhV/n0MfGbw875FkaANlR
                      MD5:83F81D30913DC4344573D7A58BD20D85
                      SHA1:5AD0E91EA18045232A8F9DF1627007FE506A70E0
                      SHA-256:30898BBF51BDD58DB397FF780F061E33431A38EF5CFC288B5177ECF76B399F26
                      SHA-512:85F97F12AD4482B5D9A6166BB2AE3C4458A582CF575190C71C1D8E0FB87C58482F8C0EFEAD56E3A70EDD42BED945816DB5E07732AD27B8FFC93F4093710DD58F
                      Malicious:false
                      Preview:{"createnew":{"message":"\u10d0\u10ee\u10da\u10d8\u10e1 \u10e8\u10d4\u10e5\u10db\u10dc\u10d0"},"explanationofflinedisabled":{"message":"\u10d7\u10e5\u10d5\u10d4\u10dc \u10ee\u10d0\u10d6\u10d2\u10d0\u10e0\u10d4\u10e8\u10d4 \u10ee\u10d0\u10e0\u10d7. Google Docs-\u10d8\u10e1 \u10d8\u10dc\u10e2\u10d4\u10e0\u10dc\u10d4\u10e2\u10d7\u10d0\u10dc \u10d9\u10d0\u10d5\u10e8\u10d8\u10e0\u10d8\u10e1 \u10d2\u10d0\u10e0\u10d4\u10e8\u10d4 \u10d2\u10d0\u10db\u10dd\u10e1\u10d0\u10e7\u10d4\u10dc\u10d4\u10d1\u10da\u10d0\u10d3 \u10d2\u10d0\u10d3\u10d0\u10d3\u10d8\u10d7 \u10de\u10d0\u10e0\u10d0\u10db\u10d4\u10e2\u10e0\u10d4\u10d1\u10d6\u10d4 Google Docs-\u10d8\u10e1 \u10db\u10d7\u10d0\u10d5\u10d0\u10e0 \u10d2\u10d5\u10d4\u10e0\u10d3\u10d6\u10d4 \u10d3\u10d0 \u10e9\u10d0\u10e0\u10d7\u10d4\u10d7 \u10ee\u10d0\u10d6\u10d2\u10d0\u10e0\u10d4\u10e8\u10d4 \u10e1\u10d8\u10dc\u10e5\u10e0\u10dd\u10dc\u10d8\u10d6\u10d0\u10ea\u10d8\u10d0, \u10e0\u10dd\u10d3\u10d4\u10e1\u10d0\u10ea \u10e8\u10d4\u10db\u10d3\u10d2\u10dd\u10
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):3235
                      Entropy (8bit):3.6081439490236464
                      Encrypted:false
                      SSDEEP:96:H3E+6rOEAbeHTln2EQ77Uayg45RjhCSj+OyRdM7AE9qdV:HXcR/nQXUayYV
                      MD5:2D94A58795F7B1E6E43C9656A147AD3C
                      SHA1:E377DB505C6924B6BFC9D73DC7C02610062F674E
                      SHA-256:548DC6C96E31A16CE355DC55C64833B08EF3FBA8BF33149031B4A685959E3AF4
                      SHA-512:F51CC857E4CF2D4545C76A2DCE7D837381CE59016E250319BF8D39718BE79F9F6EE74EA5A56DE0E8759E4E586D93430D51651FC902376D8A5698628E54A0F2D8
                      Malicious:false
                      Preview:{"createnew":{"message":"\u0416\u0410\u04a2\u0410\u0421\u042b\u041d \u0416\u0410\u0421\u0410\u0423"},"explanationofflinedisabled":{"message":"\u0421\u0456\u0437 \u043e\u0444\u043b\u0430\u0439\u043d \u0440\u0435\u0436\u0438\u043c\u0456\u043d\u0434\u0435\u0441\u0456\u0437. Google Docs \u049b\u043e\u043b\u0434\u0430\u043d\u0431\u0430\u0441\u044b\u043d \u0436\u0435\u043b\u0456 \u0431\u0430\u0439\u043b\u0430\u043d\u044b\u0441\u044b\u043d\u0441\u044b\u0437 \u049b\u043e\u043b\u0434\u0430\u043d\u0443 \u04af\u0448\u0456\u043d, \u043a\u0435\u043b\u0435\u0441\u0456 \u0436\u043e\u043b\u044b \u0436\u0435\u043b\u0456\u0433\u0435 \u049b\u043e\u0441\u044b\u043b\u0493\u0430\u043d\u0434\u0430, Google Docs \u043d\u0435\u0433\u0456\u0437\u0433\u0456 \u0431\u0435\u0442\u0456\u043d\u0435\u043d \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u043b\u0435\u0440 \u0431\u04e9\u043b\u0456\u043c\u0456\u043d \u043a\u0456\u0440\u0456\u043f, \u043e\u0444\u043b\u0430\u0439\u043d \u0440\u0435\u0436\u0438\u043c\u0456\u
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):3122
                      Entropy (8bit):3.891443295908904
                      Encrypted:false
                      SSDEEP:96:/OOrssRU6Bg7VSdL+zsCfoZiWssriWqo2gx7RRCos2sEeBkS7Zesg:H5GRZlXsGdo
                      MD5:B3699C20A94776A5C2F90AEF6EB0DAD9
                      SHA1:1F9B968B0679A20FA097624C9ABFA2B96C8C0BEA
                      SHA-256:A6118F0A0DE329E07C01F53CD6FB4FED43E54C5F53DB4CD1C7F5B2B4D9FB10E6
                      SHA-512:1E8D15B8BFF1D289434A244172F9ED42B4BB6BCB6372C1F300B01ACEA5A88167E97FEDABA0A7AE3BEB5E24763D1B09046AE8E30745B80E2E2FE785C94DF362F6
                      Malicious:false
                      Preview:{"createnew":{"message":"\u1794\u1784\u17d2\u1780\u17be\u178f\u200b\u1790\u17d2\u1798\u17b8"},"explanationofflinedisabled":{"message":"\u17a2\u17d2\u1793\u1780\u200b\u1782\u17d2\u1798\u17b6\u1793\u200b\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f\u17d4 \u178a\u17be\u1798\u17d2\u1794\u17b8\u200b\u1794\u17d2\u179a\u17be Google \u17af\u1780\u179f\u17b6\u179a\u200b\u1794\u17b6\u1793\u200b\u200b\u178a\u17c4\u1799\u200b\u200b\u1798\u17b7\u1793\u1798\u17b6\u1793\u200b\u200b\u200b\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f \u179f\u17bc\u1798\u200b\u200b\u1791\u17c5\u200b\u1780\u17b6\u1793\u17cb\u200b\u1780\u17b6\u179a\u200b\u1780\u17c6\u178e\u178f\u17cb\u200b\u1793\u17c5\u200b\u179b\u17be\u200b\u1782\u17c1\u17a0\u1791\u17c6\u1796\u17d0\u179a Google \u17af\u1780\u179f\u17b6\u179a \u1793\u17b7\u1784\u200b\u1794\u17be\u1780\u200b\u1780\u17b6\u179a\u1792\u17d2\u179c\u17be\u200b\u179f\u1798\u1780\u17b6\u179b\u1780\u1798\u17d2\u1798\u200b\u200b\u200b\u1782\u17d2\u1798\u17b6\u1793
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1880
                      Entropy (8bit):4.295185867329351
                      Encrypted:false
                      SSDEEP:48:SHYGuEETiuF6OX5tCYFZt5GurMRRevsY4tVZIGnZRxlKT6/UGG:yYG8iuF6yTCYFH5GjLPtVZVZRxOZZ
                      MD5:8E16966E815C3C274EEB8492B1EA6648
                      SHA1:7482ED9F1C9FD9F6F9BA91AB15921B19F64C9687
                      SHA-256:418FF53FCA505D54268413C796E4DF80E947A09F399AB222A90B81E93113D5B5
                      SHA-512:85B28202E874B1CF45B37BA05B87B3D8D6FE38E89C6011C4240CF6B563EA6DA60181D712CCE20D07C364F4A266A4EC90C4934CC8B7BB2013CB3B22D755796E38
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "........ .....".. },.. "explanationofflinedisabled": {.. "message": ".... ..................... ......... ............. Google ...... ....., Google ...... ............ ............... .... ..... ...... .... .... ............ ............. ........ ..... ... .....".. },.. "explanationofflineenabled": {.. "message": ".... ...................., .... .... .... ......... ........... ............ .... ........ .........."..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1042
                      Entropy (8bit):5.3945675025513955
                      Encrypted:false
                      SSDEEP:24:1HAWYsF4dqNfBQH49Hk8YfIhYzTJ+6WJBtl/u4s+6:ZF4wNfvm87mX4LF6
                      MD5:F3E59EEEB007144EA26306C20E04C292
                      SHA1:83E7BDFA1F18F4C7534208493C3FF6B1F2F57D90
                      SHA-256:C52D9B955D229373725A6E713334BBB31EA72EFA9B5CF4FBD76A566417B12CAC
                      SHA-512:7808CB5FF041B002CBD78171EC5A0B4DBA3E017E21F7E8039084C2790F395B839BEE04AD6C942EED47CCB53E90F6DE818A725D1450BF81BA2990154AFD3763AF
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": ".. ...".. },.. "explanationofflinedisabled": {.. "message": ".... ...... ... .. .. Google Docs. ..... Google Docs .... .... .... .... .... ..... . .... .... ..... ......".. },.. "explanationofflineenabled": {.. "message": ".... ...... ... .. ... ... ..... ... ... .. . .....".. },.. "extdesc": {.. "message": ".... .... ... .., ...... . ....... .., .., ......".. },.. "extname": {.. "message": "Google Docs ....".. },.. "learnmore": {.. "message": "... ....".. },.. "popuphelptext": {.. "message": "... .. ... .... ..... .... .... .....
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2535
                      Entropy (8bit):3.8479764584971368
                      Encrypted:false
                      SSDEEP:48:YRcHe/4raK1EIlZt1wg62FIOg+xGaF8guI5EP9I2yC:+cs4raK1xlZtOgviOfGaF8RI5EP95b
                      MD5:E20D6C27840B406555E2F5091B118FC5
                      SHA1:0DCECC1A58CEB4936E255A64A2830956BFA6EC14
                      SHA-256:89082FB05229826BC222F5D22C158235F025F0E6DF67FF135A18BD899E13BB8F
                      SHA-512:AD53FC0B153005F47F9F4344DF6C4804049FAC94932D895FD02EEBE75222CFE77EEDD9CD3FDC4C88376D18C5972055B00190507AA896488499D64E884F84F093
                      Malicious:false
                      Preview:{"createnew":{"message":"\u0eaa\u0ec9\u0eb2\u0e87\u0ec3\u0edd\u0ec8"},"explanationofflinedisabled":{"message":"\u0e97\u0ec8\u0eb2\u0e99\u0ead\u0ead\u0e9a\u0ea5\u0eb2\u0e8d\u0ea2\u0eb9\u0ec8. \u0ec0\u0e9e\u0eb7\u0ec8\u0ead\u0ec3\u0e8a\u0ec9 Google Docs \u0ec2\u0e94\u0e8d\u0e9a\u0ecd\u0ec8\u0ec0\u0e8a\u0eb7\u0ec8\u0ead\u0ea1\u0e95\u0ecd\u0ec8\u0ead\u0eb4\u0e99\u0ec0\u0e95\u0eb5\u0ec0\u0e99\u0eb1\u0e94, \u0ec3\u0eab\u0ec9\u0ec4\u0e9b\u0e97\u0eb5\u0ec8\u0e81\u0eb2\u0e99\u0e95\u0eb1\u0ec9\u0e87\u0e84\u0ec8\u0eb2\u0ec3\u0e99\u0edc\u0ec9\u0eb2 Google Docs \u0ec1\u0ea5\u0ec9\u0ea7\u0ec0\u0e9b\u0eb5\u0e94\u0ec3\u0e8a\u0ec9\u0e81\u0eb2\u0e99\u0e8a\u0eb4\u0ec9\u0e87\u0ec1\u0e9a\u0e9a\u0ead\u0ead\u0e9a\u0ea5\u0eb2\u0e8d\u0ec3\u0e99\u0ec0\u0e97\u0eb7\u0ec8\u0ead\u0e95\u0ecd\u0ec8\u0ec4\u0e9b\u0e97\u0eb5\u0ec8\u0e97\u0ec8\u0eb2\u0e99\u0ec0\u0e8a\u0eb7\u0ec8\u0ead\u0ea1\u0e95\u0ecd\u0ec8\u0ead\u0eb4\u0e99\u0ec0\u0e95\u0eb5\u0ec0\u0e99\u0eb1\u0e94."},"explanationofflineenabled":{"message":"\u0e97\u0ec
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1028
                      Entropy (8bit):4.797571191712988
                      Encrypted:false
                      SSDEEP:24:1HAivZZaJ3Rje394+k7IKgpAJjUpSkiQjuRBMd:fZZahBeu7IKgqeMg
                      MD5:970544AB4622701FFDF66DC556847652
                      SHA1:14BEE2B77EE74C5E38EBD1DB09E8D8104CF75317
                      SHA-256:5DFCBD4DFEAEC3ABE973A78277D3BD02CD77AE635D5C8CD1F816446C61808F59
                      SHA-512:CC12D00C10B970189E90D47390EEB142359A8D6F3A9174C2EF3AE0118F09C88AB9B689D9773028834839A7DFAF3AAC6747BC1DCB23794A9F067281E20B8DC6EA
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "SUKURTI NAUJ.".. },.. "explanationofflinedisabled": {.. "message": "Esate neprisijung.. Jei norite naudoti .Google. dokumentus be interneto ry.io, pagrindiniame .Google. dokument. puslapyje eikite . nustatym. skilt. ir .junkite sinchronizavim. neprisijungus, kai kit. kart. b.site prisijung. prie interneto.".. },.. "explanationofflineenabled": {.. "message": "Esate neprisijung., bet vis tiek galite redaguoti pasiekiamus failus arba sukurti nauj..".. },.. "extdesc": {.. "message": "Redaguokite, kurkite ir per.i.r.kite savo dokumentus, skai.iuokles ir pristatymus . visk. darykite be prieigos prie interneto.".. },.. "extname": {.. "message": ".Google. dokumentai neprisijungus".. },.. "learnmore": {.. "message": "Su.inoti daugiau".. },.. "popuphelptext": {.. "message": "Ra.ykite, redaguokite ir bendradarbiaukite bet kurioje vietoje naudodami interneto ry.. arba
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):994
                      Entropy (8bit):4.700308832360794
                      Encrypted:false
                      SSDEEP:24:1HAaJ7a/uNpoB/Y4vPnswSPkDzLKFQHpp//BpPDB:7J7a/uzQ/Y4vvswhDzDr/LDB
                      MD5:A568A58817375590007D1B8ABCAEBF82
                      SHA1:B0F51FE6927BB4975FC6EDA7D8A631BF0C1AB597
                      SHA-256:0621DE9161748F45D53052ED8A430962139D7F19074C7FFE7223ECB06B0B87DB
                      SHA-512:FCFBADEC9F73975301AB404DB6B09D31457FAC7CCAD2FA5BE348E1CAD6800F87CB5B56DE50880C55BBADB3C40423351A6B5C2D03F6A327D898E35F517B1C628C
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "IZVEIDOT JAUNU".. },.. "explanationofflinedisabled": {.. "message": "J.s esat bezsaist.. Lai lietotu pakalpojumu Google dokumenti bez interneta savienojuma, n.kamaj. reiz., kad ir izveidots savienojums ar internetu, atveriet Google dokumentu s.kumlapas iestat.jumu izv.lni un iesl.dziet sinhroniz.ciju bezsaist..".. },.. "explanationofflineenabled": {.. "message": "J.s esat bezsaist., ta.u varat redi..t pieejamos failus un izveidot jaunus.".. },.. "extdesc": {.. "message": "Redi..jiet, veidojiet un skatiet savus dokumentus, izkl.jlapas un prezent.cijas, neizmantojot savienojumu ar internetu.".. },.. "extname": {.. "message": "Google dokumenti bezsaist.".. },.. "learnmore": {.. "message": "Uzziniet vair.k".. },.. "popuphelptext": {.. "message": "Rakstiet, redi..jiet un sadarbojieties ar interneta savienojumu vai bez t. neatkar.gi no t., kur atrodaties.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2091
                      Entropy (8bit):4.358252286391144
                      Encrypted:false
                      SSDEEP:24:1HAnHdGc4LtGxVY6IuVzJkeNL5kP13a67wNcYP8j5PIaSTIjPU4ELFPCWJjMupV/:idGcyYPVtkAUl7wqziBsg9DbpN6XoN/
                      MD5:4717EFE4651F94EFF6ACB6653E868D1A
                      SHA1:B8A7703152767FBE1819808876D09D9CC1C44450
                      SHA-256:22CA9415E294D9C3EC3384B9D08CDAF5164AF73B4E4C251559E09E529C843EA6
                      SHA-512:487EAB4938F6BC47B1D77DD47A5E2A389B94E01D29849E38E96C95CABC7BD98679451F0E22D3FEA25C045558CD69FDDB6C4FEF7C581141F1C53C4AA17578D7F7
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "....... ............".. },.. "explanationofflinedisabled": {.. "message": "...... ........... ........... ............. ..... Google ....... ..........., Google ....... .......... ............. .... ...... ...... ... ............... .................... '.......... ................' .........".. },.. "explanationofflineenabled": {.. "message": "................., .......... ......... ....... ...... ..............
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2778
                      Entropy (8bit):3.595196082412897
                      Encrypted:false
                      SSDEEP:48:Y943BFU1LQ4HwQLQ4LQhlmVQL3QUm6H6ZgFIcwn6Rs2ShpQ3IwjGLQSJ/PYoEQj8:I43BCymz8XNcfuQDXYN2sum
                      MD5:83E7A14B7FC60D4C66BF313C8A2BEF0B
                      SHA1:1CCF1D79CDED5D65439266DB58480089CC110B18
                      SHA-256:613D8751F6CC9D3FA319F4B7EA8B2BD3BED37FD077482CA825929DD7C12A69A8
                      SHA-512:3742E24FFC4B5283E6EE496813C1BDC6835630D006E8647D427C3DE8B8E7BF814201ADF9A27BFAB3ABD130B6FEC64EBB102AC0EB8DEDFE7B63D82D3E1233305D
                      Malicious:false
                      Preview:{"createnew":{"message":"\u0428\u0418\u041d\u0418\u0419\u0413 \u04ae\u04ae\u0421\u0413\u042d\u0425"},"explanationofflinedisabled":{"message":"\u0422\u0430 \u043e\u0444\u043b\u0430\u0439\u043d \u0431\u0430\u0439\u043d\u0430. Google \u0414\u043e\u043a\u044b\u0433 \u0438\u043d\u0442\u0435\u0440\u043d\u044d\u0442\u0433\u04af\u0439\u0433\u044d\u044d\u0440 \u0430\u0448\u0438\u0433\u043b\u0430\u0445\u044b\u043d \u0442\u0443\u043b\u0434 \u0434\u0430\u0440\u0430\u0430\u0433\u0438\u0439\u043d \u0443\u0434\u0430\u0430 \u0438\u043d\u0442\u0435\u0440\u043d\u044d\u0442\u044d\u0434 \u0445\u043e\u043b\u0431\u043e\u0433\u0434\u043e\u0445\u0434\u043e\u043e Google \u0414\u043e\u043a\u044b\u043d \u043d\u04af\u04af\u0440 \u0445\u0443\u0443\u0434\u0430\u0441\u043d\u0430\u0430\u0441 \u0442\u043e\u0445\u0438\u0440\u0433\u043e\u043e \u0434\u043e\u0442\u043e\u0440\u0445 \u043e\u0444\u043b\u0430\u0439\u043d \u0441\u0438\u043d\u043a\u0438\u0439\u0433 \u0438\u0434\u044d\u0432\u0445\u0436\u04af\u04af\u043b\u043d\u0
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1719
                      Entropy (8bit):4.287702203591075
                      Encrypted:false
                      SSDEEP:48:65/5EKaDMw6pEf4I5+jSksOTJqQyrFO8C:65/5EKaAw6pEf4I5+vsOVqQyFO8C
                      MD5:3B98C4ED8874A160C3789FEAD5553CFA
                      SHA1:5550D0EC548335293D962AAA96B6443DD8ABB9F6
                      SHA-256:ADEB082A9C754DFD5A9D47340A3DDCC19BF9C7EFA6E629A2F1796305F1C9A66F
                      SHA-512:5139B6C6DF9459C7B5CDC08A98348891499408CD75B46519BA3AC29E99AAAFCC5911A1DEE6C3A57E3413DBD0FAE72D7CBC676027248DCE6364377982B5CE4151
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": ".... .... ...".. },.. "explanationofflinedisabled": {.. "message": "...... ...... ..... ......... ....... ....... ..... Google ....... ............, Google ....... .............. .......... .. ... ..... .... ...... ......... ...... ...... ...... .... .... ....".. },.. "explanationofflineenabled": {.. "message": "...... ...... ...., ..... ...... ...... ...... .... ....... ... ..... .... .... ... .....".. },.. "extdesc": {.. "message": "..... ..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):936
                      Entropy (8bit):4.457879437756106
                      Encrypted:false
                      SSDEEP:24:1HARXIqhmemNKsE27rhdfNLChtyo2JJ/YgTgin:iIqFC7lrDfNLCIBRzn
                      MD5:7D273824B1E22426C033FF5D8D7162B7
                      SHA1:EADBE9DBE5519BD60458B3551BDFC36A10049DD1
                      SHA-256:2824CF97513DC3ECC261F378BFD595AE95A5997E9D1C63F5731A58B1F8CD54F9
                      SHA-512:E5B611BBFAB24C9924D1D5E1774925433C65C322769E1F3B116254B1E9C69B6DF1BE7828141EEBBF7524DD179875D40C1D8F29C4FB86D663B8A365C6C60421A7
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "BUAT BAHARU".. },.. "explanationofflinedisabled": {.. "message": "Anda berada di luar talian. Untuk menggunakan Google Docs tanpa sambungan Internet, pergi ke tetapan di halaman utama Google Docs dan hidupkan penyegerakan luar talian apabila anda disambungkan ke Internet selepas ini.".. },.. "explanationofflineenabled": {.. "message": "Anda berada di luar talian, tetapi anda masih boleh mengedit fail yang tersedia atau buat fail baharu.".. },.. "extdesc": {.. "message": "Edit, buat dan lihat dokumen, hamparan dan pembentangan anda . kesemuanya tanpa akses Internet.".. },.. "extname": {.. "message": "Google Docs Luar Talian".. },.. "learnmore": {.. "message": "Ketahui Lebih Lanjut".. },.. "popuphelptext": {.. "message": "Tulis, edit dan bekerjasama di mana-mana sahaja anda berada, dengan atau tanpa sambungan Internet.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):3830
                      Entropy (8bit):3.5483353063347587
                      Encrypted:false
                      SSDEEP:48:Ya+Ivxy6ur1+j3P7Xgr5ELkpeCgygyOxONHO3pj6H57ODyOXOVp6:8Uspsj3P3ty2a66xl09
                      MD5:342335A22F1886B8BC92008597326B24
                      SHA1:2CB04F892E430DCD7705C02BF0A8619354515513
                      SHA-256:243BEFBD6B67A21433DCC97DC1A728896D3A070DC20055EB04D644E1BB955FE7
                      SHA-512:CD344D060E30242E5A4705547E807CE3CE2231EE983BB9A8AD22B3E7598A7EC87399094B04A80245AD51D039370F09D74FE54C0B0738583884A73F0C7E888AD8
                      Malicious:false
                      Preview:{"createnew":{"message":"\u1021\u101e\u1005\u103a \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u101b\u1014\u103a"},"explanationofflinedisabled":{"message":"\u101e\u1004\u103a \u1021\u1031\u102c\u1037\u1016\u103a\u101c\u102d\u102f\u1004\u103a\u1038\u1016\u103c\u1005\u103a\u1014\u1031\u1015\u102b\u101e\u100a\u103a\u104b \u1021\u1004\u103a\u1010\u102c\u1014\u1000\u103a\u1001\u103b\u102d\u1010\u103a\u1006\u1000\u103a\u1019\u103e\u102f \u1019\u101b\u103e\u102d\u1018\u1032 Google Docs \u1000\u102d\u102f \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u101b\u1014\u103a \u1014\u1031\u102c\u1000\u103a\u1010\u1005\u103a\u1000\u103c\u102d\u1019\u103a \u101e\u1004\u103a\u1021\u1004\u103a\u1010\u102c\u1014\u1000\u103a\u1001\u103b\u102d\u1010\u103a\u1006\u1000\u103a\u101e\u100a\u1037\u103a\u1021\u1001\u102b Google Docs \u1015\u1004\u103a\u1019\u1005\u102c\u1019\u103b\u1000\u103a\u1014\u103e\u102c\u101b\u103e\u102d \u1006\u1000\u103a\u1010\u1004\u103a\u1019\u103b\u102c\u1038\u101e\u102d\u102f\u1037\u1
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1898
                      Entropy (8bit):4.187050294267571
                      Encrypted:false
                      SSDEEP:24:1HAmQ6ZSWfAx6fLMr48tE/cAbJtUZJScSIQoAfboFMiQ9pdvz48YgqG:TQ6W6MbkcAltUJxQdfbqQ9pp0gqG
                      MD5:B1083DA5EC718D1F2F093BD3D1FB4F37
                      SHA1:74B6F050D918448396642765DEF1AD5390AB5282
                      SHA-256:E6ED0A023EF31705CCCBAF1E07F2B4B2279059296B5CA973D2070417BA16F790
                      SHA-512:7102B90ABBE2C811E8EE2F1886A73B1298D4F3D5D05F0FFDB57CF78B9A49A25023A290B255BAA4895BB150B388BAFD9F8432650B8C70A1A9A75083FFFCD74F1A
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": ".... ....... .........".. },.. "explanationofflinedisabled": {.. "message": "..... ...... .......... .... ........ .... .... Google ........ ...... .... ..... ..... ... .......... ....... .... Google ........ .......... ..... .......... .. ...... ..... .... ..... ......... .. ..........".. },.. "explanationofflineenabled": {.. "message": "..... ...... ........., .. ..... ... ... ...... ....... ....... .. .... ....... ....
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):914
                      Entropy (8bit):4.513485418448461
                      Encrypted:false
                      SSDEEP:12:1HASvgFARCBxNBv52/fXjOXl6W6ICBxeBvMzU1CSUJAO6SFAIVIbCBhZHdb1tvz+:1HABJx4X6QDwEzlm2uGvYzKU
                      MD5:32DF72F14BE59A9BC9777113A8B21DE6
                      SHA1:2A8D9B9A998453144307DD0B700A76E783062AD0
                      SHA-256:F3FE1FFCB182183B76E1B46C4463168C746A38E461FD25CA91FF2A40846F1D61
                      SHA-512:E0966F5CCA5A8A6D91C58D716E662E892D1C3441DAA5D632E5E843839BB989F620D8AC33ED3EDBAFE18D7306B40CD0C4639E5A4E04DA2C598331DACEC2112AAD
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "NIEUW MAKEN".. },.. "explanationofflinedisabled": {.. "message": "Je bent offline. Wil je Google Documenten zonder internetverbinding gebruiken, ga dan de volgende keer dat je verbinding met internet hebt naar 'Instellingen' op de homepage van Google Documenten en zet 'Offline synchronisatie' aan.".. },.. "explanationofflineenabled": {.. "message": "Je bent offline, maar je kunt nog wel beschikbare bestanden bewerken of nieuwe bestanden maken.".. },.. "extdesc": {.. "message": "Bewerk, maak en bekijk je documenten, spreadsheets en presentaties. Allemaal zonder internettoegang.".. },.. "extname": {.. "message": "Offline Documenten".. },.. "learnmore": {.. "message": "Meer informatie".. },.. "popuphelptext": {.. "message": "Overal schrijven, bewerken en samenwerken, met of zonder internetverbinding.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):878
                      Entropy (8bit):4.4541485835627475
                      Encrypted:false
                      SSDEEP:24:1HAqwwrJ6wky68uk+NILxRGJwBvDyrj9V:nwwQwky6W+NwswVyT
                      MD5:A1744B0F53CCF889955B95108367F9C8
                      SHA1:6A5A6771DFF13DCB4FD425ED839BA100B7123DE0
                      SHA-256:21CEFF02B45A4BFD60D144879DFA9F427949A027DD49A3EB0E9E345BD0B7C9A8
                      SHA-512:F55E43F14514EECB89F6727A0D3C234149609020A516B193542B5964D2536D192F40CC12D377E70C683C269A1BDCDE1C6A0E634AA84A164775CFFE776536A961
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "OPPRETT NYTT".. },.. "explanationofflinedisabled": {.. "message": "Du er uten nett. For . bruke Google Dokumenter uten internettilkobling, g. til innstillingene p. Google Dokumenter-nettsiden og sl. p. synkronisering uten nett neste gang du er koblet til Internett.".. },.. "explanationofflineenabled": {.. "message": "Du er uten nett, men du kan likevel endre tilgjengelige filer eller opprette nye.".. },.. "extdesc": {.. "message": "Rediger, opprett og se dokumentene, regnearkene og presentasjonene dine . uten nettilgang.".. },.. "extname": {.. "message": "Google Dokumenter uten nett".. },.. "learnmore": {.. "message": "Finn ut mer".. },.. "popuphelptext": {.. "message": "Skriv, rediger eller samarbeid uansett hvor du er, med eller uten internettilkobling.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2766
                      Entropy (8bit):3.839730779948262
                      Encrypted:false
                      SSDEEP:48:YEH6/o0iZbNCbDMUcipdkNtQjsGKIhO9aBjj/nxt9o5nDAj3:p6wbZbEbvJ8jQkIhO9aBjb/90Ab
                      MD5:97F769F51B83D35C260D1F8CFD7990AF
                      SHA1:0D59A76564B0AEE31D0A074305905472F740CECA
                      SHA-256:BBD37D41B7DE6F93948FA2437A7699D4C30A3C39E736179702F212CB36A3133C
                      SHA-512:D91F5E2D22FC2D7F73C1F1C4AF79DB98FCFD1C7804069AE9B2348CBC729A6D2DFF7FB6F44D152B0BDABA6E0D05DFF54987E8472C081C4D39315CEC2CBC593816
                      Malicious:false
                      Preview:{"createnew":{"message":"\u0a28\u0a35\u0a3e\u0a02 \u0a2c\u0a23\u0a3e\u0a13"},"explanationofflinedisabled":{"message":"\u0a24\u0a41\u0a38\u0a40\u0a02 \u0a06\u0a2b\u0a3c\u0a32\u0a3e\u0a08\u0a28 \u0a39\u0a4b\u0964 \u0a07\u0a70\u0a1f\u0a30\u0a28\u0a48\u0a71\u0a1f \u0a15\u0a28\u0a48\u0a15\u0a36\u0a28 \u0a26\u0a47 \u0a2c\u0a3f\u0a28\u0a3e\u0a02 Google Docs \u0a28\u0a42\u0a70 \u0a35\u0a30\u0a24\u0a23 \u0a32\u0a08, \u0a05\u0a17\u0a32\u0a40 \u0a35\u0a3e\u0a30 \u0a1c\u0a26\u0a4b\u0a02 \u0a24\u0a41\u0a38\u0a40\u0a02 \u0a07\u0a70\u0a1f\u0a30\u0a28\u0a48\u0a71\u0a1f \u0a26\u0a47 \u0a28\u0a3e\u0a32 \u0a15\u0a28\u0a48\u0a15\u0a1f \u0a39\u0a4b\u0a35\u0a4b \u0a24\u0a3e\u0a02 Google Docs \u0a2e\u0a41\u0a71\u0a16 \u0a2a\u0a70\u0a28\u0a47 '\u0a24\u0a47 \u0a38\u0a48\u0a1f\u0a3f\u0a70\u0a17\u0a3e\u0a02 \u0a35\u0a3f\u0a71\u0a1a \u0a1c\u0a3e\u0a13 \u0a05\u0a24\u0a47 \u0a06\u0a2b\u0a3c\u0a32\u0a3e\u0a08\u0a28 \u0a38\u0a3f\u0a70\u0a15 \u0a28\u0a42\u0a70 \u0a1a\u0a3e\u0a32\u0a42 \u0a15\u0a30\u0a4b\u0964"},"expla
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):978
                      Entropy (8bit):4.879137540019932
                      Encrypted:false
                      SSDEEP:24:1HApiJiRelvm3wi8QAYcbm24sK+tFJaSDD:FJMx3whxYcbNp
                      MD5:B8D55E4E3B9619784AECA61BA15C9C0F
                      SHA1:B4A9C9885FBEB78635957296FDDD12579FEFA033
                      SHA-256:E00FF20437599A5C184CA0C79546CB6500171A95E5F24B9B5535E89A89D3EC3D
                      SHA-512:266589116EEE223056391C65808255EDAE10EB6DC5C26655D96F8178A41E283B06360AB8E08AC3857D172023C4F616EF073D0BEA770A3B3DD3EE74F5FFB2296B
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "UTW.RZ NOWY".. },.. "explanationofflinedisabled": {.. "message": "Jeste. offline. Aby korzysta. z Dokument.w Google bez po..czenia internetowego, otw.rz ustawienia na stronie g..wnej Dokument.w Google i w..cz synchronizacj. offline nast.pnym razem, gdy b.dziesz mie. dost.p do internetu.".. },.. "explanationofflineenabled": {.. "message": "Jeste. offline, ale nadal mo.esz edytowa. dost.pne pliki i tworzy. nowe.".. },.. "extdesc": {.. "message": "Edytuj, tw.rz i wy.wietlaj swoje dokumenty, arkusze kalkulacyjne oraz prezentacje bez konieczno.ci ..czenia si. z internetem.".. },.. "extname": {.. "message": "Dokumenty Google offline".. },.. "learnmore": {.. "message": "Wi.cej informacji".. },.. "popuphelptext": {.. "message": "Pisz, edytuj i wsp..pracuj, gdziekolwiek jeste. . niezale.nie od tego, czy masz po..czenie z internetem.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):907
                      Entropy (8bit):4.599411354657937
                      Encrypted:false
                      SSDEEP:12:1HASvgU30CBxNd6GwXOK1styCJ02OK9+4KbCBxed6X4LBAt4rXgUCSUuYDHIIQka:1HAcXlyCJ5+Tsz4LY4rXSw/Q+ftkC
                      MD5:608551F7026E6BA8C0CF85D9AC11F8E3
                      SHA1:87B017B2D4DA17E322AF6384F82B57B807628617
                      SHA-256:A73EEA087164620FA2260D3910D3FBE302ED85F454EDB1493A4F287D42FC882F
                      SHA-512:82F52F8591DB3C0469CC16D7CBFDBF9116F6D5B5D2AD02A3D8FA39CE1378C64C0EA80AB8509519027F71A89EB8BBF38A8702D9AD26C8E6E0F499BF7DA18BF747
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CRIAR NOVO".. },.. "explanationofflinedisabled": {.. "message": "Voc. est. off-line. Para usar o Documentos Google sem conex.o com a Internet, na pr.xima vez que se conectar, acesse as configura..es na p.gina inicial do Documentos Google e ative a sincroniza..o off-line.".. },.. "explanationofflineenabled": {.. "message": "Voc. est. off-line, mas mesmo assim pode editar os arquivos dispon.veis ou criar novos arquivos.".. },.. "extdesc": {.. "message": "Edite, crie e veja seus documentos, planilhas e apresenta..es sem precisar de acesso . Internet.".. },.. "extname": {.. "message": "Documentos Google off-line".. },.. "learnmore": {.. "message": "Saiba mais".. },.. "popuphelptext": {.. "message": "Escreva, edite e colabore onde voc. estiver, com ou sem conex.o com a Internet.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):914
                      Entropy (8bit):4.604761241355716
                      Encrypted:false
                      SSDEEP:24:1HAcXzw8M+N0STDIjxX+qxCjKw5BKriEQFMJXkETs:zXzw0pKXbxqKw5BKri3aNY
                      MD5:0963F2F3641A62A78B02825F6FA3941C
                      SHA1:7E6972BEAB3D18E49857079A24FB9336BC4D2D48
                      SHA-256:E93B8E7FB86D2F7DFAE57416BB1FB6EE0EEA25629B972A5922940F0023C85F90
                      SHA-512:22DD42D967124DA5A2209DD05FB6AD3F5D0D2687EA956A22BA1E31C56EC09DEB53F0711CD5B24D672405358502E9D1C502659BB36CED66CAF83923B021CA0286
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CRIAR NOVO".. },.. "explanationofflinedisabled": {.. "message": "Est. offline. Para utilizar o Google Docs sem uma liga..o . Internet, aceda .s defini..es na p.gina inicial do Google Docs e ative a sincroniza..o offline da pr.xima vez que estiver ligado . Internet.".. },.. "explanationofflineenabled": {.. "message": "Est. offline, mas continua a poder editar os ficheiros dispon.veis ou criar novos ficheiros.".. },.. "extdesc": {.. "message": "Edite, crie e veja os documentos, as folhas de c.lculo e as apresenta..es, tudo sem precisar de aceder . Internet.".. },.. "extname": {.. "message": "Google Docs offline".. },.. "learnmore": {.. "message": "Saber mais".. },.. "popuphelptext": {.. "message": "Escreva edite e colabore onde quer que esteja, com ou sem uma liga..o . Internet.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):937
                      Entropy (8bit):4.686555713975264
                      Encrypted:false
                      SSDEEP:24:1HA8dC6e6w+uFPHf2TFMMlecFpweWV4RE:pC6KvHf4plVweCx
                      MD5:BED8332AB788098D276B448EC2B33351
                      SHA1:6084124A2B32F386967DA980CBE79DD86742859E
                      SHA-256:085787999D78FADFF9600C9DC5E3FF4FB4EB9BE06D6BB19DF2EEF8C284BE7B20
                      SHA-512:22596584D10707CC1C8179ED3ABE46EF2C314CF9C3D0685921475944B8855AAB660590F8FA1CFDCE7976B4BB3BD9ABBBF053F61F1249A325FD0094E1C95692ED
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "CREEAZ. UN DOCUMENT".. },.. "explanationofflinedisabled": {.. "message": "E.ti offline. Pentru a utiliza Documente Google f.r. conexiune la internet, intr. .n set.rile din pagina principal. Documente Google .i activeaz. sincronizarea offline data viitoare c.nd e.ti conectat(.) la internet.".. },.. "explanationofflineenabled": {.. "message": "E.ti offline, dar po.i .nc. s. editezi fi.ierele disponibile sau s. creezi altele.".. },.. "extdesc": {.. "message": "Editeaz., creeaz. .i acceseaz. documente, foi de calcul .i prezent.ri - totul f.r. acces la internet.".. },.. "extname": {.. "message": "Documente Google Offline".. },.. "learnmore": {.. "message": "Afl. mai multe".. },.. "popuphelptext": {.. "message": "Scrie, editeaz. .i colaboreaz. oriunde ai fi, cu sau f.r. conexiune la internet.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1337
                      Entropy (8bit):4.69531415794894
                      Encrypted:false
                      SSDEEP:24:1HABEapHTEmxUomjsfDVs8THjqBK8/hHUg41v+Lph5eFTHQ:I/VdxUomjsre8Kh4Riph5eFU
                      MD5:51D34FE303D0C90EE409A2397FCA437D
                      SHA1:B4B9A7B19C62D0AA95D1F10640A5FBA628CCCA12
                      SHA-256:BE733625ACD03158103D62BC0EEF272CA3F265AC30C87A6A03467481A177DAE3
                      SHA-512:E8670DED44DC6EE30E5F41C8B2040CF8A463CD9A60FC31FA70EB1D4C9AC1A3558369792B5B86FA761A21F5266D5A35E5C2C39297F367DAA84159585C19EC492A
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": ".......".. },.. "explanationofflinedisabled": {.. "message": "..... ............ Google ......... ... ........., ............ . .... . ......... ............. . ......-...... . .......... .. ......... .........".. },.. "explanationofflineenabled": {.. "message": "... ........... . .......... .. ...... ......... ..... ..... . ............. .., . ....... ........ ......-.......".. },.. "extdesc": {.. "message": ".........., .............. . ............ ........., ....... . ........... ... ....... . ..........".. },.. "extname": {.. "message": "Google.......... ......".. },.. "learnmore": {.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2846
                      Entropy (8bit):3.7416822879702547
                      Encrypted:false
                      SSDEEP:48:YWi+htQTKEQb3aXQYJLSWy7sTQThQTnQtQTrEmQ6kiLsegQSJFwsQGaiPn779I+S:zhiTK5b3tUGVjTGTnQiTryOLpyaxYf/S
                      MD5:B8A4FD612534A171A9A03C1984BB4BDD
                      SHA1:F513F7300827FE352E8ECB5BD4BB1729F3A0E22A
                      SHA-256:54241EBE651A8344235CC47AFD274C080ABAEBC8C3A25AFB95D8373B6A5670A2
                      SHA-512:C03E35BFDE546AEB3245024EF721E7E606327581EFE9EAF8C5B11989D9033BDB58437041A5CB6D567BAA05466B6AAF054C47F976FD940EEEDF69FDF80D79095B
                      Malicious:false
                      Preview:{"createnew":{"message":"\u0db1\u0dc0 \u0dbd\u0dda\u0d9b\u0db1\u0dba\u0d9a\u0dca \u0dc3\u0dcf\u0daf\u0db1\u0dca\u0db1"},"explanationofflinedisabled":{"message":"\u0d94\u0db6 \u0db1\u0ddc\u0db6\u0dd0\u0db3\u0dd2\u0dba. \u0d85\u0db1\u0dca\u0dad\u0dbb\u0dca\u0da2\u0dcf\u0dbd \u0dc3\u0db8\u0dca\u0db6\u0db1\u0dca\u0db0\u0dad\u0dcf\u0dc0\u0d9a\u0dca \u0db1\u0ddc\u0db8\u0dd0\u0dad\u0dd2\u0dc0 Google Docs \u0db7\u0dcf\u0dc0\u0dd2\u0dad \u0d9a\u0dd2\u0dbb\u0dd3\u0db8\u0da7, Google Docs \u0db8\u0dd4\u0dbd\u0dca \u0db4\u0dd2\u0da7\u0dd4\u0dc0 \u0db8\u0dad \u0dc3\u0dd0\u0d9a\u0dc3\u0dd3\u0db8\u0dca \u0dc0\u0dd9\u0dad \u0d9c\u0ddc\u0dc3\u0dca \u0d94\u0db6 \u0d8a\u0dc5\u0d9f \u0d85\u0dc0\u0dc3\u0dca\u0dae\u0dcf\u0dc0\u0dda \u0d85\u0db1\u0dca\u0dad\u0dbb\u0dca\u0da2\u0dcf\u0dbd\u0dba\u0da7 \u0dc3\u0db6\u0dd0\u0db3\u0dd2 \u0dc0\u0dd2\u0da7 \u0db1\u0ddc\u0db6\u0dd0\u0db3\u0dd2 \u0dc3\u0db8\u0db8\u0dd4\u0dc4\u0dd4\u0dbb\u0dca\u0dad \u0d9a\u0dd2\u0dbb\u0dd3\u0db8 \u0d9a\u0dca\u200d\u0dbb\u0dd2\u0dba\u0dc
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):934
                      Entropy (8bit):4.882122893545996
                      Encrypted:false
                      SSDEEP:24:1HAF8pMv1RS4LXL22IUjdh8uJwpPqLDEtxKLhSS:hyv1RS4LXx38u36QsS
                      MD5:8E55817BF7A87052F11FE554A61C52D5
                      SHA1:9ABDC0725FE27967F6F6BE0DF5D6C46E2957F455
                      SHA-256:903060EC9E76040B46DEB47BBB041D0B28A6816CB9B892D7342FC7DC6782F87C
                      SHA-512:EFF9EC7E72B272DDE5F29123653BC056A4BC2C3C662AE3C448F8CB6A4D1865A0679B7E74C1B3189F3E262109ED6BC8F8D2BDE14AEFC8E87E0F785AE4837D01C7
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "VYTVORI. NOV.".. },.. "explanationofflinedisabled": {.. "message": "Ste offline. Ak chcete pou.i. Dokumenty Google bez pripojenia na internet, po najbli..om pripojen. na internet prejdite do nastaven. na domovskej str.nke Dokumentov Google a.zapnite offline synchroniz.ciu.".. },.. "explanationofflineenabled": {.. "message": "Ste offline, no st.le m..ete upravova. dostupn. s.bory a.vytv.ra. nov..".. },.. "extdesc": {.. "message": ".prava, tvorba a.zobrazenie dokumentov, tabuliek a.prezent.ci.. To v.etko bez pr.stupu na internet.".. },.. "extname": {.. "message": "Dokumenty Google v re.ime offline".. },.. "learnmore": {.. "message": ".al.ie inform.cie".. },.. "popuphelptext": {.. "message": "P..te, upravujte a.spolupracuje, kdeko.vek ste, a.to s.pripojen.m na internet aj bez neho.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):963
                      Entropy (8bit):4.6041913416245
                      Encrypted:false
                      SSDEEP:12:1HASvgfECBxNFCEuKXowwJrpvPwNgEcPJJJEfWOCBxeFCJuGuU4KYXCSUXKDxX4A:1HAXMKYw8VYNLcaeDmKYLdX2zJBG5
                      MD5:BFAEFEFF32813DF91C56B71B79EC2AF4
                      SHA1:F8EDA2B632610972B581724D6B2F9782AC37377B
                      SHA-256:AAB9CF9098294A46DC0F2FA468AFFF7CA7C323A1A0EFA70C9DB1E3A4DA05D1D4
                      SHA-512:971F2BBF5E9C84DE3D31E5F2A4D1A00D891A2504F8AF6D3F75FC19056BFD059A270C4C9836AF35258ABA586A1888133FB22B484F260C1CBC2D1D17BC3B4451AA
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "USTVARI NOVO".. },.. "explanationofflinedisabled": {.. "message": "Nimate vzpostavljene povezave. .e .elite uporabljati Google Dokumente brez internetne povezave, odprite nastavitve na doma.i strani Google Dokumentov in vklopite sinhronizacijo brez povezave, ko naslednji. vzpostavite internetno povezavo.".. },.. "explanationofflineenabled": {.. "message": "Nimate vzpostavljene povezave, vendar lahko .e vedno urejate razpolo.ljive datoteke ali ustvarjate nove.".. },.. "extdesc": {.. "message": "Urejajte, ustvarjajte in si ogledujte dokumente, preglednice in predstavitve . vse to brez internetnega dostopa.".. },.. "extname": {.. "message": "Google Dokumenti brez povezave".. },.. "learnmore": {.. "message": "Ve. o tem".. },.. "popuphelptext": {.. "message": "Pi.ite, urejajte in sodelujte, kjer koli ste, z internetno povezavo ali brez nje.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1320
                      Entropy (8bit):4.569671329405572
                      Encrypted:false
                      SSDEEP:24:1HArg/fjQg2JwrfZtUWTrw1P4epMnRGi5TBmuPDRxZQ/XtiCw/Rwh/Q9EVz:ogUg2JwDZe6rwKI8VTP9xK1CwhI94
                      MD5:7F5F8933D2D078618496C67526A2B066
                      SHA1:B7050E3EFA4D39548577CF47CB119FA0E246B7A4
                      SHA-256:4E8B69E864F57CDDD4DC4E4FAF2C28D496874D06016BC22E8D39E0CB69552769
                      SHA-512:0FBAB56629368EEF87DEEF2977CA51831BEB7DEAE98E02504E564218425C751853C4FDEAA40F51ECFE75C633128B56AE105A6EB308FD5B4A2E983013197F5DBA
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "....... ....".. },.. "explanationofflinedisabled": {.. "message": "...... .... .. ..... ......... Google ......... ... ........ ...., ..... . .......... .. ........ ........ Google .......... . ........ ...... .............. ... ....... ... ...... ........ .. ...........".. },.. "explanationofflineenabled": {.. "message": "...... ..., ... . .... ...... .. ....... ...... . ........ ........ ... .. ....... .....".. },.. "extdesc": {.. "message": "....... . ........... ........., ...... . ............ . ....... ...... . ... . ... .. ... ........ .........".. },.. "extname": {.. "message
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):884
                      Entropy (8bit):4.627108704340797
                      Encrypted:false
                      SSDEEP:24:1HA0NOYT/6McbnX/yzklyOIPRQrJlvDymvBd:vNOcyHnX/yg0P4Bymn
                      MD5:90D8FB448CE9C0B9BA3D07FB8DE6D7EE
                      SHA1:D8688CAC0245FD7B886D0DEB51394F5DF8AE7E84
                      SHA-256:64B1E422B346AB77C5D1C77142685B3FF7661D498767D104B0C24CB36D0EB859
                      SHA-512:6D58F49EE3EF0D3186EA036B868B2203FE936CE30DC8E246C32E90B58D9B18C624825419346B62AF8F7D61767DBE9721957280AA3C524D3A5DFB1A3A76C00742
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "SKAPA NYTT".. },.. "explanationofflinedisabled": {.. "message": "Du .r offline. Om du vill anv.nda Google Dokument utan internetuppkoppling, .ppna inst.llningarna p. Google Dokuments startsida och aktivera offlinesynkronisering n.sta g.ng du .r ansluten till internet.".. },.. "explanationofflineenabled": {.. "message": "Du .r offline, men det g.r fortfarande att redigera tillg.ngliga filer eller skapa nya.".. },.. "extdesc": {.. "message": "Redigera, skapa och visa dina dokument, kalkylark och presentationer . helt utan internet.tkomst.".. },.. "extname": {.. "message": "Google Dokument Offline".. },.. "learnmore": {.. "message": "L.s mer".. },.. "popuphelptext": {.. "message": "Skriv, redigera och samarbeta .verallt, med eller utan internetanslutning.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):980
                      Entropy (8bit):4.50673686618174
                      Encrypted:false
                      SSDEEP:12:1HASvgNHCBxNx1HMHyMhybK7QGU78oCuafIvfCBxex6EYPE5E1pOCSUJqONtCBh8:1HAGDQ3y0Q/Kjp/zhDoKMkeAT6dBaX
                      MD5:D0579209686889E079D87C23817EDDD5
                      SHA1:C4F99E66A5891973315D7F2BC9C1DAA524CB30DC
                      SHA-256:0D20680B74AF10EF8C754FCDE259124A438DCE3848305B0CAF994D98E787D263
                      SHA-512:D59911F91ED6C8FF78FD158389B4D326DAF4C031B940C399569FE210F6985E23897E7F404B7014FC7B0ACEC086C01CC5F76354F7E5D3A1E0DEDEF788C23C2978
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "FUNGUA MPYA".. },.. "explanationofflinedisabled": {.. "message": "Haupo mtandaoni. Ili uweze kutumia Hati za Google bila muunganisho wa intaneti, wakati utakuwa umeunganishwa kwenye intaneti, nenda kwenye sehemu ya mipangilio kwenye ukurasa wa kwanza wa Hati za Google kisha uwashe kipengele cha usawazishaji nje ya mtandao.".. },.. "explanationofflineenabled": {.. "message": "Haupo mtandaoni, lakini bado unaweza kubadilisha faili zilizopo au uunde mpya.".. },.. "extdesc": {.. "message": "Badilisha, unda na uangalie hati, malahajedwali na mawasilisho yako . yote bila kutumia muunganisho wa intaneti.".. },.. "extname": {.. "message": "Hati za Google Nje ya Mtandao".. },.. "learnmore": {.. "message": "Pata Maelezo Zaidi".. },.. "popuphelptext": {.. "message": "Andika hati, zibadilishe na ushirikiane na wengine popote ulipo, iwe una muunganisho wa intaneti au huna.".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1941
                      Entropy (8bit):4.132139619026436
                      Encrypted:false
                      SSDEEP:24:1HAoTZwEj3YfVLiANpx96zjlXTwB4uNJDZwq3CP1B2xIZiIH1CYFIZ03SoFyxrph:JCEjWiAD0ZXkyYFyPND1L/I
                      MD5:DCC0D1725AEAEAAF1690EF8053529601
                      SHA1:BB9D31859469760AC93E84B70B57909DCC02EA65
                      SHA-256:6282BF9DF12AD453858B0B531C8999D5FD6251EB855234546A1B30858462231A
                      SHA-512:6243982D764026D342B3C47C706D822BB2B0CAFFA51F0591D8C878F981EEF2A7FC68B76D012630B1C1EB394AF90EB782E2B49329EB6538DD5608A7F0791FDCF5
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "..... ....... .........".. },.. "explanationofflinedisabled": {.. "message": ".......... ........... .... ....... ..... Google ......... .........., ...... .... ........... ......... ...., Google ... ................... ................ ......, ........ ......... ..........".. },.. "explanationofflineenabled": {.. "message": ".......... ..........., .......... .......... .......... ......... ........... ...... .....
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1969
                      Entropy (8bit):4.327258153043599
                      Encrypted:false
                      SSDEEP:48:R7jQrEONienBcFNBNieCyOBw0/kCcj+sEf24l+Q+u1LU4ljCj55ONipR41ssrNix:RjQJN1nBcFNBNlCyGcj+RXl+Q+u1LU4s
                      MD5:385E65EF723F1C4018EEE6E4E56BC03F
                      SHA1:0CEA195638A403FD99BAEF88A360BD746C21DF42
                      SHA-256:026C164BAE27DBB36A564888A796AA3F188AAD9E0C37176D48910395CF772CEA
                      SHA-512:E55167CB5638E04DF3543D57C8027B86B9483BFCAFA8E7C148EDED66454AEBF554B4C1CF3C33E93EC63D73E43800D6A6E7B9B1A1B0798B6BDB2F699D3989B052
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "..... ...... ........ ......".. },.. "explanationofflinedisabled": {.. "message": ".... ........... ........ ......... ........ ....... Google Docs... .............., .... ............ ....... ..... ...... .... Google Docs .... ...... ............. ......, ........ ........ ... .......".. },.. "explanationofflineenabled": {.. "message": ".... ........... ......., .... .... ........ .......... .... ....... ..... ....... .... ..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1674
                      Entropy (8bit):4.343724179386811
                      Encrypted:false
                      SSDEEP:48:fcGjnU3UnGKD1GeU3pktOggV1tL2ggG7Q:f3jnDG1eUk0g6RLE
                      MD5:64077E3D186E585A8BEA86FF415AA19D
                      SHA1:73A861AC810DABB4CE63AD052E6E1834F8CA0E65
                      SHA-256:D147631B2334A25B8AA4519E4A30FB3A1A85B6A0396BC688C68DC124EC387D58
                      SHA-512:56DD389EB9DD335A6214E206B3BF5D63562584394D1DE1928B67D369E548477004146E6CB2AD19D291CB06564676E2B2AC078162356F6BC9278B04D29825EF0C
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": ".........".. },.. "explanationofflinedisabled": {.. "message": ".............. ............. Google .................................... ............................... Google ...... .................................................................".. },.. "explanationofflineenabled": {.. "message": "................................................................".. },.. "extdesc": {.. "message": "..... ..... ........
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1063
                      Entropy (8bit):4.853399816115876
                      Encrypted:false
                      SSDEEP:24:1HAowYuBPgoMC4AGehrgGm7tJ3ckwFrXnRs5m:GYsPgrCtGehkGc3cvXr
                      MD5:76B59AAACC7B469792694CF3855D3F4C
                      SHA1:7C04A2C1C808FA57057A4CCEEE66855251A3C231
                      SHA-256:B9066A162BEE00FD50DC48C71B32B69DFFA362A01F84B45698B017A624F46824
                      SHA-512:2E507CA6874DE8028DC769F3D9DFD9E5494C268432BA41B51568D56F7426F8A5F2E5B111DDD04259EB8D9A036BB4E3333863A8FC65AAB793BCEF39EDFE41403B
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "YEN. OLU.TUR".. },.. "explanationofflinedisabled": {.. "message": ".nternet'e ba.l. de.ilsiniz. Google Dok.manlar'. .nternet ba.lant.s. olmadan kullanmak i.in, .nternet'e ba.lanabildi.inizde Google Dok.manlar ana sayfas.nda Ayarlar'a gidin ve .evrimd... senkronizasyonu etkinle.tirin.".. },.. "explanationofflineenabled": {.. "message": ".nternet'e ba.l. de.ilsiniz. Ancak, yine de mevcut dosyalar. d.zenleyebilir veya yeni dosyalar olu.turabilirsiniz.".. },.. "extdesc": {.. "message": "Dok.man, e-tablo ve sunu olu.turun, bunlar. d.zenleyin ve g.r.nt.leyin. T.m bu i.lemleri internet eri.imi olmadan yapabilirsiniz.".. },.. "extname": {.. "message": "Google Dok.manlar .evrimd...".. },.. "learnmore": {.. "message": "Daha Fazla Bilgi".. },.. "popuphelptext": {.. "message": ".nternet ba.lant.n.z olsun veya olmas.n, nerede olursan.z olun yaz.n, d.zenl
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1333
                      Entropy (8bit):4.686760246306605
                      Encrypted:false
                      SSDEEP:24:1HAk9oxkm6H4KyGGB9GeGoxPEYMQhpARezTtHUN97zlwpEH7:VKU1GB9GeBc/OARETt+9/WCb
                      MD5:970963C25C2CEF16BB6F60952E103105
                      SHA1:BBDDACFEEE60E22FB1C130E1EE8EFDA75EA600AA
                      SHA-256:9FA26FF09F6ACDE2457ED366C0C4124B6CAC1435D0C4FD8A870A0C090417DA19
                      SHA-512:1BED9FE4D4ADEED3D0BC8258D9F2FD72C6A177C713C3B03FC6F5452B6D6C2CB2236C54EA972ECE7DBFD756733805EB2352CAE44BAB93AA8EA73BB80460349504
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "........".. },.. "explanationofflinedisabled": {.. "message": ".. . ...... ....... ... ............. Google ........... ... ......... . .........., ......... . ............ .. ........ ........ Google .......... . ......... ......-............., .... ...... . .......".. },.. "explanationofflineenabled": {.. "message": ".. . ...... ......, ..... ... .... ...... .......... ........ ..... ... .......... .....".. },.. "extdesc": {.. "message": "........., ......... . ............ ........., .......... ....... .. ........... ... ....... .. ..........".. },.. "extname": {.. "message": "Goo
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1263
                      Entropy (8bit):4.861856182762435
                      Encrypted:false
                      SSDEEP:24:1HAl3zNEUhN3mNjkSIkmdNpInuUVsqNtOJDhY8Dvp/IkLzx:e3uUhQKvkmd+s11Lp1F
                      MD5:8B4DF6A9281333341C939C244DDB7648
                      SHA1:382C80CAD29BCF8AAF52D9A24CA5A6ECF1941C6B
                      SHA-256:5DA836224D0F3A96F1C5EB5063061AAD837CA9FC6FED15D19C66DA25CF56F8AC
                      SHA-512:FA1C015D4EA349F73468C78FDB798D462EEF0F73C1A762298798E19F825E968383B0A133E0A2CE3B3DF95F24C71992235BFC872C69DC98166B44D3183BF8A9E5
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "... ......".. },.. "explanationofflinedisabled": {.. "message": ".. .. .... .... Google Docs .. .... ....... ..... ....... .... ..... .... ... .. .. ....... .. ..... ... .. Google Docs ... ... .. ....... .. ..... ... .. .... ...... ..... .. .. .....".. },.. "explanationofflineenabled": {.. "message": ".. .. .... ... .... .. ... ... ...... ..... ... ..... .. .... ... .. ... ..... ... .... ....".. },.. "extdesc": {.. "message": ".......... .......... ... ....... . .... ... ....... .. ..... .. .... ...... ..... .... ... ..... .......".. },.. "extname": {.. "message": "Google Docs .. ....".. },.. "learnmore": {..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1074
                      Entropy (8bit):5.062722522759407
                      Encrypted:false
                      SSDEEP:24:1HAhBBLEBOVUSUfE+eDFmj4BLErQ7e2CIer32KIxqJ/HtNiE5nIGeU+KCVT:qHCDheDFmjDQgX32/S/hI9jh
                      MD5:773A3B9E708D052D6CBAA6D55C8A5438
                      SHA1:5617235844595D5C73961A2C0A4AC66D8EA5F90F
                      SHA-256:597C5F32BC999746BC5C2ED1E5115C523B7EB1D33F81B042203E1C1DF4BBCAFE
                      SHA-512:E5F906729E38B23F64D7F146FA48F3ABF6BAED9AAFC0E5F6FA59F369DC47829DBB4BFA94448580BD61A34E844241F590B8D7AEC7091861105D8EBB2590A3BEE9
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "T.O M.I".. },.. "explanationofflinedisabled": {.. "message": "B.n .ang ngo.i tuy.n. .. s. d.ng Google T.i li.u m. kh.ng c.n k.t n.i Internet, .i ..n c.i ..t tr.n trang ch. c.a Google T.i li.u v. b.t ..ng b. h.a ngo.i tuy.n v.o l.n ti.p theo b.n ...c k.t n.i v.i m.ng Internet.".. },.. "explanationofflineenabled": {.. "message": "B.n .ang ngo.i tuy.n, tuy nhi.n b.n v.n c. th. ch.nh s.a c.c t.p c. s.n ho.c t.o c.c t.p m.i.".. },.. "extdesc": {.. "message": "Ch.nh s.a, t.o v. xem t.i li.u, b.ng t.nh v. b.n tr.nh b.y . t.t c. m. kh.ng c.n truy c.p Internet.".. },.. "extname": {.. "message": "Google T.i li.u ngo.i tuy.n".. },.. "learnmore": {.. "message": "Ti.m hi..u th.m".. },.. "popuphelptext": {.. "message": "Vi.t, ch.nh s.a v. c.ng t.c
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):879
                      Entropy (8bit):5.7905809868505544
                      Encrypted:false
                      SSDEEP:12:1HASvgteHCBxNtSBXuetOrgIkA2OrWjMOCBxetSBXK01fg/SOiCSUEQ27e1CBhUj:1HAFsHtrIkA2jqldI/727eggcLk9pf
                      MD5:3E76788E17E62FB49FB5ED5F4E7A3DCE
                      SHA1:6904FFA0D13D45496F126E58C886C35366EFCC11
                      SHA-256:E72D0BB08CC3005556E95A498BD737E7783BB0E56DCC202E7D27A536616F5EE0
                      SHA-512:F431E570AB5973C54275C9EEF05E49E6FE2D6C17000F98D672DD31F9A1FAD98E0D50B5B0B9CF85D5BBD3B655B93FD69768C194C8C1688CB962AA75FF1AF9BDB6
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": "..".. },.. "explanationofflinedisabled": {.. "message": "....................... Google ................ Google ....................".. },.. "explanationofflineenabled": {.. "message": ".............................".. },.. "extdesc": {.. "message": "...................... - ........".. },.. "extname": {.. "message": "Google .......".. },.. "learnmore": {.. "message": "....".. },.. "popuphelptext": {.. "message": "...............................".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):1205
                      Entropy (8bit):4.50367724745418
                      Encrypted:false
                      SSDEEP:24:YWvqB0f7Cr591AhI9Ah8U1F4rw4wtB9G976d6BY9scKUrPoAhNehIrI/uIXS1:YWvl7Cr5JHrw7k7u6BY9trW+rHR
                      MD5:524E1B2A370D0E71342D05DDE3D3E774
                      SHA1:60D1F59714F9E8F90EF34138D33FBFF6DD39E85A
                      SHA-256:30F44CFAD052D73D86D12FA20CFC111563A3B2E4523B43F7D66D934BA8DACE91
                      SHA-512:D2225CF2FA94B01A7B0F70A933E1FDCF69CDF92F76C424CE4F9FCC86510C481C9A87A7B71F907C836CBB1CA41A8BEBBD08F68DBC90710984CA738D293F905272
                      Malicious:false
                      Preview:{"createnew":{"message":"\u5efa\u7acb\u65b0\u9805\u76ee"},"explanationofflinedisabled":{"message":"\u60a8\u8655\u65bc\u96e2\u7dda\u72c0\u614b\u3002\u5982\u8981\u5728\u6c92\u6709\u4e92\u806f\u7db2\u9023\u7dda\u7684\u60c5\u6cc1\u4e0b\u4f7f\u7528\u300cGoogle \u6587\u4ef6\u300d\uff0c\u8acb\u524d\u5f80\u300cGoogle \u6587\u4ef6\u300d\u9996\u9801\u7684\u8a2d\u5b9a\uff0c\u4e26\u5728\u4e0b\u6b21\u9023\u63a5\u4e92\u806f\u7db2\u6642\u958b\u555f\u96e2\u7dda\u540c\u6b65\u529f\u80fd\u3002"},"explanationofflineenabled":{"message":"\u60a8\u8655\u65bc\u96e2\u7dda\u72c0\u614b\uff0c\u4f46\u60a8\u4ecd\u53ef\u4ee5\u7de8\u8f2f\u53ef\u7528\u6a94\u6848\u6216\u5efa\u7acb\u65b0\u6a94\u6848\u3002"},"extdesc":{"message":"\u7de8\u8f2f\u3001\u5efa\u7acb\u53ca\u67e5\u770b\u60a8\u7684\u6587\u4ef6\u3001\u8a66\u7b97\u8868\u548c\u7c21\u5831\uff0c\u5b8c\u5168\u4e0d\u9700\u4f7f\u7528\u4e92\u806f\u7db2\u3002"},"extname":{"message":"\u300cGoogle \u6587\u4ef6\u300d\u96e2\u7dda\u7248"},"learnmore":{"message":"\u77ad\u89e3\u8a
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):843
                      Entropy (8bit):5.76581227215314
                      Encrypted:false
                      SSDEEP:12:1HASvgmaCBxNtBtA24ZOuAeOEHGOCBxetBtMHQIJECSUnLRNocPNy6CBhU5OGg1O:1HAEfQkekYyLvRmcPGgzcL2kx5U
                      MD5:0E60627ACFD18F44D4DF469D8DCE6D30
                      SHA1:2BFCB0C3CA6B50D69AD5745FA692BAF0708DB4B5
                      SHA-256:F94C6DDEDF067642A1AF18D629778EC65E02B6097A8532B7E794502747AEB008
                      SHA-512:6FF517EED4381A61075AC7C8E80C73FAFAE7C0583BA4FA7F4951DD7DBE183C253702DEE44B3276EFC566F295DAC1592271BE5E0AC0C7D2C9F6062054418C7C27
                      Malicious:false
                      Preview:{.. "createnew": {.. "message": ".....".. },.. "explanationofflinedisabled": {.. "message": ".................. Google ................ Google .................".. },.. "explanationofflineenabled": {.. "message": ".........................".. },.. "extdesc": {.. "message": ".............................".. },.. "extname": {.. "message": "Google .....".. },.. "learnmore": {.. "message": "....".. },.. "popuphelptext": {.. "message": "................................".. }..}..
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):912
                      Entropy (8bit):4.65963951143349
                      Encrypted:false
                      SSDEEP:24:YlMBKqLnI7EgBLWFQbTQIF+j4h3OadMJzLWnCieqgwLeOvKrCRPE:YlMBKqjI7EQOQb0Pj4heOWqeyaBrMPE
                      MD5:71F916A64F98B6D1B5D1F62D297FDEC1
                      SHA1:9386E8F723C3F42DA5B3F7E0B9970D2664EA0BAA
                      SHA-256:EC78DDD4CCF32B5D76EC701A20167C3FBD146D79A505E4FB0421FC1E5CF4AA63
                      SHA-512:30FA4E02120AF1BE6E7CC7DBB15FAE5D50825BD6B3CF28EF21D2F2E217B14AF5B76CFCC165685C3EDC1D09536BFCB10CA07E1E2CC0DA891CEC05E19394AD7144
                      Malicious:false
                      Preview:{"createnew":{"message":"DALA ENTSHA"},"explanationofflinedisabled":{"message":"Awuxhunyiwe ku-inthanethi. Ukuze usebenzise i-Google Amadokhumenti ngaphandle koxhumano lwe-inthanethi, iya kokuthi izilungiselelo ekhasini lasekhaya le-Google Amadokhumenti bese uvula ukuvumelanisa okungaxhunyiwe ku-inthanethi ngesikhathi esilandelayo lapho uxhunywe ku-inthanethi."},"explanationofflineenabled":{"message":"Awuxhunyiwe ku-inthanethi, kodwa usangakwazi ukuhlela amafayela atholakalayo noma udale amasha."},"extdesc":{"message":"Hlela, dala, futhi ubuke amadokhumenti akho, amaspredishithi, namaphrezentheshini \u2014 konke ngaphandle kokufinyelela kwe-inthanethi."},"extname":{"message":"I-Google Amadokhumenti engaxhumekile ku-intanethi"},"learnmore":{"message":"Funda kabanzi"},"popuphelptext":{"message":"Bhala, hlela, futhi hlanganyela noma yikuphi lapho okhona, unalo noma ungenalo uxhumano lwe-inthanethi."}}.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):11280
                      Entropy (8bit):5.754230909218899
                      Encrypted:false
                      SSDEEP:192:RBG1G1UPkUj/86Op//Ier/2nsN9Jtwg1MK8HNnswuHEIIMuuqd7CKqv+pccW5SJ+:m8IGIEu8RfW+
                      MD5:BE5DB35513DDEF454CE3502B6418B9B4
                      SHA1:C82B23A82F745705AA6BCBBEFEB6CE3DBCC71CB1
                      SHA-256:C6F623BE1112C2FDE6BE8941848A82B2292FCD2B475FBD363CC2FD4DF25049B5
                      SHA-512:38C48E67631FAF0594D44525423C6EDC08F5A65F04288F0569B7CF8C71C359924069212462B0A2BFA38356F93708143EE1CBD42295D7317E8670D0A0CD10BAFD
                      Malicious:false
                      Preview:[{"description":"treehash per file","signed_content":{"payload":"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
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):854
                      Entropy (8bit):4.284628987131403
                      Encrypted:false
                      SSDEEP:12:ont+QByTwnnGNcMbyWM+Q9TZldnnnGGxlF/S0WOtUL0M0r:vOrGe4dDCVGOjWJ0nr
                      MD5:4EC1DF2DA46182103D2FFC3B92D20CA5
                      SHA1:FB9D1BA3710CF31A87165317C6EDC110E98994CE
                      SHA-256:6C69CE0FE6FAB14F1990A320D704FEE362C175C00EB6C9224AA6F41108918CA6
                      SHA-512:939D81E6A82B10FF73A35C931052D8D53D42D915E526665079EEB4820DF4D70F1C6AEBAB70B59519A0014A48514833FEFD687D5A3ED1B06482223A168292105D
                      Malicious:false
                      Preview:{. "type": "object",. "properties": {. "allowedDocsOfflineDomains": {. "type": "array",. "items": {. "type": "string". },. "title": "Allow users to enable Docs offline for the specified managed domains.",. "description": "Users on managed devices will be able to enable docs offline if they are part of the specified managed domains.". },. "autoEnabledDocsOfflineDomains": {. "type": "array",. "items": {. "type": "string". },. "title": "Auto enable Docs offline for the specified managed domains in certain eligible situations.",. "description": "Users on managed devices, in certain eligible situations, will be able to automatically access and edit recent files offline for the managed domains set in this property. They can still disable it from Drive settings.". }. }.}.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):2525
                      Entropy (8bit):5.417689528134667
                      Encrypted:false
                      SSDEEP:24:1HEZ4WPoolELb/KxktGw3VwELb/4iL2QDkUpvdz1xxy/Atj1e9yiVvQe:WdP5aLTKQGwlTLT4oRvvxs/APegiVb
                      MD5:10FF8E5B674311683D27CE1879384954
                      SHA1:9C269C14E067BB86642EB9F4816D75CF1B9B9158
                      SHA-256:17363162A321625358255EE939F447E9363FF2284BD35AE15470FD5318132CA9
                      SHA-512:4D3EB89D398A595FEA8B59AC6269A57CC96C4A0E5A5DB8C5FE70AB762E8144A5DF9AFC8756CA2E798E50778CD817CC9B0826FC2942DE31397E858DBFA1B06830
                      Malicious:false
                      Preview:{.. "author": {.. "email": "docs-hosted-app-own@google.com".. },.. "background": {.. "service_worker": "service_worker_bin_prod.js".. },.. "content_capabilities": {.. "matches": [ "https://docs.google.com/*", "https://drive.google.com/*", "https://drive-autopush.corp.google.com/*", "https://drive-daily-0.corp.google.com/*", "https://drive-daily-1.corp.google.com/*", "https://drive-daily-2.corp.google.com/*", "https://drive-daily-3.corp.google.com/*", "https://drive-daily-4.corp.google.com/*", "https://drive-daily-5.corp.google.com/*", "https://drive-daily-6.corp.google.com/*", "https://drive-preprod.corp.google.com/*", "https://drive-staging.corp.google.com/*" ],.. "permissions": [ "clipboardRead", "clipboardWrite", "unlimitedStorage" ].. },.. "content_security_policy": {.. "extension_pages": "script-src 'self'; object-src 'self'".. },.. "default_locale": "en_US",.. "description": "__MSG_extDesc__",.. "externally_connectable": {.. "ma
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:HTML document, ASCII text
                      Category:dropped
                      Size (bytes):97
                      Entropy (8bit):4.862433271815736
                      Encrypted:false
                      SSDEEP:3:PouV7uJL5XL/oGLvLAAJR90bZNGXIL0Hac4NGb:hxuJL5XsOv0EmNV4HX4Qb
                      MD5:B747B5922A0BC74BBF0A9BC59DF7685F
                      SHA1:7BF124B0BE8EE2CFCD2506C1C6FFC74D1650108C
                      SHA-256:B9FA2D52A4FFABB438B56184131B893B04655B01F336066415D4FE839EFE64E7
                      SHA-512:7567761BE4054FCB31885E16D119CD4E419A423FFB83C3B3ED80BFBF64E78A73C2E97AAE4E24AB25486CD1E43877842DB0836DB58FBFBCEF495BC53F9B2A20EC
                      Malicious:false
                      Preview:<!DOCTYPE html>.<html>.<body>. <script src="offscreendocument_main.js"></script>.</body>.</html>
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with very long lines (4369)
                      Category:dropped
                      Size (bytes):95567
                      Entropy (8bit):5.4016395763198135
                      Encrypted:false
                      SSDEEP:1536:Ftd/mjDC/Hass/jCKLwPOPO2MCeYHxU2/NjAGHChg3JOzZ8:YfjCKdHm2/NbHCIJo8
                      MD5:09AF2D8CFA8BF1078101DA78D09C4174
                      SHA1:F2369551E2CDD86258062BEB0729EE4D93FCA050
                      SHA-256:39D113C44D45AE3609B9509ED099680CC5FCEF182FD9745B303A76E164D8BCEC
                      SHA-512:F791434B053FA2A5B731C60F22A4579F19FE741134EF0146E8BAC7DECAC78DE65915B3188093DBBE00F389A7F15B80172053FABB64E636DD4A945DBE3C2CF2E6
                      Malicious:false
                      Preview:'use strict';function aa(){return function(){}}function l(a){return function(){return this[a]}}var n;function ba(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}}var ca="function"==typeof Object.defineProperties?Object.defineProperty:function(a,b,c){if(a==Array.prototype||a==Object.prototype)return a;a[b]=c.value;return a};.function da(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var c=a[b];if(c&&c.Math==Math)return c}throw Error("Cannot find global object");}var q=da(this);function r(a,b){if(b)a:{var c=q;a=a.split(".");for(var d=0;d<a.length-1;d++){var e=a[d];if(!(e in c))break a;c=c[e]}a=a[a.length-1];d=c[a];b=b(d);b!=d&&null!=b&&ca(c,a,{configurable:!0,writable:!0,value:b})}}.r("Symbol",function(a){function b(f){if(this instanceof b)throw new TypeError("Symbol is not a constructor");return new c(d+(f||"")+"_"+e++,f)}function c(f,
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text
                      Category:dropped
                      Size (bytes):291
                      Entropy (8bit):4.65176400421739
                      Encrypted:false
                      SSDEEP:6:2LGX86tj66rU8j6D3bWq2un/XBtzHrH9Mnj63LK603:2Q8KVqb2u/Rt3Onj1
                      MD5:3AB0CD0F493B1B185B42AD38AE2DD572
                      SHA1:079B79C2ED6F67B5A5BD9BC8C85801F96B1B0F4B
                      SHA-256:73E3888CCBC8E0425C3D2F8D1E6A7211F7910800EEDE7B1E23AD43D3B21173F7
                      SHA-512:32F9DB54654F29F39D49F7A24A1FC800DBC0D4A8A1BAB2369C6F9799BC6ADE54962EFF6010EF6D6419AE51D5B53EC4B26B6E2CDD98DEF7CC0D2ADC3A865F37D3
                      Malicious:false
                      Preview:(function(){window._docs_chrome_extension_exists=!0;window._docs_chrome_extension_features_version=2;window._docs_chrome_extension_permissions="alarms clipboardRead clipboardWrite storage unlimitedStorage offscreen".split(" ");window._docs_chrome_extension_manifest_version=3;}).call(this);.
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:ASCII text, with very long lines (4369)
                      Category:dropped
                      Size (bytes):103988
                      Entropy (8bit):5.389407461078688
                      Encrypted:false
                      SSDEEP:1536:oXWJmOMsz9UqqRtjWLqj74SJf2VsxJ5BGOzr61SfwKmWGMJOaAFlObQ/x0BGm:yRqr6v3JnVzr6wwfMtkFSYm
                      MD5:EA946F110850F17E637B15CF22B82837
                      SHA1:8D27C963E76E3D2F5B8634EE66706F95F000FCAF
                      SHA-256:029DFE87536E8907A612900B26EEAA72C63EDF28458A7227B295AE6D4E2BD94C
                      SHA-512:5E8E61E648740FEF2E89A035A4349B2E4E5E4E88150EE1BDA9D4AD8D75827DC67C1C95A2CA41DF5B89DE8F575714E1A4D23BDE2DC3CF21D55DB3A39907B8F820
                      Malicious:false
                      Preview:'use strict';function k(){return function(){}}function n(a){return function(){return this[a]}}var q;function aa(a){var b=0;return function(){return b<a.length?{done:!1,value:a[b++]}:{done:!0}}}var ba="function"==typeof Object.defineProperties?Object.defineProperty:function(a,b,c){if(a==Array.prototype||a==Object.prototype)return a;a[b]=c.value;return a};.function da(a){a=["object"==typeof globalThis&&globalThis,a,"object"==typeof window&&window,"object"==typeof self&&self,"object"==typeof global&&global];for(var b=0;b<a.length;++b){var c=a[b];if(c&&c.Math==Math)return c}throw Error("Cannot find global object");}var r=da(this);function t(a,b){if(b)a:{var c=r;a=a.split(".");for(var d=0;d<a.length-1;d++){var e=a[d];if(!(e in c))break a;c=c[e]}a=a[a.length-1];d=c[a];b=b(d);b!=d&&null!=b&&ba(c,a,{configurable:!0,writable:!0,value:b})}}.t("Symbol",function(a){function b(f){if(this instanceof b)throw new TypeError("Symbol is not a constructor");return new c(d+(f||"")+"_"+e++,f)}function c(f,g
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3888
                      Entropy (8bit):3.5100809062484317
                      Encrypted:false
                      SSDEEP:48:REtLdOYftsJ+rgzBdLXuHVkDpr2AZGdOYstsJ+rgzngdLXuHVk+21:P3u1kDwFnIu1kz
                      MD5:6EAAF4445DE54DE3F2FA701D9447D548
                      SHA1:000BAB13280FD7894830E7C412C97581E87D8FB7
                      SHA-256:A5BE99F571D5F2B0820E5475FFEB7A25D9B5EAE099B766F1D30F9E4F501A6281
                      SHA-512:94933D42D1A5758C34097771EFD8BF2C5516CF960CB8273D5D2749C366EBFFF44FDEC19D9226B52AB320A27967FBDF5E3D2029B671F0EC9F2646838937754BC2
                      Malicious:false
                      Preview:...................................FL..................F.@.. .....|.K...nuw3.....?......(>@.....................1....P.O. .:i.....+00.../C:\.....................1.....DWQ`..PROGRA~2.........O.IDWQ`....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....\.1.....DWP`..MICROS~1..D......(Ux..Y.E..............................M.i.c.r.o.s.o.f.t.....N.1.....CWaa0.Edge..:.......S8.DW;`...........................s..E.d.g.e.....`.1.....CWaa0.APPLIC~1..H.......S8..Y.E..............................A.p.p.l.i.c.a.t.i.o.n.....`.2.(>@.=W2b .msedge.exe..F.......S8..Y.E....u.......................q.m.s.e.d.g.e...e.x.e.......k...............-.......j...........,L.r.....C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe..<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.........%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe...............................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3888
                      Entropy (8bit):3.5043916761785594
                      Encrypted:false
                      SSDEEP:48:REZGdOYstsJ+rgzBdLXuHVkDpr2AZGdOYstsJ+rgzngdLXuHVk+21:33u1kDwFnIu1kz
                      MD5:5D4CB1386905ADC6D763C6FFC6FFE522
                      SHA1:BC7FEC45A71EDB17EA734F65146041E260018991
                      SHA-256:009675B3BC4AF2A021A5BDBB8640AF5F832F6A8D597EA3793FD02BFDB45FBBBB
                      SHA-512:330DB93C43C11F93C1DD16C03933B8732B111DBEAFDC50AFA5CE8EE68727C956A76323EF128119698AF2243E0286FB72B28444FB78D36C5191B93A0E8272C452
                      Malicious:false
                      Preview:...................................FL..................F.@.. .....|.K...nuw3.....?......(>@.....................1....P.O. .:i.....+00.../C:\.....................1......Y.E..PROGRA~2.........O.I.Y.E....................V.....@...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....\.1.....DWP`..MICROS~1..D......(Ux..Y.E..............................M.i.c.r.o.s.o.f.t.....N.1.....CWaa0.Edge..:.......S8..Y.E...........................s..E.d.g.e.....`.1.....CWaa0.APPLIC~1..H.......S8..Y.E..............................A.p.p.l.i.c.a.t.i.o.n.....`.2.(>@.=W2b .msedge.exe..F.......S8..Y.E....u.......................q.m.s.e.d.g.e...e.x.e.......k...............-.......j...........,L.r.....C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe..<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.........%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe...............................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3888
                      Entropy (8bit):3.5100809062484317
                      Encrypted:false
                      SSDEEP:48:REtLdOYftsJ+rgzBdLXuHVkDpr2AZGdOYstsJ+rgzngdLXuHVk+21:P3u1kDwFnIu1kz
                      MD5:6EAAF4445DE54DE3F2FA701D9447D548
                      SHA1:000BAB13280FD7894830E7C412C97581E87D8FB7
                      SHA-256:A5BE99F571D5F2B0820E5475FFEB7A25D9B5EAE099B766F1D30F9E4F501A6281
                      SHA-512:94933D42D1A5758C34097771EFD8BF2C5516CF960CB8273D5D2749C366EBFFF44FDEC19D9226B52AB320A27967FBDF5E3D2029B671F0EC9F2646838937754BC2
                      Malicious:false
                      Preview:...................................FL..................F.@.. .....|.K...nuw3.....?......(>@.....................1....P.O. .:i.....+00.../C:\.....................1.....DWQ`..PROGRA~2.........O.IDWQ`....................V.........P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....\.1.....DWP`..MICROS~1..D......(Ux..Y.E..............................M.i.c.r.o.s.o.f.t.....N.1.....CWaa0.Edge..:.......S8.DW;`...........................s..E.d.g.e.....`.1.....CWaa0.APPLIC~1..H.......S8..Y.E..............................A.p.p.l.i.c.a.t.i.o.n.....`.2.(>@.=W2b .msedge.exe..F.......S8..Y.E....u.......................q.m.s.e.d.g.e...e.x.e.......k...............-.......j...........,L.r.....C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe..<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.........%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe...............................
                      Process:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):3888
                      Entropy (8bit):3.5043916761785594
                      Encrypted:false
                      SSDEEP:48:REZGdOYstsJ+rgzBdLXuHVkDpr2AZGdOYstsJ+rgzngdLXuHVk+21:33u1kDwFnIu1kz
                      MD5:5D4CB1386905ADC6D763C6FFC6FFE522
                      SHA1:BC7FEC45A71EDB17EA734F65146041E260018991
                      SHA-256:009675B3BC4AF2A021A5BDBB8640AF5F832F6A8D597EA3793FD02BFDB45FBBBB
                      SHA-512:330DB93C43C11F93C1DD16C03933B8732B111DBEAFDC50AFA5CE8EE68727C956A76323EF128119698AF2243E0286FB72B28444FB78D36C5191B93A0E8272C452
                      Malicious:false
                      Preview:...................................FL..................F.@.. .....|.K...nuw3.....?......(>@.....................1....P.O. .:i.....+00.../C:\.....................1......Y.E..PROGRA~2.........O.I.Y.E....................V.....@...P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.7.....\.1.....DWP`..MICROS~1..D......(Ux..Y.E..............................M.i.c.r.o.s.o.f.t.....N.1.....CWaa0.Edge..:.......S8..Y.E...........................s..E.d.g.e.....`.1.....CWaa0.APPLIC~1..H.......S8..Y.E..............................A.p.p.l.i.c.a.t.i.o.n.....`.2.(>@.=W2b .msedge.exe..F.......S8..Y.E....u.......................q.m.s.e.d.g.e...e.x.e.......k...............-.......j...........,L.r.....C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe..<.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.M.i.c.r.o.s.o.f.t.\.E.d.g.e.\.A.p.p.l.i.c.a.t.i.o.n.\.m.s.e.d.g.e...e.x.e.........%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe...............................
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):6.579773948910593
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:file.exe
                      File size:917'504 bytes
                      MD5:aeadec1696b55c6f2222a110fec044bb
                      SHA1:75587461a0368b3a242f0329435df075855255da
                      SHA256:2b933cada26bdd843c2929e0ef2a088366251077ed8d1e50ec91848f0b1bd67e
                      SHA512:a57d8e8fb99ba390687b98aab6fa716b39f91a762fbf3bd4b87c084f6098b9852958bea79e6a77d109363430744a0c839ffec37bb2ef018eb8622ad8500c1ee8
                      SSDEEP:12288:cqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDgacTK:cqDEvCTbMWu7rQYlBQcBiT6rprG8asK
                      TLSH:7E159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                      Icon Hash:aaf3e3e3938382a0
                      Entrypoint:0x420577
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                      Time Stamp:0x66D2D64F [Sat Aug 31 08:37:35 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:948cc502fe9226992dce9417f952fce3
                      Instruction
                      call 00007F3170ED5AE3h
                      jmp 00007F3170ED53EFh
                      push ebp
                      mov ebp, esp
                      push esi
                      push dword ptr [ebp+08h]
                      mov esi, ecx
                      call 00007F3170ED55CDh
                      mov dword ptr [esi], 0049FDF0h
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      and dword ptr [ecx+04h], 00000000h
                      mov eax, ecx
                      and dword ptr [ecx+08h], 00000000h
                      mov dword ptr [ecx+04h], 0049FDF8h
                      mov dword ptr [ecx], 0049FDF0h
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      push dword ptr [ebp+08h]
                      mov esi, ecx
                      call 00007F3170ED559Ah
                      mov dword ptr [esi], 0049FE0Ch
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      and dword ptr [ecx+04h], 00000000h
                      mov eax, ecx
                      and dword ptr [ecx+08h], 00000000h
                      mov dword ptr [ecx+04h], 0049FE14h
                      mov dword ptr [ecx], 0049FE0Ch
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      mov esi, ecx
                      lea eax, dword ptr [esi+04h]
                      mov dword ptr [esi], 0049FDD0h
                      and dword ptr [eax], 00000000h
                      and dword ptr [eax+04h], 00000000h
                      push eax
                      mov eax, dword ptr [ebp+08h]
                      add eax, 04h
                      push eax
                      call 00007F3170ED818Dh
                      pop ecx
                      pop ecx
                      mov eax, esi
                      pop esi
                      pop ebp
                      retn 0004h
                      lea eax, dword ptr [ecx+04h]
                      mov dword ptr [ecx], 0049FDD0h
                      push eax
                      call 00007F3170ED81D8h
                      pop ecx
                      ret
                      push ebp
                      mov ebp, esp
                      push esi
                      mov esi, ecx
                      lea eax, dword ptr [esi+04h]
                      mov dword ptr [esi], 0049FDD0h
                      push eax
                      call 00007F3170ED81C1h
                      test byte ptr [ebp+08h], 00000001h
                      pop ecx
                      Programming Language:
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x95c8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0xd40000x95c80x96007967dfceae0fccee02240af04a40d254False0.286953125data5.165611252919382IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                      RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                      RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                      RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                      RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                      RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                      RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                      RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                      RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                      RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                      RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                      RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                      RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                      RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                      RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                      RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                      RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                      RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                      RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                      RT_RCDATA0xdc7b80x890data1.0050182481751824
                      RT_GROUP_ICON0xdd0480x76dataEnglishGreat Britain0.6610169491525424
                      RT_GROUP_ICON0xdd0c00x14dataEnglishGreat Britain1.25
                      RT_GROUP_ICON0xdd0d40x14dataEnglishGreat Britain1.15
                      RT_GROUP_ICON0xdd0e80x14dataEnglishGreat Britain1.25
                      RT_VERSION0xdd0fc0xdcdataEnglishGreat Britain0.6181818181818182
                      RT_MANIFEST0xdd1d80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                      DLLImport
                      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                      PSAPI.DLLGetProcessMemoryInfo
                      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                      UxTheme.dllIsThemeActive
                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                      USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                      GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                      OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                      Language of compilation systemCountry where language is spokenMap
                      EnglishGreat Britain
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 31, 2024 10:45:58.523792982 CEST49675443192.168.2.4173.222.162.32
                      Aug 31, 2024 10:46:00.417059898 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:00.417104006 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:00.417188883 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:00.417397022 CEST49748443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:00.417431116 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:00.417615891 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:00.417640924 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:00.417648077 CEST49748443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:00.417753935 CEST49748443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:00.417764902 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.077563047 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.082751989 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.084592104 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.084619999 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.084790945 CEST49748443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.084809065 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.085656881 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.085731030 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.085762978 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.085803032 CEST49748443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.087595940 CEST49748443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.087598085 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.087686062 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.087703943 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.087994099 CEST49748443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.088001966 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.088259935 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.088267088 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.130225897 CEST49748443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.132316113 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.186058044 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.186079025 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.186085939 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.186110973 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.186139107 CEST49748443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.186147928 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.186171055 CEST49748443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.186533928 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.186779976 CEST49748443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.188498974 CEST49748443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.188509941 CEST4434974813.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.195404053 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.195420980 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.195429087 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.195442915 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.195470095 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.195476055 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.195497036 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.195512056 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.195521116 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.195553064 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.281959057 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.281985998 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.282176018 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.282188892 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.282250881 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.285753012 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.285768986 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.285881042 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.285888910 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.285986900 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.373447895 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.373472929 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.373549938 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.373550892 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.373564005 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.373671055 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.373816967 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.373876095 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.373883009 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.373897076 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.373948097 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.395525932 CEST49747443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:01.395553112 CEST4434974713.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:01.799508095 CEST49754443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:01.799544096 CEST44349754172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:01.799654007 CEST49754443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:01.800010920 CEST49755443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:01.800045013 CEST44349755172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:01.800091982 CEST49755443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:01.800230026 CEST49754443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:01.800245047 CEST44349754172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:01.800673962 CEST49756443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:01.800681114 CEST44349756172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:01.800774097 CEST49756443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:01.800951004 CEST49755443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:01.800966978 CEST44349755172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:01.801229000 CEST49757443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:01.801234961 CEST44349757162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:01.801371098 CEST49756443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:01.801379919 CEST44349756172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:01.801408052 CEST49757443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:01.801573038 CEST49757443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:01.801584005 CEST44349757162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:01.847352028 CEST49758443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:01.847372055 CEST44349758172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:01.847424030 CEST49758443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:01.847929001 CEST49758443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:01.847942114 CEST44349758172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:01.898777008 CEST49759443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:01.898803949 CEST44349759184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:01.898927927 CEST49759443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:01.900603056 CEST49759443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:01.900614023 CEST44349759184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:02.261137009 CEST44349754172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.261392117 CEST49754443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.261410952 CEST44349754172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.262406111 CEST44349754172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.262450933 CEST49754443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.263336897 CEST49754443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.263394117 CEST44349754172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.263626099 CEST49754443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.263633013 CEST44349754172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.264262915 CEST44349757162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:02.264565945 CEST49757443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:02.264575958 CEST44349757162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:02.264683008 CEST44349756172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.264831066 CEST49756443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.264838934 CEST44349756172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.265547991 CEST44349757162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:02.265599012 CEST49757443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:02.265820026 CEST44349756172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.265873909 CEST49756443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.266829014 CEST49757443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:02.266887903 CEST44349757162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:02.267190933 CEST49756443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.267251968 CEST44349756172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.267483950 CEST49757443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:02.267491102 CEST44349757162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:02.267735004 CEST49756443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.267741919 CEST44349756172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.285209894 CEST44349755172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.285392046 CEST49755443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.285403013 CEST44349755172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.286262989 CEST44349755172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.286313057 CEST49755443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.287260056 CEST49755443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.287312984 CEST44349755172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.287379026 CEST49755443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.287385941 CEST44349755172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.304497004 CEST49754443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.319669008 CEST49757443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:02.319756031 CEST49756443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.322449923 CEST44349758172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.322635889 CEST49758443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.322644949 CEST44349758172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.323499918 CEST44349758172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.323554039 CEST49758443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.324421883 CEST49758443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.324476957 CEST44349758172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.324645042 CEST49758443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.324654102 CEST44349758172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.335366964 CEST49755443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.366503954 CEST49758443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.386686087 CEST44349757162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:02.386746883 CEST44349757162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:02.386806965 CEST49757443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:02.387459993 CEST44349756172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.387507915 CEST44349756172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.387568951 CEST49756443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.389023066 CEST49756443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.389043093 CEST44349756172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.389405012 CEST49757443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:02.389410973 CEST44349757162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:02.395123005 CEST44349754172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.395175934 CEST44349754172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.395286083 CEST49754443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.396097898 CEST49754443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.396101952 CEST44349754172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.424119949 CEST44349755172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.424165964 CEST44349755172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.424216032 CEST49755443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.424382925 CEST49755443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.424406052 CEST44349755172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.465707064 CEST44349758172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.465754032 CEST44349758172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.465811968 CEST49758443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.467677116 CEST49758443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:02.467689037 CEST44349758172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:02.544462919 CEST44349759184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:02.544526100 CEST49759443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:02.546669006 CEST49759443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:02.546674967 CEST44349759184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:02.546873093 CEST44349759184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:02.587507963 CEST49759443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:02.632503033 CEST44349759184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:02.817631960 CEST44349759184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:02.817679882 CEST44349759184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:02.817826033 CEST49759443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:02.817826033 CEST49759443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:02.817846060 CEST44349759184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:02.817873001 CEST49759443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:02.817878962 CEST44349759184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:02.856885910 CEST49760443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:02.856920004 CEST44349760184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:02.857043982 CEST49760443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:02.857281923 CEST49760443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:02.857296944 CEST44349760184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:03.040407896 CEST49761443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.040432930 CEST44349761172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.044400930 CEST49762443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.044406891 CEST44349762172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.044457912 CEST49761443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.044508934 CEST49762443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.044748068 CEST49762443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.044759035 CEST44349762172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.044998884 CEST49761443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.045006990 CEST44349761172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.455702066 CEST49763443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.455740929 CEST44349763142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.455820084 CEST49764443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.455848932 CEST44349764142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.455876112 CEST49763443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.455967903 CEST49764443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.456149101 CEST49763443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.456163883 CEST44349763142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.456398010 CEST49764443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.456417084 CEST44349764142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.497479916 CEST44349760184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:03.497672081 CEST49760443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:03.502013922 CEST44349761172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.502048969 CEST49760443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:03.502055883 CEST44349760184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:03.502269030 CEST44349760184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:03.502521992 CEST49761443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.502537966 CEST44349761172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.502818108 CEST44349761172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.503999949 CEST49761443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.504055977 CEST44349761172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.504452944 CEST49760443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:03.532552958 CEST44349762172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.532994032 CEST49762443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.533004999 CEST44349762172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.533329010 CEST44349762172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.534473896 CEST49762443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.534528017 CEST44349762172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.544497967 CEST44349760184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:03.558515072 CEST49761443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.587860107 CEST49762443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.745217085 CEST49765443192.168.2.4142.250.65.164
                      Aug 31, 2024 10:46:03.745238066 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:03.745389938 CEST49765443192.168.2.4142.250.65.164
                      Aug 31, 2024 10:46:03.745845079 CEST49765443192.168.2.4142.250.65.164
                      Aug 31, 2024 10:46:03.745853901 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:03.775150061 CEST44349760184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:03.775196075 CEST44349760184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:03.775341988 CEST49760443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:03.780659914 CEST49760443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:03.780675888 CEST44349760184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:03.780685902 CEST49760443192.168.2.4184.28.90.27
                      Aug 31, 2024 10:46:03.780692101 CEST44349760184.28.90.27192.168.2.4
                      Aug 31, 2024 10:46:03.921158075 CEST44349763142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.922431946 CEST49763443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.922452927 CEST44349763142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.922765017 CEST44349763142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.922823906 CEST49763443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.923367023 CEST44349763142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.923408031 CEST49763443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.925780058 CEST49763443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.925853968 CEST44349763142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.926246881 CEST44349764142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.926347017 CEST49763443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.926354885 CEST44349763142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.926620960 CEST49764443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.926636934 CEST44349764142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.926945925 CEST44349764142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.927000999 CEST49764443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.927548885 CEST44349764142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.927599907 CEST49764443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.928093910 CEST49764443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.928147078 CEST44349764142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.935734034 CEST49764443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.935741901 CEST44349764142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:03.978420973 CEST49763443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:03.978457928 CEST49764443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.033725977 CEST44349763142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.033979893 CEST44349763142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.034045935 CEST49763443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.046118975 CEST44349764142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.046195030 CEST44349764142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.046478987 CEST49764443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.073940039 CEST49763443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.073956966 CEST44349763142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.075047016 CEST49764443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.075061083 CEST44349764142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.216917992 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:04.217436075 CEST49765443192.168.2.4142.250.65.164
                      Aug 31, 2024 10:46:04.217452049 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:04.218302011 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:04.218378067 CEST49765443192.168.2.4142.250.65.164
                      Aug 31, 2024 10:46:04.219738007 CEST49765443192.168.2.4142.250.65.164
                      Aug 31, 2024 10:46:04.219786882 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:04.220046997 CEST49765443192.168.2.4142.250.65.164
                      Aug 31, 2024 10:46:04.220052958 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:04.274094105 CEST49765443192.168.2.4142.250.65.164
                      Aug 31, 2024 10:46:04.316708088 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:04.316737890 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:04.316786051 CEST49765443192.168.2.4142.250.65.164
                      Aug 31, 2024 10:46:04.316793919 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:04.316893101 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:04.316935062 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:04.316972971 CEST49765443192.168.2.4142.250.65.164
                      Aug 31, 2024 10:46:04.316975117 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:04.317087889 CEST49765443192.168.2.4142.250.65.164
                      Aug 31, 2024 10:46:04.318445921 CEST49765443192.168.2.4142.250.65.164
                      Aug 31, 2024 10:46:04.318456888 CEST44349765142.250.65.164192.168.2.4
                      Aug 31, 2024 10:46:04.383814096 CEST49766443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.383850098 CEST44349766142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.383923054 CEST49766443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.383979082 CEST49767443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.384002924 CEST44349767142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.384071112 CEST49767443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.384131908 CEST49766443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.384144068 CEST44349766142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.384234905 CEST49767443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.384251118 CEST44349767142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.854037046 CEST44349766142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.854285002 CEST49766443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.854306936 CEST44349766142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.854628086 CEST44349766142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.854684114 CEST49766443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.855241060 CEST44349766142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.855298042 CEST49766443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.855480909 CEST49766443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.855542898 CEST44349766142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.864331007 CEST44349767142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.864790916 CEST49767443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.864810944 CEST44349767142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.865124941 CEST44349767142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.865184069 CEST49767443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.865724087 CEST44349767142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.865770102 CEST49767443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.865907907 CEST49767443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.865961075 CEST44349767142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.897274017 CEST49766443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.897283077 CEST44349766142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.912893057 CEST49767443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.912904024 CEST44349767142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.944142103 CEST49766443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.959760904 CEST49767443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:11.007272959 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:11.007325888 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:11.007493973 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:11.008457899 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:11.008474112 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:11.835592985 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:11.835673094 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:11.838772058 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:11.838778973 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:11.839021921 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:11.885934114 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:12.404844999 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:12.452507973 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:12.687630892 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:12.687654018 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:12.687661886 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:12.687670946 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:12.687693119 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:12.687747002 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:12.687767982 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:12.687799931 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:12.687808990 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:12.689507961 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:12.689579010 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:12.689587116 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:12.689598083 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:12.689635992 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:13.307485104 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:13.307524920 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:13.307542086 CEST49768443192.168.2.440.68.123.157
                      Aug 31, 2024 10:46:13.307548046 CEST4434976840.68.123.157192.168.2.4
                      Aug 31, 2024 10:46:15.323473930 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:15.323502064 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:15.323576927 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:15.323726892 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:15.323736906 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:15.988733053 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:15.988765955 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:15.988833904 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:15.989063978 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:15.989075899 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.047133923 CEST6451553192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:16.051922083 CEST53645151.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:16.052002907 CEST6451553192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:16.057372093 CEST53645151.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:16.079133034 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.092130899 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.092140913 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.092519999 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.092534065 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.092582941 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.092588902 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.092822075 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.093152046 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.095092058 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.095149040 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.095427036 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.095432997 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.147726059 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.351737022 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.352319002 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.352513075 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.352519989 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.355642080 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.355700970 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.355705976 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.360910892 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.364389896 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.364394903 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.374077082 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.374845982 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.374870062 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.374934912 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.374941111 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.374989033 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.379452944 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.380388975 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.380393982 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.388148069 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.388219118 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.388225079 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.392010927 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.392076969 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.392082930 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.440956116 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.441823959 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.441832066 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.442739010 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.443120956 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.443125963 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.445923090 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.445975065 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.445979118 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.451384068 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.451441050 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.451446056 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.457541943 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.460386038 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.460391045 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.473319054 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.474468946 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.474498034 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.474570990 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.474575996 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.477425098 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.480401993 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.480407000 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.483053923 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.483119965 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.483124971 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.488738060 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.488936901 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.488943100 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.494824886 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.494905949 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.494910955 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.500616074 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.500660896 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.500665903 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.504878044 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.504920959 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.504925966 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.510785103 CEST6451553192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:16.512985945 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.513031960 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.513036013 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.515769958 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.515897036 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.515902996 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.516283989 CEST53645151.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:16.516395092 CEST6451553192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:16.522763014 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.522826910 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.522831917 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.531800032 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.531939983 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.531960964 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.532006979 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.532012939 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.532043934 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.534029961 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.534101009 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.534106970 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.538477898 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.538537979 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.538542986 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.541538954 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.541692019 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.541697025 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.545181990 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.545253038 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.545257092 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.548182011 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.548233986 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.548238993 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.553004980 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.553060055 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.553066015 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.555444956 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.555509090 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.555514097 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.558840036 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.558913946 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.558919907 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.562540054 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.562587023 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.562591076 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.565615892 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.565761089 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.565766096 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.569139004 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.569195032 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.569200039 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.572545052 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.572628021 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.572633028 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.576001883 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.576176882 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.576181889 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.579411983 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.579464912 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.579473972 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.585864067 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.585964918 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.585973978 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.586343050 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.586572886 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.586577892 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.602747917 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.602823019 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.602833033 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.604433060 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.604787111 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.604793072 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.605230093 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.606045961 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.606051922 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.607290030 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.607356071 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.607361078 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.608472109 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.608560085 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.608565092 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.609069109 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.609143972 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.609148979 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.610939026 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.611193895 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.611219883 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.611226082 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.611608028 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.614443064 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.614509106 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.614630938 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.614834070 CEST49778443192.168.2.4142.250.181.225
                      Aug 31, 2024 10:46:16.614846945 CEST44349778142.250.181.225192.168.2.4
                      Aug 31, 2024 10:46:16.633171082 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.633450031 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:16.633466005 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.634433985 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.634489059 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:16.635425091 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:16.635485888 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.635557890 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:16.679826975 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:16.679841042 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.725869894 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:16.745436907 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.745456934 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.745465040 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.745496988 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.745501995 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:16.745518923 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.745537996 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.745551109 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:16.745551109 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:16.745570898 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:16.745589972 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:16.747503996 CEST49781443192.168.2.413.107.246.60
                      Aug 31, 2024 10:46:16.747514963 CEST4434978113.107.246.60192.168.2.4
                      Aug 31, 2024 10:46:18.411571026 CEST44349761172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:18.411643028 CEST44349761172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:18.411761999 CEST49761443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:18.435225964 CEST44349762172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:18.435285091 CEST44349762172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:18.435381889 CEST49762443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.206113100 CEST64517443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:19.206160069 CEST44364517162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:19.206202030 CEST64517443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:19.206573009 CEST64517443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:19.206585884 CEST44364517162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:19.206929922 CEST64518443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.206964016 CEST44364518172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.207138062 CEST64518443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.207319021 CEST64518443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.207334995 CEST44364518172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.256594896 CEST64519443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.256608963 CEST44364519172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.256654024 CEST64519443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.257183075 CEST64519443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.257194996 CEST44364519172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.684005022 CEST44364517162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:19.684293985 CEST64517443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:19.684313059 CEST44364517162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:19.684954882 CEST44364518172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.685220957 CEST64518443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.685244083 CEST44364518172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.685272932 CEST44364517162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:19.685324907 CEST64517443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:19.686093092 CEST44364518172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.686142921 CEST64518443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.686798096 CEST64517443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:19.686863899 CEST44364517162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:19.687072992 CEST64517443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:19.687081099 CEST44364517162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:19.687311888 CEST64518443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.687371016 CEST44364518172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.687407970 CEST64518443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.726269960 CEST44364519172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.726663113 CEST64519443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.726672888 CEST44364519172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.727860928 CEST64518443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.727865934 CEST64517443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:19.727869987 CEST44364518172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.729466915 CEST44364519172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.729532957 CEST64519443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.730669975 CEST64519443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.730742931 CEST44364519172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.731122017 CEST64519443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.731128931 CEST44364519172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.774719000 CEST64519443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.774722099 CEST64518443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.812031984 CEST44364518172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.812081099 CEST44364518172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.812127113 CEST64518443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.812382936 CEST64518443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.812397957 CEST44364518172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.813390017 CEST44364517162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:19.813443899 CEST44364517162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:19.813579082 CEST64517443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:19.813786030 CEST64517443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:19.813795090 CEST44364517162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:19.858207941 CEST44364519172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.858269930 CEST44364519172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:19.858392000 CEST64519443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.859482050 CEST64519443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:19.859488010 CEST44364519172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:33.651036978 CEST64520443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:33.651071072 CEST44364520172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:33.651200056 CEST64520443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:33.651350975 CEST64521443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:33.651379108 CEST44364521172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:33.651426077 CEST64521443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:33.651525974 CEST64520443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:33.651539087 CEST44364520172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:33.651624918 CEST64521443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:33.651638031 CEST44364521172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.115802050 CEST44364521172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.116256952 CEST64521443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.116274118 CEST44364521172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.116586924 CEST44364521172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.117310047 CEST64521443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.117371082 CEST44364521172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.117552996 CEST64521443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.118521929 CEST44364520172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.119139910 CEST64520443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.119158983 CEST44364520172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.119435072 CEST44364520172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.119755030 CEST64520443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.119816065 CEST44364520172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.120055914 CEST64520443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.160497904 CEST44364520172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.160506964 CEST44364521172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.163532019 CEST64520443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.230861902 CEST44364521172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.230906010 CEST44364521172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.231093884 CEST64521443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.231193066 CEST64521443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.231206894 CEST44364521172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.266259909 CEST44364520172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.266307116 CEST44364520172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.266366959 CEST64520443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.266460896 CEST64520443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.266472101 CEST44364520172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.266906023 CEST64522443192.168.2.4152.195.19.97
                      Aug 31, 2024 10:46:34.266923904 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:34.267092943 CEST64522443192.168.2.4152.195.19.97
                      Aug 31, 2024 10:46:34.267247915 CEST64522443192.168.2.4152.195.19.97
                      Aug 31, 2024 10:46:34.267261028 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:34.835117102 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:34.835408926 CEST64522443192.168.2.4152.195.19.97
                      Aug 31, 2024 10:46:34.835426092 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:34.836271048 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:34.836395025 CEST64522443192.168.2.4152.195.19.97
                      Aug 31, 2024 10:46:34.839072943 CEST64522443192.168.2.4152.195.19.97
                      Aug 31, 2024 10:46:34.839131117 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:34.839380026 CEST64522443192.168.2.4152.195.19.97
                      Aug 31, 2024 10:46:34.839386940 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:34.883403063 CEST64522443192.168.2.4152.195.19.97
                      Aug 31, 2024 10:46:34.941926003 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:34.944988966 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:34.944999933 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:34.945015907 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:34.945055008 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:34.945086002 CEST64522443192.168.2.4152.195.19.97
                      Aug 31, 2024 10:46:34.945162058 CEST64522443192.168.2.4152.195.19.97
                      Aug 31, 2024 10:46:34.954714060 CEST64522443192.168.2.4152.195.19.97
                      Aug 31, 2024 10:46:34.954730034 CEST44364522152.195.19.97192.168.2.4
                      Aug 31, 2024 10:46:35.262522936 CEST64523443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.262558937 CEST44364523162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.262767076 CEST64524443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.262799025 CEST44364524162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.262839079 CEST64523443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.263045073 CEST64523443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.263060093 CEST44364523162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.263084888 CEST64524443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.263233900 CEST64524443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.263250113 CEST44364524162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.720576048 CEST44364524162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.764832973 CEST64524443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.882616043 CEST64524443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.882636070 CEST44364524162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.883038998 CEST44364524162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.884058952 CEST64524443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.884118080 CEST44364524162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.884563923 CEST64524443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.928493023 CEST44364524162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.957101107 CEST44364523162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.957551003 CEST64523443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.957565069 CEST44364523162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.957878113 CEST44364523162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.958254099 CEST64523443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.958312988 CEST44364523162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:36.007401943 CEST64523443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:36.051348925 CEST44364524162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:36.051418066 CEST44364524162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:36.051465034 CEST64524443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:36.051531076 CEST64524443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:36.051546097 CEST44364524162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:49.897699118 CEST49766443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:49.897715092 CEST44349766142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:49.913321972 CEST49767443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:49.913337946 CEST44349767142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:50.644243956 CEST44364523162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:50.644315004 CEST44364523162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:50.644361973 CEST64523443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:52.822384119 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:52.822411060 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:52.822474957 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:52.822766066 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:52.822777987 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.625449896 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.625524998 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:53.630875111 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:53.630882978 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.631117105 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.642535925 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:53.684519053 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.959646940 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.959673882 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.959690094 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.959775925 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:53.959789991 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.959851027 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:53.963134050 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.963175058 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.963226080 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.963243008 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:53.963262081 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:53.963289022 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:53.964731932 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:53.964731932 CEST64527443192.168.2.440.127.169.103
                      Aug 31, 2024 10:46:53.964749098 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:53.964757919 CEST4436452740.127.169.103192.168.2.4
                      Aug 31, 2024 10:46:55.432432890 CEST64528443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.432503939 CEST44364528172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.432583094 CEST64528443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.432591915 CEST64529443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.432611942 CEST44364529172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.432687998 CEST64529443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.432740927 CEST64528443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.432758093 CEST44364528172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.432902098 CEST64529443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.432914019 CEST44364529172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.885888100 CEST44364528172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.886087894 CEST64528443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.886113882 CEST44364528172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.886436939 CEST44364528172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.886674881 CEST64528443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.886740923 CEST44364528172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.897630930 CEST44364529172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.901746988 CEST64529443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.901755095 CEST44364529172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.902097940 CEST44364529172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.904707909 CEST64529443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.904773951 CEST44364529172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.928369999 CEST64528443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.943984032 CEST64529443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:56.791152954 CEST5222753192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:56.796325922 CEST53522271.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:56.796382904 CEST5222753192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:56.801848888 CEST53522271.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:57.426173925 CEST5222753192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:57.431729078 CEST53522271.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:57.431776047 CEST5222753192.168.2.41.1.1.1
                      Aug 31, 2024 10:47:03.412590981 CEST49761443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:03.412610054 CEST44349761172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:03.443854094 CEST49762443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:03.443861961 CEST44349762172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:10.796575069 CEST44364528172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:10.796646118 CEST44364528172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:10.796727896 CEST64528443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:10.804986000 CEST44364529172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:10.805039883 CEST44364529172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:10.805087090 CEST64529443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:13.493845940 CEST64523443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:47:13.493879080 CEST44364523162.159.61.3192.168.2.4
                      Aug 31, 2024 10:47:28.885266066 CEST64528443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:28.885303974 CEST64529443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:28.885309935 CEST44364528172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:28.885323048 CEST44364529172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:28.891380072 CEST49761443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:28.891393900 CEST44349761172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:28.891422033 CEST49762443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:28.891426086 CEST44349762172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:28.891581059 CEST49766443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:47:28.891630888 CEST49767443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:47:28.891665936 CEST44349766142.250.65.174192.168.2.4
                      Aug 31, 2024 10:47:28.891700983 CEST44349767142.250.65.174192.168.2.4
                      Aug 31, 2024 10:47:28.891717911 CEST49766443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:47:28.891741991 CEST49767443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:47:58.164855003 CEST52233443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.164915085 CEST44352233172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.164992094 CEST52233443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.165055990 CEST52234443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.165064096 CEST44352234172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.165113926 CEST52234443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.165268898 CEST52233443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.165283918 CEST44352233172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.165395021 CEST52234443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.165401936 CEST44352234172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.631258965 CEST44352234172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.632915974 CEST52234443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.632944107 CEST44352234172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.633259058 CEST44352234172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.634480000 CEST52234443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.634546995 CEST44352234172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.637002945 CEST52234443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.648442984 CEST44352233172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.648657084 CEST52233443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.648665905 CEST44352233172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.648973942 CEST44352233172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.649384022 CEST52233443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.649437904 CEST44352233172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.684499979 CEST44352234172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.694828987 CEST52233443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.767313004 CEST44352234172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.767365932 CEST44352234172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.767415047 CEST52234443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.767538071 CEST52234443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.767554998 CEST44352234172.64.41.3192.168.2.4
                      TimestampSource PortDest PortSource IPDest IP
                      Aug 31, 2024 10:45:57.262878895 CEST53647951.1.1.1192.168.2.4
                      Aug 31, 2024 10:45:58.148824930 CEST6491053192.168.2.41.1.1.1
                      Aug 31, 2024 10:45:58.148997068 CEST5835353192.168.2.41.1.1.1
                      Aug 31, 2024 10:45:59.506758928 CEST53555931.1.1.1192.168.2.4
                      Aug 31, 2024 10:45:59.529042006 CEST53640971.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:01.789196968 CEST6426353192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:01.789329052 CEST6283753192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:01.789557934 CEST5272053192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:01.789710999 CEST6435353192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:01.790220022 CEST6149053192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:01.790375948 CEST6403553192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:01.790682077 CEST6260153192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:01.790868044 CEST5957353192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:01.798527956 CEST53628371.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:01.799025059 CEST53642631.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:01.799036026 CEST53643531.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:01.799077988 CEST53527201.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:01.799506903 CEST53614901.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:01.799516916 CEST53640351.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:01.800354958 CEST53626011.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:01.800365925 CEST53595731.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:01.839235067 CEST5975653192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:01.839370012 CEST5829853192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:01.846601009 CEST53582981.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:01.847009897 CEST53597561.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:02.728451014 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.040064096 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.179579020 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.179613113 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.179624081 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.179773092 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.179785013 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.180053949 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.184024096 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.184117079 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.184360981 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.184495926 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.285986900 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.286307096 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.286434889 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.286525965 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.286731958 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.286881924 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.287663937 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.288476944 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.288810968 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.352777958 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.352777958 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.386502981 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.423846006 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.453823090 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.454327106 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.454682112 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.454958916 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.455703020 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.638853073 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.638936996 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:03.739645958 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.740950108 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.741182089 CEST44355748172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:03.743881941 CEST55748443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:04.077670097 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.383558989 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.522420883 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.523452997 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.527354002 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.528043032 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.528060913 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.528073072 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.528292894 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.528460979 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.529016018 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.529897928 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.530004978 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.530354977 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.530369043 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.539830923 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.625782967 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.625958920 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.625967979 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.626236916 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.633884907 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.636457920 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.640902996 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.641231060 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.643409967 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.648297071 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.648433924 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:04.650090933 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.691693068 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:04.743952990 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:12.501487017 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:12.501544952 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:12.601094007 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:12.627837896 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:12.628071070 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:12.628343105 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:12.667383909 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:12.754592896 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:15.311608076 CEST5483653192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:15.311755896 CEST5926353192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:15.322978973 CEST53548361.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:15.323065042 CEST53592631.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:16.046638012 CEST53529081.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:17.582145929 CEST53506181.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:18.158560038 CEST138138192.168.2.4192.168.2.255
                      Aug 31, 2024 10:46:19.197575092 CEST5254953192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:19.198024035 CEST5980953192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:19.198312998 CEST5743453192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:19.198813915 CEST6398153192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:19.205310106 CEST53598091.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:19.205522060 CEST53525491.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:19.205625057 CEST53574341.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:19.206414938 CEST53639811.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:19.248399973 CEST6528153192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:19.248758078 CEST5906953192.168.2.41.1.1.1
                      Aug 31, 2024 10:46:19.255934000 CEST53590691.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:19.256010056 CEST53652811.1.1.1192.168.2.4
                      Aug 31, 2024 10:46:33.432147980 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:33.432312965 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:33.479363918 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:33.479401112 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:33.526782036 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:33.541708946 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:33.541894913 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:33.541940928 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:33.569869041 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:33.573748112 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:33.587580919 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:33.587738991 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:33.588011980 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:33.616817951 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:33.650715113 CEST58497443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:33.664932013 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:33.707602978 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:33.960874081 CEST58497443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:33.978888988 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:33.978991032 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:34.074327946 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:34.088978052 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:34.089237928 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:34.089999914 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:34.116874933 CEST55794443192.168.2.4142.250.65.174
                      Aug 31, 2024 10:46:34.127130032 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.127458096 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.130609035 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.130738020 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.130749941 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.131122112 CEST58497443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.131202936 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.132366896 CEST58497443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.133085966 CEST58497443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.133230925 CEST58497443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.215586901 CEST44355794142.250.65.174192.168.2.4
                      Aug 31, 2024 10:46:34.228477001 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.228713989 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.228723049 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.228735924 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.228744984 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.228852034 CEST58497443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.228928089 CEST58497443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:34.326545954 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:34.366771936 CEST58497443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:35.260595083 CEST58497443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:35.262037039 CEST55423443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.262074947 CEST58497443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:35.357719898 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:35.358233929 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:35.358243942 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:35.358537912 CEST44358497172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:35.358922005 CEST58497443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:35.570333958 CEST55423443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.709558964 CEST44355423162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.709793091 CEST44355423162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.710218906 CEST44355423162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.710231066 CEST44355423162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.710572004 CEST44355423162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:35.883132935 CEST55423443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.884424925 CEST55423443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.905941010 CEST55423443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.906033039 CEST55423443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:35.906236887 CEST55423443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:36.047442913 CEST44355423162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:36.047745943 CEST44355423162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:36.047756910 CEST44355423162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:36.047875881 CEST44355423162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:36.047924995 CEST55423443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:36.048010111 CEST55423443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:36.048510075 CEST44355423162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:36.086687088 CEST55423443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:36.147516966 CEST44355423162.159.61.3192.168.2.4
                      Aug 31, 2024 10:46:36.183023930 CEST55423443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:46:55.432224989 CEST55965443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.741054058 CEST55965443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.882163048 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.882297993 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.882617950 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.882628918 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.882913113 CEST55965443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.883235931 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.884572983 CEST55965443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.884829998 CEST55965443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.884917974 CEST55965443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.885107040 CEST55965443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.885248899 CEST55965443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.979512930 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.980494022 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.980501890 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.980509996 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.980648994 CEST55965443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.980722904 CEST55965443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:55.980958939 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.980967999 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.981575012 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:55.981679916 CEST55965443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:56.084470034 CEST44355965172.64.41.3192.168.2.4
                      Aug 31, 2024 10:46:56.115948915 CEST55965443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:46:56.790826082 CEST53559051.1.1.1192.168.2.4
                      Aug 31, 2024 10:47:04.621232033 CEST62182443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:04.621377945 CEST62182443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:04.621726036 CEST62182443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:04.621840954 CEST62182443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:04.992244959 CEST62182443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:05.088581085 CEST44362182172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:05.089850903 CEST62182443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:05.096220970 CEST44362182172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:05.096497059 CEST62182443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:05.097002029 CEST44362182172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:05.097011089 CEST44362182172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:05.097018957 CEST44362182172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:05.097161055 CEST62182443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:05.097202063 CEST62182443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:05.194407940 CEST44362182172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:05.201004028 CEST44362182172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:05.201311111 CEST62182443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:05.315660000 CEST44362182172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:05.315815926 CEST44362182172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:05.316637993 CEST44362182172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:05.316781998 CEST62182443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:05.317409992 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.317523003 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.648026943 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.777645111 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:05.784040928 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:05.784182072 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:05.784399033 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.784501076 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.784694910 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.784706116 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.784806967 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.784828901 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.803109884 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:05.878372908 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:05.879486084 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:05.879528999 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:05.879667997 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:05.879790068 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.893309116 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:05.893573046 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:05.893601894 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:05.893738031 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.893743038 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:05.893815041 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.893881083 CEST50477443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:05.988085032 CEST44350477142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:34.728213072 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:34.729455948 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.148221970 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.185520887 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.186181068 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.186284065 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.186501026 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.186518908 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.205842972 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.225908995 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.246632099 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.246866941 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.280337095 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.280621052 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.281146049 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.281327963 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.281630039 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.295629025 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.295769930 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.295890093 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.335499048 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.342710018 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.391858101 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.790476084 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.790514946 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.885845900 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.899189949 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.899403095 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:35.899434090 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:35.928303003 CEST49529443192.168.2.4142.250.80.110
                      Aug 31, 2024 10:47:36.214292049 CEST44349529142.250.80.110192.168.2.4
                      Aug 31, 2024 10:47:58.164602041 CEST54462443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.475415945 CEST54462443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.634149075 CEST44354462172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.634182930 CEST44354462172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.634361029 CEST44354462172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.634372950 CEST44354462172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.634929895 CEST54462443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.635092020 CEST44354462172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.636424065 CEST54462443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.636713028 CEST54462443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.636811018 CEST54462443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.637238026 CEST54462443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.734879971 CEST44354462172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.734939098 CEST44354462172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.734947920 CEST44354462172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.734951973 CEST44354462172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.735364914 CEST54462443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.735515118 CEST54462443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.736402035 CEST44354462172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.737184048 CEST44354462172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.768043041 CEST54462443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:47:58.833133936 CEST44354462172.64.41.3192.168.2.4
                      Aug 31, 2024 10:47:58.866810083 CEST54462443192.168.2.4172.64.41.3
                      Aug 31, 2024 10:48:00.992553949 CEST5608653192.168.2.41.1.1.1
                      Aug 31, 2024 10:48:00.992655993 CEST5343453192.168.2.41.1.1.1
                      Aug 31, 2024 10:48:00.999685049 CEST53534341.1.1.1192.168.2.4
                      Aug 31, 2024 10:48:00.999891043 CEST53560861.1.1.1192.168.2.4
                      Aug 31, 2024 10:48:01.000940084 CEST53071443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:48:01.002314091 CEST53071443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:48:01.002480030 CEST53071443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:48:01.002556086 CEST53071443192.168.2.4162.159.61.3
                      Aug 31, 2024 10:48:01.465609074 CEST44353071162.159.61.3192.168.2.4
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Aug 31, 2024 10:45:58.148824930 CEST192.168.2.41.1.1.10x360fStandard query (0)bzib.nelreports.netA (IP address)IN (0x0001)false
                      Aug 31, 2024 10:45:58.148997068 CEST192.168.2.41.1.1.10xac43Standard query (0)bzib.nelreports.net65IN (0x0001)false
                      Aug 31, 2024 10:46:01.789196968 CEST192.168.2.41.1.1.10xfe96Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.789329052 CEST192.168.2.41.1.1.10xb41cStandard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:01.789557934 CEST192.168.2.41.1.1.10xf1bbStandard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.789710999 CEST192.168.2.41.1.1.10x24c4Standard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:01.790220022 CEST192.168.2.41.1.1.10x9508Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.790375948 CEST192.168.2.41.1.1.10xedd5Standard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:01.790682077 CEST192.168.2.41.1.1.10xff1bStandard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.790868044 CEST192.168.2.41.1.1.10xa5afStandard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:01.839235067 CEST192.168.2.41.1.1.10x2a38Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.839370012 CEST192.168.2.41.1.1.10xd6ffStandard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:15.311608076 CEST192.168.2.41.1.1.10xc953Standard query (0)clients2.googleusercontent.comA (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:15.311755896 CEST192.168.2.41.1.1.10xe75bStandard query (0)clients2.googleusercontent.com65IN (0x0001)false
                      Aug 31, 2024 10:46:19.197575092 CEST192.168.2.41.1.1.10x2c25Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:19.198024035 CEST192.168.2.41.1.1.10x269Standard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:19.198312998 CEST192.168.2.41.1.1.10x6461Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:19.198813915 CEST192.168.2.41.1.1.10xb460Standard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:19.248399973 CEST192.168.2.41.1.1.10x3174Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:19.248758078 CEST192.168.2.41.1.1.10xd200Standard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:48:00.992553949 CEST192.168.2.41.1.1.10xde28Standard query (0)chrome.cloudflare-dns.comA (IP address)IN (0x0001)false
                      Aug 31, 2024 10:48:00.992655993 CEST192.168.2.41.1.1.10x776aStandard query (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      2024-08-31 08:47:58 UTC192.168.2.4172.64.41.30x0Standard query (0)bzib.nelreports.netA (IP address)IN (0x0001)true
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Aug 31, 2024 10:45:58.158629894 CEST1.1.1.1192.168.2.40x360fNo error (0)bzib.nelreports.netbzib.nelreports.net.akamaized.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:45:58.159002066 CEST1.1.1.1192.168.2.40xac43No error (0)bzib.nelreports.netbzib.nelreports.net.akamaized.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:00.415846109 CEST1.1.1.1192.168.2.40x7f22No error (0)shed.dual-low.s-part-0032.t-0009.t-msedge.nets-part-0032.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:00.415846109 CEST1.1.1.1192.168.2.40x7f22No error (0)s-part-0032.t-0009.t-msedge.net13.107.246.60A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.798527956 CEST1.1.1.1192.168.2.40xb41cNo error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:01.799025059 CEST1.1.1.1192.168.2.40xfe96No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.799025059 CEST1.1.1.1192.168.2.40xfe96No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.799036026 CEST1.1.1.1192.168.2.40x24c4No error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:01.799077988 CEST1.1.1.1192.168.2.40xf1bbNo error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.799077988 CEST1.1.1.1192.168.2.40xf1bbNo error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.799506903 CEST1.1.1.1192.168.2.40x9508No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.799506903 CEST1.1.1.1192.168.2.40x9508No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.799516916 CEST1.1.1.1192.168.2.40xedd5No error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:01.800354958 CEST1.1.1.1192.168.2.40xff1bNo error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.800354958 CEST1.1.1.1192.168.2.40xff1bNo error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.800365925 CEST1.1.1.1192.168.2.40xa5afNo error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:01.846601009 CEST1.1.1.1192.168.2.40xd6ffNo error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:01.847009897 CEST1.1.1.1192.168.2.40x2a38No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:01.847009897 CEST1.1.1.1192.168.2.40x2a38No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:15.322978973 CEST1.1.1.1192.168.2.40xc953No error (0)clients2.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:15.322978973 CEST1.1.1.1192.168.2.40xc953No error (0)googlehosted.l.googleusercontent.com142.250.181.225A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:15.323065042 CEST1.1.1.1192.168.2.40xe75bNo error (0)clients2.googleusercontent.comgooglehosted.l.googleusercontent.comCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:15.988040924 CEST1.1.1.1192.168.2.40x49d5No error (0)shed.dual-low.s-part-0032.t-0009.t-msedge.nets-part-0032.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:15.988040924 CEST1.1.1.1192.168.2.40x49d5No error (0)s-part-0032.t-0009.t-msedge.net13.107.246.60A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:16.639621973 CEST1.1.1.1192.168.2.40x3f3dNo error (0)scdn1f005.wpc.ad629.nucdn.netsni1gl.wpc.nucdn.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:16.640327930 CEST1.1.1.1192.168.2.40xbe8dNo error (0)scdn1f005.wpc.ad629.nucdn.netsni1gl.wpc.nucdn.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:16.640327930 CEST1.1.1.1192.168.2.40xbe8dNo error (0)sni1gl.wpc.nucdn.net152.199.21.175A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:17.659337997 CEST1.1.1.1192.168.2.40x3a2cNo error (0)scdn1f005.wpc.ad629.nucdn.netsni1gl.wpc.nucdn.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:17.660176992 CEST1.1.1.1192.168.2.40xba24No error (0)scdn1f005.wpc.ad629.nucdn.netsni1gl.wpc.nucdn.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:17.660176992 CEST1.1.1.1192.168.2.40xba24No error (0)sni1gl.wpc.nucdn.net152.199.21.175A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:19.205310106 CEST1.1.1.1192.168.2.40x269No error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:19.205522060 CEST1.1.1.1192.168.2.40x2c25No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:19.205522060 CEST1.1.1.1192.168.2.40x2c25No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:19.205625057 CEST1.1.1.1192.168.2.40x6461No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:19.205625057 CEST1.1.1.1192.168.2.40x6461No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:19.206414938 CEST1.1.1.1192.168.2.40xb460No error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:19.255934000 CEST1.1.1.1192.168.2.40xd200No error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:46:19.256010056 CEST1.1.1.1192.168.2.40x3174No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:19.256010056 CEST1.1.1.1192.168.2.40x3174No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:19.699220896 CEST1.1.1.1192.168.2.40x63dNo error (0)scdn1f005.wpc.ad629.nucdn.netsni1gl.wpc.nucdn.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:19.699220896 CEST1.1.1.1192.168.2.40x63dNo error (0)sni1gl.wpc.nucdn.net152.199.21.175A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:20.689918041 CEST1.1.1.1192.168.2.40x63dNo error (0)scdn1f005.wpc.ad629.nucdn.netsni1gl.wpc.nucdn.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:20.689918041 CEST1.1.1.1192.168.2.40x63dNo error (0)sni1gl.wpc.nucdn.net152.199.21.175A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:21.704137087 CEST1.1.1.1192.168.2.40x63dNo error (0)scdn1f005.wpc.ad629.nucdn.netsni1gl.wpc.nucdn.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:21.704137087 CEST1.1.1.1192.168.2.40x63dNo error (0)sni1gl.wpc.nucdn.net152.199.21.175A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:23.702349901 CEST1.1.1.1192.168.2.40x63dNo error (0)scdn1f005.wpc.ad629.nucdn.netsni1gl.wpc.nucdn.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:23.702349901 CEST1.1.1.1192.168.2.40x63dNo error (0)sni1gl.wpc.nucdn.net152.199.21.175A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:46:27.716809034 CEST1.1.1.1192.168.2.40x63dNo error (0)scdn1f005.wpc.ad629.nucdn.netsni1gl.wpc.nucdn.netCNAME (Canonical name)IN (0x0001)false
                      Aug 31, 2024 10:46:27.716809034 CEST1.1.1.1192.168.2.40x63dNo error (0)sni1gl.wpc.nucdn.net152.199.21.175A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:48:00.999685049 CEST1.1.1.1192.168.2.40x776aNo error (0)chrome.cloudflare-dns.com65IN (0x0001)false
                      Aug 31, 2024 10:48:00.999891043 CEST1.1.1.1192.168.2.40xde28No error (0)chrome.cloudflare-dns.com162.159.61.3A (IP address)IN (0x0001)false
                      Aug 31, 2024 10:48:00.999891043 CEST1.1.1.1192.168.2.40xde28No error (0)chrome.cloudflare-dns.com172.64.41.3A (IP address)IN (0x0001)false
                      2024-08-31 08:46:34 UTC172.64.41.3192.168.2.40x0No error (0)scdn1f005.wpc.ad629.nucdn.netsni1gl.wpc.nucdn.netCNAME (Canonical name)IN (0x0001)true
                      2024-08-31 08:46:34 UTC172.64.41.3192.168.2.40x0No error (0)sni1gl.wpc.nucdn.net152.195.19.97A (IP address)IN (0x0001)true
                      2024-08-31 08:46:34 UTC172.64.41.3192.168.2.40x0No error (0)scdn1f005.wpc.ad629.nucdn.netsni1gl.wpc.nucdn.netCNAME (Canonical name)IN (0x0001)true
                      2024-08-31 08:47:58 UTC172.64.41.3192.168.2.40x0No error (0)bzib.nelreports.netbzib.nelreports.net.akamaized.netCNAME (Canonical name)IN (0x0001)true
                      • edgeassetservice.azureedge.net
                      • chrome.cloudflare-dns.com
                      • fs.microsoft.com
                      • https:
                        • www.google.com
                      • slscr.update.microsoft.com
                      • clients2.googleusercontent.com
                      • msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.com
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.44974813.107.246.604437484C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:01 UTC486OUTGET /assets/arbitration_priority_list/4.0.5/asset?assetgroup=ArbitrationService HTTP/1.1
                      Host: edgeassetservice.azureedge.net
                      Connection: keep-alive
                      Edge-Asset-Group: ArbitrationService
                      Sec-Fetch-Site: none
                      Sec-Fetch-Mode: no-cors
                      Sec-Fetch-Dest: empty
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-GB,en;q=0.9,en-US;q=0.8
                      2024-08-31 08:46:01 UTC538INHTTP/1.1 200 OK
                      Date: Sat, 31 Aug 2024 08:46:01 GMT
                      Content-Type: application/octet-stream
                      Content-Length: 11989
                      Connection: close
                      Last-Modified: Fri, 23 Aug 2024 00:10:35 GMT
                      ETag: 0x8DCC30802EF150E
                      x-ms-request-id: 903262f1-801e-001b-4826-f94695000000
                      x-ms-version: 2009-09-19
                      x-ms-lease-status: unlocked
                      x-ms-blob-type: BlockBlob
                      x-azure-ref: 20240831T084601Z-16579567576txfkctmnqv2e9c400000004bg0000000069w6
                      Cache-Control: public, max-age=604800
                      x-fd-int-roxy-purgeid: 69316365
                      X-Cache: TCP_HIT
                      Accept-Ranges: bytes
                      2024-08-31 08:46:01 UTC11989INData Raw: 7b 0d 0a 20 20 22 63 6f 6e 66 69 67 56 65 72 73 69 6f 6e 22 3a 20 33 32 2c 0d 0a 20 20 22 50 72 69 76 69 6c 65 67 65 64 45 78 70 65 72 69 65 6e 63 65 73 22 3a 20 5b 0d 0a 20 20 20 20 22 53 68 6f 72 65 6c 69 6e 65 50 72 69 76 69 6c 65 67 65 64 45 78 70 65 72 69 65 6e 63 65 49 44 22 2c 0d 0a 20 20 20 20 22 53 48 4f 50 50 49 4e 47 5f 41 55 54 4f 5f 53 48 4f 57 5f 43 4f 55 50 4f 4e 53 5f 43 48 45 43 4b 4f 55 54 22 2c 0d 0a 20 20 20 20 22 53 48 4f 50 50 49 4e 47 5f 41 55 54 4f 5f 53 48 4f 57 5f 4c 4f 57 45 52 5f 50 52 49 43 45 5f 46 4f 55 4e 44 22 2c 0d 0a 20 20 20 20 22 53 48 4f 50 50 49 4e 47 5f 41 55 54 4f 5f 53 48 4f 57 5f 42 49 4e 47 5f 53 45 41 52 43 48 22 2c 0d 0a 20 20 20 20 22 53 48 4f 50 50 49 4e 47 5f 41 55 54 4f 5f 53 48 4f 57 5f 52 45 42 41 54 45
                      Data Ascii: { "configVersion": 32, "PrivilegedExperiences": [ "ShorelinePrivilegedExperienceID", "SHOPPING_AUTO_SHOW_COUPONS_CHECKOUT", "SHOPPING_AUTO_SHOW_LOWER_PRICE_FOUND", "SHOPPING_AUTO_SHOW_BING_SEARCH", "SHOPPING_AUTO_SHOW_REBATE


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.44974713.107.246.604437484C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:01 UTC711OUTGET /assets/domains_config_gz/2.8.76/asset?assetgroup=EntityExtractionDomainsConfig HTTP/1.1
                      Host: edgeassetservice.azureedge.net
                      Connection: keep-alive
                      Edge-Asset-Group: EntityExtractionDomainsConfig
                      Sec-Mesh-Client-Edge-Version: 117.0.2045.47
                      Sec-Mesh-Client-Edge-Channel: stable
                      Sec-Mesh-Client-OS: Windows
                      Sec-Mesh-Client-OS-Version: 10.0.19045
                      Sec-Mesh-Client-Arch: x86_64
                      Sec-Mesh-Client-WebView: 0
                      Sec-Fetch-Site: none
                      Sec-Fetch-Mode: no-cors
                      Sec-Fetch-Dest: empty
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-GB,en;q=0.9,en-US;q=0.8
                      2024-08-31 08:46:01 UTC583INHTTP/1.1 200 OK
                      Date: Sat, 31 Aug 2024 08:46:01 GMT
                      Content-Type: application/octet-stream
                      Content-Length: 70207
                      Connection: close
                      Content-Encoding: gzip
                      Last-Modified: Fri, 02 Aug 2024 18:10:35 GMT
                      ETag: 0x8DCB31E67C22927
                      x-ms-request-id: 66f87118-601e-001a-2116-f94768000000
                      x-ms-version: 2009-09-19
                      x-ms-lease-status: unlocked
                      x-ms-blob-type: BlockBlob
                      x-azure-ref: 20240831T084601Z-16579567576pgh4h94c7qn0kuc00000004h000000000dvcr
                      Cache-Control: public, max-age=604800
                      x-fd-int-roxy-purgeid: 69316365
                      X-Cache: TCP_HIT
                      X-Cache-Info: L1_T2
                      Accept-Ranges: bytes
                      2024-08-31 08:46:01 UTC15801INData Raw: 1f 8b 08 08 1a 21 ad 66 02 ff 61 73 73 65 74 00 ec bd 0b 97 db 36 b2 30 f8 57 b2 b9 33 b3 dd 89 d5 d6 5b dd d9 cd fa f4 d3 f1 f8 39 6d 3b 19 db f1 d5 01 49 48 a2 45 91 0c 1f 6a ab c3 be bf 7d 0b 05 80 00 08 50 52 db ce 77 ef b7 67 67 9c 16 09 14 0a 40 a1 50 a8 2a 14 c0 3f bf f7 93 78 16 ce bf ff e9 bb 3f bf 2f 92 25 8d a7 51 b8 0a 0b 78 ef 8d bb dd 07 df 7d 9f 92 39 9d fa 65 91 cc 66 90 38 1c f4 59 62 40 67 a4 8c 8a 69 94 f8 24 a2 d3 15 49 11 81 c7 f0 c0 df 0e 3c 00 94 97 e3 6b de f1 08 7b a5 11 7b a5 51 67 9e e1 6b 8c af 71 a7 cc f1 15 81 69 de 59 7d c6 d7 02 5f 8b 0e a5 ec d5 c7 5c 3f ef f8 b7 ec 35 20 ec 35 20 9d 60 89 af 14 5f 69 27 40 e0 19 e6 ce 48 27 c4 8a 66 21 be 86 1d 78 60 af 19 be 66 9d 19 e6 2e b0 ec 82 76 c2 08 5f 31 77 91 75 16 3c b7 c4 d7
                      Data Ascii: !fasset60W3[9m;IHEj}PRwgg@P*?x?/%Qx}9ef8Yb@gi$I<k{{QgkqiY}_\?5 5 `_i'@H'f!x`f.v_1wu<
                      2024-08-31 08:46:01 UTC16384INData Raw: 4a b0 09 cb 82 45 ac c5 f3 e8 07 bb 82 71 ba da 2a 0b c7 62 2c 30 96 c2 52 09 74 65 c0 2a 8a c3 88 95 9c 7c 3e a9 79 09 d4 fa 9a 9f 30 4a 49 28 2b d7 97 ff 7a 7b f9 fa cd f4 c9 05 68 2b 37 9c c1 08 01 cb 2f 28 f3 02 34 de 08 0c a6 34 da 38 c6 ec 48 27 33 28 96 9f 45 d9 4f 9f 12 f7 54 d2 47 a6 39 87 08 81 e9 6d 4f c1 43 97 10 bf ad 59 55 67 39 13 fe 1e 05 67 65 16 87 6c 9b f5 cb 90 60 eb 3d ea 25 09 33 8b f9 4a fb 10 ef 11 3b 7c e8 61 60 14 a0 60 b9 7c 16 e7 69 54 b1 c3 22 c0 e0 29 df c2 05 4c 8f bc f0 67 5e 04 75 33 51 9a b7 e1 61 1a 61 48 f5 c3 30 f7 62 91 d5 a8 34 39 2a 97 ff 2d f5 aa c1 c2 6c 78 e0 35 33 d1 42 b3 75 c4 be 3b f4 d0 68 83 51 a7 81 2d a0 ff 0d 5d 10 62 ed 7f 55 a5 99 9f 25 2b 2f a4 4d 09 21 65 43 c7 04 cf 93 19 f3 c1 d0 b6 e9 14 38 59 31
                      Data Ascii: JEq*b,0Rte*|>y0JI(+z{h+7/(448H'3(EOTG9mOCYUg9gel`=%3J;|a``|iT")Lg^u3QaaH0b49*-lx53Bu;hQ-]bU%+/M!eC8Y1
                      2024-08-31 08:46:01 UTC16384INData Raw: 2f 4d 35 19 b9 3f d5 c1 f4 52 a7 67 b3 99 ff bc b7 c2 8e 7c d3 4d 9a a5 bf dc f0 20 15 b1 bc 1f 82 9a 8d 98 a7 af db 80 6b 74 e7 ab 7c e6 18 7d 9a 2b 3e 34 2d 1a e7 c0 d5 e8 b4 a0 0e d4 7d 19 bb 69 52 58 a2 33 32 78 db 4b 2d cd 54 dd d2 2b 9c a0 29 69 1a ba 4a ee 0a 4d 33 5a 7b a7 1a 83 5f f3 f7 fe 2c 2f 84 3b 39 d0 56 82 ef 75 a4 f3 69 57 af 58 09 8c 2a 1d 24 b9 4e 6b cf 63 d0 74 99 e3 02 0f 26 7f 1a 86 a9 a8 69 fa 5a d8 25 83 c1 ea f8 fd 12 62 16 86 38 17 5a 19 6f 13 03 00 e6 6a 07 a4 40 be bb 20 de a6 de bf d1 06 75 32 1f c3 4f 67 41 ad 31 bd b0 9c ee 44 47 33 2a 92 9c d3 f6 35 64 a9 b1 d3 f6 b1 c7 a7 b4 80 af ea c1 2a 6c dd 81 a0 0b 67 ca d2 b2 11 7c 8d dc 39 47 56 d1 bd 08 e8 ec 3e 4f c9 56 d6 7a d3 9a 56 4d 17 50 41 9b 17 9b 37 36 da 2e 7c a4 ba 63
                      Data Ascii: /M5?Rg|M kt|}+>4-}iRX32xK-T+)iJM3Z{_,/;9VuiWX*$Nkct&iZ%b8Zoj@ u2OgA1DG3*5d*lg|9GV>OVzVMPA76.|c
                      2024-08-31 08:46:01 UTC16384INData Raw: 99 dc 5a 2e 69 cf 52 41 9e 48 c8 71 d7 39 94 dd f7 b6 3f 2a 48 d1 b5 2e 37 a4 97 5f 43 54 c9 8d d7 76 7a 14 e4 6f 3b 80 f7 6a 61 e8 6f 47 e9 2d cb 60 84 66 2b c0 b9 77 09 1b c0 32 5c aa 6c 0e 25 81 ed a0 5e 61 25 37 6f 3c a5 bc 1f 04 1a dd b1 04 1d c9 73 16 3a 58 a8 69 4d 12 c1 5e e9 66 5f 14 6c e4 9e d4 61 25 e1 2f c3 fc b8 ed df 80 5d 2b 3a 5b 4c 56 c9 72 1f 59 1d 6a 72 0b d2 b0 4c 8e d5 67 db 16 79 41 90 65 4f 4b 68 63 f6 d1 e5 db b6 6a 18 e6 ca 5f 04 79 2e 71 69 5d 0e 19 cc d9 f6 58 27 58 af 1c 18 04 f1 98 d2 bf 15 1e 37 ce e0 1e 88 54 83 3c 82 f8 a8 05 5f b0 1b 3f 2f 02 8f 31 a4 e9 1d ed 45 e6 e4 85 e6 b9 66 4c fd cd 8d e4 58 f7 79 73 8b 47 40 25 b6 0d 7f 78 ff a8 fe e7 7d 69 4a fc 00 c7 b0 37 a9 44 f0 40 1e e8 bd 41 8a b4 0a 5d 5a 2c 0e 60 f7 fb 81
                      Data Ascii: Z.iRAHq9?*H.7_CTvzo;jaoG-`f+w2\l%^a%7o<s:XiM^f_la%/]+:[LVrYjrLgyAeOKhcj_y.qi]X'X7T<_?/1EfLXysG@%x}iJ7D@A]Z,`
                      2024-08-31 08:46:01 UTC5254INData Raw: 29 50 5f 50 34 9a d3 9a 2a 83 ab 27 93 58 c5 2b d2 9c af 2b 4e 0f 79 ac a9 56 57 20 b1 61 ca d2 f5 ed 38 df 10 b9 60 88 4c 48 ac b1 cd 10 b5 8f 76 49 19 f2 b6 d5 54 1d d1 9c b1 20 7a d3 64 f7 91 a2 0c 4d 73 6d e0 da be ee e6 87 03 9f 5e f7 4f 98 9c 12 cd 88 68 4c 2e b1 48 00 60 c3 31 74 31 8d 87 b4 32 56 02 4f bf e1 a9 3b c0 40 d6 24 8e 10 55 c7 c3 e7 8c f3 78 28 78 d3 94 de b0 5a 4d 22 eb 28 5c 22 00 98 8e 15 1a f8 ab ac 54 f4 5d 80 d0 a5 aa 6e 87 83 fd d6 f1 b0 c0 82 f7 f4 5e ef 2f 2b b8 62 a2 13 a1 4d ae 60 cf 59 3c b1 b1 f4 40 4d 41 74 7c ac 2c 5a 9e ef f4 d2 81 6d 69 e1 d3 8b 73 2c 84 2c 06 37 fd 72 38 10 a5 b2 13 51 f1 a0 a2 06 7d 3f 89 8f 72 35 a0 58 a0 46 79 2f b7 1f cc 57 92 ec c8 b4 b5 f2 5c 65 e7 30 5a 93 e3 b1 8e 5f f5 91 44 87 44 19 1d 59 83
                      Data Ascii: )P_P4*'X++NyVW a8`LHvIT zdMsm^OhL.H`1t12VO;@$Ux(xZM"(\"T]n^/+bM`Y<@MAt|,Zmis,,7r8Q}?r5XFy/W\e0Z_DDY


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.449754172.64.41.34437484C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:02 UTC245OUTPOST /dns-query HTTP/1.1
                      Host: chrome.cloudflare-dns.com
                      Connection: keep-alive
                      Content-Length: 128
                      Accept: application/dns-message
                      Accept-Language: *
                      User-Agent: Chrome
                      Accept-Encoding: identity
                      Content-Type: application/dns-message
                      2024-08-31 08:46:02 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcom)TP
                      2024-08-31 08:46:02 UTC247INHTTP/1.1 200 OK
                      Server: cloudflare
                      Date: Sat, 31 Aug 2024 08:46:02 GMT
                      Content-Type: application/dns-message
                      Connection: close
                      Access-Control-Allow-Origin: *
                      Content-Length: 468
                      CF-RAY: 8bbbbf70ae36729e-EWR
                      alt-svc: h3=":443"; ma=86400
                      2024-08-31 08:46:02 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 00 b5 00 04 8e fb 28 63 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcom(c)


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.449757162.159.61.34437484C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:02 UTC245OUTPOST /dns-query HTTP/1.1
                      Host: chrome.cloudflare-dns.com
                      Connection: keep-alive
                      Content-Length: 128
                      Accept: application/dns-message
                      Accept-Language: *
                      User-Agent: Chrome
                      Accept-Encoding: identity
                      Content-Type: application/dns-message
                      2024-08-31 08:46:02 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcom)TP
                      2024-08-31 08:46:02 UTC247INHTTP/1.1 200 OK
                      Server: cloudflare
                      Date: Sat, 31 Aug 2024 08:46:02 GMT
                      Content-Type: application/dns-message
                      Connection: close
                      Access-Control-Allow-Origin: *
                      Content-Length: 468
                      CF-RAY: 8bbbbf70a9394364-EWR
                      alt-svc: h3=":443"; ma=86400
                      2024-08-31 08:46:02 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 01 11 00 04 8e fa 50 23 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcomP#)


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      4192.168.2.449756172.64.41.34437484C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:02 UTC245OUTPOST /dns-query HTTP/1.1
                      Host: chrome.cloudflare-dns.com
                      Connection: keep-alive
                      Content-Length: 128
                      Accept: application/dns-message
                      Accept-Language: *
                      User-Agent: Chrome
                      Accept-Encoding: identity
                      Content-Type: application/dns-message
                      2024-08-31 08:46:02 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcom)TP
                      2024-08-31 08:46:02 UTC247INHTTP/1.1 200 OK
                      Server: cloudflare
                      Date: Sat, 31 Aug 2024 08:46:02 GMT
                      Content-Type: application/dns-message
                      Connection: close
                      Access-Control-Allow-Origin: *
                      Content-Length: 468
                      CF-RAY: 8bbbbf70ac350f63-EWR
                      alt-svc: h3=":443"; ma=86400
                      2024-08-31 08:46:02 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 00 d9 00 04 8e fa 50 43 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcomPC)


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      5192.168.2.449755172.64.41.34437484C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:02 UTC245OUTPOST /dns-query HTTP/1.1
                      Host: chrome.cloudflare-dns.com
                      Connection: keep-alive
                      Content-Length: 128
                      Accept: application/dns-message
                      Accept-Language: *
                      User-Agent: Chrome
                      Accept-Encoding: identity
                      Content-Type: application/dns-message
                      2024-08-31 08:46:02 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcom)TP
                      2024-08-31 08:46:02 UTC247INHTTP/1.1 200 OK
                      Server: cloudflare
                      Date: Sat, 31 Aug 2024 08:46:02 GMT
                      Content-Type: application/dns-message
                      Connection: close
                      Access-Control-Allow-Origin: *
                      Content-Length: 468
                      CF-RAY: 8bbbbf70d9dac3ee-EWR
                      alt-svc: h3=":443"; ma=86400
                      2024-08-31 08:46:02 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 01 07 00 04 8e fa 50 43 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcomPC)


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      6192.168.2.449758172.64.41.34437484C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:02 UTC245OUTPOST /dns-query HTTP/1.1
                      Host: chrome.cloudflare-dns.com
                      Connection: keep-alive
                      Content-Length: 128
                      Accept: application/dns-message
                      Accept-Language: *
                      User-Agent: Chrome
                      Accept-Encoding: identity
                      Content-Type: application/dns-message
                      2024-08-31 08:46:02 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcom)TP
                      2024-08-31 08:46:02 UTC247INHTTP/1.1 200 OK
                      Server: cloudflare
                      Date: Sat, 31 Aug 2024 08:46:02 GMT
                      Content-Type: application/dns-message
                      Connection: close
                      Access-Control-Allow-Origin: *
                      Content-Length: 468
                      CF-RAY: 8bbbbf711d9b41cd-EWR
                      alt-svc: h3=":443"; ma=86400
                      2024-08-31 08:46:02 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 01 23 00 04 8e fb 29 03 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcom#))


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      7192.168.2.449759184.28.90.27443
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:02 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      Accept-Encoding: identity
                      User-Agent: Microsoft BITS/7.8
                      Host: fs.microsoft.com
                      2024-08-31 08:46:02 UTC466INHTTP/1.1 200 OK
                      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                      Content-Type: application/octet-stream
                      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                      Server: ECAcc (lpl/EF06)
                      X-CID: 11
                      X-Ms-ApiVersion: Distribute 1.2
                      X-Ms-Region: prod-weu-z1
                      Cache-Control: public, max-age=28818
                      Date: Sat, 31 Aug 2024 08:46:02 GMT
                      Connection: close
                      X-CID: 2


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      8192.168.2.449760184.28.90.27443
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:03 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      Accept-Encoding: identity
                      If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                      Range: bytes=0-2147483646
                      User-Agent: Microsoft BITS/7.8
                      Host: fs.microsoft.com
                      2024-08-31 08:46:03 UTC514INHTTP/1.1 200 OK
                      ApiVersion: Distribute 1.1
                      Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                      Content-Type: application/octet-stream
                      ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                      Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                      Server: ECAcc (lpl/EF06)
                      X-CID: 11
                      X-Ms-ApiVersion: Distribute 1.2
                      X-Ms-Region: prod-weu-z1
                      Cache-Control: public, max-age=28815
                      Date: Sat, 31 Aug 2024 08:46:03 GMT
                      Content-Length: 55
                      Connection: close
                      X-CID: 2
                      2024-08-31 08:46:03 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                      Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      9192.168.2.449763142.250.65.1744437484C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:03 UTC567OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Accept: */*
                      Access-Control-Request-Method: POST
                      Access-Control-Request-Headers: x-goog-authuser
                      Origin: https://accounts.google.com
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-GB,en;q=0.9
                      2024-08-31 08:46:04 UTC520INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                      Access-Control-Max-Age: 86400
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                      Content-Type: text/plain; charset=UTF-8
                      Date: Sat, 31 Aug 2024 08:46:03 GMT
                      Server: Playlog
                      Content-Length: 0
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      10192.168.2.449764142.250.65.1744437484C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:03 UTC567OUTOPTIONS /log?format=json&hasfast=true&authuser=0 HTTP/1.1
                      Host: play.google.com
                      Connection: keep-alive
                      Accept: */*
                      Access-Control-Request-Method: POST
                      Access-Control-Request-Headers: x-goog-authuser
                      Origin: https://accounts.google.com
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47
                      Sec-Fetch-Mode: cors
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Dest: empty
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-GB,en;q=0.9
                      2024-08-31 08:46:04 UTC520INHTTP/1.1 200 OK
                      Access-Control-Allow-Origin: https://accounts.google.com
                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                      Access-Control-Max-Age: 86400
                      Access-Control-Allow-Credentials: true
                      Access-Control-Allow-Headers: X-Playlog-Web,authorization,origin,x-goog-authuser
                      Content-Type: text/plain; charset=UTF-8
                      Date: Sat, 31 Aug 2024 08:46:03 GMT
                      Server: Playlog
                      Content-Length: 0
                      X-XSS-Protection: 0
                      X-Frame-Options: SAMEORIGIN
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      11192.168.2.449765142.250.65.1644437484C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:04 UTC887OUTGET /favicon.ico HTTP/1.1
                      Host: www.google.com
                      Connection: keep-alive
                      sec-ch-ua: "Microsoft Edge";v="117", "Not;A=Brand";v="8", "Chromium";v="117"
                      sec-ch-ua-mobile: ?0
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47
                      sec-ch-ua-arch: "x86"
                      sec-ch-ua-full-version: "117.0.2045.47"
                      sec-ch-ua-platform-version: "10.0.0"
                      sec-ch-ua-full-version-list: "Microsoft Edge";v="117.0.2045.47", "Not;A=Brand";v="8.0.0.0", "Chromium";v="117.0.5938.132"
                      sec-ch-ua-bitness: "64"
                      sec-ch-ua-model: ""
                      sec-ch-ua-wow64: ?0
                      sec-ch-ua-platform: "Windows"
                      Accept: image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
                      Sec-Fetch-Site: same-site
                      Sec-Fetch-Mode: no-cors
                      Sec-Fetch-Dest: image
                      Referer: https://accounts.google.com/
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-GB,en;q=0.9
                      2024-08-31 08:46:04 UTC704INHTTP/1.1 200 OK
                      Accept-Ranges: bytes
                      Cross-Origin-Resource-Policy: cross-origin
                      Cross-Origin-Opener-Policy-Report-Only: same-origin; report-to="static-on-bigtable"
                      Report-To: {"group":"static-on-bigtable","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/static-on-bigtable"}]}
                      Content-Length: 5430
                      X-Content-Type-Options: nosniff
                      Server: sffe
                      X-XSS-Protection: 0
                      Date: Sat, 31 Aug 2024 08:43:31 GMT
                      Expires: Sun, 08 Sep 2024 08:43:31 GMT
                      Cache-Control: public, max-age=691200
                      Last-Modified: Tue, 22 Oct 2019 18:30:00 GMT
                      Content-Type: image/x-icon
                      Vary: Accept-Encoding
                      Age: 153
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close
                      2024-08-31 08:46:04 UTC686INData Raw: 00 00 01 00 02 00 10 10 00 00 01 00 20 00 68 04 00 00 26 00 00 00 20 20 00 00 01 00 20 00 a8 10 00 00 8e 04 00 00 28 00 00 00 10 00 00 00 20 00 00 00 01 00 20 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 30 fd fd fd 96 fd fd fd d8 fd fd fd f9 fd fd fd f9 fd fd fd d7 fd fd fd 94 fe fe fe 2e 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd 99 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 95 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 09 fd fd fd c1 ff ff ff ff fa fd f9 ff b4 d9 a7 ff 76 ba 5d ff 58 ab 3a ff 58 aa 3a ff 72 b8 59 ff ac d5 9d ff f8 fb f6 ff ff
                      Data Ascii: h& ( 0.v]X:X:rY
                      2024-08-31 08:46:04 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d8 fd fd fd 99 ff ff ff ff 92 cf fb ff 37 52 ec ff 38 46 ea ff d0 d4 fa ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 96 fe fe fe 32 ff ff ff ff f9 f9 fe ff 56 62 ed ff 35 43 ea ff 3b 49 eb ff 95 9c f4 ff cf d2 fa ff d1 d4 fa ff 96 9d f4 ff 52 5e ed ff e1 e3 fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff 30 00 00 00 00 fd fd fd 9d ff ff ff ff e8 ea fd ff 58 63 ee ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 35 43 ea ff 6c 76 f0 ff ff ff ff ff ff ff ff ff fd fd fd 98 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd c3 ff ff ff ff f9 f9 fe ff a5 ac f6 ff 5d 69 ee ff 3c 4a eb
                      Data Ascii: 7R8F2Vb5C;IR^0Xc5C5C5C5C5C5Clv]i<J
                      2024-08-31 08:46:04 UTC1390INData Raw: ff ff ff ff ff ff ff ff ff ff fd fd fd d0 ff ff ff 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fd fd fd 8b ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff b1 d8 a3 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 60 a5 35 ff ca 8e 3e ff f9 c1 9f ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd 87 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 25 fd fd fd fb ff ff ff ff ff ff ff ff ff ff ff ff c2 e0 b7 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 53 a8 34 ff 6e b6 54 ff 9f ce 8d ff b7 da aa ff b8 db ab ff a5 d2 95 ff 7b bc 64 ff 54 a8 35 ff 53 a8 34 ff 77 a0 37 ff e3 89 41 ff f4 85 42 ff f4 85 42 ff fc
                      Data Ascii: S4S4S4S4S4S4S4S4S4S4S4S4S4S4`5>%S4S4S4S4S4S4nT{dT5S4w7ABB
                      2024-08-31 08:46:04 UTC1390INData Raw: f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff f4 85 42 ff fb d5 bf ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd ea fd fd fd cb ff ff ff ff ff ff ff ff ff ff ff ff 46 cd fc ff 05 bc fb ff 05 bc fb ff 05 bc fb ff 21 ae f9 ff fb fb ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd c8 fd fd fd 9c ff ff ff ff ff ff ff ff ff ff ff ff 86 df fd ff 05 bc fb ff 05 bc fb ff 15 93 f5 ff 34 49 eb ff b3 b8 f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                      Data Ascii: BBBBBBF!4I
                      2024-08-31 08:46:04 UTC574INData Raw: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd d2 fe fe fe 24 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ff ff ff 0a fd fd fd 8d fd fd fd fc ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff fd fd fd fb fd fd fd 8b fe fe fe 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 fe fe fe 27 fd fd fd 9f fd fd fd f7 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
                      Data Ascii: $'


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      12192.168.2.44976840.68.123.157443
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:12 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=s+gBg+wx87rhMr7&MD=hDHON5EA HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                      Host: slscr.update.microsoft.com
                      2024-08-31 08:46:12 UTC560INHTTP/1.1 200 OK
                      Cache-Control: no-cache
                      Pragma: no-cache
                      Content-Type: application/octet-stream
                      Expires: -1
                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                      ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                      MS-CorrelationId: 048938ed-192b-4517-9713-168e673ba228
                      MS-RequestId: c45eca29-9d98-48b6-86b0-bede6ab920e9
                      MS-CV: cEOJJVStGUmZ+070.0
                      X-Microsoft-SLSClientCache: 2880
                      Content-Disposition: attachment; filename=environment.cab
                      X-Content-Type-Options: nosniff
                      Date: Sat, 31 Aug 2024 08:46:11 GMT
                      Connection: close
                      Content-Length: 24490
                      2024-08-31 08:46:12 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                      Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                      2024-08-31 08:46:12 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                      Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      13192.168.2.449778142.250.181.225443404C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:16 UTC594OUTGET /crx/blobs/AY4GWKBMNax_FQrZEVzNkO_0mu3UShnzR6AihR_EPjVIUOT_pwZzkWCpOk8YKIu0qnIq_YObWXuPyiJ7NA0nDjMHUEYIIEknsNvJHXuPd0MqxESzoxi9xiMyJKNwZiVV1yEAxlKa5UVe61sINARQ7fO9dE0bkfP_W4GG/GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_80_1_0.crx HTTP/1.1
                      Host: clients2.googleusercontent.com
                      Connection: keep-alive
                      Sec-Fetch-Site: none
                      Sec-Fetch-Mode: no-cors
                      Sec-Fetch-Dest: empty
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-GB,en;q=0.9,en-US;q=0.8
                      2024-08-31 08:46:16 UTC566INHTTP/1.1 200 OK
                      Accept-Ranges: bytes
                      Content-Length: 135751
                      X-GUploader-UploadID: AD-8ljtuStaDYYAGm2K1B6vhfFE1zirakEh-vcrIS-GeOVNTwoYi7TdS_6vOolLjKfcZlXpbZbs
                      X-Goog-Hash: crc32c=IDdmTg==
                      Server: UploadServer
                      Date: Fri, 30 Aug 2024 20:38:51 GMT
                      Expires: Sat, 30 Aug 2025 20:38:51 GMT
                      Cache-Control: public, max-age=31536000
                      Age: 43645
                      Last-Modified: Tue, 23 Jul 2024 15:56:28 GMT
                      ETag: 1d368626_ddaec042_86665b6c_28d780a0_b2065016
                      Content-Type: application/x-chrome-extension
                      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                      Connection: close
                      2024-08-31 08:46:16 UTC824INData Raw: 43 72 32 34 03 00 00 00 e8 15 00 00 12 ac 04 0a a6 02 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 9c 5e d1 18 b0 31 22 89 f4 fd 77 8d 67 83 0b 74 fd c3 32 4a 0e 47 31 00 29 58 34 b1 bf 3d 26 90 3f 5b 6a 2c 4c 7a fd d5 6a b0 75 cf 65 5b 49 85 71 2a 42 61 2f 58 dd ee dc 50 c1 68 fc cd 84 4c 04 88 b9 99 dc 32 25 33 5f 6f f4 ae b5 ad 19 0d d4 b8 48 f7 29 27 b9 3d d6 95 65 f8 ac c8 9c 3f 15 e6 ef 1f 08 ab 11 6a e1 a9 c8 33 55 48 fd 7c bf 58 8c 4d 06 e3 97 75 cc c2 9c 73 5b a6 2a f2 ea 3f 24 f3 9c db 8a 05 9f 46 25 11 1d 18 b4 49 08 19 94 80 29 08 f2 2c 2d c0 2f 90 65 35 29 a6 66 83 e7 4f e4 b2 71 14 5e ff 90 92 01 8d d3 bf ca a0 d0 39 a0 08 28 e3 d2 5f d5 70 68 32 fe 10 5e d5 59 42 50 58 66 5f 38 cc 0b 08
                      Data Ascii: Cr240"0*H0^1"wgt2JG1)X4=&?[j,Lzjue[Iq*Ba/XPhL2%3_oH)'=e?j3UH|XMus[*?$F%I),-/e5)fOq^9(_ph2^YBPXf_8
                      2024-08-31 08:46:16 UTC1390INData Raw: cb 30 5e ae fd 8f bf fc 18 3f ab aa ce 6f f5 9f 86 ea f3 4f e7 8b aa 7e fc f9 c7 ed f2 de 57 f2 ef e5 b5 1f ab 7e fc f1 97 7f fc 18 f2 a7 ba e6 52 7f be 7a 86 4d 61 da 86 e0 b6 91 9a 75 5d 9a b5 2a 9f 87 2d b7 6e 97 ac 9b be 32 73 3c 97 a6 da 8a e4 b0 45 fb 9f 36 ba 3c 2e c2 57 bd 48 91 71 68 ae 17 fd f9 3a 6a a8 79 f8 fe f7 4e dd 44 1a 5d 4e 6a fc f5 d0 bb b5 f4 df 2f a7 cb 61 8a 9a f7 7b e9 db fd f7 67 ca ce f9 92 d0 b9 66 29 ba 7e 7f 5f 98 88 8b a7 31 71 fe fe 4c da 11 23 06 47 da 8d 8d f0 51 97 77 14 c8 99 1d 4a 10 22 04 c4 8e 74 e1 33 0f c2 4d e5 0b 5b 3c 43 e7 18 dc 2e a5 0f 8d 7c 77 d8 1e 94 73 2b 4c 54 17 3e 9b 8f 26 ec 8e 26 50 a5 85 6a 61 ea eb 6e 98 0b 73 73 39 ee c2 67 61 3a ff 1e e7 f7 b3 85 53 ee a9 9e 59 f5 3e 81 0c 1d b9 f8 4a 3a 06 39 87
                      Data Ascii: 0^?oO~W~RzMau]*-n2s<E6<.WHqh:jyND]Nj/a{gf)~_1qL#GQwJ"t3M[<C.|ws+LT>&&Pjanss9ga:SY>J:9
                      2024-08-31 08:46:16 UTC1390INData Raw: fb 44 b0 b4 75 cd a2 45 f6 da fb af bc 3f ce 66 36 89 54 f7 7b 85 4d 64 18 16 65 30 97 1e f2 8b 3d 8c f3 00 e1 48 79 96 ec ea 1d f6 a0 d6 80 10 97 4f 10 60 43 7e 2d de bf 3f ac f5 dc 1b 32 87 63 d4 2b 25 8c c9 3d 52 f4 88 e8 d8 51 25 77 c5 5e 7a c9 5e 86 25 15 31 06 d8 2d 7b ad d1 54 eb 11 a3 53 14 2c cf 7d f9 ff d0 e0 b2 c1 43 66 d4 4a 06 e2 33 37 55 9a 78 d1 48 02 d7 8b 1b d1 0b 33 cc 70 a7 4b c1 72 2f c2 13 19 ed c4 5b a9 a0 8b 4d b9 59 5e 7b 72 2d ff 51 fb dc 0d f6 85 87 e6 ba 95 5e 68 12 00 3b 14 08 91 1b c3 91 cc 5a 03 7c cc a3 e0 a7 19 9b 8f 07 0b 70 9c 51 bc af ba f7 c7 22 7f 6b ed da 1b 3c a4 60 9b 5a c3 ab 54 de 7c 82 75 4b 00 a2 d8 aa 43 9d 31 12 d1 82 59 67 1d aa fb 81 1f 1b e0 15 11 e5 97 16 34 8b 65 ef 77 cd 57 b2 c7 ad ba 65 8d f2 aa de 35
                      Data Ascii: DuE?f6T{Mde0=HyO`C~-?2c+%=RQ%w^z^%1-{TS,}CfJ37UxH3pKr/[MY^{r-Q^h;Z|pQ"k<`ZT|uKC1Yg4ewWe5
                      2024-08-31 08:46:16 UTC1390INData Raw: a3 3a 66 63 2b dc 55 dd f4 76 4a 8c 67 19 c8 cf dc c0 a9 f6 5c fb 04 0e 30 9f 45 2b 3a 9d 3b 96 d8 5b 6e bd d6 e7 9c e8 c6 a6 3c ec 04 3f 00 02 d8 07 6a 07 4f 70 bb e6 0d 44 84 8e 31 f6 ed 3b e9 6a c5 3d 68 26 0c d9 55 07 3f b0 ae cd 25 f6 a5 bf 92 bd 1a 68 de 40 51 36 ee a5 e4 ce 91 50 6c c6 16 de 88 4e bc 66 c4 fd 22 da f5 e3 d6 a9 11 77 9e cc c8 00 69 5f 40 62 95 20 df ff 5c 62 ff d0 7c 77 74 a5 ee 94 81 37 09 f8 6e 89 76 d0 cc c3 9e ed f1 98 74 e8 44 3c ad 43 b4 7d 7c ef 37 12 7f b8 65 96 f8 5e 7f 6d d6 87 cf c8 3f 3c ff 0f fe 46 0a 5c ba b6 fe 19 70 0e 32 75 0d ee 8d af b1 e1 04 85 42 3c 9e 59 9b c0 78 a6 b0 b5 39 1f b7 d1 de cd 12 22 41 49 d1 15 ab a1 11 33 5c d4 fd b2 5b d9 73 15 d6 f9 35 bc c7 cd bb 1d 79 b6 97 eb f1 e5 7e 9d 14 50 5d 28 7c 07 9c
                      Data Ascii: :fc+UvJg\0E+:;[n<?jOpD1;j=h&U?%h@Q6PlNf"wi_@b \b|wt7nvtD<C}|7e^m?<F\p2uB<Yx9"AI3\[s5y~P](|
                      2024-08-31 08:46:16 UTC1390INData Raw: f4 82 39 aa e0 7a ec d0 f9 66 30 94 41 fc df ee db 1c a9 13 e6 2d 30 13 82 a1 ce 12 31 7d 82 53 e2 83 47 45 59 27 58 b8 8f 29 06 91 69 cf 5a f8 cc 88 c6 0f 64 a8 24 03 ce ef 34 a6 34 d9 53 76 aa d1 f7 b6 0a 2b fc d4 75 76 ce 3a 75 4f 2d 57 df f3 bf de ff fb dd 66 83 81 23 92 f4 b0 c9 4d 75 c1 14 7c 9e f8 b8 ab 3c 75 20 0d 34 51 a3 0e b9 57 8f 5c c9 54 10 9d 35 cc 9b 85 ba 8d ce d3 40 ea df eb f4 bd c6 2c 8d bf 7f cb f8 66 fe ef 5a ba 1d ba 7f 9e b7 3c ff e1 39 cb 7f 7d 77 90 3e 1b 53 53 b5 ff 3a 2b 59 eb 1a b5 ef 9a f3 97 e0 e3 a3 e0 8e ca 4c fb 5e 74 ea 56 74 b6 f6 9f d3 57 e1 d7 9f b9 df 5e fe f7 bb 96 ae e7 1e 0d df 6b e7 fb 2c e6 b1 79 7f 1c 1b ef fb ff 1f ba be 0c 5d 77 5f 05 74 4c cd 62 ce b9 d6 b7 e6 3a 9d e3 7f 1f 1a cd c7 fb 67 75 fb f1 97 bf fe
                      Data Ascii: 9zf0A-01}SGEY'X)iZd$44Sv+uv:uO-Wf#Mu|<u 4QW\T5@,fZ<9}w>SS:+YL^tVtW^k,y]w_tLb:gu
                      2024-08-31 08:46:16 UTC1390INData Raw: ad 33 4d c7 0c 67 6e 81 d6 1e 0c 0b 79 e1 e5 4a 9e 81 e8 0e 6d e9 ca e1 60 fa 07 7f fa d2 b1 1f f7 7b ac 3f 4a 13 55 ac f1 4c 7f 94 cf f0 fa f1 b6 7e 2d 9f 5f f6 86 cc fe f1 ec 09 fd 70 24 26 57 1c cf 8f 61 96 f1 4e 24 37 5b 2c f1 37 09 ff 3e 8d 4e e3 76 3b 30 89 99 dc ba 80 99 fa f5 86 7a ab 17 00 10 99 70 d6 78 75 3f ec 5d 26 c0 29 73 23 b1 4d 01 b1 bd 85 22 65 c6 ae 4d 05 29 bb 19 a4 97 d3 26 50 39 76 5a 02 7b 3b 5c cd 19 16 9a 34 6a ca 98 31 83 a3 30 c0 8d 8b 90 69 14 2e 18 a7 11 fc 43 a4 1b 50 25 a6 9a b3 38 b3 01 a7 ed 89 86 13 1f da e6 66 69 88 9b 9b cb a3 0e 88 10 49 34 ac c5 ac 87 cc 0e df 3a 83 59 3f 4a c7 9a 9c 4a 52 22 4a 73 50 10 93 5b 04 26 5d e4 1b 03 5e 57 1d b5 9f 07 15 ea 11 56 a2 32 1c 57 08 4b 8e 3a dd 14 09 a5 9a 54 87 09 2c df 70 99
                      Data Ascii: 3MgnyJm`{?JUL~-_p$&WaN$7[,7>Nv;0zpxu?]&)s#M"eM)&P9vZ{;\4j10i.CP%8fiI4:Y?JJR"JsP[&]^WV2WK:T,p
                      2024-08-31 08:46:16 UTC1390INData Raw: 34 3d 97 d3 d8 25 32 96 b3 f5 13 f7 6e 04 c3 e8 d7 24 af 68 00 67 eb c3 66 e7 0c 80 f3 86 ed 66 61 be 93 2c c1 a2 81 5f 40 75 19 01 ec 81 b2 11 59 6b 02 01 7c 80 cd 06 9c b7 f6 39 2e 1b a2 d1 59 0b 31 ae 2b a8 f9 19 97 78 ba 9e 92 04 eb 38 0f b1 da 61 42 cf b8 b8 ab 80 50 16 da 7c e0 2a 5d 2e b6 61 3d 16 a7 f7 ad 25 37 09 0c 17 4a fa a3 b0 2f 74 b2 60 63 c4 b5 32 fd ca 4b dc 91 50 cd 08 cf a1 3e ef 10 50 75 05 0f a4 06 bb 61 21 1b 94 db 98 9a 6d 25 ee 69 db 2b 4b 9f 80 46 c6 7a 5d 13 fe 95 45 1a 44 be bd d3 f7 20 9f 7f 88 83 9f 5b 5b 41 3d 0c 7f 6e 6e 02 8a 0a a9 66 0f 64 38 ff 27 1a e0 86 95 3d 0e 65 8e 2a 9e ff b3 5a f5 13 b7 6b 4c e2 da dd 53 96 36 98 be 35 e0 8b a2 03 ec 6d 83 0f 98 a6 6a 9a 7d d4 30 cf b9 22 24 be 95 ed ae b5 82 4d 0c 6d 44 68 ea 50
                      Data Ascii: 4=%2n$hgffa,_@uYk|9.Y1+x8aBP|*].a=%7J/t`c2KP>Pua!m%i+KFz]ED [[A=nnfd8'=e*ZkLS65mj}0"$MmDhP
                      2024-08-31 08:46:16 UTC1390INData Raw: 87 c6 bc 81 e5 c6 01 f8 80 6e be 68 ae 8d 1a 92 d9 22 7c fb 47 cd 55 a8 b9 72 2b d4 f6 c4 b2 bb dd a3 21 3e c1 52 53 40 cc 0f 98 69 56 28 ab c0 b8 20 06 f5 02 9a 6f 68 bf 82 e6 8f 24 99 81 79 93 8e d4 f5 47 b4 3f 91 f0 93 e1 db ea 74 d9 df bc 02 e8 81 b4 53 49 59 03 c4 1b 90 6e de 93 27 17 a4 fa 97 68 50 4b ef a1 19 2a b3 8e 70 02 6b db 66 44 24 b0 33 79 cf de 43 b1 cd cd c3 41 86 8d 22 07 8e 36 37 b7 cc 9f 0b de bb 60 25 1c fe f7 ea 9b 07 c5 80 f6 9d 10 df 4c b8 27 ef 1c 14 d6 c4 c3 c8 1c ee dd 3d 4d da 8a 0c c4 52 71 54 0a cc 3d d5 5f 29 07 02 fd 8d 5b 75 1c 35 30 b0 47 f8 b3 f1 28 6e 46 7c 56 31 fc 89 c5 6c ca aa 76 67 10 f7 66 c9 bd 26 86 fd fd 33 5d db d6 b3 31 ae 67 3e af 13 4c ea cf 63 28 1c 73 d5 b7 cf 2e dd b8 9a fa 75 a8 12 83 1e ae 82 2c 32 d0
                      Data Ascii: nh"|GUr+!>RS@iV( oh$yG?tSIYn'hPK*pkfD$3yCA"67`%L'=MRqT=_)[u50G(nF|V1lvgf&3]1g>Lc(s.u,2
                      2024-08-31 08:46:16 UTC1390INData Raw: 1a 0c 27 c9 15 33 8e 4d 6d 30 cb db c6 1d 95 4b 44 47 2a fe 65 6d 62 82 56 4a e1 cb 97 55 fc 6d 2d fc d8 a1 69 e9 bd ea 7b 41 b9 d4 6c 30 29 3a d9 54 cc 2c 05 5e a2 02 b3 c5 bb 08 19 d8 62 b9 d7 a5 62 06 3c 34 40 2e 25 3c 2e c3 97 e2 9d d1 3b c2 71 73 13 d5 e3 35 1f 0d 77 bd 52 9b 9d 01 9b 76 ce d3 0a 52 52 c7 6b 5d b2 e6 95 0a ae bf 14 a3 21 ab aa 31 20 bd b4 d7 42 bf e6 ac e0 5e 40 6f ac 03 3a 6a 01 54 03 d6 36 21 06 2c ba 37 91 a3 0c 4f d2 f8 12 13 46 bb 84 e9 6e dd 4f 81 45 78 78 68 42 e3 13 1f ac 1d 5f 60 04 f8 9a c2 4f 39 8e dc 8c 8d 17 91 02 eb a3 e5 59 ed 20 d2 12 4f e2 a7 7e 66 86 b7 89 8d 5e 42 dd ad 6d cf 2f c2 ed a0 58 e6 a4 e8 94 cb 4f a1 44 3b d4 2c b4 50 44 ce 14 d0 d2 b6 82 1a 45 be 6a b8 a8 f3 70 b4 81 60 59 46 50 39 3d 99 b2 b8 fb 19 23
                      Data Ascii: '3Mm0KDG*embVJUm-i{Al0):T,^bb<4@.%<.;qs5wRvRRk]!1 B^@o:jT6!,7OFnOExxhB_`O9Y O~f^Bm/XOD;,PDEjp`YFP9=#
                      2024-08-31 08:46:16 UTC1390INData Raw: 5e 4e 7f fd fa f3 8f 27 8f ff d8 06 aa 7b 8f 52 b0 a4 78 a6 f8 ce 72 c4 5f 39 36 74 23 3d a2 5e 64 ed 29 3c 87 d5 63 57 ef 41 05 40 38 0f e8 2f d0 e8 ee 60 78 31 a8 e0 aa 56 f0 9d a3 17 ab 1f c9 83 ee a5 c0 0c d4 43 84 42 20 54 19 07 77 89 e3 f9 04 05 67 92 9e a7 b0 83 ae 1c df b9 60 e3 01 68 2e f0 49 a9 c5 b0 3d 74 1f 03 d9 07 37 09 19 27 70 29 60 8f d4 1e 13 eb a4 2d 83 17 0b 58 58 65 0b 2b 09 80 2e 29 5a 5a 1e 7b 0b 46 a0 a2 7f e9 a8 77 64 98 5b 0e e4 3a 8a 11 91 76 32 04 ed 6a 28 4f 01 04 c6 70 85 84 f6 e7 b3 20 6e 41 39 10 d0 00 a9 42 a0 f8 c0 6e f0 6c 6d 44 a1 12 09 6c f4 67 bf 3f ab ff f1 f8 f1 1c 10 16 b7 35 9a 93 9f 70 5f e2 ca bd 60 c7 46 0f d8 18 13 66 58 1b 01 f9 88 5d 2a e3 a5 e8 eb b3 27 1a 94 30 a2 67 4f 44 be 18 97 0f cf c7 58 11 76 5a 6f
                      Data Ascii: ^N'{Rxr_96t#=^d)<cWA@8/`x1VCB Twg`h.I=t7'p)`-XXe+.)ZZ{Fwd[:v2j(Op nA9BnlmDlg?5p_`FfX]*'0gODXvZo


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      14192.168.2.44978113.107.246.60443404C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:16 UTC486OUTGET /assets/arbitration_priority_list/4.0.5/asset?assetgroup=ArbitrationService HTTP/1.1
                      Host: edgeassetservice.azureedge.net
                      Connection: keep-alive
                      Edge-Asset-Group: ArbitrationService
                      Sec-Fetch-Site: none
                      Sec-Fetch-Mode: no-cors
                      Sec-Fetch-Dest: empty
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-GB,en;q=0.9,en-US;q=0.8
                      2024-08-31 08:46:16 UTC559INHTTP/1.1 200 OK
                      Date: Sat, 31 Aug 2024 08:46:16 GMT
                      Content-Type: application/octet-stream
                      Content-Length: 11989
                      Connection: close
                      Last-Modified: Fri, 23 Aug 2024 00:10:35 GMT
                      ETag: 0x8DCC30802EF150E
                      x-ms-request-id: 903262f1-801e-001b-4826-f94695000000
                      x-ms-version: 2009-09-19
                      x-ms-lease-status: unlocked
                      x-ms-blob-type: BlockBlob
                      x-azure-ref: 20240831T084616Z-16579567576gnfmq2acf56mm7000000004dg00000000d3dr
                      Cache-Control: public, max-age=604800
                      x-fd-int-roxy-purgeid: 69316365
                      X-Cache: TCP_HIT
                      X-Cache-Info: L1_T2
                      Accept-Ranges: bytes
                      2024-08-31 08:46:16 UTC11989INData Raw: 7b 0d 0a 20 20 22 63 6f 6e 66 69 67 56 65 72 73 69 6f 6e 22 3a 20 33 32 2c 0d 0a 20 20 22 50 72 69 76 69 6c 65 67 65 64 45 78 70 65 72 69 65 6e 63 65 73 22 3a 20 5b 0d 0a 20 20 20 20 22 53 68 6f 72 65 6c 69 6e 65 50 72 69 76 69 6c 65 67 65 64 45 78 70 65 72 69 65 6e 63 65 49 44 22 2c 0d 0a 20 20 20 20 22 53 48 4f 50 50 49 4e 47 5f 41 55 54 4f 5f 53 48 4f 57 5f 43 4f 55 50 4f 4e 53 5f 43 48 45 43 4b 4f 55 54 22 2c 0d 0a 20 20 20 20 22 53 48 4f 50 50 49 4e 47 5f 41 55 54 4f 5f 53 48 4f 57 5f 4c 4f 57 45 52 5f 50 52 49 43 45 5f 46 4f 55 4e 44 22 2c 0d 0a 20 20 20 20 22 53 48 4f 50 50 49 4e 47 5f 41 55 54 4f 5f 53 48 4f 57 5f 42 49 4e 47 5f 53 45 41 52 43 48 22 2c 0d 0a 20 20 20 20 22 53 48 4f 50 50 49 4e 47 5f 41 55 54 4f 5f 53 48 4f 57 5f 52 45 42 41 54 45
                      Data Ascii: { "configVersion": 32, "PrivilegedExperiences": [ "ShorelinePrivilegedExperienceID", "SHOPPING_AUTO_SHOW_COUPONS_CHECKOUT", "SHOPPING_AUTO_SHOW_LOWER_PRICE_FOUND", "SHOPPING_AUTO_SHOW_BING_SEARCH", "SHOPPING_AUTO_SHOW_REBATE


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      15192.168.2.464517162.159.61.3443404C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:19 UTC245OUTPOST /dns-query HTTP/1.1
                      Host: chrome.cloudflare-dns.com
                      Connection: keep-alive
                      Content-Length: 128
                      Accept: application/dns-message
                      Accept-Language: *
                      User-Agent: Chrome
                      Accept-Encoding: identity
                      Content-Type: application/dns-message
                      2024-08-31 08:46:19 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcom)TP
                      2024-08-31 08:46:19 UTC247INHTTP/1.1 200 OK
                      Server: cloudflare
                      Date: Sat, 31 Aug 2024 08:46:19 GMT
                      Content-Type: application/dns-message
                      Connection: close
                      Access-Control-Allow-Origin: *
                      Content-Length: 468
                      CF-RAY: 8bbbbfdd887143c5-EWR
                      alt-svc: h3=":443"; ma=86400
                      2024-08-31 08:46:19 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 01 21 00 04 8e fa 41 a3 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcom!A)


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      16192.168.2.464518172.64.41.3443404C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:19 UTC245OUTPOST /dns-query HTTP/1.1
                      Host: chrome.cloudflare-dns.com
                      Connection: keep-alive
                      Content-Length: 128
                      Accept: application/dns-message
                      Accept-Language: *
                      User-Agent: Chrome
                      Accept-Encoding: identity
                      Content-Type: application/dns-message
                      2024-08-31 08:46:19 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcom)TP
                      2024-08-31 08:46:19 UTC247INHTTP/1.1 200 OK
                      Server: cloudflare
                      Date: Sat, 31 Aug 2024 08:46:19 GMT
                      Content-Type: application/dns-message
                      Connection: close
                      Access-Control-Allow-Origin: *
                      Content-Length: 468
                      CF-RAY: 8bbbbfdd89b9c41d-EWR
                      alt-svc: h3=":443"; ma=86400
                      2024-08-31 08:46:19 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 01 1a 00 04 8e fa 50 43 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcomPC)


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      17192.168.2.464519172.64.41.3443404C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:19 UTC245OUTPOST /dns-query HTTP/1.1
                      Host: chrome.cloudflare-dns.com
                      Connection: keep-alive
                      Content-Length: 128
                      Accept: application/dns-message
                      Accept-Language: *
                      User-Agent: Chrome
                      Accept-Encoding: identity
                      Content-Type: application/dns-message
                      2024-08-31 08:46:19 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 54 00 0c 00 50 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcom)TP
                      2024-08-31 08:46:19 UTC247INHTTP/1.1 200 OK
                      Server: cloudflare
                      Date: Sat, 31 Aug 2024 08:46:19 GMT
                      Content-Type: application/dns-message
                      Connection: close
                      Access-Control-Allow-Origin: *
                      Content-Length: 468
                      CF-RAY: 8bbbbfddc9c20c7c-EWR
                      alt-svc: h3=":443"; ma=86400
                      2024-08-31 08:46:19 UTC468INData Raw: 00 00 81 80 00 01 00 01 00 00 00 01 03 77 77 77 07 67 73 74 61 74 69 63 03 63 6f 6d 00 00 01 00 01 c0 0c 00 01 00 01 00 00 00 fa 00 04 8e fb 23 a3 00 00 29 04 d0 00 00 00 00 01 98 00 0c 01 94 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: wwwgstaticcom#)


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      18192.168.2.464521172.64.41.3443404C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:34 UTC245OUTPOST /dns-query HTTP/1.1
                      Host: chrome.cloudflare-dns.com
                      Connection: keep-alive
                      Content-Length: 128
                      Accept: application/dns-message
                      Accept-Language: *
                      User-Agent: Chrome
                      Accept-Encoding: identity
                      Content-Type: application/dns-message
                      2024-08-31 08:46:34 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 10 6d 73 65 64 67 65 65 78 74 65 6e 73 69 6f 6e 73 02 73 66 03 74 6c 75 02 64 6c 08 64 65 6c 69 76 65 72 79 02 6d 70 09 6d 69 63 72 6f 73 6f 66 74 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 2f 00 0c 00 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: msedgeextensionssftludldeliverympmicrosoftcom)/+
                      2024-08-31 08:46:34 UTC247INHTTP/1.1 200 OK
                      Server: cloudflare
                      Date: Sat, 31 Aug 2024 08:46:34 GMT
                      Content-Type: application/dns-message
                      Connection: close
                      Access-Control-Allow-Origin: *
                      Content-Length: 468
                      CF-RAY: 8bbbc037ab1bc413-EWR
                      alt-svc: h3=":443"; ma=86400
                      2024-08-31 08:46:34 UTC468INData Raw: 00 00 81 80 00 01 00 07 00 00 00 01 10 6d 73 65 64 67 65 65 78 74 65 6e 73 69 6f 6e 73 02 73 66 03 74 6c 75 02 64 6c 08 64 65 6c 69 76 65 72 79 02 6d 70 09 6d 69 63 72 6f 73 6f 66 74 03 63 6f 6d 00 00 01 00 01 c0 0c 00 05 00 01 00 00 0e 0f 00 34 04 73 74 61 72 02 73 66 03 74 6c 75 02 64 6c 08 64 65 6c 69 76 65 72 79 02 6d 70 09 6d 69 63 72 6f 73 6f 66 74 03 63 6f 6d 08 64 65 6c 69 76 65 72 79 c0 33 c0 52 00 05 00 01 00 01 51 7f 00 26 11 63 64 70 2d 66 2d 73 73 6c 2d 74 6c 75 2d 6e 65 74 0e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 03 6e 65 74 00 c0 92 00 05 00 01 00 00 01 2b 00 1c 0f 77 69 6c 64 63 61 72 64 74 6c 75 2d 73 73 6c 09 61 7a 75 72 65 65 64 67 65 c0 b3 c0 c4 00 05 00 01 00 00 07 07 00 15 0f 77 69 6c 64 63 61 72 64 74 6c 75 2d 73 73 6c 02 65 63
                      Data Ascii: msedgeextensionssftludldeliverympmicrosoftcom4starsftludldeliverympmicrosoftcomdelivery3RQ&cdp-f-ssl-tlu-nettrafficmanagernet+wildcardtlu-sslazureedgewildcardtlu-sslec


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      19192.168.2.464520172.64.41.3443404C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:34 UTC245OUTPOST /dns-query HTTP/1.1
                      Host: chrome.cloudflare-dns.com
                      Connection: keep-alive
                      Content-Length: 128
                      Accept: application/dns-message
                      Accept-Language: *
                      User-Agent: Chrome
                      Accept-Encoding: identity
                      Content-Type: application/dns-message
                      2024-08-31 08:46:34 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 10 6d 73 65 64 67 65 65 78 74 65 6e 73 69 6f 6e 73 02 73 66 03 74 6c 75 02 64 6c 08 64 65 6c 69 76 65 72 79 02 6d 70 09 6d 69 63 72 6f 73 6f 66 74 03 63 6f 6d 00 00 41 00 01 00 00 29 10 00 00 00 00 00 00 2f 00 0c 00 2b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: msedgeextensionssftludldeliverympmicrosoftcomA)/+
                      2024-08-31 08:46:34 UTC247INHTTP/1.1 200 OK
                      Server: cloudflare
                      Date: Sat, 31 Aug 2024 08:46:34 GMT
                      Content-Type: application/dns-message
                      Connection: close
                      Access-Control-Allow-Origin: *
                      Content-Length: 468
                      CF-RAY: 8bbbc037cb890f79-EWR
                      alt-svc: h3=":443"; ma=86400
                      2024-08-31 08:46:34 UTC468INData Raw: 00 00 81 80 00 01 00 06 00 01 00 01 10 6d 73 65 64 67 65 65 78 74 65 6e 73 69 6f 6e 73 02 73 66 03 74 6c 75 02 64 6c 08 64 65 6c 69 76 65 72 79 02 6d 70 09 6d 69 63 72 6f 73 6f 66 74 03 63 6f 6d 00 00 41 00 01 c0 0c 00 05 00 01 00 00 0a b9 00 34 04 73 74 61 72 02 73 66 03 74 6c 75 02 64 6c 08 64 65 6c 69 76 65 72 79 02 6d 70 09 6d 69 63 72 6f 73 6f 66 74 03 63 6f 6d 08 64 65 6c 69 76 65 72 79 c0 33 c0 52 00 05 00 01 00 01 4e 29 00 26 11 63 64 70 2d 66 2d 73 73 6c 2d 74 6c 75 2d 6e 65 74 0e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 03 6e 65 74 00 c0 92 00 05 00 01 00 00 01 2c 00 1c 0f 77 69 6c 64 63 61 72 64 74 6c 75 2d 73 73 6c 09 61 7a 75 72 65 65 64 67 65 c0 b3 c0 c4 00 05 00 01 00 00 07 08 00 15 0f 77 69 6c 64 63 61 72 64 74 6c 75 2d 73 73 6c 02 65 63
                      Data Ascii: msedgeextensionssftludldeliverympmicrosoftcomA4starsftludldeliverympmicrosoftcomdelivery3RN)&cdp-f-ssl-tlu-nettrafficmanagernet,wildcardtlu-sslazureedgewildcardtlu-sslec


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      20192.168.2.464522152.195.19.97443404C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:34 UTC616OUTGET /filestreamingservice/files/bdc392b9-6b81-4aaa-b3ee-2fffd9562edb?P1=1725698776&P2=404&P3=2&P4=T0O7OVcNgyThGUT1PRxzpOZDy9DwIq7Q90Q9eV%2f22u2Pgf1QBb5zYPg4O5bU%2fwcrr2pWcJF3YzR6rNzVruy9xw%3d%3d HTTP/1.1
                      Host: msedgeextensions.sf.tlu.dl.delivery.mp.microsoft.com
                      Connection: keep-alive
                      MS-CV: Ubn9SXqUJ1SYulYQTz7C+9
                      Sec-Fetch-Site: none
                      Sec-Fetch-Mode: no-cors
                      Sec-Fetch-Dest: empty
                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36 Edg/117.0.2045.47
                      Accept-Encoding: gzip, deflate, br
                      Accept-Language: en-GB,en;q=0.9,en-US;q=0.8
                      2024-08-31 08:46:34 UTC632INHTTP/1.1 200 OK
                      Accept-Ranges: bytes
                      Age: 5020525
                      Cache-Control: public, max-age=17280000
                      Content-Type: application/x-chrome-extension
                      Date: Sat, 31 Aug 2024 08:46:34 GMT
                      Etag: "Gv3jDkaZdFLRHkoq2781zOehQE8="
                      Last-Modified: Wed, 24 Jan 2024 00:25:37 GMT
                      MS-CorrelationId: b4b4aabf-4d02-4629-96b1-a382405b6a31
                      MS-CV: 642I+iNy0Qp5KFcIV/sUKh.0
                      MS-RequestId: 5245ac9e-0afd-43ce-8780-5c7d0bedf1d4
                      Server: ECAcc (nyd/D11E)
                      X-AspNet-Version: 4.0.30319
                      X-AspNetMvc-Version: 5.3
                      X-Cache: HIT
                      X-CCC: US
                      X-CID: 11
                      X-Powered-By: ASP.NET
                      X-Powered-By: ARR/3.0
                      X-Powered-By: ASP.NET
                      Content-Length: 11185
                      Connection: close
                      2024-08-31 08:46:34 UTC11185INData Raw: 43 72 32 34 03 00 00 00 1d 05 00 00 12 ac 04 0a a6 02 30 82 01 22 30 0d 06 09 2a 86 48 86 f7 0d 01 01 01 05 00 03 82 01 0f 00 30 82 01 0a 02 82 01 01 00 bb 4e a9 d8 c8 e8 cb ac 89 0d 45 23 09 ef 07 9e ab ed 9a 39 65 ef 75 ea 71 bc a5 c4 56 59 59 ef 8c 08 40 04 2b ed 43 d0 dc 6b a7 4f 88 b9 62 4b d3 60 94 de 36 ee 47 92 ab 25 8a 1e cc 0d fa 33 5a 12 19 8e 65 20 5f fd 36 15 d6 13 1e 46 ae 8b 31 70 18 f1 a8 4b 1d 5a ff de 0e 83 8e 11 b2 2f 20 ed 33 88 cb fb 4f 54 94 9e 60 00 d3 bc 30 ab c0 d7 59 8b b0 96 46 54 fc f0 34 33 1c 74 68 d6 79 f9 0c 8c 7d 8a 91 98 ca 70 c6 4c 0f 1b c8 32 53 b9 26 69 cc 60 09 8d 6f ec f9 a6 66 8d 6f 48 81 0e 05 8a f1 97 4e b8 c3 94 3a b3 f7 69 6a 54 89 33 da 9e 46 7b d1 30 bb 2c cc 66 3f 27 66 e3 43 51 74 3b 62 5f 22 50 63 08 e5 20
                      Data Ascii: Cr240"0*H0NE#9euqVYY@+CkObK`6G%3Ze _6F1pKZ/ 3OT`0YFT43thy}pL2S&i`ofoHN:ijT3F{0,f?'fCQt;b_"Pc


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      21192.168.2.464524162.159.61.3443404C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:35 UTC245OUTPOST /dns-query HTTP/1.1
                      Host: chrome.cloudflare-dns.com
                      Connection: keep-alive
                      Content-Length: 128
                      Accept: application/dns-message
                      Accept-Language: *
                      User-Agent: Chrome
                      Accept-Encoding: identity
                      Content-Type: application/dns-message
                      2024-08-31 08:46:35 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 04 65 64 67 65 09 6d 69 63 72 6f 73 6f 66 74 03 63 6f 6d 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 51 00 0c 00 4d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: edgemicrosoftcom)QM
                      2024-08-31 08:46:36 UTC247INHTTP/1.1 200 OK
                      Server: cloudflare
                      Date: Sat, 31 Aug 2024 08:46:36 GMT
                      Content-Type: application/dns-message
                      Connection: close
                      Access-Control-Allow-Origin: *
                      Content-Length: 468
                      CF-RAY: 8bbbc0430f0243c7-EWR
                      alt-svc: h3=":443"; ma=86400
                      2024-08-31 08:46:36 UTC468INData Raw: 00 00 81 80 00 01 00 04 00 00 00 01 04 65 64 67 65 09 6d 69 63 72 6f 73 6f 66 74 03 63 6f 6d 00 00 01 00 01 c0 0c 00 05 00 01 00 00 0d ec 00 2d 12 65 64 67 65 2d 6d 69 63 72 6f 73 6f 66 74 2d 63 6f 6d 0b 64 75 61 6c 2d 61 2d 30 30 33 36 08 61 2d 6d 73 65 64 67 65 03 6e 65 74 00 c0 30 00 05 00 01 00 00 00 18 00 02 c0 43 c0 43 00 01 00 01 00 00 00 18 00 04 cc 4f c5 ef c0 43 00 01 00 01 00 00 00 18 00 04 0d 6b 15 ef 00 00 29 04 d0 00 00 00 00 01 3e 00 0c 01 3a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: edgemicrosoftcom-edge-microsoft-comdual-a-0036a-msedgenet0CCOCk)>:


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      22192.168.2.46452740.127.169.103443
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:46:53 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=s+gBg+wx87rhMr7&MD=hDHON5EA HTTP/1.1
                      Connection: Keep-Alive
                      Accept: */*
                      User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                      Host: slscr.update.microsoft.com
                      2024-08-31 08:46:53 UTC560INHTTP/1.1 200 OK
                      Cache-Control: no-cache
                      Pragma: no-cache
                      Content-Type: application/octet-stream
                      Expires: -1
                      Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                      ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                      MS-CorrelationId: e42606ab-3c5c-4892-b9be-76a6047faa8b
                      MS-RequestId: 2a1107a8-2bfb-403c-97d4-1e36d47369eb
                      MS-CV: FR4DVv55qEy6TldK.0
                      X-Microsoft-SLSClientCache: 1440
                      Content-Disposition: attachment; filename=environment.cab
                      X-Content-Type-Options: nosniff
                      Date: Sat, 31 Aug 2024 08:46:53 GMT
                      Connection: close
                      Content-Length: 30005
                      2024-08-31 08:46:53 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                      Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                      2024-08-31 08:46:53 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                      Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      23192.168.2.452234172.64.41.34437484C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      TimestampBytes transferredDirectionData
                      2024-08-31 08:47:58 UTC245OUTPOST /dns-query HTTP/1.1
                      Host: chrome.cloudflare-dns.com
                      Connection: keep-alive
                      Content-Length: 128
                      Accept: application/dns-message
                      Accept-Language: *
                      User-Agent: Chrome
                      Accept-Encoding: identity
                      Content-Type: application/dns-message
                      2024-08-31 08:47:58 UTC128OUTData Raw: 00 00 01 00 00 01 00 00 00 00 00 01 04 62 7a 69 62 0a 6e 65 6c 72 65 70 6f 72 74 73 03 6e 65 74 00 00 01 00 01 00 00 29 10 00 00 00 00 00 00 50 00 0c 00 4c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: bzibnelreportsnet)PL
                      2024-08-31 08:47:58 UTC247INHTTP/1.1 200 OK
                      Server: cloudflare
                      Date: Sat, 31 Aug 2024 08:47:58 GMT
                      Content-Type: application/dns-message
                      Connection: close
                      Access-Control-Allow-Origin: *
                      Content-Length: 468
                      CF-RAY: 8bbbc247fe5d42d0-EWR
                      alt-svc: h3=":443"; ma=86400
                      2024-08-31 08:47:58 UTC468INData Raw: 00 00 81 80 00 01 00 04 00 00 00 01 04 62 7a 69 62 0a 6e 65 6c 72 65 70 6f 72 74 73 03 6e 65 74 00 00 01 00 01 c0 0c 00 05 00 01 00 00 0d f5 00 20 04 62 7a 69 62 0a 6e 65 6c 72 65 70 6f 72 74 73 03 6e 65 74 09 61 6b 61 6d 61 69 7a 65 64 c0 1c c0 31 00 05 00 01 00 00 54 45 00 13 04 61 34 31 36 04 64 73 63 64 06 61 6b 61 6d 61 69 c0 1c c0 5d 00 01 00 01 00 00 00 0a 00 04 17 36 a1 69 c0 5d 00 01 00 01 00 00 00 0a 00 04 17 37 eb aa 00 00 29 04 d0 00 00 00 00 01 39 00 0c 01 35 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                      Data Ascii: bzibnelreportsnet bzibnelreportsnetakamaized1TEa416dscdakamai]6i]7)95


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:04:45:53
                      Start date:31/08/2024
                      Path:C:\Users\user\Desktop\file.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\file.exe"
                      Imagebase:0xad0000
                      File size:917'504 bytes
                      MD5 hash:AEADEC1696B55C6F2222A110FEC044BB
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Target ID:1
                      Start time:04:45:53
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:3
                      Start time:04:45:53
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password --flag-switches-begin --flag-switches-end --disable-nacl --do-not-de-elevate
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:false

                      Target ID:4
                      Start time:04:45:53
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2204 --field-trial-handle=2120,i,14100662108306307512,17240055722320644546,262144 --disable-features=TranslateUI /prefetch:3
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:5
                      Start time:04:45:54
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2756 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:3
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:false

                      Target ID:7
                      Start time:04:45:58
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=6932 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:8
                      Start time:04:45:58
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-GB --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --mojo-platform-channel-handle=3444 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:9
                      Start time:04:45:59
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7264 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8
                      Imagebase:0x7ff7e4a10000
                      File size:1'255'976 bytes
                      MD5 hash:76C58E5BABFE4ACF0308AA646FC0F416
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:10
                      Start time:04:45:59
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=7264 --field-trial-handle=2040,i,9930441290366973003,4601105489204100444,262144 --disable-features=TranslateUI /prefetch:8
                      Imagebase:0x7ff7e4a10000
                      File size:1'255'976 bytes
                      MD5 hash:76C58E5BABFE4ACF0308AA646FC0F416
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:12
                      Start time:04:46:12
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:false

                      Target ID:13
                      Start time:04:46:12
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2228 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:3
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:false

                      Target ID:14
                      Start time:04:46:13
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-GB --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4184 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:moderate
                      Has exited:true

                      Target ID:15
                      Start time:04:46:14
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6164 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8
                      Imagebase:0x7ff7e4a10000
                      File size:1'255'976 bytes
                      MD5 hash:76C58E5BABFE4ACF0308AA646FC0F416
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:16
                      Start time:04:46:14
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=6164 --field-trial-handle=1948,i,13885286041094760984,11072867299078711805,262144 /prefetch:8
                      Imagebase:0x7ff7e4a10000
                      File size:1'255'976 bytes
                      MD5 hash:76C58E5BABFE4ACF0308AA646FC0F416
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:19
                      Start time:04:46:20
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:20
                      Start time:04:46:21
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=1952 --field-trial-handle=2088,i,17495144093669896207,16119466351810412879,262144 /prefetch:3
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:21
                      Start time:04:46:29
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:22
                      Start time:04:46:29
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2096 --field-trial-handle=1992,i,11980253433158085184,3980390935348244074,262144 /prefetch:3
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:23
                      Start time:04:46:42
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start /prefetch:5
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Target ID:24
                      Start time:04:46:42
                      Start date:31/08/2024
                      Path:C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      Wow64 process (32bit):false
                      Commandline:"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --mojo-platform-channel-handle=2152 --field-trial-handle=1972,i,10789157105983230292,1372337410351055034,262144 /prefetch:3
                      Imagebase:0x7ff67dcd0000
                      File size:4'210'216 bytes
                      MD5 hash:69222B8101B0601CC6663F8381E7E00F
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:1.8%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:4.9%
                        Total number of Nodes:1355
                        Total number of Limit Nodes:42
                        execution_graph 94995 ad1cad SystemParametersInfoW 94996 b62a55 95004 b41ebc 94996->95004 94999 b62a70 95006 b339c0 22 API calls 94999->95006 95000 b62a87 95002 b62a7c 95007 b3417d 22 API calls __fread_nolock 95002->95007 95005 b41ec3 IsWindow 95004->95005 95005->94999 95005->95000 95006->95002 95007->95000 95008 ad1044 95013 ad10f3 95008->95013 95010 ad104a 95049 af00a3 29 API calls __onexit 95010->95049 95012 ad1054 95050 ad1398 95013->95050 95017 ad116a 95060 ada961 95017->95060 95020 ada961 22 API calls 95021 ad117e 95020->95021 95022 ada961 22 API calls 95021->95022 95023 ad1188 95022->95023 95024 ada961 22 API calls 95023->95024 95025 ad11c6 95024->95025 95026 ada961 22 API calls 95025->95026 95027 ad1292 95026->95027 95065 ad171c 95027->95065 95031 ad12c4 95032 ada961 22 API calls 95031->95032 95033 ad12ce 95032->95033 95086 ae1940 95033->95086 95035 ad12f9 95096 ad1aab 95035->95096 95037 ad1315 95038 ad1325 GetStdHandle 95037->95038 95039 b12485 95038->95039 95040 ad137a 95038->95040 95039->95040 95041 b1248e 95039->95041 95044 ad1387 OleInitialize 95040->95044 95103 aefddb 95041->95103 95043 b12495 95113 b4011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95043->95113 95044->95010 95046 b1249e 95114 b40944 CreateThread 95046->95114 95048 b124aa CloseHandle 95048->95040 95049->95012 95115 ad13f1 95050->95115 95053 ad13f1 22 API calls 95054 ad13d0 95053->95054 95055 ada961 22 API calls 95054->95055 95056 ad13dc 95055->95056 95122 ad6b57 95056->95122 95058 ad1129 95059 ad1bc3 6 API calls 95058->95059 95059->95017 95061 aefe0b 22 API calls 95060->95061 95062 ada976 95061->95062 95063 aefddb 22 API calls 95062->95063 95064 ad1174 95063->95064 95064->95020 95066 ada961 22 API calls 95065->95066 95067 ad172c 95066->95067 95068 ada961 22 API calls 95067->95068 95069 ad1734 95068->95069 95070 ada961 22 API calls 95069->95070 95071 ad174f 95070->95071 95072 aefddb 22 API calls 95071->95072 95073 ad129c 95072->95073 95074 ad1b4a 95073->95074 95075 ad1b58 95074->95075 95076 ada961 22 API calls 95075->95076 95077 ad1b63 95076->95077 95078 ada961 22 API calls 95077->95078 95079 ad1b6e 95078->95079 95080 ada961 22 API calls 95079->95080 95081 ad1b79 95080->95081 95082 ada961 22 API calls 95081->95082 95083 ad1b84 95082->95083 95084 aefddb 22 API calls 95083->95084 95085 ad1b96 RegisterWindowMessageW 95084->95085 95085->95031 95087 ae1981 95086->95087 95091 ae195d 95086->95091 95167 af0242 5 API calls __Init_thread_wait 95087->95167 95089 ae198b 95089->95091 95168 af01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95089->95168 95095 ae196e 95091->95095 95169 af0242 5 API calls __Init_thread_wait 95091->95169 95092 ae8727 95092->95095 95170 af01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95092->95170 95095->95035 95097 ad1abb 95096->95097 95098 b1272d 95096->95098 95099 aefddb 22 API calls 95097->95099 95171 b43209 23 API calls 95098->95171 95102 ad1ac3 95099->95102 95101 b12738 95102->95037 95106 aefde0 95103->95106 95104 afea0c ___std_exception_copy 21 API calls 95104->95106 95105 aefdfa 95105->95043 95106->95104 95106->95105 95108 aefdfc 95106->95108 95172 af4ead 7 API calls 2 library calls 95106->95172 95109 af066d 95108->95109 95173 af32a4 RaiseException 95108->95173 95174 af32a4 RaiseException 95109->95174 95111 af068a 95111->95043 95113->95046 95114->95048 95175 b4092a 28 API calls 95114->95175 95116 ada961 22 API calls 95115->95116 95117 ad13fc 95116->95117 95118 ada961 22 API calls 95117->95118 95119 ad1404 95118->95119 95120 ada961 22 API calls 95119->95120 95121 ad13c6 95120->95121 95121->95053 95123 b14ba1 95122->95123 95124 ad6b67 _wcslen 95122->95124 95145 ad93b2 95123->95145 95127 ad6b7d 95124->95127 95128 ad6ba2 95124->95128 95126 b14baa 95126->95126 95134 ad6f34 22 API calls 95127->95134 95130 aefddb 22 API calls 95128->95130 95132 ad6bae 95130->95132 95131 ad6b85 __fread_nolock 95131->95058 95135 aefe0b 95132->95135 95134->95131 95138 aefddb 95135->95138 95137 aefdfa 95137->95131 95138->95137 95141 aefdfc 95138->95141 95149 afea0c 95138->95149 95156 af4ead 7 API calls 2 library calls 95138->95156 95140 af066d 95158 af32a4 RaiseException 95140->95158 95141->95140 95157 af32a4 RaiseException 95141->95157 95143 af068a 95143->95131 95146 ad93c9 __fread_nolock 95145->95146 95147 ad93c0 95145->95147 95146->95126 95147->95146 95161 adaec9 95147->95161 95154 b03820 pre_c_initialization 95149->95154 95150 b0385e 95160 aff2d9 20 API calls _free 95150->95160 95151 b03849 RtlAllocateHeap 95153 b0385c 95151->95153 95151->95154 95153->95138 95154->95150 95154->95151 95159 af4ead 7 API calls 2 library calls 95154->95159 95156->95138 95157->95140 95158->95143 95159->95154 95160->95153 95162 adaedc 95161->95162 95166 adaed9 __fread_nolock 95161->95166 95163 aefddb 22 API calls 95162->95163 95164 adaee7 95163->95164 95165 aefe0b 22 API calls 95164->95165 95165->95166 95166->95146 95167->95089 95168->95091 95169->95092 95170->95095 95171->95101 95172->95106 95173->95109 95174->95111 95176 ad2de3 95177 ad2df0 __wsopen_s 95176->95177 95178 ad2e09 95177->95178 95179 b12c2b ___scrt_fastfail 95177->95179 95192 ad3aa2 95178->95192 95181 b12c47 GetOpenFileNameW 95179->95181 95183 b12c96 95181->95183 95185 ad6b57 22 API calls 95183->95185 95187 b12cab 95185->95187 95187->95187 95189 ad2e27 95220 ad44a8 95189->95220 95249 b11f50 95192->95249 95195 ad3ace 95197 ad6b57 22 API calls 95195->95197 95196 ad3ae9 95255 ada6c3 95196->95255 95199 ad3ada 95197->95199 95251 ad37a0 95199->95251 95202 ad2da5 95203 b11f50 __wsopen_s 95202->95203 95204 ad2db2 GetLongPathNameW 95203->95204 95205 ad6b57 22 API calls 95204->95205 95206 ad2dda 95205->95206 95207 ad3598 95206->95207 95208 ada961 22 API calls 95207->95208 95209 ad35aa 95208->95209 95210 ad3aa2 23 API calls 95209->95210 95211 ad35b5 95210->95211 95212 b132eb 95211->95212 95213 ad35c0 95211->95213 95218 b1330d 95212->95218 95273 aece60 41 API calls 95212->95273 95261 ad515f 95213->95261 95219 ad35df 95219->95189 95274 ad4ecb 95220->95274 95223 b13833 95296 b42cf9 95223->95296 95225 ad4ecb 94 API calls 95226 ad44e1 95225->95226 95226->95223 95228 ad44e9 95226->95228 95227 b13848 95229 b13869 95227->95229 95230 b1384c 95227->95230 95231 b13854 95228->95231 95232 ad44f5 95228->95232 95234 aefe0b 22 API calls 95229->95234 95323 ad4f39 95230->95323 95329 b3da5a 82 API calls 95231->95329 95322 ad940c 136 API calls 2 library calls 95232->95322 95248 b138ae 95234->95248 95237 ad2e31 95238 b13862 95238->95229 95239 ad4f39 68 API calls 95242 b13a5f 95239->95242 95242->95239 95335 b3989b 82 API calls __wsopen_s 95242->95335 95245 ad9cb3 22 API calls 95245->95248 95248->95242 95248->95245 95330 b3967e 22 API calls __fread_nolock 95248->95330 95331 b395ad 42 API calls _wcslen 95248->95331 95332 b40b5a 22 API calls 95248->95332 95333 ada4a1 22 API calls __fread_nolock 95248->95333 95334 ad3ff7 22 API calls 95248->95334 95250 ad3aaf GetFullPathNameW 95249->95250 95250->95195 95250->95196 95252 ad37ae 95251->95252 95253 ad93b2 22 API calls 95252->95253 95254 ad2e12 95253->95254 95254->95202 95256 ada6dd 95255->95256 95257 ada6d0 95255->95257 95258 aefddb 22 API calls 95256->95258 95257->95199 95259 ada6e7 95258->95259 95260 aefe0b 22 API calls 95259->95260 95260->95257 95262 ad516e 95261->95262 95266 ad518f __fread_nolock 95261->95266 95264 aefe0b 22 API calls 95262->95264 95263 aefddb 22 API calls 95265 ad35cc 95263->95265 95264->95266 95267 ad35f3 95265->95267 95266->95263 95268 ad3605 95267->95268 95272 ad3624 __fread_nolock 95267->95272 95270 aefe0b 22 API calls 95268->95270 95269 aefddb 22 API calls 95271 ad363b 95269->95271 95270->95272 95271->95219 95272->95269 95273->95212 95336 ad4e90 LoadLibraryA 95274->95336 95279 ad4ef6 LoadLibraryExW 95344 ad4e59 LoadLibraryA 95279->95344 95280 b13ccf 95282 ad4f39 68 API calls 95280->95282 95284 b13cd6 95282->95284 95286 ad4e59 3 API calls 95284->95286 95288 b13cde 95286->95288 95287 ad4f20 95287->95288 95289 ad4f2c 95287->95289 95366 ad50f5 95288->95366 95291 ad4f39 68 API calls 95289->95291 95293 ad44cd 95291->95293 95293->95223 95293->95225 95295 b13d05 95297 b42d15 95296->95297 95298 ad511f 64 API calls 95297->95298 95299 b42d29 95298->95299 95509 b42e66 95299->95509 95302 b42d3f 95302->95227 95303 ad50f5 40 API calls 95304 b42d56 95303->95304 95305 ad50f5 40 API calls 95304->95305 95306 b42d66 95305->95306 95307 ad50f5 40 API calls 95306->95307 95308 b42d81 95307->95308 95309 ad50f5 40 API calls 95308->95309 95310 b42d9c 95309->95310 95311 ad511f 64 API calls 95310->95311 95312 b42db3 95311->95312 95313 afea0c ___std_exception_copy 21 API calls 95312->95313 95314 b42dba 95313->95314 95315 afea0c ___std_exception_copy 21 API calls 95314->95315 95316 b42dc4 95315->95316 95317 ad50f5 40 API calls 95316->95317 95318 b42dd8 95317->95318 95319 b428fe 27 API calls 95318->95319 95320 b42dee 95319->95320 95320->95302 95515 b422ce 79 API calls 95320->95515 95322->95237 95324 ad4f4a 95323->95324 95325 ad4f43 95323->95325 95327 ad4f59 95324->95327 95328 ad4f6a FreeLibrary 95324->95328 95516 afe678 95325->95516 95327->95231 95328->95327 95329->95238 95330->95248 95331->95248 95332->95248 95333->95248 95334->95248 95335->95242 95337 ad4ea8 GetProcAddress 95336->95337 95338 ad4ec6 95336->95338 95339 ad4eb8 95337->95339 95341 afe5eb 95338->95341 95339->95338 95340 ad4ebf FreeLibrary 95339->95340 95340->95338 95374 afe52a 95341->95374 95343 ad4eea 95343->95279 95343->95280 95345 ad4e8d 95344->95345 95346 ad4e6e GetProcAddress 95344->95346 95349 ad4f80 95345->95349 95347 ad4e7e 95346->95347 95347->95345 95348 ad4e86 FreeLibrary 95347->95348 95348->95345 95350 aefe0b 22 API calls 95349->95350 95351 ad4f95 95350->95351 95435 ad5722 95351->95435 95353 ad4fa1 __fread_nolock 95354 ad50a5 95353->95354 95355 b13d1d 95353->95355 95358 ad4fdc 95353->95358 95438 ad42a2 CreateStreamOnHGlobal 95354->95438 95449 b4304d 74 API calls 95355->95449 95359 b13d22 95358->95359 95360 ad50f5 40 API calls 95358->95360 95365 ad506e messages 95358->95365 95444 ad511f 95358->95444 95361 ad511f 64 API calls 95359->95361 95360->95358 95362 b13d45 95361->95362 95363 ad50f5 40 API calls 95362->95363 95363->95365 95365->95287 95367 ad5107 95366->95367 95370 b13d70 95366->95370 95471 afe8c4 95367->95471 95371 b428fe 95492 b4274e 95371->95492 95373 b42919 95373->95295 95377 afe536 CallCatchBlock 95374->95377 95375 afe544 95399 aff2d9 20 API calls _free 95375->95399 95377->95375 95379 afe574 95377->95379 95378 afe549 95400 b027ec 26 API calls _strftime 95378->95400 95381 afe579 95379->95381 95382 afe586 95379->95382 95401 aff2d9 20 API calls _free 95381->95401 95391 b08061 95382->95391 95385 afe58f 95387 afe595 95385->95387 95389 afe5a2 95385->95389 95386 afe554 __wsopen_s 95386->95343 95402 aff2d9 20 API calls _free 95387->95402 95403 afe5d4 LeaveCriticalSection __fread_nolock 95389->95403 95392 b0806d CallCatchBlock 95391->95392 95404 b02f5e EnterCriticalSection 95392->95404 95394 b0807b 95405 b080fb 95394->95405 95398 b080ac __wsopen_s 95398->95385 95399->95378 95400->95386 95401->95386 95402->95386 95403->95386 95404->95394 95411 b0811e 95405->95411 95406 b08088 95419 b080b7 95406->95419 95407 b08177 95424 b04c7d 20 API calls 2 library calls 95407->95424 95410 b08180 95425 b029c8 95410->95425 95411->95406 95411->95407 95422 af918d EnterCriticalSection 95411->95422 95423 af91a1 LeaveCriticalSection 95411->95423 95413 b08189 95413->95406 95431 b03405 11 API calls 2 library calls 95413->95431 95415 b081a8 95432 af918d EnterCriticalSection 95415->95432 95418 b081bb 95418->95406 95434 b02fa6 LeaveCriticalSection 95419->95434 95421 b080be 95421->95398 95422->95411 95423->95411 95424->95410 95426 b029fc _free 95425->95426 95427 b029d3 RtlFreeHeap 95425->95427 95426->95413 95427->95426 95428 b029e8 95427->95428 95433 aff2d9 20 API calls _free 95428->95433 95430 b029ee GetLastError 95430->95426 95431->95415 95432->95418 95433->95430 95434->95421 95436 aefddb 22 API calls 95435->95436 95437 ad5734 95436->95437 95437->95353 95439 ad42bc FindResourceExW 95438->95439 95440 ad42d9 95438->95440 95439->95440 95441 b135ba LoadResource 95439->95441 95440->95358 95441->95440 95442 b135cf SizeofResource 95441->95442 95442->95440 95443 b135e3 LockResource 95442->95443 95443->95440 95445 ad512e 95444->95445 95448 b13d90 95444->95448 95450 afece3 95445->95450 95449->95359 95453 afeaaa 95450->95453 95452 ad513c 95452->95358 95456 afeab6 CallCatchBlock 95453->95456 95454 afeac2 95466 aff2d9 20 API calls _free 95454->95466 95456->95454 95457 afeae8 95456->95457 95468 af918d EnterCriticalSection 95457->95468 95459 afeac7 95467 b027ec 26 API calls _strftime 95459->95467 95460 afeaf4 95469 afec0a 62 API calls 2 library calls 95460->95469 95463 afeb08 95470 afeb27 LeaveCriticalSection __fread_nolock 95463->95470 95465 afead2 __wsopen_s 95465->95452 95466->95459 95467->95465 95468->95460 95469->95463 95470->95465 95474 afe8e1 95471->95474 95473 ad5118 95473->95371 95475 afe8ed CallCatchBlock 95474->95475 95476 afe92d 95475->95476 95477 afe900 ___scrt_fastfail 95475->95477 95478 afe925 __wsopen_s 95475->95478 95489 af918d EnterCriticalSection 95476->95489 95487 aff2d9 20 API calls _free 95477->95487 95478->95473 95481 afe937 95490 afe6f8 38 API calls 4 library calls 95481->95490 95482 afe91a 95488 b027ec 26 API calls _strftime 95482->95488 95485 afe94e 95491 afe96c LeaveCriticalSection __fread_nolock 95485->95491 95487->95482 95488->95478 95489->95481 95490->95485 95491->95478 95495 afe4e8 95492->95495 95494 b4275d 95494->95373 95498 afe469 95495->95498 95497 afe505 95497->95494 95499 afe48c 95498->95499 95500 afe478 95498->95500 95505 afe488 __alldvrm 95499->95505 95508 b0333f 11 API calls 2 library calls 95499->95508 95506 aff2d9 20 API calls _free 95500->95506 95502 afe47d 95507 b027ec 26 API calls _strftime 95502->95507 95505->95497 95506->95502 95507->95505 95508->95505 95514 b42e7a 95509->95514 95510 ad50f5 40 API calls 95510->95514 95511 b42d3b 95511->95302 95511->95303 95512 b428fe 27 API calls 95512->95514 95513 ad511f 64 API calls 95513->95514 95514->95510 95514->95511 95514->95512 95514->95513 95515->95302 95517 afe684 CallCatchBlock 95516->95517 95518 afe6aa 95517->95518 95519 afe695 95517->95519 95527 afe6a5 __wsopen_s 95518->95527 95531 af918d EnterCriticalSection 95518->95531 95529 aff2d9 20 API calls _free 95519->95529 95522 afe69a 95530 b027ec 26 API calls _strftime 95522->95530 95523 afe6c6 95532 afe602 95523->95532 95526 afe6d1 95548 afe6ee LeaveCriticalSection __fread_nolock 95526->95548 95527->95324 95529->95522 95530->95527 95531->95523 95533 afe60f 95532->95533 95534 afe624 95532->95534 95549 aff2d9 20 API calls _free 95533->95549 95539 afe61f 95534->95539 95551 afdc0b 95534->95551 95536 afe614 95550 b027ec 26 API calls _strftime 95536->95550 95539->95526 95544 afe646 95568 b0862f 95544->95568 95547 b029c8 _free 20 API calls 95547->95539 95548->95527 95549->95536 95550->95539 95552 afdc1f 95551->95552 95553 afdc23 95551->95553 95557 b04d7a 95552->95557 95553->95552 95554 afd955 __fread_nolock 26 API calls 95553->95554 95555 afdc43 95554->95555 95583 b059be 62 API calls 5 library calls 95555->95583 95558 b04d90 95557->95558 95560 afe640 95557->95560 95559 b029c8 _free 20 API calls 95558->95559 95558->95560 95559->95560 95561 afd955 95560->95561 95562 afd976 95561->95562 95563 afd961 95561->95563 95562->95544 95584 aff2d9 20 API calls _free 95563->95584 95565 afd966 95585 b027ec 26 API calls _strftime 95565->95585 95567 afd971 95567->95544 95569 b0863e 95568->95569 95570 b08653 95568->95570 95586 aff2c6 20 API calls _free 95569->95586 95571 b0868e 95570->95571 95576 b0867a 95570->95576 95591 aff2c6 20 API calls _free 95571->95591 95574 b08643 95587 aff2d9 20 API calls _free 95574->95587 95588 b08607 95576->95588 95577 b08693 95592 aff2d9 20 API calls _free 95577->95592 95580 afe64c 95580->95539 95580->95547 95581 b0869b 95593 b027ec 26 API calls _strftime 95581->95593 95583->95552 95584->95565 95585->95567 95586->95574 95587->95580 95594 b08585 95588->95594 95590 b0862b 95590->95580 95591->95577 95592->95581 95593->95580 95595 b08591 CallCatchBlock 95594->95595 95605 b05147 EnterCriticalSection 95595->95605 95597 b0859f 95598 b085d1 95597->95598 95599 b085c6 95597->95599 95621 aff2d9 20 API calls _free 95598->95621 95606 b086ae 95599->95606 95602 b085cc 95622 b085fb LeaveCriticalSection __wsopen_s 95602->95622 95604 b085ee __wsopen_s 95604->95590 95605->95597 95623 b053c4 95606->95623 95608 b086c4 95636 b05333 21 API calls 3 library calls 95608->95636 95609 b086be 95609->95608 95611 b086f6 95609->95611 95613 b053c4 __wsopen_s 26 API calls 95609->95613 95611->95608 95614 b053c4 __wsopen_s 26 API calls 95611->95614 95612 b0871c 95615 b0873e 95612->95615 95637 aff2a3 20 API calls 2 library calls 95612->95637 95616 b086ed 95613->95616 95617 b08702 FindCloseChangeNotification 95614->95617 95615->95602 95619 b053c4 __wsopen_s 26 API calls 95616->95619 95617->95608 95620 b0870e GetLastError 95617->95620 95619->95611 95620->95608 95621->95602 95622->95604 95624 b053d1 95623->95624 95625 b053e6 95623->95625 95638 aff2c6 20 API calls _free 95624->95638 95630 b0540b 95625->95630 95640 aff2c6 20 API calls _free 95625->95640 95627 b053d6 95639 aff2d9 20 API calls _free 95627->95639 95630->95609 95631 b05416 95641 aff2d9 20 API calls _free 95631->95641 95632 b053de 95632->95609 95634 b0541e 95642 b027ec 26 API calls _strftime 95634->95642 95636->95612 95637->95615 95638->95627 95639->95632 95640->95631 95641->95634 95642->95632 95643 addddc 95646 adb710 95643->95646 95647 adb72b 95646->95647 95648 b20146 95647->95648 95649 b200f8 95647->95649 95676 adb750 95647->95676 95712 b558a2 377 API calls 2 library calls 95648->95712 95652 b20102 95649->95652 95655 b2010f 95649->95655 95649->95676 95710 b55d33 377 API calls 95652->95710 95672 adba20 95655->95672 95711 b561d0 377 API calls 2 library calls 95655->95711 95658 aed336 40 API calls 95658->95676 95659 b203d9 95659->95659 95663 b20322 95725 b55c0c 82 API calls 95663->95725 95667 adba4e 95671 adbbe0 40 API calls 95671->95676 95672->95667 95726 b4359c 82 API calls __wsopen_s 95672->95726 95676->95658 95676->95663 95676->95667 95676->95671 95676->95672 95677 adec40 95676->95677 95701 ada81b 41 API calls 95676->95701 95702 aed2f0 40 API calls 95676->95702 95703 aea01b 377 API calls 95676->95703 95704 af0242 5 API calls __Init_thread_wait 95676->95704 95705 aeedcd 22 API calls 95676->95705 95706 af00a3 29 API calls __onexit 95676->95706 95707 af01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95676->95707 95708 aeee53 82 API calls 95676->95708 95709 aee5ca 377 API calls 95676->95709 95713 adaceb 95676->95713 95723 b2f6bf 23 API calls 95676->95723 95724 ada8c7 22 API calls __fread_nolock 95676->95724 95697 adec76 messages 95677->95697 95678 af00a3 29 API calls pre_c_initialization 95678->95697 95679 aefddb 22 API calls 95679->95697 95680 adfef7 95694 aded9d messages 95680->95694 95730 ada8c7 22 API calls __fread_nolock 95680->95730 95681 b24beb 95734 b4359c 82 API calls __wsopen_s 95681->95734 95684 adf3ae messages 95684->95694 95731 b4359c 82 API calls __wsopen_s 95684->95731 95685 b24600 95685->95694 95729 ada8c7 22 API calls __fread_nolock 95685->95729 95686 b24b0b 95732 b4359c 82 API calls __wsopen_s 95686->95732 95687 ada8c7 22 API calls 95687->95697 95693 af0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95693->95697 95694->95676 95695 adfbe3 95695->95684 95695->95694 95698 b24bdc 95695->95698 95696 ada961 22 API calls 95696->95697 95697->95678 95697->95679 95697->95680 95697->95681 95697->95684 95697->95685 95697->95686 95697->95687 95697->95693 95697->95694 95697->95695 95697->95696 95700 af01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95697->95700 95727 ae01e0 377 API calls 2 library calls 95697->95727 95728 ae06a0 41 API calls messages 95697->95728 95733 b4359c 82 API calls __wsopen_s 95698->95733 95700->95697 95701->95676 95702->95676 95703->95676 95704->95676 95705->95676 95706->95676 95707->95676 95708->95676 95709->95676 95710->95655 95711->95672 95712->95676 95714 adacf9 95713->95714 95722 adad2a messages 95713->95722 95715 adad55 95714->95715 95717 adad01 messages 95714->95717 95715->95722 95735 ada8c7 22 API calls __fread_nolock 95715->95735 95718 b1fa48 95717->95718 95719 adad21 95717->95719 95717->95722 95718->95722 95736 aece17 22 API calls messages 95718->95736 95720 b1fa3a VariantClear 95719->95720 95719->95722 95720->95722 95722->95676 95723->95676 95724->95676 95725->95672 95726->95659 95727->95697 95728->95697 95729->95694 95730->95694 95731->95694 95732->95694 95733->95681 95734->95694 95735->95722 95736->95722 95737 adf7bf 95738 adfcb6 95737->95738 95739 adf7d3 95737->95739 95740 adaceb 23 API calls 95738->95740 95741 adfcc2 95739->95741 95742 aefddb 22 API calls 95739->95742 95740->95741 95743 adaceb 23 API calls 95741->95743 95744 adf7e5 95742->95744 95746 adfd3d 95743->95746 95744->95741 95745 adf83e 95744->95745 95744->95746 95762 aded9d messages 95745->95762 95772 ae1310 95745->95772 95830 b41155 22 API calls 95746->95830 95749 b24beb 95836 b4359c 82 API calls __wsopen_s 95749->95836 95750 adfef7 95750->95762 95832 ada8c7 22 API calls __fread_nolock 95750->95832 95752 aefddb 22 API calls 95767 adec76 messages 95752->95767 95754 adf3ae messages 95754->95762 95833 b4359c 82 API calls __wsopen_s 95754->95833 95755 b24600 95755->95762 95831 ada8c7 22 API calls __fread_nolock 95755->95831 95756 b24b0b 95834 b4359c 82 API calls __wsopen_s 95756->95834 95757 ada8c7 22 API calls 95757->95767 95764 af0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95764->95767 95765 adfbe3 95765->95754 95765->95762 95768 b24bdc 95765->95768 95766 ada961 22 API calls 95766->95767 95767->95749 95767->95750 95767->95752 95767->95754 95767->95755 95767->95756 95767->95757 95767->95762 95767->95764 95767->95765 95767->95766 95770 af01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95767->95770 95771 af00a3 29 API calls pre_c_initialization 95767->95771 95828 ae01e0 377 API calls 2 library calls 95767->95828 95829 ae06a0 41 API calls messages 95767->95829 95835 b4359c 82 API calls __wsopen_s 95768->95835 95770->95767 95771->95767 95773 ae1376 95772->95773 95774 ae17b0 95772->95774 95775 b26331 95773->95775 95778 ae1940 9 API calls 95773->95778 95887 af0242 5 API calls __Init_thread_wait 95774->95887 95897 b5709c 377 API calls 95775->95897 95781 ae13a0 95778->95781 95779 ae17ba 95786 ae17fb 95779->95786 95888 ad9cb3 95779->95888 95780 b2633d 95780->95767 95782 ae1940 9 API calls 95781->95782 95784 ae13b6 95782->95784 95784->95786 95787 ae13ec 95784->95787 95785 b26346 95898 b4359c 82 API calls __wsopen_s 95785->95898 95786->95785 95788 ae182c 95786->95788 95787->95785 95812 ae1408 __fread_nolock 95787->95812 95790 adaceb 23 API calls 95788->95790 95793 ae1839 95790->95793 95791 ae17d4 95894 af01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95791->95894 95895 aed217 377 API calls 95793->95895 95795 b2636e 95899 b4359c 82 API calls __wsopen_s 95795->95899 95796 ae152f 95798 ae153c 95796->95798 95799 b263d1 95796->95799 95801 ae1940 9 API calls 95798->95801 95901 b55745 54 API calls _wcslen 95799->95901 95802 ae1549 95801->95802 95808 ae1940 9 API calls 95802->95808 95818 ae15c7 messages 95802->95818 95803 aefddb 22 API calls 95803->95812 95804 ae1872 95804->95775 95896 aefaeb 23 API calls 95804->95896 95805 aefe0b 22 API calls 95805->95812 95806 ae171d 95806->95767 95816 ae1563 95808->95816 95810 adec40 377 API calls 95810->95812 95811 ae167b messages 95811->95806 95886 aece17 22 API calls messages 95811->95886 95812->95793 95812->95795 95812->95796 95812->95803 95812->95805 95812->95810 95813 b263b2 95812->95813 95812->95818 95900 b4359c 82 API calls __wsopen_s 95813->95900 95815 ae1940 9 API calls 95815->95818 95816->95818 95902 ada8c7 22 API calls __fread_nolock 95816->95902 95818->95804 95818->95811 95818->95815 95837 b5ab67 95818->95837 95840 b613b7 95818->95840 95851 b629bf 95818->95851 95855 b6149e 95818->95855 95862 aef645 95818->95862 95869 b619bc 95818->95869 95872 b45c5a 95818->95872 95877 b62598 95818->95877 95903 b4359c 82 API calls __wsopen_s 95818->95903 95828->95767 95829->95767 95830->95762 95831->95762 95832->95762 95833->95762 95834->95762 95835->95749 95836->95762 95904 b5aff9 95837->95904 96044 b62ad8 95840->96044 95842 b613cb 95843 b61418 GetForegroundWindow 95842->95843 95848 b613da 95842->95848 95844 b61435 95843->95844 95845 b6142a 95843->95845 96064 aef98e GetForegroundWindow 95844->96064 96054 b3e97b 95845->96054 95848->95818 95849 b61442 95850 b3e97b 5 API calls 95849->95850 95850->95848 95852 b629cb 95851->95852 95853 b62a01 GetForegroundWindow 95852->95853 95854 b629d1 95852->95854 95853->95854 95854->95818 95856 b62ad8 54 API calls 95855->95856 95857 b614ae 95856->95857 95858 b629bf GetForegroundWindow 95857->95858 95859 b614b5 95858->95859 95860 b614eb GetForegroundWindow 95859->95860 95861 b614b9 95859->95861 95860->95861 95861->95818 95863 adb567 39 API calls 95862->95863 95864 aef659 95863->95864 95865 b2f2dc Sleep 95864->95865 95866 aef661 timeGetTime 95864->95866 95867 adb567 39 API calls 95866->95867 95868 aef677 95867->95868 95868->95818 95870 b62ad8 54 API calls 95869->95870 95871 b619cb 95870->95871 95871->95818 95873 ad7510 53 API calls 95872->95873 95874 b45c6d 95873->95874 96077 b3dbbe lstrlenW 95874->96077 95876 b45c77 95876->95818 95878 b62ad8 54 API calls 95877->95878 95879 b625a9 95878->95879 95883 b625b8 95879->95883 96082 b33d03 SendMessageTimeoutW 95879->96082 95881 b62607 95882 adb567 39 API calls 95881->95882 95881->95883 95884 b62630 SetWindowPos 95882->95884 95883->95818 95884->95883 95886->95811 95887->95779 95889 ad9cc2 _wcslen 95888->95889 95890 aefe0b 22 API calls 95889->95890 95891 ad9cea __fread_nolock 95890->95891 95892 aefddb 22 API calls 95891->95892 95893 ad9d00 95892->95893 95893->95791 95894->95786 95895->95804 95896->95804 95897->95780 95898->95818 95899->95818 95900->95818 95901->95816 95902->95818 95903->95818 95905 b5b01d ___scrt_fastfail 95904->95905 95906 b5b094 95905->95906 95907 b5b058 95905->95907 95911 adb567 39 API calls 95906->95911 95912 b5b08b 95906->95912 96022 adb567 95907->96022 95909 b5b063 95909->95912 95915 adb567 39 API calls 95909->95915 95910 b5b0ed 95995 ad7510 95910->95995 95914 b5b0a5 95911->95914 95912->95910 95916 adb567 39 API calls 95912->95916 95918 adb567 39 API calls 95914->95918 95919 b5b078 95915->95919 95916->95910 95918->95912 95921 adb567 39 API calls 95919->95921 95921->95912 95922 b5b115 95923 b5b11f 95922->95923 95924 b5b1d8 95922->95924 95926 ad7510 53 API calls 95923->95926 95925 b5b20a GetCurrentDirectoryW 95924->95925 95927 ad7510 53 API calls 95924->95927 95928 aefe0b 22 API calls 95925->95928 95929 b5b130 95926->95929 95932 b5b1ef 95927->95932 95930 b5b22f GetCurrentDirectoryW 95928->95930 95931 ad7620 22 API calls 95929->95931 95933 b5b23c 95930->95933 95934 b5b13a 95931->95934 95935 ad7620 22 API calls 95932->95935 95938 b5b275 95933->95938 96027 ad9c6e 22 API calls 95933->96027 95936 ad7510 53 API calls 95934->95936 95937 b5b1f9 _wcslen 95935->95937 95939 b5b14b 95936->95939 95937->95925 95937->95938 95946 b5b287 95938->95946 95947 b5b28b 95938->95947 95941 ad7620 22 API calls 95939->95941 95943 b5b155 95941->95943 95942 b5b255 96028 ad9c6e 22 API calls 95942->96028 95945 ad7510 53 API calls 95943->95945 95949 b5b166 95945->95949 95951 b5b2f8 95946->95951 95952 b5b39a CreateProcessW 95946->95952 96030 b407c0 10 API calls 95947->96030 95948 b5b265 96029 ad9c6e 22 API calls 95948->96029 95954 ad7620 22 API calls 95949->95954 96033 b311c8 39 API calls 95951->96033 95974 b5b32f _wcslen 95952->95974 95958 b5b170 95954->95958 95955 b5b294 96031 b406e6 10 API calls 95955->96031 95961 b5b1a6 GetSystemDirectoryW 95958->95961 95966 ad7510 53 API calls 95958->95966 95959 b5b2aa 96032 b405a7 8 API calls 95959->96032 95960 b5b2fd 95964 b5b323 95960->95964 95965 b5b32a 95960->95965 95963 aefe0b 22 API calls 95961->95963 95968 b5b1cb GetSystemDirectoryW 95963->95968 96034 b31201 128 API calls 2 library calls 95964->96034 96035 b314ce 6 API calls 95965->96035 95970 b5b187 95966->95970 95967 b5b2d0 95967->95946 95968->95933 95973 ad7620 22 API calls 95970->95973 95972 b5b328 95972->95974 95977 b5b191 _wcslen 95973->95977 95975 b5b3d6 GetLastError 95974->95975 95976 b5b42f CloseHandle 95974->95976 95984 b5b41a 95975->95984 95978 b5b43f 95976->95978 95986 b5b49a 95976->95986 95977->95933 95977->95961 95979 b5b446 CloseHandle 95978->95979 95980 b5b451 95978->95980 95979->95980 95982 b5b463 95980->95982 95983 b5b458 CloseHandle 95980->95983 95987 b5b475 95982->95987 95988 b5b46a CloseHandle 95982->95988 95983->95982 96038 b40175 6 API calls 95984->96038 95985 b5b4a6 95985->95984 95986->95985 95991 b5b4d2 CloseHandle 95986->95991 96036 b409d9 34 API calls 95987->96036 95988->95987 95991->95984 95992 b5ab79 95992->95818 95993 b5b486 96037 b5b536 25 API calls 95993->96037 95996 ad7525 95995->95996 95997 ad7522 95995->95997 95998 ad752d 95996->95998 95999 ad755b 95996->95999 96018 ad7620 95997->96018 96039 af51c6 26 API calls 95998->96039 96001 b150f6 95999->96001 96002 ad756d 95999->96002 96010 b1500f 95999->96010 96042 af5183 26 API calls 96001->96042 96040 aefb21 51 API calls 96002->96040 96003 ad753d 96008 aefddb 22 API calls 96003->96008 96006 b1510e 96006->96006 96011 ad7547 96008->96011 96009 b15088 96041 aefb21 51 API calls 96009->96041 96010->96009 96013 aefe0b 22 API calls 96010->96013 96012 ad9cb3 22 API calls 96011->96012 96012->95997 96014 b15058 96013->96014 96015 aefddb 22 API calls 96014->96015 96016 b1507f 96015->96016 96017 ad9cb3 22 API calls 96016->96017 96017->96009 96019 ad762a _wcslen 96018->96019 96020 aefe0b 22 API calls 96019->96020 96021 ad763f 96020->96021 96021->95922 96023 adb578 96022->96023 96024 adb57f 96022->96024 96023->96024 96043 af62d1 39 API calls 96023->96043 96024->95909 96026 adb5c2 96026->95909 96027->95942 96028->95948 96029->95938 96030->95955 96031->95959 96032->95967 96033->95960 96034->95972 96035->95974 96036->95993 96037->95986 96038->95992 96039->96003 96040->96003 96041->96001 96042->96006 96043->96026 96045 adaceb 23 API calls 96044->96045 96046 b62af3 96045->96046 96047 b62aff 96046->96047 96048 b62b1d 96046->96048 96049 ad7510 53 API calls 96047->96049 96050 ad6b57 22 API calls 96048->96050 96051 b62b0c 96049->96051 96052 b62b1b 96050->96052 96051->96052 96076 ada8c7 22 API calls __fread_nolock 96051->96076 96052->95842 96055 b3e9f9 96054->96055 96056 b3e988 96054->96056 96055->95844 96057 b3e98a Sleep 96056->96057 96059 b3e993 QueryPerformanceCounter 96056->96059 96057->96055 96059->96057 96060 b3e9a1 QueryPerformanceFrequency 96059->96060 96061 b3e9ab Sleep QueryPerformanceCounter 96060->96061 96062 b3e9ec 96061->96062 96062->96061 96063 b3e9f0 96062->96063 96063->96055 96065 b2f467 96064->96065 96066 aef9a8 96064->96066 96067 b2f46e FindWindowW 96065->96067 96068 b2f47c IsIconic 96065->96068 96066->95849 96067->96068 96069 b2f490 SetForegroundWindow 96068->96069 96070 b2f487 ShowWindow 96068->96070 96071 b2f4a2 7 API calls 96069->96071 96072 b2f56b 96069->96072 96070->96069 96073 b2f4eb 9 API calls 96071->96073 96074 b2f543 AttachThreadInput AttachThreadInput AttachThreadInput 96071->96074 96073->96074 96074->96072 96076->96052 96078 b3dc06 96077->96078 96079 b3dbdc GetFileAttributesW 96077->96079 96078->95876 96079->96078 96080 b3dbe8 FindFirstFileW 96079->96080 96080->96078 96081 b3dbf9 FindClose 96080->96081 96081->96078 96082->95881 96083 b22a00 96098 add7b0 messages 96083->96098 96084 addb11 PeekMessageW 96084->96098 96085 add807 GetInputState 96085->96084 96085->96098 96087 b21cbe TranslateAcceleratorW 96087->96098 96088 adda04 timeGetTime 96088->96098 96089 addb8f PeekMessageW 96089->96098 96090 addb73 TranslateMessage DispatchMessageW 96090->96089 96091 addbaf Sleep 96091->96098 96092 b22b74 Sleep 96105 b22b85 96092->96105 96095 b21dda timeGetTime 96130 aee300 23 API calls 96095->96130 96098->96084 96098->96085 96098->96087 96098->96088 96098->96089 96098->96090 96098->96091 96098->96092 96098->96095 96100 b629bf GetForegroundWindow 96098->96100 96101 add9d5 96098->96101 96108 b3e97b 5 API calls 96098->96108 96111 adec40 377 API calls 96098->96111 96112 ae1310 377 API calls 96098->96112 96115 addd50 96098->96115 96122 aeedf6 96098->96122 96127 addfd0 377 API calls 3 library calls 96098->96127 96128 adbf40 377 API calls 2 library calls 96098->96128 96129 aee551 timeGetTime 96098->96129 96131 b43a2a 23 API calls 96098->96131 96132 b4359c 82 API calls __wsopen_s 96098->96132 96133 b55658 23 API calls 96098->96133 96099 b22c0b GetExitCodeProcess 96103 b22c21 WaitForSingleObject 96099->96103 96104 b22c37 CloseHandle 96099->96104 96100->96098 96103->96098 96103->96104 96104->96105 96105->96098 96105->96099 96105->96101 96106 b22ca9 Sleep 96105->96106 96134 aee551 timeGetTime 96105->96134 96135 b3d4dc 47 API calls 96105->96135 96106->96098 96108->96098 96111->96098 96112->96098 96116 addd6f 96115->96116 96117 addd83 96115->96117 96136 add260 96116->96136 96168 b4359c 82 API calls __wsopen_s 96117->96168 96119 addd7a 96119->96098 96121 b22f75 96121->96121 96123 aeee09 96122->96123 96124 aeee12 96122->96124 96123->96098 96124->96123 96125 aeee36 IsDialogMessageW 96124->96125 96126 b2efaf GetClassLongW 96124->96126 96125->96123 96125->96124 96126->96124 96126->96125 96127->96098 96128->96098 96129->96098 96130->96098 96131->96098 96132->96098 96133->96098 96134->96105 96135->96105 96137 adec40 377 API calls 96136->96137 96154 add29d 96137->96154 96138 b21bc4 96175 b4359c 82 API calls __wsopen_s 96138->96175 96140 add30b messages 96140->96119 96141 add3c3 96143 add3ce 96141->96143 96144 add6d5 96141->96144 96142 add5ff 96146 b21bb5 96142->96146 96147 add614 96142->96147 96145 aefddb 22 API calls 96143->96145 96144->96140 96151 aefe0b 22 API calls 96144->96151 96156 add3d5 __fread_nolock 96145->96156 96174 b55705 23 API calls 96146->96174 96150 aefddb 22 API calls 96147->96150 96148 add4b8 96152 aefe0b 22 API calls 96148->96152 96160 add46a 96150->96160 96151->96156 96163 add429 __fread_nolock messages 96152->96163 96153 aefddb 22 API calls 96155 add3f6 96153->96155 96154->96138 96154->96140 96154->96141 96154->96144 96154->96148 96157 aefddb 22 API calls 96154->96157 96154->96163 96155->96163 96169 adbec0 377 API calls 96155->96169 96156->96153 96156->96155 96157->96154 96159 b21ba4 96173 b4359c 82 API calls __wsopen_s 96159->96173 96160->96119 96163->96142 96163->96159 96163->96160 96164 b21b7f 96163->96164 96166 b21b5d 96163->96166 96170 ad1f6f 377 API calls 96163->96170 96172 b4359c 82 API calls __wsopen_s 96164->96172 96171 b4359c 82 API calls __wsopen_s 96166->96171 96168->96121 96169->96163 96170->96163 96171->96160 96172->96160 96173->96160 96174->96138 96175->96140 96176 b08402 96181 b081be 96176->96181 96179 b0842a 96182 b081ef try_get_first_available_module 96181->96182 96189 b08338 96182->96189 96196 af8e0b 40 API calls 2 library calls 96182->96196 96184 b083ee 96200 b027ec 26 API calls _strftime 96184->96200 96186 b08343 96186->96179 96193 b10984 96186->96193 96188 b0838c 96188->96189 96197 af8e0b 40 API calls 2 library calls 96188->96197 96189->96186 96199 aff2d9 20 API calls _free 96189->96199 96191 b083ab 96191->96189 96198 af8e0b 40 API calls 2 library calls 96191->96198 96201 b10081 96193->96201 96195 b1099f 96195->96179 96196->96188 96197->96191 96198->96189 96199->96184 96200->96186 96203 b1008d CallCatchBlock 96201->96203 96202 b1009b 96258 aff2d9 20 API calls _free 96202->96258 96203->96202 96205 b100d4 96203->96205 96212 b1065b 96205->96212 96206 b100a0 96259 b027ec 26 API calls _strftime 96206->96259 96211 b100aa __wsopen_s 96211->96195 96213 b10678 96212->96213 96214 b106a6 96213->96214 96215 b1068d 96213->96215 96261 b05221 96214->96261 96275 aff2c6 20 API calls _free 96215->96275 96218 b106ab 96219 b106b4 96218->96219 96220 b106cb 96218->96220 96277 aff2c6 20 API calls _free 96219->96277 96274 b1039a CreateFileW 96220->96274 96224 b106b9 96278 aff2d9 20 API calls _free 96224->96278 96225 b10781 GetFileType 96230 b107d3 96225->96230 96231 b1078c GetLastError 96225->96231 96226 b10704 96226->96225 96229 b10756 GetLastError 96226->96229 96279 b1039a CreateFileW 96226->96279 96227 b100f8 96260 b10121 LeaveCriticalSection __wsopen_s 96227->96260 96280 aff2a3 20 API calls 2 library calls 96229->96280 96283 b0516a 21 API calls 3 library calls 96230->96283 96281 aff2a3 20 API calls 2 library calls 96231->96281 96232 b10692 96276 aff2d9 20 API calls _free 96232->96276 96236 b1079a CloseHandle 96236->96232 96239 b107c3 96236->96239 96238 b10749 96238->96225 96238->96229 96282 aff2d9 20 API calls _free 96239->96282 96240 b107f4 96243 b10840 96240->96243 96284 b105ab 72 API calls 4 library calls 96240->96284 96242 b107c8 96242->96232 96247 b1086d 96243->96247 96285 b1014d 72 API calls 4 library calls 96243->96285 96246 b10866 96246->96247 96248 b1087e 96246->96248 96249 b086ae __wsopen_s 29 API calls 96247->96249 96248->96227 96250 b108fc CloseHandle 96248->96250 96249->96227 96286 b1039a CreateFileW 96250->96286 96252 b10927 96253 b10931 GetLastError 96252->96253 96254 b1095d 96252->96254 96287 aff2a3 20 API calls 2 library calls 96253->96287 96254->96227 96256 b1093d 96288 b05333 21 API calls 3 library calls 96256->96288 96258->96206 96259->96211 96260->96211 96262 b0522d CallCatchBlock 96261->96262 96289 b02f5e EnterCriticalSection 96262->96289 96264 b05234 96265 b05259 96264->96265 96270 b052c7 EnterCriticalSection 96264->96270 96272 b0527b 96264->96272 96293 b05000 21 API calls 3 library calls 96265->96293 96268 b052a4 __wsopen_s 96268->96218 96269 b0525e 96269->96272 96294 b05147 EnterCriticalSection 96269->96294 96271 b052d4 LeaveCriticalSection 96270->96271 96270->96272 96271->96264 96290 b0532a 96272->96290 96274->96226 96275->96232 96276->96227 96277->96224 96278->96232 96279->96238 96280->96232 96281->96236 96282->96242 96283->96240 96284->96243 96285->96246 96286->96252 96287->96256 96288->96254 96289->96264 96295 b02fa6 LeaveCriticalSection 96290->96295 96292 b05331 96292->96268 96293->96269 96294->96272 96295->96292 96296 b12ba5 96297 ad2b25 96296->96297 96298 b12baf 96296->96298 96324 ad2b83 7 API calls 96297->96324 96339 ad3a5a 96298->96339 96301 b12bb8 96303 ad9cb3 22 API calls 96301->96303 96306 b12bc6 96303->96306 96305 ad2b2f 96313 ad2b44 96305->96313 96328 ad3837 96305->96328 96307 b12bf5 96306->96307 96308 b12bce 96306->96308 96311 ad33c6 22 API calls 96307->96311 96346 ad33c6 96308->96346 96322 b12bf1 GetForegroundWindow ShellExecuteW 96311->96322 96318 ad2b5f 96313->96318 96338 ad30f2 Shell_NotifyIconW ___scrt_fastfail 96313->96338 96317 b12be7 96320 ad33c6 22 API calls 96317->96320 96321 ad2b66 SetCurrentDirectoryW 96318->96321 96319 b12c26 96319->96318 96320->96322 96323 ad2b7a 96321->96323 96322->96319 96356 ad2cd4 7 API calls 96324->96356 96326 ad2b2a 96327 ad2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96326->96327 96327->96305 96329 ad3862 ___scrt_fastfail 96328->96329 96357 ad4212 96329->96357 96333 b13386 Shell_NotifyIconW 96334 ad3906 Shell_NotifyIconW 96361 ad3923 96334->96361 96335 ad38e8 96335->96333 96335->96334 96337 ad391c 96337->96313 96338->96318 96340 b11f50 __wsopen_s 96339->96340 96341 ad3a67 GetModuleFileNameW 96340->96341 96342 ad9cb3 22 API calls 96341->96342 96343 ad3a8d 96342->96343 96344 ad3aa2 23 API calls 96343->96344 96345 ad3a97 96344->96345 96345->96301 96347 ad33dd 96346->96347 96348 b130bb 96346->96348 96392 ad33ee 96347->96392 96350 aefddb 22 API calls 96348->96350 96352 b130c5 _wcslen 96350->96352 96351 ad33e8 96355 ad6350 22 API calls 96351->96355 96353 aefe0b 22 API calls 96352->96353 96354 b130fe __fread_nolock 96353->96354 96355->96317 96356->96326 96358 b135a4 96357->96358 96359 ad38b7 96357->96359 96358->96359 96360 b135ad DestroyIcon 96358->96360 96359->96335 96383 b3c874 42 API calls _strftime 96359->96383 96360->96359 96362 ad393f 96361->96362 96363 ad3a13 96361->96363 96384 ad6270 96362->96384 96363->96337 96366 b13393 LoadStringW 96369 b133ad 96366->96369 96367 ad395a 96368 ad6b57 22 API calls 96367->96368 96370 ad396f 96368->96370 96377 ad3994 ___scrt_fastfail 96369->96377 96390 ada8c7 22 API calls __fread_nolock 96369->96390 96371 ad397c 96370->96371 96372 b133c9 96370->96372 96371->96369 96375 ad3986 96371->96375 96391 ad6350 22 API calls 96372->96391 96389 ad6350 22 API calls 96375->96389 96380 ad39f9 Shell_NotifyIconW 96377->96380 96378 b133d7 96378->96377 96379 ad33c6 22 API calls 96378->96379 96381 b133f9 96379->96381 96380->96363 96382 ad33c6 22 API calls 96381->96382 96382->96377 96383->96335 96385 aefe0b 22 API calls 96384->96385 96386 ad6295 96385->96386 96387 aefddb 22 API calls 96386->96387 96388 ad394d 96387->96388 96388->96366 96388->96367 96389->96377 96390->96377 96391->96378 96393 ad33fe _wcslen 96392->96393 96394 b1311d 96393->96394 96395 ad3411 96393->96395 96397 aefddb 22 API calls 96394->96397 96402 ada587 96395->96402 96399 b13127 96397->96399 96398 ad341e __fread_nolock 96398->96351 96400 aefe0b 22 API calls 96399->96400 96401 b13157 __fread_nolock 96400->96401 96403 ada59d 96402->96403 96406 ada598 __fread_nolock 96402->96406 96404 aefe0b 22 API calls 96403->96404 96405 b1f80f 96403->96405 96404->96406 96406->96398 96407 af03fb 96408 af0407 CallCatchBlock 96407->96408 96436 aefeb1 96408->96436 96410 af040e 96411 af0561 96410->96411 96414 af0438 96410->96414 96463 af083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96411->96463 96413 af0568 96464 af4e52 28 API calls _abort 96413->96464 96425 af0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96414->96425 96447 b0247d 96414->96447 96416 af056e 96465 af4e04 28 API calls _abort 96416->96465 96420 af0576 96421 af0457 96423 af04d8 96455 af0959 96423->96455 96425->96423 96459 af4e1a 38 API calls 3 library calls 96425->96459 96427 af04de 96428 af04f3 96427->96428 96460 af0992 GetModuleHandleW 96428->96460 96430 af04fa 96430->96413 96431 af04fe 96430->96431 96432 af0507 96431->96432 96461 af4df5 28 API calls _abort 96431->96461 96462 af0040 13 API calls 2 library calls 96432->96462 96435 af050f 96435->96421 96437 aefeba 96436->96437 96466 af0698 IsProcessorFeaturePresent 96437->96466 96439 aefec6 96467 af2c94 10 API calls 3 library calls 96439->96467 96441 aefecb 96446 aefecf 96441->96446 96468 b02317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96441->96468 96443 aefed8 96444 aefee6 96443->96444 96469 af2cbd 8 API calls 3 library calls 96443->96469 96444->96410 96446->96410 96448 b02494 96447->96448 96470 af0a8c 96448->96470 96450 af0451 96450->96421 96451 b02421 96450->96451 96452 b02450 96451->96452 96453 af0a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 96452->96453 96454 b02479 96453->96454 96454->96425 96478 af2340 96455->96478 96458 af097f 96458->96427 96459->96423 96460->96430 96461->96432 96462->96435 96463->96413 96464->96416 96465->96420 96466->96439 96467->96441 96468->96443 96469->96446 96471 af0a97 IsProcessorFeaturePresent 96470->96471 96472 af0a95 96470->96472 96474 af0c5d 96471->96474 96472->96450 96477 af0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96474->96477 96476 af0d40 96476->96450 96477->96476 96479 af096c GetStartupInfoW 96478->96479 96479->96458 96480 ad1098 96485 ad42de 96480->96485 96484 ad10a7 96486 ada961 22 API calls 96485->96486 96487 ad42f5 GetVersionExW 96486->96487 96488 ad6b57 22 API calls 96487->96488 96489 ad4342 96488->96489 96490 ad93b2 22 API calls 96489->96490 96494 ad4378 96489->96494 96491 ad436c 96490->96491 96493 ad37a0 22 API calls 96491->96493 96492 ad441b GetCurrentProcess IsWow64Process 96495 ad4437 96492->96495 96493->96494 96494->96492 96500 b137df 96494->96500 96496 ad444f LoadLibraryA 96495->96496 96497 b13824 GetSystemInfo 96495->96497 96498 ad449c GetSystemInfo 96496->96498 96499 ad4460 GetProcAddress 96496->96499 96502 ad4476 96498->96502 96499->96498 96501 ad4470 GetNativeSystemInfo 96499->96501 96501->96502 96503 ad447a FreeLibrary 96502->96503 96504 ad109d 96502->96504 96503->96504 96505 af00a3 29 API calls __onexit 96504->96505 96505->96484 96506 ad105b 96511 ad344d 96506->96511 96508 ad106a 96542 af00a3 29 API calls __onexit 96508->96542 96510 ad1074 96512 ad345d __wsopen_s 96511->96512 96513 ada961 22 API calls 96512->96513 96514 ad3513 96513->96514 96515 ad3a5a 24 API calls 96514->96515 96516 ad351c 96515->96516 96543 ad3357 96516->96543 96519 ad33c6 22 API calls 96520 ad3535 96519->96520 96521 ad515f 22 API calls 96520->96521 96522 ad3544 96521->96522 96523 ada961 22 API calls 96522->96523 96524 ad354d 96523->96524 96525 ada6c3 22 API calls 96524->96525 96526 ad3556 RegOpenKeyExW 96525->96526 96527 b13176 RegQueryValueExW 96526->96527 96532 ad3578 96526->96532 96528 b13193 96527->96528 96529 b1320c RegCloseKey 96527->96529 96530 aefe0b 22 API calls 96528->96530 96529->96532 96541 b1321e _wcslen 96529->96541 96531 b131ac 96530->96531 96534 ad5722 22 API calls 96531->96534 96532->96508 96533 ad4c6d 22 API calls 96533->96541 96535 b131b7 RegQueryValueExW 96534->96535 96536 b131d4 96535->96536 96538 b131ee messages 96535->96538 96537 ad6b57 22 API calls 96536->96537 96537->96538 96538->96529 96539 ad9cb3 22 API calls 96539->96541 96540 ad515f 22 API calls 96540->96541 96541->96532 96541->96533 96541->96539 96541->96540 96542->96510 96544 b11f50 __wsopen_s 96543->96544 96545 ad3364 GetFullPathNameW 96544->96545 96546 ad3386 96545->96546 96547 ad6b57 22 API calls 96546->96547 96548 ad33a4 96547->96548 96548->96519 96549 ad2e37 96550 ada961 22 API calls 96549->96550 96551 ad2e4d 96550->96551 96628 ad4ae3 96551->96628 96553 ad2e6b 96554 ad3a5a 24 API calls 96553->96554 96555 ad2e7f 96554->96555 96556 ad9cb3 22 API calls 96555->96556 96557 ad2e8c 96556->96557 96558 ad4ecb 94 API calls 96557->96558 96559 ad2ea5 96558->96559 96560 ad2ead 96559->96560 96561 b12cb0 96559->96561 96642 ada8c7 22 API calls __fread_nolock 96560->96642 96562 b42cf9 80 API calls 96561->96562 96563 b12cc3 96562->96563 96564 b12ccf 96563->96564 96566 ad4f39 68 API calls 96563->96566 96570 ad4f39 68 API calls 96564->96570 96566->96564 96567 ad2ec3 96643 ad6f88 22 API calls 96567->96643 96569 ad2ecf 96571 ad9cb3 22 API calls 96569->96571 96572 b12ce5 96570->96572 96573 ad2edc 96571->96573 96660 ad3084 22 API calls 96572->96660 96644 ada81b 41 API calls 96573->96644 96575 ad2eec 96578 ad9cb3 22 API calls 96575->96578 96577 b12d02 96661 ad3084 22 API calls 96577->96661 96580 ad2f12 96578->96580 96645 ada81b 41 API calls 96580->96645 96581 b12d1e 96583 ad3a5a 24 API calls 96581->96583 96584 b12d44 96583->96584 96662 ad3084 22 API calls 96584->96662 96585 ad2f21 96588 ada961 22 API calls 96585->96588 96587 b12d50 96663 ada8c7 22 API calls __fread_nolock 96587->96663 96589 ad2f3f 96588->96589 96646 ad3084 22 API calls 96589->96646 96592 b12d5e 96664 ad3084 22 API calls 96592->96664 96593 ad2f4b 96647 af4a28 40 API calls 2 library calls 96593->96647 96596 ad2f59 96596->96572 96598 ad2f63 96596->96598 96597 b12d6d 96665 ada8c7 22 API calls __fread_nolock 96597->96665 96648 af4a28 40 API calls 2 library calls 96598->96648 96601 b12d83 96666 ad3084 22 API calls 96601->96666 96602 ad2f6e 96602->96577 96604 ad2f78 96602->96604 96649 af4a28 40 API calls 2 library calls 96604->96649 96605 b12d90 96607 ad2f83 96607->96581 96608 ad2f8d 96607->96608 96650 af4a28 40 API calls 2 library calls 96608->96650 96610 ad2f98 96611 ad2fdc 96610->96611 96651 ad3084 22 API calls 96610->96651 96611->96597 96612 ad2fe8 96611->96612 96612->96605 96654 ad63eb 22 API calls 96612->96654 96614 ad2fbf 96652 ada8c7 22 API calls __fread_nolock 96614->96652 96617 ad2ff8 96655 ad6a50 22 API calls 96617->96655 96618 ad2fcd 96653 ad3084 22 API calls 96618->96653 96621 ad3006 96656 ad70b0 23 API calls 96621->96656 96625 ad3021 96626 ad3065 96625->96626 96657 ad6f88 22 API calls 96625->96657 96658 ad70b0 23 API calls 96625->96658 96659 ad3084 22 API calls 96625->96659 96629 ad4af0 __wsopen_s 96628->96629 96630 ad6b57 22 API calls 96629->96630 96631 ad4b22 96629->96631 96630->96631 96640 ad4b58 96631->96640 96667 ad4c6d 96631->96667 96633 ad9cb3 22 API calls 96635 ad4c52 96633->96635 96634 ad9cb3 22 API calls 96634->96640 96636 ad515f 22 API calls 96635->96636 96639 ad4c5e 96636->96639 96637 ad4c6d 22 API calls 96637->96640 96638 ad515f 22 API calls 96638->96640 96639->96553 96640->96634 96640->96637 96640->96638 96641 ad4c29 96640->96641 96641->96633 96641->96639 96642->96567 96643->96569 96644->96575 96645->96585 96646->96593 96647->96596 96648->96602 96649->96607 96650->96610 96651->96614 96652->96618 96653->96611 96654->96617 96655->96621 96656->96625 96657->96625 96658->96625 96659->96625 96660->96577 96661->96581 96662->96587 96663->96592 96664->96597 96665->96601 96666->96605 96668 adaec9 22 API calls 96667->96668 96669 ad4c78 96668->96669 96669->96631 96670 ad3156 96673 ad3170 96670->96673 96674 ad3187 96673->96674 96675 ad318c 96674->96675 96676 ad31eb 96674->96676 96717 ad31e9 96674->96717 96677 ad3199 96675->96677 96678 ad3265 PostQuitMessage 96675->96678 96680 b12dfb 96676->96680 96681 ad31f1 96676->96681 96683 ad31a4 96677->96683 96684 b12e7c 96677->96684 96685 ad316a 96678->96685 96679 ad31d0 DefWindowProcW 96679->96685 96729 ad18e2 10 API calls 96680->96729 96686 ad321d SetTimer RegisterWindowMessageW 96681->96686 96687 ad31f8 96681->96687 96691 ad31ae 96683->96691 96692 b12e68 96683->96692 96733 b3bf30 34 API calls ___scrt_fastfail 96684->96733 96686->96685 96693 ad3246 CreatePopupMenu 96686->96693 96688 ad3201 KillTimer 96687->96688 96689 b12d9c 96687->96689 96725 ad30f2 Shell_NotifyIconW ___scrt_fastfail 96688->96725 96701 b12da1 96689->96701 96702 b12dd7 MoveWindow 96689->96702 96690 b12e1c 96730 aee499 42 API calls 96690->96730 96698 ad31b9 96691->96698 96699 b12e4d 96691->96699 96718 b3c161 96692->96718 96693->96685 96704 ad31c4 96698->96704 96705 ad3253 96698->96705 96699->96679 96732 b30ad7 22 API calls 96699->96732 96700 b12e8e 96700->96679 96700->96685 96706 b12da7 96701->96706 96707 b12dc6 SetFocus 96701->96707 96702->96685 96703 ad3214 96726 ad3c50 DeleteObject DestroyWindow 96703->96726 96704->96679 96731 ad30f2 Shell_NotifyIconW ___scrt_fastfail 96704->96731 96727 ad326f 44 API calls ___scrt_fastfail 96705->96727 96706->96704 96711 b12db0 96706->96711 96707->96685 96728 ad18e2 10 API calls 96711->96728 96712 ad3263 96712->96685 96715 b12e41 96716 ad3837 49 API calls 96715->96716 96716->96717 96717->96679 96719 b3c276 96718->96719 96720 b3c179 ___scrt_fastfail 96718->96720 96719->96685 96721 ad3923 24 API calls 96720->96721 96723 b3c1a0 96721->96723 96722 b3c25f KillTimer SetTimer 96722->96719 96723->96722 96724 b3c251 Shell_NotifyIconW 96723->96724 96724->96722 96725->96703 96726->96685 96727->96712 96728->96685 96729->96690 96730->96704 96731->96715 96732->96717 96733->96700 96734 ad1033 96739 ad4c91 96734->96739 96738 ad1042 96740 ada961 22 API calls 96739->96740 96741 ad4cff 96740->96741 96747 ad3af0 96741->96747 96744 ad4d9c 96745 ad1038 96744->96745 96750 ad51f7 22 API calls __fread_nolock 96744->96750 96746 af00a3 29 API calls __onexit 96745->96746 96746->96738 96751 ad3b1c 96747->96751 96750->96744 96752 ad3b0f 96751->96752 96753 ad3b29 96751->96753 96752->96744 96753->96752 96754 ad3b30 RegOpenKeyExW 96753->96754 96754->96752 96755 ad3b4a RegQueryValueExW 96754->96755 96756 ad3b6b 96755->96756 96757 ad3b80 RegCloseKey 96755->96757 96756->96757 96757->96752

                        Control-flow Graph

                        APIs
                        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00AEF998
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B2F474
                        • IsIconic.USER32(00000000), ref: 00B2F47D
                        • ShowWindow.USER32(00000000,00000009), ref: 00B2F48A
                        • SetForegroundWindow.USER32(00000000), ref: 00B2F494
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00B2F4AA
                        • GetCurrentThreadId.KERNEL32 ref: 00B2F4B1
                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00B2F4BD
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00B2F4CE
                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00B2F4D6
                        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00B2F4DE
                        • SetForegroundWindow.USER32(00000000), ref: 00B2F4E1
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B2F4F6
                        • keybd_event.USER32(00000012,00000000), ref: 00B2F501
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B2F50B
                        • keybd_event.USER32(00000012,00000000), ref: 00B2F510
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B2F519
                        • keybd_event.USER32(00000012,00000000), ref: 00B2F51E
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B2F528
                        • keybd_event.USER32(00000012,00000000), ref: 00B2F52D
                        • SetForegroundWindow.USER32(00000000), ref: 00B2F530
                        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00B2F557
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                        • String ID: Shell_TrayWnd
                        • API String ID: 4125248594-2988720461
                        • Opcode ID: 079239cc19e3a470854f77c1750608756a54bef8d6e8b143286b4a2bd2ac33f5
                        • Instruction ID: 0170b658c1f96d83882431bc89316c58a2f9df6f660afabc6ed528a405df2bc3
                        • Opcode Fuzzy Hash: 079239cc19e3a470854f77c1750608756a54bef8d6e8b143286b4a2bd2ac33f5
                        • Instruction Fuzzy Hash: FA313371A402187BEB206BB55C4AFBF7EBCEB48B50F100066F645E71D1CBF55D00AA61

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 405 ad42de-ad434d call ada961 GetVersionExW call ad6b57 410 b13617-b1362a 405->410 411 ad4353 405->411 413 b1362b-b1362f 410->413 412 ad4355-ad4357 411->412 414 ad435d-ad43bc call ad93b2 call ad37a0 412->414 415 b13656 412->415 416 b13631 413->416 417 b13632-b1363e 413->417 434 b137df-b137e6 414->434 435 ad43c2-ad43c4 414->435 420 b1365d-b13660 415->420 416->417 417->413 419 b13640-b13642 417->419 419->412 422 b13648-b1364f 419->422 423 ad441b-ad4435 GetCurrentProcess IsWow64Process 420->423 424 b13666-b136a8 420->424 422->410 426 b13651 422->426 429 ad4494-ad449a 423->429 430 ad4437 423->430 424->423 427 b136ae-b136b1 424->427 426->415 432 b136b3-b136bd 427->432 433 b136db-b136e5 427->433 431 ad443d-ad4449 429->431 430->431 436 ad444f-ad445e LoadLibraryA 431->436 437 b13824-b13828 GetSystemInfo 431->437 438 b136ca-b136d6 432->438 439 b136bf-b136c5 432->439 441 b136e7-b136f3 433->441 442 b136f8-b13702 433->442 443 b13806-b13809 434->443 444 b137e8 434->444 435->420 440 ad43ca-ad43dd 435->440 445 ad449c-ad44a6 GetSystemInfo 436->445 446 ad4460-ad446e GetProcAddress 436->446 438->423 439->423 447 b13726-b1372f 440->447 448 ad43e3-ad43e5 440->448 441->423 450 b13715-b13721 442->450 451 b13704-b13710 442->451 452 b137f4-b137fc 443->452 453 b1380b-b1381a 443->453 449 b137ee 444->449 456 ad4476-ad4478 445->456 446->445 455 ad4470-ad4474 GetNativeSystemInfo 446->455 459 b13731-b13737 447->459 460 b1373c-b13748 447->460 457 ad43eb-ad43ee 448->457 458 b1374d-b13762 448->458 449->452 450->423 451->423 452->443 453->449 454 b1381c-b13822 453->454 454->452 455->456 463 ad447a-ad447b FreeLibrary 456->463 464 ad4481-ad4493 456->464 465 b13791-b13794 457->465 466 ad43f4-ad440f 457->466 461 b13764-b1376a 458->461 462 b1376f-b1377b 458->462 459->423 460->423 461->423 462->423 463->464 465->423 467 b1379a-b137c1 465->467 468 b13780-b1378c 466->468 469 ad4415 466->469 470 b137c3-b137c9 467->470 471 b137ce-b137da 467->471 468->423 469->423 470->423 471->423
                        APIs
                        • GetVersionExW.KERNEL32(?), ref: 00AD430D
                          • Part of subcall function 00AD6B57: _wcslen.LIBCMT ref: 00AD6B6A
                        • GetCurrentProcess.KERNEL32(?,00B6CB64,00000000,?,?), ref: 00AD4422
                        • IsWow64Process.KERNEL32(00000000,?,?), ref: 00AD4429
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00AD4454
                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00AD4466
                        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00AD4474
                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 00AD447B
                        • GetSystemInfo.KERNEL32(?,?,?), ref: 00AD44A0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                        • String ID: GetNativeSystemInfo$kernel32.dll$|O
                        • API String ID: 3290436268-3101561225
                        • Opcode ID: 31c00e5aed80e607a05083254ac0f6939593b6a99c04654a269091731573838f
                        • Instruction ID: e5499cdccadca43c2462e1be2e8e9185357826810b24f7f7f8b191a60c8bd7e3
                        • Opcode Fuzzy Hash: 31c00e5aed80e607a05083254ac0f6939593b6a99c04654a269091731573838f
                        • Instruction Fuzzy Hash: 6AA1607690A2C0FFCF91CF6D78425E57EE4AB27740F084C9AD08297B61DE754988CB29

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 670 ad42a2-ad42ba CreateStreamOnHGlobal 671 ad42bc-ad42d3 FindResourceExW 670->671 672 ad42da-ad42dd 670->672 673 ad42d9 671->673 674 b135ba-b135c9 LoadResource 671->674 673->672 674->673 675 b135cf-b135dd SizeofResource 674->675 675->673 676 b135e3-b135ee LockResource 675->676 676->673 677 b135f4-b13612 676->677 677->673
                        APIs
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00AD50AA,?,?,00000000,00000000), ref: 00AD42B2
                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00AD50AA,?,?,00000000,00000000), ref: 00AD42C9
                        • LoadResource.KERNEL32(?,00000000,?,?,00AD50AA,?,?,00000000,00000000,?,?,?,?,?,?,00AD4F20), ref: 00B135BE
                        • SizeofResource.KERNEL32(?,00000000,?,?,00AD50AA,?,?,00000000,00000000,?,?,?,?,?,?,00AD4F20), ref: 00B135D3
                        • LockResource.KERNEL32(00AD50AA,?,?,00AD50AA,?,?,00000000,00000000,?,?,?,?,?,?,00AD4F20,?), ref: 00B135E6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                        • String ID: SCRIPT
                        • API String ID: 3051347437-3967369404
                        • Opcode ID: f2ae0e57917134762e4d4130f28081772b83ecd7c4056d22fc98bc88f37f088e
                        • Instruction ID: 2b4cb13bc5bdd9fbf4bb3998023ffba4ac9e0c50a6118750b46323e46e7505af
                        • Opcode Fuzzy Hash: f2ae0e57917134762e4d4130f28081772b83ecd7c4056d22fc98bc88f37f088e
                        • Instruction Fuzzy Hash: 77113C71200701BFE7219B65DC49F677BBAEBC9F51F24416AF847D72A0DBB1D8008A60

                        Control-flow Graph

                        APIs
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00AD2B6B
                          • Part of subcall function 00AD3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00BA1418,?,00AD2E7F,?,?,?,00000000), ref: 00AD3A78
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                        • GetForegroundWindow.USER32(runas,?,?,?,?,?,00B92224), ref: 00B12C10
                        • ShellExecuteW.SHELL32(00000000,?,?,00B92224), ref: 00B12C17
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                        • String ID: runas
                        • API String ID: 448630720-4000483414
                        • Opcode ID: 7a14d4c8da7c39661e73ffd4c17ac6359fdaa7ff3da4bf6fd6c0520ecee57437
                        • Instruction ID: 76cb3ab3f7675e8500318e78a93d6754161264005df4e8896d672a9c7f9c91f0
                        • Opcode Fuzzy Hash: 7a14d4c8da7c39661e73ffd4c17ac6359fdaa7ff3da4bf6fd6c0520ecee57437
                        • Instruction Fuzzy Hash: 6B11D6326083416ACB14FF64DA52ABEBBE49FA5740F44086FF083573A2CF658949D713

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 855 b3dbbe-b3dbda lstrlenW 856 b3dc06 855->856 857 b3dbdc-b3dbe6 GetFileAttributesW 855->857 858 b3dc09-b3dc0d 856->858 857->858 859 b3dbe8-b3dbf7 FindFirstFileW 857->859 859->856 860 b3dbf9-b3dc04 FindClose 859->860 860->858
                        APIs
                        • lstrlenW.KERNEL32(?,00B15222), ref: 00B3DBCE
                        • GetFileAttributesW.KERNELBASE(?), ref: 00B3DBDD
                        • FindFirstFileW.KERNEL32(?,?), ref: 00B3DBEE
                        • FindClose.KERNEL32(00000000), ref: 00B3DBFA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: FileFind$AttributesCloseFirstlstrlen
                        • String ID:
                        • API String ID: 2695905019-0
                        • Opcode ID: 3417250941a28b372884465961c3bdadacc79a4ceecfed8323159d8d63d6cc7c
                        • Instruction ID: d6583fca84f2f57a263141fdc14c56f125d97be0576ff46d496ccaae42a9b0ad
                        • Opcode Fuzzy Hash: 3417250941a28b372884465961c3bdadacc79a4ceecfed8323159d8d63d6cc7c
                        • Instruction Fuzzy Hash: 97F0A0708209105782206F78AC0D8BA7BACDE02334FA04B42F8B6C20E0EFF499548695

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 16 b5aff9-b5b056 call af2340 19 b5b094-b5b098 16->19 20 b5b058-b5b06b call adb567 16->20 22 b5b0dd-b5b0e0 19->22 23 b5b09a-b5b0bb call adb567 * 2 19->23 28 b5b06d-b5b092 call adb567 * 2 20->28 29 b5b0c8 20->29 25 b5b0f5-b5b119 call ad7510 call ad7620 22->25 26 b5b0e2-b5b0e5 22->26 46 b5b0bf-b5b0c4 23->46 48 b5b11f-b5b178 call ad7510 call ad7620 call ad7510 call ad7620 call ad7510 call ad7620 25->48 49 b5b1d8-b5b1e0 25->49 30 b5b0e8-b5b0ed call adb567 26->30 28->46 33 b5b0cb-b5b0cf 29->33 30->25 38 b5b0d1-b5b0d7 33->38 39 b5b0d9-b5b0db 33->39 38->30 39->22 39->25 46->22 50 b5b0c6 46->50 98 b5b1a6-b5b1d6 GetSystemDirectoryW call aefe0b GetSystemDirectoryW 48->98 99 b5b17a-b5b195 call ad7510 call ad7620 48->99 51 b5b1e2-b5b1fd call ad7510 call ad7620 49->51 52 b5b20a-b5b238 GetCurrentDirectoryW call aefe0b GetCurrentDirectoryW 49->52 50->33 51->52 69 b5b1ff-b5b208 call af4963 51->69 60 b5b23c 52->60 63 b5b240-b5b244 60->63 66 b5b275-b5b285 call b400d9 63->66 67 b5b246-b5b270 call ad9c6e * 3 63->67 80 b5b287-b5b289 66->80 81 b5b28b-b5b2e1 call b407c0 call b406e6 call b405a7 66->81 67->66 69->52 69->66 84 b5b2ee-b5b2f2 80->84 81->84 112 b5b2e3 81->112 86 b5b2f8-b5b321 call b311c8 84->86 87 b5b39a-b5b3be CreateProcessW 84->87 103 b5b323-b5b328 call b31201 86->103 104 b5b32a call b314ce 86->104 92 b5b3c1-b5b3d4 call aefe14 * 2 87->92 117 b5b3d6-b5b3e8 92->117 118 b5b42f-b5b43d CloseHandle 92->118 98->60 99->98 126 b5b197-b5b1a0 call af4963 99->126 116 b5b32f-b5b33c call af4963 103->116 104->116 112->84 128 b5b347-b5b357 call af4963 116->128 129 b5b33e-b5b345 116->129 124 b5b3ed-b5b3fc 117->124 125 b5b3ea 117->125 122 b5b49c 118->122 123 b5b43f-b5b444 118->123 134 b5b4a0-b5b4a4 122->134 130 b5b446-b5b44c CloseHandle 123->130 131 b5b451-b5b456 123->131 132 b5b401-b5b42a GetLastError call ad630c call adcfa0 124->132 133 b5b3fe 124->133 125->124 126->63 126->98 150 b5b362-b5b372 call af4963 128->150 151 b5b359-b5b360 128->151 129->128 129->129 130->131 137 b5b463-b5b468 131->137 138 b5b458-b5b45e CloseHandle 131->138 148 b5b4e5-b5b4f6 call b40175 132->148 133->132 140 b5b4a6-b5b4b0 134->140 141 b5b4b2-b5b4bc 134->141 145 b5b475-b5b49a call b409d9 call b5b536 137->145 146 b5b46a-b5b470 CloseHandle 137->146 138->137 140->148 142 b5b4c4-b5b4e3 call adcfa0 CloseHandle 141->142 143 b5b4be 141->143 142->148 143->142 145->134 146->145 162 b5b374-b5b37b 150->162 163 b5b37d-b5b398 call aefe14 * 3 150->163 151->150 151->151 162->162 162->163 163->92
                        APIs
                        • _wcslen.LIBCMT ref: 00B5B198
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B5B1B0
                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B5B1D4
                        • _wcslen.LIBCMT ref: 00B5B200
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B5B214
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B5B236
                        • _wcslen.LIBCMT ref: 00B5B332
                          • Part of subcall function 00B405A7: GetStdHandle.KERNEL32(000000F6), ref: 00B405C6
                        • _wcslen.LIBCMT ref: 00B5B34B
                        • _wcslen.LIBCMT ref: 00B5B366
                        • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B5B3B6
                        • GetLastError.KERNEL32(00000000), ref: 00B5B407
                        • CloseHandle.KERNEL32(?), ref: 00B5B439
                        • CloseHandle.KERNEL32(00000000), ref: 00B5B44A
                        • CloseHandle.KERNEL32(00000000), ref: 00B5B45C
                        • CloseHandle.KERNEL32(00000000), ref: 00B5B46E
                        • CloseHandle.KERNEL32(?), ref: 00B5B4E3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                        • String ID:
                        • API String ID: 2178637699-0
                        • Opcode ID: c1d0d1c449c31e7871d1b2465f26c0d67a3dfa2a1f186ebb0631eb524b18e638
                        • Instruction ID: 040eefafe6cac4e2374f0754aeb66c86eed4560b2a00efb295a0b20699e5a771
                        • Opcode Fuzzy Hash: c1d0d1c449c31e7871d1b2465f26c0d67a3dfa2a1f186ebb0631eb524b18e638
                        • Instruction Fuzzy Hash: E2F16A316043409FC724EF24C991B6EBBE5EF85314F18859EF8969B2A2DB71EC44CB52
                        APIs
                        • GetInputState.USER32 ref: 00ADD807
                        • timeGetTime.WINMM ref: 00ADDA07
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00ADDB28
                        • TranslateMessage.USER32(?), ref: 00ADDB7B
                        • DispatchMessageW.USER32(?), ref: 00ADDB89
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00ADDB9F
                        • Sleep.KERNELBASE(0000000A), ref: 00ADDBB1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                        • String ID:
                        • API String ID: 2189390790-0
                        • Opcode ID: 9391fce843ed0272a09773eaec2e3c8335d71f9f52a3f57d936dfcacca29ef80
                        • Instruction ID: da4a90f705ce31516f4a6b4b8bcbde740085feb03827cfe1c4fc275095584532
                        • Opcode Fuzzy Hash: 9391fce843ed0272a09773eaec2e3c8335d71f9f52a3f57d936dfcacca29ef80
                        • Instruction Fuzzy Hash: 6742C230608341EFD725CF24D895BAABBF0FF46304F14895AE49A8B3A1D775E844CB92

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00AD2D07
                        • RegisterClassExW.USER32(00000030), ref: 00AD2D31
                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AD2D42
                        • InitCommonControlsEx.COMCTL32(?), ref: 00AD2D5F
                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AD2D6F
                        • LoadIconW.USER32(000000A9), ref: 00AD2D85
                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AD2D94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                        • API String ID: 2914291525-1005189915
                        • Opcode ID: dcc8780a83569b15788960b3299e14a524bc1f7fbe8edc53a3b4b4945c783424
                        • Instruction ID: 6d6cbbc6a41b9b889c046cac51e9fa1ab57548153d7382d967c390b4fa8e7da7
                        • Opcode Fuzzy Hash: dcc8780a83569b15788960b3299e14a524bc1f7fbe8edc53a3b4b4945c783424
                        • Instruction Fuzzy Hash: AE21E2B5901318AFDB40DFA8EC4AAAEBFB8FB09700F00451AE555A72A0DBB90544CF95

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 473 b1065b-b1068b call b1042f 476 b106a6-b106b2 call b05221 473->476 477 b1068d-b10698 call aff2c6 473->477 483 b106b4-b106c9 call aff2c6 call aff2d9 476->483 484 b106cb-b10714 call b1039a 476->484 482 b1069a-b106a1 call aff2d9 477->482 493 b1097d-b10983 482->493 483->482 491 b10781-b1078a GetFileType 484->491 492 b10716-b1071f 484->492 497 b107d3-b107d6 491->497 498 b1078c-b107bd GetLastError call aff2a3 CloseHandle 491->498 495 b10721-b10725 492->495 496 b10756-b1077c GetLastError call aff2a3 492->496 495->496 502 b10727-b10754 call b1039a 495->502 496->482 500 b107d8-b107dd 497->500 501 b107df-b107e5 497->501 498->482 512 b107c3-b107ce call aff2d9 498->512 505 b107e9-b10837 call b0516a 500->505 501->505 506 b107e7 501->506 502->491 502->496 516 b10847-b1086b call b1014d 505->516 517 b10839-b10845 call b105ab 505->517 506->505 512->482 523 b1086d 516->523 524 b1087e-b108c1 516->524 517->516 522 b1086f-b10879 call b086ae 517->522 522->493 523->522 526 b108c3-b108c7 524->526 527 b108e2-b108f0 524->527 526->527 529 b108c9-b108dd 526->529 530 b108f6-b108fa 527->530 531 b1097b 527->531 529->527 530->531 532 b108fc-b1092f CloseHandle call b1039a 530->532 531->493 535 b10931-b1095d GetLastError call aff2a3 call b05333 532->535 536 b10963-b10977 532->536 535->536 536->531
                        APIs
                          • Part of subcall function 00B1039A: CreateFileW.KERNELBASE(00000000,00000000,?,00B10704,?,?,00000000,?,00B10704,00000000,0000000C), ref: 00B103B7
                        • GetLastError.KERNEL32 ref: 00B1076F
                        • __dosmaperr.LIBCMT ref: 00B10776
                        • GetFileType.KERNELBASE(00000000), ref: 00B10782
                        • GetLastError.KERNEL32 ref: 00B1078C
                        • __dosmaperr.LIBCMT ref: 00B10795
                        • CloseHandle.KERNEL32(00000000), ref: 00B107B5
                        • CloseHandle.KERNEL32(?), ref: 00B108FF
                        • GetLastError.KERNEL32 ref: 00B10931
                        • __dosmaperr.LIBCMT ref: 00B10938
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                        • String ID: H
                        • API String ID: 4237864984-2852464175
                        • Opcode ID: 180d8cdda4a22295dcbf152a3e5ce3225ece2fb486c0fe272fb8858b36260483
                        • Instruction ID: 537af5e1f942c62cd11cacb1c6c3030525931bdc04d2c464e8bcc6204dbc0e72
                        • Opcode Fuzzy Hash: 180d8cdda4a22295dcbf152a3e5ce3225ece2fb486c0fe272fb8858b36260483
                        • Instruction Fuzzy Hash: FFA1F8329241088FDF19BF68D8917ED7BE0EB46320F140199F815AB3D1DB759D92CB51

                        Control-flow Graph

                        APIs
                          • Part of subcall function 00AD3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00BA1418,?,00AD2E7F,?,?,?,00000000), ref: 00AD3A78
                          • Part of subcall function 00AD3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00AD3379
                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00AD356A
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00B1318D
                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00B131CE
                        • RegCloseKey.ADVAPI32(?), ref: 00B13210
                        • _wcslen.LIBCMT ref: 00B13277
                        • _wcslen.LIBCMT ref: 00B13286
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                        • API String ID: 98802146-2727554177
                        • Opcode ID: daea0c2dae1daaeededccbb6f225c65847a4a47fc894baab969fbc8fa238da19
                        • Instruction ID: c35ed8cb5710f0e3f94a7f2e35b5e6a7352ec07e01e86939e7f4d69851bc4572
                        • Opcode Fuzzy Hash: daea0c2dae1daaeededccbb6f225c65847a4a47fc894baab969fbc8fa238da19
                        • Instruction Fuzzy Hash: 5171C4715043009ECB04EF69DD829ABBBE8FF96740F40082EF555832B0EF749A48CB56

                        Control-flow Graph

                        APIs
                        • GetSysColorBrush.USER32(0000000F), ref: 00AD2B8E
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00AD2B9D
                        • LoadIconW.USER32(00000063), ref: 00AD2BB3
                        • LoadIconW.USER32(000000A4), ref: 00AD2BC5
                        • LoadIconW.USER32(000000A2), ref: 00AD2BD7
                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00AD2BEF
                        • RegisterClassExW.USER32(?), ref: 00AD2C40
                          • Part of subcall function 00AD2CD4: GetSysColorBrush.USER32(0000000F), ref: 00AD2D07
                          • Part of subcall function 00AD2CD4: RegisterClassExW.USER32(00000030), ref: 00AD2D31
                          • Part of subcall function 00AD2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AD2D42
                          • Part of subcall function 00AD2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00AD2D5F
                          • Part of subcall function 00AD2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AD2D6F
                          • Part of subcall function 00AD2CD4: LoadIconW.USER32(000000A9), ref: 00AD2D85
                          • Part of subcall function 00AD2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AD2D94
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                        • String ID: #$0$AutoIt v3
                        • API String ID: 423443420-4155596026
                        • Opcode ID: 54427353c0ad7dba2d78be7e7aa57867f0f02d10d5a08dd0a6e441a1b4f8590e
                        • Instruction ID: c0c79171203dcb188c3fc062353b12a57744805b4a8ec20525dd18d137157c63
                        • Opcode Fuzzy Hash: 54427353c0ad7dba2d78be7e7aa57867f0f02d10d5a08dd0a6e441a1b4f8590e
                        • Instruction Fuzzy Hash: AC21F575A00328BFDF50DFA9EC56AA97FF4FB49B50F00041AE504A76A0DBB50940CF98

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 614 ad3170-ad3185 615 ad31e5-ad31e7 614->615 616 ad3187-ad318a 614->616 615->616 619 ad31e9 615->619 617 ad318c-ad3193 616->617 618 ad31eb 616->618 620 ad3199-ad319e 617->620 621 ad3265-ad326d PostQuitMessage 617->621 623 b12dfb-b12e23 call ad18e2 call aee499 618->623 624 ad31f1-ad31f6 618->624 622 ad31d0-ad31d8 DefWindowProcW 619->622 626 ad31a4-ad31a8 620->626 627 b12e7c-b12e90 call b3bf30 620->627 629 ad3219-ad321b 621->629 628 ad31de-ad31e4 622->628 659 b12e28-b12e2f 623->659 630 ad321d-ad3244 SetTimer RegisterWindowMessageW 624->630 631 ad31f8-ad31fb 624->631 635 ad31ae-ad31b3 626->635 636 b12e68-b12e72 call b3c161 626->636 627->629 653 b12e96 627->653 629->628 630->629 637 ad3246-ad3251 CreatePopupMenu 630->637 632 ad3201-ad3214 KillTimer call ad30f2 call ad3c50 631->632 633 b12d9c-b12d9f 631->633 632->629 645 b12da1-b12da5 633->645 646 b12dd7-b12df6 MoveWindow 633->646 642 ad31b9-ad31be 635->642 643 b12e4d-b12e54 635->643 649 b12e77 636->649 637->629 651 ad31c4-ad31ca 642->651 652 ad3253-ad3263 call ad326f 642->652 643->622 647 b12e5a-b12e63 call b30ad7 643->647 654 b12da7-b12daa 645->654 655 b12dc6-b12dd2 SetFocus 645->655 646->629 647->622 649->629 651->622 651->659 652->629 653->622 654->651 660 b12db0-b12dc1 call ad18e2 654->660 655->629 659->622 663 b12e35-b12e48 call ad30f2 call ad3837 659->663 660->629 663->622
                        APIs
                        • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00AD316A,?,?), ref: 00AD31D8
                        • KillTimer.USER32(?,00000001,?,?,?,?,?,00AD316A,?,?), ref: 00AD3204
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00AD3227
                        • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00AD316A,?,?), ref: 00AD3232
                        • CreatePopupMenu.USER32 ref: 00AD3246
                        • PostQuitMessage.USER32(00000000), ref: 00AD3267
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                        • String ID: TaskbarCreated
                        • API String ID: 129472671-2362178303
                        • Opcode ID: f9294f33216c609bd47eb03430071e5ac93570a2ad959e44a728e65b980ba3af
                        • Instruction ID: 87a993cbfb881b324a594594c8cbedc22ecace48743bd1052522aa633d60c46f
                        • Opcode Fuzzy Hash: f9294f33216c609bd47eb03430071e5ac93570a2ad959e44a728e65b980ba3af
                        • Instruction Fuzzy Hash: 9E412637604201AADF145F7CAD0ABBE3AA9EB16340F040667F653873A1CFB58E409763

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 680 ad2c63-ad2cd3 CreateWindowExW * 2 ShowWindow * 2
                        APIs
                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00AD2C91
                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00AD2CB2
                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,00AD1CAD,?), ref: 00AD2CC6
                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,00AD1CAD,?), ref: 00AD2CCF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$CreateShow
                        • String ID: AutoIt v3$edit
                        • API String ID: 1584632944-3779509399
                        • Opcode ID: f1e54cbb360fe3002775c247efc861e98e15a357d7c3dbc226788f7ff3e585a4
                        • Instruction ID: ee1835747642139737669584566e59d44f9bb97a86cefedbf10f6a230103b85f
                        • Opcode Fuzzy Hash: f1e54cbb360fe3002775c247efc861e98e15a357d7c3dbc226788f7ff3e585a4
                        • Instruction Fuzzy Hash: 0EF0D0765402907AEB711F1B6C09E772EFDD7C7F60F00045AF904935A0CAA51850DA74

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 795 b3e97b-b3e986 796 b3e9f9-b3e9fb 795->796 797 b3e988 795->797 798 b3e98a-b3e98c 797->798 799 b3e98e-b3e991 797->799 800 b3e9f3 Sleep 798->800 801 b3e993-b3e99f QueryPerformanceCounter 799->801 802 b3e9f2 799->802 800->796 801->802 803 b3e9a1-b3e9a5 QueryPerformanceFrequency 801->803 802->800 804 b3e9ab-b3e9ee Sleep QueryPerformanceCounter call b120b0 803->804 807 b3e9f0 804->807 807->796
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?), ref: 00B3E997
                        • QueryPerformanceFrequency.KERNEL32(?), ref: 00B3E9A5
                        • Sleep.KERNEL32(00000000), ref: 00B3E9AD
                        • QueryPerformanceCounter.KERNEL32(?), ref: 00B3E9B7
                        • Sleep.KERNELBASE ref: 00B3E9F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: PerformanceQuery$CounterSleep$Frequency
                        • String ID:
                        • API String ID: 2833360925-0
                        • Opcode ID: e9d1fea3c62acfbd7cbd3eee69f74d135aa8fad629f65dd7c4d35f5f80137032
                        • Instruction ID: 8356a74ac5e2785cb174f5c97abf620d41b108ea242b3a8b3b7df8b6e07c454c
                        • Opcode Fuzzy Hash: e9d1fea3c62acfbd7cbd3eee69f74d135aa8fad629f65dd7c4d35f5f80137032
                        • Instruction Fuzzy Hash: E8015731C01629DBCF00ABE4DC59AEDBBB8FB09701F100686E952B6280CB749551CBA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 844 ad3b1c-ad3b27 845 ad3b99-ad3b9b 844->845 846 ad3b29-ad3b2e 844->846 847 ad3b8c-ad3b8f 845->847 846->845 848 ad3b30-ad3b48 RegOpenKeyExW 846->848 848->845 849 ad3b4a-ad3b69 RegQueryValueExW 848->849 850 ad3b6b-ad3b76 849->850 851 ad3b80-ad3b8b RegCloseKey 849->851 852 ad3b78-ad3b7a 850->852 853 ad3b90-ad3b97 850->853 851->847 854 ad3b7e 852->854 853->854 854->851
                        APIs
                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00AD3B0F,SwapMouseButtons,00000004,?), ref: 00AD3B40
                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00AD3B0F,SwapMouseButtons,00000004,?), ref: 00AD3B61
                        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00AD3B0F,SwapMouseButtons,00000004,?), ref: 00AD3B83
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID: Control Panel\Mouse
                        • API String ID: 3677997916-824357125
                        • Opcode ID: f09d6b43e8c72736dad3e77e410975a08a8cf49db1dd6153dca544bc43d8195b
                        • Instruction ID: 9e84434ed8955a7d358b697baefcf469f6989819b566c1dcc56c6554075c5255
                        • Opcode Fuzzy Hash: f09d6b43e8c72736dad3e77e410975a08a8cf49db1dd6153dca544bc43d8195b
                        • Instruction Fuzzy Hash: 22112AB6510208FFDF218FA5DC44AEEBBB8EF04744B10446BE846D7210D6719E409761
                        APIs
                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00B133A2
                          • Part of subcall function 00AD6B57: _wcslen.LIBCMT ref: 00AD6B6A
                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00AD3A04
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: IconLoadNotifyShell_String_wcslen
                        • String ID: Line:
                        • API String ID: 2289894680-1585850449
                        • Opcode ID: 49db29a06c7a4d738fa66eb5b219a8d178b47805094224f071b4084abb5638dd
                        • Instruction ID: e1c9be26afe0d111dbb73120e8acac67564e36de515a613060e6641138fd9be3
                        • Opcode Fuzzy Hash: 49db29a06c7a4d738fa66eb5b219a8d178b47805094224f071b4084abb5638dd
                        • Instruction Fuzzy Hash: 1031D672508304AACB21EF14DC56BEF77E8AB45710F00492BF59A87291EF709A48C7D7
                        APIs
                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00AF0668
                          • Part of subcall function 00AF32A4: RaiseException.KERNEL32(?,?,?,00AF068A,?,00BA1444,?,?,?,?,?,?,00AF068A,00AD1129,00B98738,00AD1129), ref: 00AF3304
                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00AF0685
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Exception@8Throw$ExceptionRaise
                        • String ID: Unknown exception
                        • API String ID: 3476068407-410509341
                        • Opcode ID: 6fd59360bc953849c815e36057f7978ac4d385c4e7f293a372e15accf31523bb
                        • Instruction ID: 39a6f5357f645513a9d59925ac9929e6f00dd512d4b58cfb45c26bdfb7fca1c8
                        • Opcode Fuzzy Hash: 6fd59360bc953849c815e36057f7978ac4d385c4e7f293a372e15accf31523bb
                        • Instruction Fuzzy Hash: 3AF0C23590020D7B8F00BBE5ED86DBE7BBC9E40354B608171BA14D65A6EFB1EA25C680
                        APIs
                          • Part of subcall function 00AD1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AD1BF4
                          • Part of subcall function 00AD1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00AD1BFC
                          • Part of subcall function 00AD1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AD1C07
                          • Part of subcall function 00AD1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AD1C12
                          • Part of subcall function 00AD1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00AD1C1A
                          • Part of subcall function 00AD1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00AD1C22
                          • Part of subcall function 00AD1B4A: RegisterWindowMessageW.USER32(00000004,?,00AD12C4), ref: 00AD1BA2
                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00AD136A
                        • OleInitialize.OLE32 ref: 00AD1388
                        • CloseHandle.KERNEL32(00000000,00000000), ref: 00B124AB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                        • String ID:
                        • API String ID: 1986988660-0
                        • Opcode ID: a8cffa9d4c4910a82993111670aac5bf4443ebc6621a4bd6666076d3acaab5f2
                        • Instruction ID: de737f76c97b8c6019661cc299edb878b371eba0ea9befaab17c75bc534f57c6
                        • Opcode Fuzzy Hash: a8cffa9d4c4910a82993111670aac5bf4443ebc6621a4bd6666076d3acaab5f2
                        • Instruction Fuzzy Hash: EC71CAB9D152108FC3C8EF7DA9566653AE4FBAB384F548A6AD41AC73A1EF344400CF50
                        APIs
                          • Part of subcall function 00AD3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00AD3A04
                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00B3C259
                        • KillTimer.USER32(?,00000001,?,?), ref: 00B3C261
                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00B3C270
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: IconNotifyShell_Timer$Kill
                        • String ID:
                        • API String ID: 3500052701-0
                        • Opcode ID: 76e911f985c5ca85e746cc8db9b48fff0c70776ef6a790298bcc3f06efe1c9f7
                        • Instruction ID: aa036e92565343cb1969a8906868f3fd28a26207b882fdd9ca9d22bc25af8f6b
                        • Opcode Fuzzy Hash: 76e911f985c5ca85e746cc8db9b48fff0c70776ef6a790298bcc3f06efe1c9f7
                        • Instruction Fuzzy Hash: D831C370904344AFEB729FA48C95BE7BFECAB06304F1004DAD2DAA7241C7745A84CB51
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,00B085CC,?,00B98CC8,0000000C), ref: 00B08704
                        • GetLastError.KERNEL32(?,00B085CC,?,00B98CC8,0000000C), ref: 00B0870E
                        • __dosmaperr.LIBCMT ref: 00B08739
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                        • String ID:
                        • API String ID: 490808831-0
                        • Opcode ID: 7b2abcb3e6676f913e6d8b87e65819f3d61b06528440d4fc8d80f0b4d029ddfd
                        • Instruction ID: 798b8d032742f6e197e3017abe22ffc17dda665230ffafab06e0c8740c058912
                        • Opcode Fuzzy Hash: 7b2abcb3e6676f913e6d8b87e65819f3d61b06528440d4fc8d80f0b4d029ddfd
                        • Instruction Fuzzy Hash: 7601B133A042201AC6307334A84577F2FC9CB927B4F3A01D9F8499B1D3DEB2CD818658
                        APIs
                        • TranslateMessage.USER32(?), ref: 00ADDB7B
                        • DispatchMessageW.USER32(?), ref: 00ADDB89
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00ADDB9F
                        • Sleep.KERNELBASE(0000000A), ref: 00ADDBB1
                        • TranslateAcceleratorW.USER32(?,?,?), ref: 00B21CC9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                        • String ID:
                        • API String ID: 3288985973-0
                        • Opcode ID: da4313182ba739146b926578bff8535241703e0c5a21bcfef254978c1edc7ead
                        • Instruction ID: 0b6eaa4927f5f87d4edc8816980eea74c6bf30076adbb30369709c7dfe3bcfc4
                        • Opcode Fuzzy Hash: da4313182ba739146b926578bff8535241703e0c5a21bcfef254978c1edc7ead
                        • Instruction Fuzzy Hash: 1CF05E316443409BE730CB64DC89FEA77E8EB45310F10491AE65AC71C0DF749848DB25
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 00AE17F6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Init_thread_footer
                        • String ID: CALL
                        • API String ID: 1385522511-4196123274
                        • Opcode ID: 65060aa0dbf306121eb2d85cc3bccb24a8f1fa184d1cc1fd0b406f0da1fbce4f
                        • Instruction ID: 40ca568d01091c2398bd1c4d4efb873fd9d5e683da75a43617fc3a01c27527f6
                        • Opcode Fuzzy Hash: 65060aa0dbf306121eb2d85cc3bccb24a8f1fa184d1cc1fd0b406f0da1fbce4f
                        • Instruction Fuzzy Hash: 51229B706083919FC714DF15C490A2ABBF1FF99314F28895DF49A8B3A2D731E941CB92
                        APIs
                        • GetOpenFileNameW.COMDLG32(?), ref: 00B12C8C
                          • Part of subcall function 00AD3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AD3A97,?,?,00AD2E7F,?,?,?,00000000), ref: 00AD3AC2
                          • Part of subcall function 00AD2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00AD2DC4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Name$Path$FileFullLongOpen
                        • String ID: X
                        • API String ID: 779396738-3081909835
                        • Opcode ID: 4bbdecd9c52f0eb2772e47d4dc36c702f1faa63170a0ced6c70ed422cfb9e0f0
                        • Instruction ID: 550ad507d9d5f4f7b987b18d93b5d43a2ec2d82570c57bf6832af2cab2363670
                        • Opcode Fuzzy Hash: 4bbdecd9c52f0eb2772e47d4dc36c702f1faa63170a0ced6c70ed422cfb9e0f0
                        • Instruction Fuzzy Hash: 2C219371A002589FDF41EF94C945BEE7BF8AF59304F00405AE546A7341DBB45A89CFA1
                        APIs
                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AD3908
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: IconNotifyShell_
                        • String ID:
                        • API String ID: 1144537725-0
                        • Opcode ID: 9269cb323beaf6a3a37a9aba51359c6ad8b89ec882815eb79c10e7c0d0e1630e
                        • Instruction ID: 2c2857dfd9ebb6d13a44a61e7c0bad36ad56cb46a93d8bfeb57100eebb12c56a
                        • Opcode Fuzzy Hash: 9269cb323beaf6a3a37a9aba51359c6ad8b89ec882815eb79c10e7c0d0e1630e
                        • Instruction Fuzzy Hash: D331C3715043009FDB60DF24D8857ABBBF4FB49708F00096EF59A97380EBB1AA44CB56
                        APIs
                        • timeGetTime.WINMM ref: 00AEF661
                          • Part of subcall function 00ADD730: GetInputState.USER32 ref: 00ADD807
                        • Sleep.KERNEL32(00000000), ref: 00B2F2DE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: InputSleepStateTimetime
                        • String ID:
                        • API String ID: 4149333218-0
                        • Opcode ID: c025bee613f9a7581f26563cd53d75694d11658deef79a9400737fab25cb7038
                        • Instruction ID: 2ffa9d787f5713209d4c7cb7d00eba70f2643c89de716f25b6839110819e1b0d
                        • Opcode Fuzzy Hash: c025bee613f9a7581f26563cd53d75694d11658deef79a9400737fab25cb7038
                        • Instruction Fuzzy Hash: 26F012312406159FD354EF65E545B6ABBE4EF46761F00406AE85AD73A1DB70A800CBA1
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 00ADBB4E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Init_thread_footer
                        • String ID:
                        • API String ID: 1385522511-0
                        • Opcode ID: f80a19fabc870f8a0633d9e86ebdaf464e2c2298dc3cb8ed190a8fc89cde5721
                        • Instruction ID: 93328481144f346612afdb231929204bf59d8f69c1717c309a395c1f94a3d330
                        • Opcode Fuzzy Hash: f80a19fabc870f8a0633d9e86ebdaf464e2c2298dc3cb8ed190a8fc89cde5721
                        • Instruction Fuzzy Hash: EA32BE34A10219DFDB10DF58C894ABEB7F5EF49300F15809AE91AAB362C774ED41CBA1
                        APIs
                        • SetWindowPos.USER32(?,000000FE,00000000,00000000,00000000,00000000,00000013,00000001,?), ref: 00B62649
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window
                        • String ID:
                        • API String ID: 2353593579-0
                        • Opcode ID: 77b72a39ea4acb15d7d11f274c2fee0b63e7a54fa7dd3017ca1244b27d4c2e7a
                        • Instruction ID: daabfe5ab026cf0e6cf26d61332d088b7d35fd160f5a71ca084551218e992517
                        • Opcode Fuzzy Hash: 77b72a39ea4acb15d7d11f274c2fee0b63e7a54fa7dd3017ca1244b27d4c2e7a
                        • Instruction Fuzzy Hash: 3E21C275200A16AFE720DF18C8D0976B7D9FB54368B6480ADE8978B392CB75ED41CB90
                        APIs
                        • GetForegroundWindow.USER32(00000001,?), ref: 00B61420
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ForegroundWindow
                        • String ID:
                        • API String ID: 2020703349-0
                        • Opcode ID: 4831c9b17d32a0cf0119164ca6b34b869e0c758ecf1747997b5ebf302dde900c
                        • Instruction ID: 11e4064b302188711692bb7ac7dd8ed912a2d63dabea9240c8a15021fa55e3ee
                        • Opcode Fuzzy Hash: 4831c9b17d32a0cf0119164ca6b34b869e0c758ecf1747997b5ebf302dde900c
                        • Instruction Fuzzy Hash: F6319E30204642AFD714EF29C491B69B7E2FF44324F5886A9E8568B392DB75EC41CFD0
                        APIs
                          • Part of subcall function 00AD4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00AD4EDD,?,00BA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AD4E9C
                          • Part of subcall function 00AD4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00AD4EAE
                          • Part of subcall function 00AD4E90: FreeLibrary.KERNEL32(00000000,?,?,00AD4EDD,?,00BA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AD4EC0
                        • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00BA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AD4EFD
                          • Part of subcall function 00AD4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00B13CDE,?,00BA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AD4E62
                          • Part of subcall function 00AD4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00AD4E74
                          • Part of subcall function 00AD4E59: FreeLibrary.KERNEL32(00000000,?,?,00B13CDE,?,00BA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AD4E87
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Library$Load$AddressFreeProc
                        • String ID:
                        • API String ID: 2632591731-0
                        • Opcode ID: fabc7c3dd44ad5e5c6199de35a830d982194920fe792624f0e762a56c360f0d0
                        • Instruction ID: c33e9331d6c865ac146ed175a7d8d23268acac97b27b1fcb95b916ceea1659be
                        • Opcode Fuzzy Hash: fabc7c3dd44ad5e5c6199de35a830d982194920fe792624f0e762a56c360f0d0
                        • Instruction Fuzzy Hash: AD11C132600205ABCB14EB60DA06BED77E5AF48B10F20842AF543A62E1EE749A459B90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: __wsopen_s
                        • String ID:
                        • API String ID: 3347428461-0
                        • Opcode ID: 909eec945e079b9d0f379c90bec26a1f80fae06cc673202695864e9b1d6240eb
                        • Instruction ID: 9381c7db83e838f6a68326dd64ab1d70d712d82bce1cc782c0f771163763ebc9
                        • Opcode Fuzzy Hash: 909eec945e079b9d0f379c90bec26a1f80fae06cc673202695864e9b1d6240eb
                        • Instruction Fuzzy Hash: B811157590420AAFCB05DF58E9419DE7BF9EF48314F1040A9F808AB352DA31EA21CBA5
                        APIs
                        • GetForegroundWindow.USER32(00000000,?,?,?,00B614B5,?), ref: 00B62A01
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ForegroundWindow
                        • String ID:
                        • API String ID: 2020703349-0
                        • Opcode ID: cff8938d6e438e0df64e3161b1fa3b357b308572ffbbf0b7e74692f70de99bc8
                        • Instruction ID: 53f1eff51ae743f60ceff70fab6e4acae8bf816eec9531550b3570f2b2721bcb
                        • Opcode Fuzzy Hash: cff8938d6e438e0df64e3161b1fa3b357b308572ffbbf0b7e74692f70de99bc8
                        • Instruction Fuzzy Hash: CD019236300E419FE3248B6CC454B2237D2FBC5318F29C4A8C0478B291DB7AEC42C790
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                        • Instruction ID: 995cb986aaf673e7d173a5729ffe254b86ac30e261a2c2e966522d46b155b127
                        • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                        • Instruction Fuzzy Hash: 7FF0F432511A1C9ACA327FE98D09B7A37D99F52370F100765F621D72E2DF70980686A5
                        APIs
                        • GetForegroundWindow.USER32(?), ref: 00B614EB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ForegroundWindow
                        • String ID:
                        • API String ID: 2020703349-0
                        • Opcode ID: a6ae2c2b28b75be7532d35b39345e14d04344f1267148a9538131cecf6a801f9
                        • Instruction ID: 833ba9584572750840574963383693ca56e3299bc4a77b449981d802b1a9ac75
                        • Opcode Fuzzy Hash: a6ae2c2b28b75be7532d35b39345e14d04344f1267148a9538131cecf6a801f9
                        • Instruction Fuzzy Hash: 5C01D4353057419FD720CF6DD440826BBD5FF8436475884A9E84A8B752DA76DD82CB80
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,?,00BA1444,?,00AEFDF5,?,?,00ADA976,00000010,00BA1440,00AD13FC,?,00AD13C6,?,00AD1129), ref: 00B03852
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: c0a4178378bdb07d56d6f3c7e94509963b8e5211bd3e2ded1c653a45fca71051
                        • Instruction ID: d814790855364d081a62d919a9b9f40b747e515ad9b478f7806657d5a2e7ab8f
                        • Opcode Fuzzy Hash: c0a4178378bdb07d56d6f3c7e94509963b8e5211bd3e2ded1c653a45fca71051
                        • Instruction Fuzzy Hash: 7CE065311013286AD7212AA69D09BAB3ECDEF42FB0F1581E1FD55965D1DB61DE0183E1
                        APIs
                        • FreeLibrary.KERNEL32(?,?,00BA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AD4F6D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: FreeLibrary
                        • String ID:
                        • API String ID: 3664257935-0
                        • Opcode ID: 7cb02dcb97402c9192507448d73df544b418c2fd4ece3389ed3700d603382d46
                        • Instruction ID: 0581ad1cc12a3488c3ccd7c43acc37fadc223d5f125429c0f6fbd61e3a1f7a40
                        • Opcode Fuzzy Hash: 7cb02dcb97402c9192507448d73df544b418c2fd4ece3389ed3700d603382d46
                        • Instruction Fuzzy Hash: F4F01571105752CFDB349F64D590822BBF4AF1C729320896FE2EB82621CB319844DB10
                        APIs
                        • IsWindow.USER32(00000000), ref: 00B62A66
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window
                        • String ID:
                        • API String ID: 2353593579-0
                        • Opcode ID: 961b813c6bbe9291e3d793f4733ff02698085064520095300db7345bfa716564
                        • Instruction ID: 0fa7065b956cdb02e156031639d3098a943c9cc3ed9723d1f0a4f59c7f088ae4
                        • Opcode Fuzzy Hash: 961b813c6bbe9291e3d793f4733ff02698085064520095300db7345bfa716564
                        • Instruction Fuzzy Hash: 29E0DF36750916AAD710EB70DC808FA77CCEB10390B1049B6EC26C2100DB789A9182A0
                        APIs
                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00AD2DC4
                          • Part of subcall function 00AD6B57: _wcslen.LIBCMT ref: 00AD6B6A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: LongNamePath_wcslen
                        • String ID:
                        • API String ID: 541455249-0
                        • Opcode ID: 6004302587b442ad048c05f608b18163710fef55109935aa1ff366ed07501b27
                        • Instruction ID: 24510178838f03bd2961d332f5ce5a0511e4c9cec6dea43e3a6fac4e2c9b47b5
                        • Opcode Fuzzy Hash: 6004302587b442ad048c05f608b18163710fef55109935aa1ff366ed07501b27
                        • Instruction Fuzzy Hash: D2E0CD726041245BC710A6589C05FEA77DDDFC8790F0400B2FD09D7248D964AD808550
                        APIs
                          • Part of subcall function 00AD3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AD3908
                          • Part of subcall function 00ADD730: GetInputState.USER32 ref: 00ADD807
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00AD2B6B
                          • Part of subcall function 00AD30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00AD314E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: IconNotifyShell_$CurrentDirectoryInputState
                        • String ID:
                        • API String ID: 3667716007-0
                        • Opcode ID: 3af6947db30b9ae14701d73dc954ccf5a3250a2c22371c621e98bb87eebcb252
                        • Instruction ID: 466d7162829fbac0b82e85d08587618e8b3284a99569aa683eae112d535b27a8
                        • Opcode Fuzzy Hash: 3af6947db30b9ae14701d73dc954ccf5a3250a2c22371c621e98bb87eebcb252
                        • Instruction Fuzzy Hash: 3AE07D2370420407CF04BB38A9125BDBB498BD6351F00087FF183833A3CF6489458713
                        APIs
                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00B33D18
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSendTimeout
                        • String ID:
                        • API String ID: 1599653421-0
                        • Opcode ID: c569a822b20537eb64cbc987f6aea672569e7b2ff1f5ad0406d3a48a4958537d
                        • Instruction ID: ca1d8db9f873e47555b4b5f01388db3c60ebb07cd9e16fc384b44bc7d70e2f79
                        • Opcode Fuzzy Hash: c569a822b20537eb64cbc987f6aea672569e7b2ff1f5ad0406d3a48a4958537d
                        • Instruction Fuzzy Hash: E4D012E06A03087EFB0093718C0BEBB369CC316A81F104BA4BA02D74C1D9A4DE080130
                        APIs
                        • CreateFileW.KERNELBASE(00000000,00000000,?,00B10704,?,?,00000000,?,00B10704,00000000,0000000C), ref: 00B103B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CreateFile
                        • String ID:
                        • API String ID: 823142352-0
                        • Opcode ID: ca74b2ecc52df1130ffb7cc16e087158c11a5372dfe5f63606be0d1757a8a3f0
                        • Instruction ID: 3d410949756cc4991fdf781b8ee5dcaedbb12c105b728092844f626fa88c6bc3
                        • Opcode Fuzzy Hash: ca74b2ecc52df1130ffb7cc16e087158c11a5372dfe5f63606be0d1757a8a3f0
                        • Instruction Fuzzy Hash: ACD06C3204010DBBDF028F84DD06EDA3FAAFB48714F014000FE5866060C776E821AB90
                        APIs
                        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00AD1CBC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: InfoParametersSystem
                        • String ID:
                        • API String ID: 3098949447-0
                        • Opcode ID: ed2550dff0583d70af4968283a229a9a670c9c27680a36b2a73d11fe0726d72c
                        • Instruction ID: c5b42790821c83e6d73a55c0d634510b9f464923ed36a6acebd34ea153d21a32
                        • Opcode Fuzzy Hash: ed2550dff0583d70af4968283a229a9a670c9c27680a36b2a73d11fe0726d72c
                        • Instruction Fuzzy Hash: F4C09B35280304AFF6144B84BC4BF147754B359B10F044401FA4D575E3CBE11410DA54
                        APIs
                          • Part of subcall function 00AE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AE9BB2
                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00B6961A
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B6965B
                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00B6969F
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B696C9
                        • SendMessageW.USER32 ref: 00B696F2
                        • GetKeyState.USER32(00000011), ref: 00B6978B
                        • GetKeyState.USER32(00000009), ref: 00B69798
                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B697AE
                        • GetKeyState.USER32(00000010), ref: 00B697B8
                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B697E9
                        • SendMessageW.USER32 ref: 00B69810
                        • SendMessageW.USER32(?,00001030,?,00B67E95), ref: 00B69918
                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00B6992E
                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00B69941
                        • SetCapture.USER32(?), ref: 00B6994A
                        • ClientToScreen.USER32(?,?), ref: 00B699AF
                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00B699BC
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B699D6
                        • ReleaseCapture.USER32 ref: 00B699E1
                        • GetCursorPos.USER32(?), ref: 00B69A19
                        • ScreenToClient.USER32(?,?), ref: 00B69A26
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B69A80
                        • SendMessageW.USER32 ref: 00B69AAE
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B69AEB
                        • SendMessageW.USER32 ref: 00B69B1A
                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00B69B3B
                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00B69B4A
                        • GetCursorPos.USER32(?), ref: 00B69B68
                        • ScreenToClient.USER32(?,?), ref: 00B69B75
                        • GetParent.USER32(?), ref: 00B69B93
                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B69BFA
                        • SendMessageW.USER32 ref: 00B69C2B
                        • ClientToScreen.USER32(?,?), ref: 00B69C84
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00B69CB4
                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B69CDE
                        • SendMessageW.USER32 ref: 00B69D01
                        • ClientToScreen.USER32(?,?), ref: 00B69D4E
                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00B69D82
                          • Part of subcall function 00AE9944: GetWindowLongW.USER32(?,000000EB), ref: 00AE9952
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B69E05
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                        • String ID: @GUI_DRAGID$F
                        • API String ID: 3429851547-4164748364
                        • Opcode ID: 10597c3dbc220399f91d1b865c15d12e173932958f853ec1bca03bafc4f55c76
                        • Instruction ID: b54fd8e9f9c2f89c9fd31606f3c6b7a8388a7c77a1b5460b079d2b48c67d79db
                        • Opcode Fuzzy Hash: 10597c3dbc220399f91d1b865c15d12e173932958f853ec1bca03bafc4f55c76
                        • Instruction Fuzzy Hash: FB42AF34204301AFDB24CF28CC84EAABBE9FF49710F140A99F695872A1DB79E855CF51
                        APIs
                        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00B648F3
                        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00B64908
                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00B64927
                        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00B6494B
                        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00B6495C
                        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00B6497B
                        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00B649AE
                        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00B649D4
                        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00B64A0F
                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00B64A56
                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00B64A7E
                        • IsMenu.USER32(?), ref: 00B64A97
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B64AF2
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B64B20
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B64B94
                        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00B64BE3
                        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00B64C82
                        • wsprintfW.USER32 ref: 00B64CAE
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B64CC9
                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00B64CF1
                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00B64D13
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B64D33
                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00B64D5A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                        • String ID: %d/%02d/%02d
                        • API String ID: 4054740463-328681919
                        • Opcode ID: 5b6fb757e2b8171e011a799db278f227e26deeeac98b3f8f433c8055a6db138d
                        • Instruction ID: 1c11700509e32e58521a31c3e1e03ec4cbc16c42e784676cd16411bf92842d44
                        • Opcode Fuzzy Hash: 5b6fb757e2b8171e011a799db278f227e26deeeac98b3f8f433c8055a6db138d
                        • Instruction Fuzzy Hash: 6612EE71600654ABEB249F28DC49FBE7BF8EF45710F1041A9F51AEB2E1DBB89940CB50
                        APIs
                          • Part of subcall function 00B316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B3170D
                          • Part of subcall function 00B316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B3173A
                          • Part of subcall function 00B316C3: GetLastError.KERNEL32 ref: 00B3174A
                        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00B31286
                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00B312A8
                        • CloseHandle.KERNEL32(?), ref: 00B312B9
                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00B312D1
                        • GetProcessWindowStation.USER32 ref: 00B312EA
                        • SetProcessWindowStation.USER32(00000000), ref: 00B312F4
                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00B31310
                          • Part of subcall function 00B310BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B311FC), ref: 00B310D4
                          • Part of subcall function 00B310BF: CloseHandle.KERNEL32(?,?,00B311FC), ref: 00B310E9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                        • String ID: $default$winsta0
                        • API String ID: 22674027-1027155976
                        • Opcode ID: 335f7f2e3fb3ffa816db6fa2f0c8bbe095fd3dcd531f053f984bd4277db82565
                        • Instruction ID: bcbf8a401b8900bfc5947d449989ee255bbc7326d788804332bf87004a9cfbe9
                        • Opcode Fuzzy Hash: 335f7f2e3fb3ffa816db6fa2f0c8bbe095fd3dcd531f053f984bd4277db82565
                        • Instruction Fuzzy Hash: D1818A71900208ABDF219FA8DC49BFE7BBDEF04700F2445A9F910B62A0CB759944CF24
                        APIs
                          • Part of subcall function 00B310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B31114
                          • Part of subcall function 00B310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00B30B9B,?,?,?), ref: 00B31120
                          • Part of subcall function 00B310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00B30B9B,?,?,?), ref: 00B3112F
                          • Part of subcall function 00B310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00B30B9B,?,?,?), ref: 00B31136
                          • Part of subcall function 00B310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B3114D
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B30BCC
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B30C00
                        • GetLengthSid.ADVAPI32(?), ref: 00B30C17
                        • GetAce.ADVAPI32(?,00000000,?), ref: 00B30C51
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B30C6D
                        • GetLengthSid.ADVAPI32(?), ref: 00B30C84
                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00B30C8C
                        • HeapAlloc.KERNEL32(00000000), ref: 00B30C93
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B30CB4
                        • CopySid.ADVAPI32(00000000), ref: 00B30CBB
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B30CEA
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B30D0C
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B30D1E
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B30D45
                        • HeapFree.KERNEL32(00000000), ref: 00B30D4C
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B30D55
                        • HeapFree.KERNEL32(00000000), ref: 00B30D5C
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B30D65
                        • HeapFree.KERNEL32(00000000), ref: 00B30D6C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00B30D78
                        • HeapFree.KERNEL32(00000000), ref: 00B30D7F
                          • Part of subcall function 00B31193: GetProcessHeap.KERNEL32(00000008,00B30BB1,?,00000000,?,00B30BB1,?), ref: 00B311A1
                          • Part of subcall function 00B31193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00B30BB1,?), ref: 00B311A8
                          • Part of subcall function 00B31193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00B30BB1,?), ref: 00B311B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                        • String ID:
                        • API String ID: 4175595110-0
                        • Opcode ID: ffd76cb407b7134aa53d7d8abd02a619ee7b89249c9de98226a619449fd6e4f9
                        • Instruction ID: e7236bbe2c999976984a5807378562e2e9a212c747a19416a2866468e5c91c95
                        • Opcode Fuzzy Hash: ffd76cb407b7134aa53d7d8abd02a619ee7b89249c9de98226a619449fd6e4f9
                        • Instruction Fuzzy Hash: BA714B7290020AABDF10EFA4DC44FAEBBF8FF05310F2445A5E955A7191DBB5A905CB60
                        APIs
                        • OpenClipboard.USER32(00B6CC08), ref: 00B4EB29
                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00B4EB37
                        • GetClipboardData.USER32(0000000D), ref: 00B4EB43
                        • CloseClipboard.USER32 ref: 00B4EB4F
                        • GlobalLock.KERNEL32(00000000), ref: 00B4EB87
                        • CloseClipboard.USER32 ref: 00B4EB91
                        • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00B4EBBC
                        • IsClipboardFormatAvailable.USER32(00000001), ref: 00B4EBC9
                        • GetClipboardData.USER32(00000001), ref: 00B4EBD1
                        • GlobalLock.KERNEL32(00000000), ref: 00B4EBE2
                        • GlobalUnlock.KERNEL32(00000000,?), ref: 00B4EC22
                        • IsClipboardFormatAvailable.USER32(0000000F), ref: 00B4EC38
                        • GetClipboardData.USER32(0000000F), ref: 00B4EC44
                        • GlobalLock.KERNEL32(00000000), ref: 00B4EC55
                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00B4EC77
                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00B4EC94
                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00B4ECD2
                        • GlobalUnlock.KERNEL32(00000000,?,?), ref: 00B4ECF3
                        • CountClipboardFormats.USER32 ref: 00B4ED14
                        • CloseClipboard.USER32 ref: 00B4ED59
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                        • String ID:
                        • API String ID: 420908878-0
                        • Opcode ID: 5d199936688348a3beca41084ef56bffd4bc4d0abcc0326e4db65e739d75421e
                        • Instruction ID: 8aa47245dad842146c2d7c5fb1aff2b0cee265b2c68cb691da48ac10d888c2bc
                        • Opcode Fuzzy Hash: 5d199936688348a3beca41084ef56bffd4bc4d0abcc0326e4db65e739d75421e
                        • Instruction Fuzzy Hash: B5619D352042019FD300EF24D995F7A7BE4FF84704F14459AF8A6972A2CF75EA05EB62
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00B469BE
                        • FindClose.KERNEL32(00000000), ref: 00B46A12
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B46A4E
                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B46A75
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B46AB2
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B46ADF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                        • API String ID: 3830820486-3289030164
                        • Opcode ID: 7c375c15bf4f98119651b6392ae27eab5cbec89bc8efb853ce33fad870d7130c
                        • Instruction ID: 50ce0cc436a96e88cb1bb65b270af916ff38e905470b8fcb6977a29023f26ba6
                        • Opcode Fuzzy Hash: 7c375c15bf4f98119651b6392ae27eab5cbec89bc8efb853ce33fad870d7130c
                        • Instruction Fuzzy Hash: FAD16171508340AEC714EBA4C995EAFB7ECEF88704F44491EF586C7291EB74DA04CB62
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00B49663
                        • GetFileAttributesW.KERNEL32(?), ref: 00B496A1
                        • SetFileAttributesW.KERNEL32(?,?), ref: 00B496BB
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00B496D3
                        • FindClose.KERNEL32(00000000), ref: 00B496DE
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00B496FA
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00B4974A
                        • SetCurrentDirectoryW.KERNEL32(00B96B7C), ref: 00B49768
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B49772
                        • FindClose.KERNEL32(00000000), ref: 00B4977F
                        • FindClose.KERNEL32(00000000), ref: 00B4978F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                        • String ID: *.*
                        • API String ID: 1409584000-438819550
                        • Opcode ID: 6114363e732cd1b022fa902386d8b29bd597f10ead5155e294baa4738183319f
                        • Instruction ID: 9e631c681ef96fd1dc779f33c99865eb408dbd725ebfd77045ee97bbe662fb99
                        • Opcode Fuzzy Hash: 6114363e732cd1b022fa902386d8b29bd597f10ead5155e294baa4738183319f
                        • Instruction Fuzzy Hash: EF31BC326002196ADF14AFB4DC49AEF7BECEF09320F1041A6F955E31A0EB74DE409B64
                        APIs
                        • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00B497BE
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00B49819
                        • FindClose.KERNEL32(00000000), ref: 00B49824
                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00B49840
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00B49890
                        • SetCurrentDirectoryW.KERNEL32(00B96B7C), ref: 00B498AE
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B498B8
                        • FindClose.KERNEL32(00000000), ref: 00B498C5
                        • FindClose.KERNEL32(00000000), ref: 00B498D5
                          • Part of subcall function 00B3DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00B3DB00
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                        • String ID: *.*
                        • API String ID: 2640511053-438819550
                        • Opcode ID: 34e6d1cb7bdd2b6833c0add1dcb78dac76a30c1ede22fae7e3b5ddcc4cdf7b54
                        • Instruction ID: 1d2c0f13ff7e55faaa4a763dad7cdcca52b753b58e24572179bee93e290d6def
                        • Opcode Fuzzy Hash: 34e6d1cb7bdd2b6833c0add1dcb78dac76a30c1ede22fae7e3b5ddcc4cdf7b54
                        • Instruction Fuzzy Hash: 8F31B0325006196ADF14EFB8EC49AEF77ECDF06360F1041A6F954A31E0EB74DA449A64
                        APIs
                          • Part of subcall function 00B5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B5B6AE,?,?), ref: 00B5C9B5
                          • Part of subcall function 00B5C998: _wcslen.LIBCMT ref: 00B5C9F1
                          • Part of subcall function 00B5C998: _wcslen.LIBCMT ref: 00B5CA68
                          • Part of subcall function 00B5C998: _wcslen.LIBCMT ref: 00B5CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B5BF3E
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00B5BFA9
                        • RegCloseKey.ADVAPI32(00000000), ref: 00B5BFCD
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00B5C02C
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00B5C0E7
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00B5C154
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00B5C1E9
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00B5C23A
                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00B5C2E3
                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B5C382
                        • RegCloseKey.ADVAPI32(00000000), ref: 00B5C38F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                        • String ID:
                        • API String ID: 3102970594-0
                        • Opcode ID: 38470a5b0cfbf95c2320ce2aa0bf273c2cc726c58516d9ce587e4fb608e3c766
                        • Instruction ID: 5d7e761464cfa90339ad398d496dad998810de93911fe2808c9957912248bb92
                        • Opcode Fuzzy Hash: 38470a5b0cfbf95c2320ce2aa0bf273c2cc726c58516d9ce587e4fb608e3c766
                        • Instruction Fuzzy Hash: 24022B716043009FD714DF28C995E2ABBE5EF49318F18849DF84ADB2A2DB31ED45CB52
                        APIs
                        • GetLocalTime.KERNEL32(?), ref: 00B48257
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B48267
                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00B48273
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B48310
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00B48324
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00B48356
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00B4838C
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00B48395
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CurrentDirectoryTime$File$Local$System
                        • String ID: *.*
                        • API String ID: 1464919966-438819550
                        • Opcode ID: 3811c3067dbd8b8338da803d34cdbdcae71b8ebea3839580190c655616bbf553
                        • Instruction ID: 86d10390af8c9d96371f83f034ba13585d4a5b4a97b37dc0aa6e2d5dda689469
                        • Opcode Fuzzy Hash: 3811c3067dbd8b8338da803d34cdbdcae71b8ebea3839580190c655616bbf553
                        • Instruction Fuzzy Hash: 5B616A725043059FCB10EF64D8809AEB3E8FF89310F04895EF99A97251EB35EA45CB92
                        APIs
                          • Part of subcall function 00AD3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AD3A97,?,?,00AD2E7F,?,?,?,00000000), ref: 00AD3AC2
                          • Part of subcall function 00B3E199: GetFileAttributesW.KERNEL32(?,00B3CF95), ref: 00B3E19A
                        • FindFirstFileW.KERNEL32(?,?), ref: 00B3D122
                        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00B3D1DD
                        • MoveFileW.KERNEL32(?,?), ref: 00B3D1F0
                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00B3D20D
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B3D237
                          • Part of subcall function 00B3D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00B3D21C,?,?), ref: 00B3D2B2
                        • FindClose.KERNEL32(00000000,?,?,?), ref: 00B3D253
                        • FindClose.KERNEL32(00000000), ref: 00B3D264
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                        • String ID: \*.*
                        • API String ID: 1946585618-1173974218
                        • Opcode ID: ea2e1c2d6196a0ceaf438e04cfd5e7b03edf40c15580419db0c24d7526f05f77
                        • Instruction ID: 0afdfe1c2c1d3f9495281fe88cdb77db81f9c932c181dc24e1ec23830f5604c6
                        • Opcode Fuzzy Hash: ea2e1c2d6196a0ceaf438e04cfd5e7b03edf40c15580419db0c24d7526f05f77
                        • Instruction Fuzzy Hash: FB614C3190110DABCF05EBE0EE929EEB7B5AF15300F3441A6E41677291EB31AF09DB61
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                        • String ID:
                        • API String ID: 1737998785-0
                        • Opcode ID: f87ae518f6bba34dded447c9610f73564d45db54b37534bfb38538dede056baf
                        • Instruction ID: 49d03970bd03a24fa7e9b36cf7e50664bc556dcfe8cf24b4067339a4c027445c
                        • Opcode Fuzzy Hash: f87ae518f6bba34dded447c9610f73564d45db54b37534bfb38538dede056baf
                        • Instruction Fuzzy Hash: F341B035604611AFD710DF15D888F29BBE1FF48328F14C099E4668B7A2CB75EE41CB90
                        APIs
                          • Part of subcall function 00B316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B3170D
                          • Part of subcall function 00B316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B3173A
                          • Part of subcall function 00B316C3: GetLastError.KERNEL32 ref: 00B3174A
                        • ExitWindowsEx.USER32(?,00000000), ref: 00B3E932
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                        • String ID: $ $@$SeShutdownPrivilege
                        • API String ID: 2234035333-3163812486
                        • Opcode ID: 9e15a641511fe86032e57524b0729f279ac2c7242a778aff89a15b1d817c30af
                        • Instruction ID: 7d2d0a5ab210d3056305c86be3134cd423b13a444d084fd2f2e612ca1b25c1af
                        • Opcode Fuzzy Hash: 9e15a641511fe86032e57524b0729f279ac2c7242a778aff89a15b1d817c30af
                        • Instruction Fuzzy Hash: E401D672610211BBEB5426B89C8ABBB76DCE714750F354AA3FC23E31D2DAB4DC408394
                        APIs
                        • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00B51276
                        • WSAGetLastError.WSOCK32 ref: 00B51283
                        • bind.WSOCK32(00000000,?,00000010), ref: 00B512BA
                        • WSAGetLastError.WSOCK32 ref: 00B512C5
                        • closesocket.WSOCK32(00000000), ref: 00B512F4
                        • listen.WSOCK32(00000000,00000005), ref: 00B51303
                        • WSAGetLastError.WSOCK32 ref: 00B5130D
                        • closesocket.WSOCK32(00000000), ref: 00B5133C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$closesocket$bindlistensocket
                        • String ID:
                        • API String ID: 540024437-0
                        • Opcode ID: 0fcfd83a45bab46dfd09b2ab7e2c2d040809d79c51935a3cb427dad27234d9e3
                        • Instruction ID: 8ac23f3c0ecf7d16bf1c31d888a787edf6912e43c34a8d1d43e11662a151e6d5
                        • Opcode Fuzzy Hash: 0fcfd83a45bab46dfd09b2ab7e2c2d040809d79c51935a3cb427dad27234d9e3
                        • Instruction Fuzzy Hash: A4418D31600201AFD720DF28C488B29BBE5EF86319F1885C9E8568F2D2C775ED85CBE1
                        APIs
                          • Part of subcall function 00AD3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AD3A97,?,?,00AD2E7F,?,?,?,00000000), ref: 00AD3AC2
                          • Part of subcall function 00B3E199: GetFileAttributesW.KERNEL32(?,00B3CF95), ref: 00B3E19A
                        • FindFirstFileW.KERNEL32(?,?), ref: 00B3D420
                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00B3D470
                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B3D481
                        • FindClose.KERNEL32(00000000), ref: 00B3D498
                        • FindClose.KERNEL32(00000000), ref: 00B3D4A1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                        • String ID: \*.*
                        • API String ID: 2649000838-1173974218
                        • Opcode ID: bce91aa5c6d18b8c4ef1d758159389c5091fe637da95002bd984c6b0cf2fdb8d
                        • Instruction ID: 6c02875eca91efcfb58b67da749d4aa822db687442b8b43be2b68272a9a7258e
                        • Opcode Fuzzy Hash: bce91aa5c6d18b8c4ef1d758159389c5091fe637da95002bd984c6b0cf2fdb8d
                        • Instruction Fuzzy Hash: 943181310083419FC301EF64D9918AFB7E8BEA1304F544A5EF4E693291EB30EA09D763
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: dd96114b3a77f1a81df7fefe622ee118c2ba6afebdbfcaca5e1692894021f89a
                        • Instruction ID: 939b41b9c6707bd1467d67caadb8efc2e4844150540cf6a4a6f3a3ca41bac705
                        • Opcode Fuzzy Hash: dd96114b3a77f1a81df7fefe622ee118c2ba6afebdbfcaca5e1692894021f89a
                        • Instruction Fuzzy Hash: A1C22971E086298FDB35CE289D407EABBF5EB48314F1445EAD85DE7280E775AE818F40
                        APIs
                        • _wcslen.LIBCMT ref: 00B464DC
                        • CoInitialize.OLE32(00000000), ref: 00B46639
                        • CoCreateInstance.OLE32(00B6FCF8,00000000,00000001,00B6FB68,?), ref: 00B46650
                        • CoUninitialize.OLE32 ref: 00B468D4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                        • String ID: .lnk
                        • API String ID: 886957087-24824748
                        • Opcode ID: 90f31664f44868fbc306f56e7d578fab58b8d9281e83133bd653f43a30b78e6b
                        • Instruction ID: c8bcd4f823b36ef601ef4d19776085329f8a1e5691fc05ce620d6724a9418437
                        • Opcode Fuzzy Hash: 90f31664f44868fbc306f56e7d578fab58b8d9281e83133bd653f43a30b78e6b
                        • Instruction Fuzzy Hash: 06D14B71508301AFC314DF24C9819ABB7E8FF99704F54496EF5968B2A1EB70EE05CB92
                        APIs
                        • GetForegroundWindow.USER32(?,?,00000000), ref: 00B522E8
                          • Part of subcall function 00B4E4EC: GetWindowRect.USER32(?,?), ref: 00B4E504
                        • GetDesktopWindow.USER32 ref: 00B52312
                        • GetWindowRect.USER32(00000000), ref: 00B52319
                        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00B52355
                        • GetCursorPos.USER32(?), ref: 00B52381
                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00B523DF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$Rectmouse_event$CursorDesktopForeground
                        • String ID:
                        • API String ID: 2387181109-0
                        • Opcode ID: ba248f1f5e2378a40f6f4d41be57ee817c6252482d0ae17f6091e12fb0d9737c
                        • Instruction ID: a03a0403cbf176bd39988948e33c30fe15289a9b1cc26d95e3cabf8264b35328
                        • Opcode Fuzzy Hash: ba248f1f5e2378a40f6f4d41be57ee817c6252482d0ae17f6091e12fb0d9737c
                        • Instruction Fuzzy Hash: 36310072505305AFCB20DF54CC49B6BBBE9FF85310F000A9AF995A7181DB74EA08CB96
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00B49B78
                        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00B49C8B
                          • Part of subcall function 00B43874: GetInputState.USER32 ref: 00B438CB
                          • Part of subcall function 00B43874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B43966
                        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00B49BA8
                        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00B49C75
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                        • String ID: *.*
                        • API String ID: 1972594611-438819550
                        • Opcode ID: 3cecffc0f71332b8ed8b3331e1f7edd35eab6464b6461c467a760ccd787aa5b8
                        • Instruction ID: 394025b5134e5b5555b80d16bceb14a0a2182ef55ea64878bae4faabb6ec0e99
                        • Opcode Fuzzy Hash: 3cecffc0f71332b8ed8b3331e1f7edd35eab6464b6461c467a760ccd787aa5b8
                        • Instruction Fuzzy Hash: 5A413F7194420AAFCF14DFA4C985AEEBBF4EF05311F244196E805A6291EB309F44DF61
                        APIs
                          • Part of subcall function 00AE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AE9BB2
                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00AE9A4E
                        • GetSysColor.USER32(0000000F), ref: 00AE9B23
                        • SetBkColor.GDI32(?,00000000), ref: 00AE9B36
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Color$LongProcWindow
                        • String ID:
                        • API String ID: 3131106179-0
                        • Opcode ID: e1687fd11670883898b02e48aadc1b3260a10b351c50611378a10447ea35485f
                        • Instruction ID: a433480cb20cbda982f8aa0aad5a7c094ac58d8f01f7b5a98046ccc736bb27f8
                        • Opcode Fuzzy Hash: e1687fd11670883898b02e48aadc1b3260a10b351c50611378a10447ea35485f
                        • Instruction Fuzzy Hash: E9A15C701487A0BEE725AB3E9C99D7B36EDDF42384F140169F406C76A1CE299D02C27A
                        APIs
                          • Part of subcall function 00B5304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00B5307A
                          • Part of subcall function 00B5304E: _wcslen.LIBCMT ref: 00B5309B
                        • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00B5185D
                        • WSAGetLastError.WSOCK32 ref: 00B51884
                        • bind.WSOCK32(00000000,?,00000010), ref: 00B518DB
                        • WSAGetLastError.WSOCK32 ref: 00B518E6
                        • closesocket.WSOCK32(00000000), ref: 00B51915
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 1601658205-0
                        • Opcode ID: fdfaaa6395c44dd6525c8a83783bb739258b6c6117038faa8838f044cf3c3550
                        • Instruction ID: fd48c6a662c8d700a917c447e14bc201f51178366f228fca41b47a07ef882b2e
                        • Opcode Fuzzy Hash: fdfaaa6395c44dd6525c8a83783bb739258b6c6117038faa8838f044cf3c3550
                        • Instruction Fuzzy Hash: E851D471A00200AFD720AF24C986F7A77E5EB44718F488499F9469F3C3D775AD41CBA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                        • String ID:
                        • API String ID: 292994002-0
                        • Opcode ID: 2545a1b63f3cbc48933f928d3f6864b24593fa83fbca04b1c69dacde2d162049
                        • Instruction ID: d9d10ec8ba3111980259ae51d5e13f5f7a208327fd75979be78e221f5e469f52
                        • Opcode Fuzzy Hash: 2545a1b63f3cbc48933f928d3f6864b24593fa83fbca04b1c69dacde2d162049
                        • Instruction Fuzzy Hash: 6321D6317406015FD7208F1EC884B6A7BE5EF95314B1C88A9E846CF391CB79DC42CB90
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                        • API String ID: 0-1546025612
                        • Opcode ID: 2f53c450ad5f6ea002288584e957e6ccf831008e06da1fa0f8fb2f49af3d270e
                        • Instruction ID: 37efbe893a74dc9a6685112609272342841136f8f3ef309cd0d5811d58a769a1
                        • Opcode Fuzzy Hash: 2f53c450ad5f6ea002288584e957e6ccf831008e06da1fa0f8fb2f49af3d270e
                        • Instruction Fuzzy Hash: E4A23B71A0061ACBDF24CF58C9847EEB7B1FB54314F6481AAE816AB385DB749DC1CB90
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00B5A6AC
                        • Process32FirstW.KERNEL32(00000000,?), ref: 00B5A6BA
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                        • Process32NextW.KERNEL32(00000000,?), ref: 00B5A79C
                        • CloseHandle.KERNEL32(00000000), ref: 00B5A7AB
                          • Part of subcall function 00AECE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00B13303,?), ref: 00AECE8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                        • String ID:
                        • API String ID: 1991900642-0
                        • Opcode ID: 79fbfaff258efddf5c3de264bd8d4938c6784a1f56afdf5fdca5ac3227f7af55
                        • Instruction ID: 46ddebb038eff86b3e947f59a097dea590f9c8f3b408f38dabcea66948c7aaa0
                        • Opcode Fuzzy Hash: 79fbfaff258efddf5c3de264bd8d4938c6784a1f56afdf5fdca5ac3227f7af55
                        • Instruction Fuzzy Hash: 9E517D715083009FC710EF24D986E6BBBE8FF89754F00495EF99AA7291EB70D904CB92
                        APIs
                        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00B3AAAC
                        • SetKeyboardState.USER32(00000080), ref: 00B3AAC8
                        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00B3AB36
                        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00B3AB88
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: cf4ec4ffe32b93d5442879376d161e06caa36d2d985cbecdf6cba554ed6d03b9
                        • Instruction ID: 262466bc0001ec2cdca30f793308eaa77b328a060418f97070f2549534a90061
                        • Opcode Fuzzy Hash: cf4ec4ffe32b93d5442879376d161e06caa36d2d985cbecdf6cba554ed6d03b9
                        • Instruction Fuzzy Hash: 84312630A40248AEFB30DB64CC05BFABBEAEB44310F34429AF1C1961D1E7749981C762
                        APIs
                        • _free.LIBCMT ref: 00B0BB7F
                          • Part of subcall function 00B029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00B0D7D1,00000000,00000000,00000000,00000000,?,00B0D7F8,00000000,00000007,00000000,?,00B0DBF5,00000000), ref: 00B029DE
                          • Part of subcall function 00B029C8: GetLastError.KERNEL32(00000000,?,00B0D7D1,00000000,00000000,00000000,00000000,?,00B0D7F8,00000000,00000007,00000000,?,00B0DBF5,00000000,00000000), ref: 00B029F0
                        • GetTimeZoneInformation.KERNEL32 ref: 00B0BB91
                        • WideCharToMultiByte.KERNEL32(00000000,?,00BA121C,000000FF,?,0000003F,?,?), ref: 00B0BC09
                        • WideCharToMultiByte.KERNEL32(00000000,?,00BA1270,000000FF,?,0000003F,?,?,?,00BA121C,000000FF,?,0000003F,?,?), ref: 00B0BC36
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                        • String ID:
                        • API String ID: 806657224-0
                        • Opcode ID: c4faa7d52ee991967ad8beb232b465d6e1f14aca76874df78d200526f74614a5
                        • Instruction ID: ceabf92eec5c35e91eb18a421a168cb2afd940a6643f8d73b209a6d6b9070058
                        • Opcode Fuzzy Hash: c4faa7d52ee991967ad8beb232b465d6e1f14aca76874df78d200526f74614a5
                        • Instruction Fuzzy Hash: 02319A71908245EFDB15DF698C81A69BFF8FF46350B144AAAE061EB2E1DB309E40CB50
                        APIs
                        • InternetReadFile.WININET(?,?,00000400,?), ref: 00B4CE89
                        • GetLastError.KERNEL32(?,00000000), ref: 00B4CEEA
                        • SetEvent.KERNEL32(?,?,00000000), ref: 00B4CEFE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorEventFileInternetLastRead
                        • String ID:
                        • API String ID: 234945975-0
                        • Opcode ID: 599f3fe8de3588a6309f6d8aa39776429eb632bd9bd02df685786474a853d8d2
                        • Instruction ID: 5b92cb61caaebdbb6b668627a9f8dd99eb84eb8963ecb7f5dc9b971eb07050e6
                        • Opcode Fuzzy Hash: 599f3fe8de3588a6309f6d8aa39776429eb632bd9bd02df685786474a853d8d2
                        • Instruction Fuzzy Hash: 1221CF71541305ABDB60DFA5C988BA7BBFCEB00B54F10446EE686D2151EB74EE08AB50
                        APIs
                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00B382AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: lstrlen
                        • String ID: ($|
                        • API String ID: 1659193697-1631851259
                        • Opcode ID: 769275a773dc3320ac4b665a12e055d69af794440a80aa701483f6d6095414bd
                        • Instruction ID: a38187c5d562ae0560645ecfd121d80a12edba89e0865d668f82000b2e912b2a
                        • Opcode Fuzzy Hash: 769275a773dc3320ac4b665a12e055d69af794440a80aa701483f6d6095414bd
                        • Instruction Fuzzy Hash: 02322575A00705DFCB28CF59C481A6AB7F1FF48710B2585AEE49ADB3A1EB70E941CB44
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00B45CC1
                        • FindNextFileW.KERNEL32(00000000,?), ref: 00B45D17
                        • FindClose.KERNEL32(?), ref: 00B45D5F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Find$File$CloseFirstNext
                        • String ID:
                        • API String ID: 3541575487-0
                        • Opcode ID: 98ebb99452f522314ba9aa318bd2c7ef71b23ae991fd9e4b0ac44207c92155db
                        • Instruction ID: b0ac5a5d07e065423ff9cb4b77948c69ded24fc3368c9cf72a0602c589f5a77a
                        • Opcode Fuzzy Hash: 98ebb99452f522314ba9aa318bd2c7ef71b23ae991fd9e4b0ac44207c92155db
                        • Instruction Fuzzy Hash: F5516D75A04A019FC714DF28C494E96B7E4FF49314F1485AEE99A8B3A2DB30EE44CB91
                        APIs
                        • IsDebuggerPresent.KERNEL32 ref: 00B0271A
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00B02724
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 00B02731
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: 82619287a0f48510643bdfff43a0a50501aa79917c3f8d7cd33f8c1f90848fbe
                        • Instruction ID: c652f99a8131728d580864f15aaa90b9593c870d9597c3ba710721fe1b8f884a
                        • Opcode Fuzzy Hash: 82619287a0f48510643bdfff43a0a50501aa79917c3f8d7cd33f8c1f90848fbe
                        • Instruction Fuzzy Hash: B131C47491121C9BCB21DF64DD88B99BBB8BF08310F5041EAE90CA72A1EB749F858F44
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00B451DA
                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00B45238
                        • SetErrorMode.KERNEL32(00000000), ref: 00B452A1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$DiskFreeSpace
                        • String ID:
                        • API String ID: 1682464887-0
                        • Opcode ID: 625157faa5948e002f42102b730192d750eecd8a9b942192cffe856016fe3297
                        • Instruction ID: abd251d7d2e6c75e8cc4401f87e37a847b402db803f54a274d05e482653dc6e3
                        • Opcode Fuzzy Hash: 625157faa5948e002f42102b730192d750eecd8a9b942192cffe856016fe3297
                        • Instruction Fuzzy Hash: 05317C35A00618DFDB00DF94D884EADBBF4FF09314F04809AE846AB3A2DB71E945CB90
                        APIs
                          • Part of subcall function 00AEFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00AF0668
                          • Part of subcall function 00AEFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00AF0685
                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B3170D
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B3173A
                        • GetLastError.KERNEL32 ref: 00B3174A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                        • String ID:
                        • API String ID: 577356006-0
                        • Opcode ID: 3247a9d3c79cc5b9e0ba1cb90027c156d8a073cee0378dd56a4fc800e2092a6e
                        • Instruction ID: 58747da7194078224efd1191359e519bbd3c40fc6cafa020d669be0b5748912d
                        • Opcode Fuzzy Hash: 3247a9d3c79cc5b9e0ba1cb90027c156d8a073cee0378dd56a4fc800e2092a6e
                        • Instruction Fuzzy Hash: D611C1B2404305AFD718AF54DCC6D6ABBFDEB04754B24856EE05653281EB70BC418A24
                        APIs
                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00B3D608
                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00B3D645
                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00B3D650
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CloseControlCreateDeviceFileHandle
                        • String ID:
                        • API String ID: 33631002-0
                        • Opcode ID: 34293009fc38e71d2a574d9a26cec81961daea56b874a78dc49ca0093cca2dd5
                        • Instruction ID: d51ce9c93af3b88e9eac6c9eeb1f4cfa37cb6ad2144907d05a1ed08f6e6ac3b5
                        • Opcode Fuzzy Hash: 34293009fc38e71d2a574d9a26cec81961daea56b874a78dc49ca0093cca2dd5
                        • Instruction Fuzzy Hash: 17118E71E01228BFDB108F95EC45FAFBFBCEB45B50F108161F914E7290C6B04A058BA1
                        APIs
                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00B3168C
                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00B316A1
                        • FreeSid.ADVAPI32(?), ref: 00B316B1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: AllocateCheckFreeInitializeMembershipToken
                        • String ID:
                        • API String ID: 3429775523-0
                        • Opcode ID: 1025be7f4793378445570eccd66a8f9183a69ff2e10b021313d7002bf66131c3
                        • Instruction ID: 3ad68002b2493079dac26c49579ffc668c8a9e60e1d3d33ff404549937e42cc4
                        • Opcode Fuzzy Hash: 1025be7f4793378445570eccd66a8f9183a69ff2e10b021313d7002bf66131c3
                        • Instruction Fuzzy Hash: DDF0F471950309FBDB00DFE49D89AAEBBBCEB08604F5049A5E501E2181EB74AA448A50
                        APIs
                        • GetCurrentProcess.KERNEL32(00B028E9,?,00AF4CBE,00B028E9,00B988B8,0000000C,00AF4E15,00B028E9,00000002,00000000,?,00B028E9), ref: 00AF4D09
                        • TerminateProcess.KERNEL32(00000000,?,00AF4CBE,00B028E9,00B988B8,0000000C,00AF4E15,00B028E9,00000002,00000000,?,00B028E9), ref: 00AF4D10
                        • ExitProcess.KERNEL32 ref: 00AF4D22
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: 293403c80bf1c7c9dd77879cfc9bebc58b325f36f90b2242b04cb745bd0cde3e
                        • Instruction ID: 701d9a409fdf35cfcb2794178f05e8e20bd74764a89d61cd775406212e4d05a8
                        • Opcode Fuzzy Hash: 293403c80bf1c7c9dd77879cfc9bebc58b325f36f90b2242b04cb745bd0cde3e
                        • Instruction Fuzzy Hash: 95E0B631000148AFDF11AF94DE09A6A3F69EB89781B104024FE559B262DB79DD42CA84
                        APIs
                        • GetUserNameW.ADVAPI32(?,?), ref: 00B2D28C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: NameUser
                        • String ID: X64
                        • API String ID: 2645101109-893830106
                        • Opcode ID: 91e8d76219733870dc9a63a148d43232db3a0fcc39f97c7d43cb150c1c35eff7
                        • Instruction ID: 59ea61d1e1856a67cc3d289503bcff6acb5781cd5a49f6bb726e8306ec0ded1b
                        • Opcode Fuzzy Hash: 91e8d76219733870dc9a63a148d43232db3a0fcc39f97c7d43cb150c1c35eff7
                        • Instruction Fuzzy Hash: 2FD0CAB480112DEACB90CBA0ECC8DEAB7BCBB04305F200292F10AA2040DB7496488F20
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                        • Instruction ID: 263d6620200be09721a602d42eb6aa948300132c6208c7f4931fddb0ed253fda
                        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                        • Instruction Fuzzy Hash: 9D021D71E0021D9BDF14CFAAC9806ADFBF1EF48324F258169E919E7384D731AA41CB94
                        APIs
                        • FindFirstFileW.KERNEL32(?,?), ref: 00B46918
                        • FindClose.KERNEL32(00000000), ref: 00B46961
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID:
                        • API String ID: 2295610775-0
                        • Opcode ID: 5a7b8dc7d59b402a2d07b4ecd7a1ef6049398264c90333b111d6eaf442867a9d
                        • Instruction ID: 962f8a8a611c1c143373055301922351dff672cf39a31a867c4199a2c201766d
                        • Opcode Fuzzy Hash: 5a7b8dc7d59b402a2d07b4ecd7a1ef6049398264c90333b111d6eaf442867a9d
                        • Instruction Fuzzy Hash: 941193316042119FC710DF29D484A16BBE5FF89328F54C699E8698F3A2CB74ED05CB91
                        APIs
                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00B54891,?,?,00000035,?), ref: 00B437E4
                        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00B54891,?,?,00000035,?), ref: 00B437F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorFormatLastMessage
                        • String ID:
                        • API String ID: 3479602957-0
                        • Opcode ID: 7eabd6efd6b569628a3517945410b40a73cb5f6970f907a147601ec784823c43
                        • Instruction ID: f19ad9129884116154d4e1c0119fa4ecd2c4b9b8d189f25bc7a8e70ec5293c95
                        • Opcode Fuzzy Hash: 7eabd6efd6b569628a3517945410b40a73cb5f6970f907a147601ec784823c43
                        • Instruction Fuzzy Hash: 2CF0E5B06052283AE72017668C4DFEB3BEEEFC5B61F0001A5F509D32C1D9A09E44C6B1
                        APIs
                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B311FC), ref: 00B310D4
                        • CloseHandle.KERNEL32(?,?,00B311FC), ref: 00B310E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: AdjustCloseHandlePrivilegesToken
                        • String ID:
                        • API String ID: 81990902-0
                        • Opcode ID: fc5cd2543ea569587ccad5cf71ea999016c8fc14e7d4fc339c3987c04dba68a9
                        • Instruction ID: a41498c0cec0c2f6331f53530ec0844e14313ca34ba8b87848896956d51a4940
                        • Opcode Fuzzy Hash: fc5cd2543ea569587ccad5cf71ea999016c8fc14e7d4fc339c3987c04dba68a9
                        • Instruction Fuzzy Hash: 93E04F32008640AEE7252B16FC05E777BE9EB04310F20882DF4A5814B1DBA26C90DB14
                        Strings
                        • Variable is not of type 'Object'., xrefs: 00B20C40
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: Variable is not of type 'Object'.
                        • API String ID: 0-1840281001
                        • Opcode ID: 6bb9dac22936727cf7af316778b03a1c32d46fd095abc9f79e41c797047b7828
                        • Instruction ID: 2a6c56898d743b93d1ede6371691cc072b218b02f5a50e9262498c1a0811cf4c
                        • Opcode Fuzzy Hash: 6bb9dac22936727cf7af316778b03a1c32d46fd095abc9f79e41c797047b7828
                        • Instruction Fuzzy Hash: A5329D74910219DBCF14EF94D980AEDB7B5FF09314F50409AE80BAB392DB75AE45CB60
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00B06766,?,?,00000008,?,?,00B0FEFE,00000000), ref: 00B06998
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: 951d5fb60a66a75d683adb2725b5c58fc598c86842c3a34edca86dde7cd36ef5
                        • Instruction ID: 90347daf6343af8b1096aef153b145ce342c59f24ab13c79494b9d14c618850f
                        • Opcode Fuzzy Hash: 951d5fb60a66a75d683adb2725b5c58fc598c86842c3a34edca86dde7cd36ef5
                        • Instruction Fuzzy Hash: 52B1F6316106099FD719CF28C48AB657FE0FF49364F258699E899CF2E2C735E9A1CB40
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID: 0-3916222277
                        • Opcode ID: da9a85c8ed1575985eaf71114f19eeacb9220a6d9bf18685cebc0e249b25d354
                        • Instruction ID: 53abcb464ac4ea2b31b40cdd327b367b2e2fbd143fabbde73fab727d77083c74
                        • Opcode Fuzzy Hash: da9a85c8ed1575985eaf71114f19eeacb9220a6d9bf18685cebc0e249b25d354
                        • Instruction Fuzzy Hash: 7C126E71910229DBCB24CF59D8816EEB7F5FF48710F14819AE849EB255EB349E81CFA0
                        APIs
                        • BlockInput.USER32(00000001), ref: 00B4EABD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: BlockInput
                        • String ID:
                        • API String ID: 3456056419-0
                        • Opcode ID: 98c522d64ddcf014deca7d121f70dbdd15dbb529f6b4f8d2fb55e1e3838f3d70
                        • Instruction ID: 1c975804d8b6159e71d7572be2b402a78f8cac52753f503068b4259c0ece1211
                        • Opcode Fuzzy Hash: 98c522d64ddcf014deca7d121f70dbdd15dbb529f6b4f8d2fb55e1e3838f3d70
                        • Instruction Fuzzy Hash: CAE01A312102059FC710EF59D844E9ABBE9FF98760F008456FD5AC73A1DBB0E9408BA0
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00AF03EE), ref: 00AF09DA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 2303c20dd7fdb31d6471cab582e1460cd7c930ec52bc9a1f1acdf26037bd2706
                        • Instruction ID: acafc49cfdc64c1eec355cd27ba6c0ca8872cc9e6f9d4bca916e6dc81576a9f4
                        • Opcode Fuzzy Hash: 2303c20dd7fdb31d6471cab582e1460cd7c930ec52bc9a1f1acdf26037bd2706
                        • Instruction Fuzzy Hash:
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: 0
                        • API String ID: 0-4108050209
                        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                        • Instruction ID: 3d4f0f83ae1a9b873c1df547f82256a8b85f3678cdfcd862e390363db9cfeb67
                        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                        • Instruction Fuzzy Hash: 1451687160C70D5BDB388BE8899DBBE67E59B123C0F180509FB82D7282C655DE82D3D2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5f38659c8fded2c9a924ba3ee1118c376dd7cdf1b84919724801fb0f1c94ce28
                        • Instruction ID: ac2da53aa4331d3f59071776f0ff0f9da4a04c6e25579e11e0bd9ef8c2968d17
                        • Opcode Fuzzy Hash: 5f38659c8fded2c9a924ba3ee1118c376dd7cdf1b84919724801fb0f1c94ce28
                        • Instruction Fuzzy Hash: CF32F022D69F014DD7239634CC22325AA89EFB73C5F15D777E81AB6AA6EF29D4C34100
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 27bc5a0e2e3f58efdcbf6e63514351c960a5c89805d292c79d34ef85f2fe374e
                        • Instruction ID: a486e5986906b181b096ae587897d2ae6ce2edf349da04b248b434ebca10b3f5
                        • Opcode Fuzzy Hash: 27bc5a0e2e3f58efdcbf6e63514351c960a5c89805d292c79d34ef85f2fe374e
                        • Instruction Fuzzy Hash: 44320731A001A98BCF28CF29E4D4A7D7FE1EB85310F3985AAE45D9B295D730DD82DB41
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 806eae9a1354c1b64a51a8247e66fec968bb93301b85b10c7bee92e5ab706dbd
                        • Instruction ID: 9e32618d04493fb73fd4d3e58dc723d40bed7f1ff51d25811e7e1ddb568eb586
                        • Opcode Fuzzy Hash: 806eae9a1354c1b64a51a8247e66fec968bb93301b85b10c7bee92e5ab706dbd
                        • Instruction Fuzzy Hash: F6229C70A04609DFDF14CFA5D981AEEB7F6FF44300F60466AE816A7391EB36A950CB50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c96f97511f9f423612f02171fc1cb5fbd4217b1013d2c050067bc33367b49822
                        • Instruction ID: 630de6c33398e2a3f341d10c623597d1199f04a67a6b200c82be416130c78046
                        • Opcode Fuzzy Hash: c96f97511f9f423612f02171fc1cb5fbd4217b1013d2c050067bc33367b49822
                        • Instruction Fuzzy Hash: B10292B1A00209EFDB04DF55D981AEEB7F1FF44300F6081A9E8169B391EB31EA51CB95
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5e2c8faa220d2d89c35ef1d5661821f2480596ae1b1c6df0b121e5d6aa666eff
                        • Instruction ID: 382e1c9cb95ec047561b0d1947bfe645be9791e3d792d16c1cf4bce42706d030
                        • Opcode Fuzzy Hash: 5e2c8faa220d2d89c35ef1d5661821f2480596ae1b1c6df0b121e5d6aa666eff
                        • Instruction Fuzzy Hash: 45B1F320D2AF414DC22396398831336BA9CAFBB6D5F52D71BFC1A75D62EF2286C35141
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                        • Instruction ID: 40f927280493fa9e4c0f9afd0ae0b0c8c4fbe5183708b3b59ac9589e16927372
                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                        • Instruction Fuzzy Hash: 3E9187726080A78ADB2947BE857403EFFF15A923A131A079EF5F2CB1C5FE24C954D620
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                        • Instruction ID: a9a4f2fc90d09a51c13d07be440035fb3b5e77454077a5d2ec0e84b0eb36d1ca
                        • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                        • Instruction Fuzzy Hash: 2B9177732090A749DB2D43BA857413DFFF15A923A131A079EF5F2CB1C5EE248954E724
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                        • Instruction ID: a5db4f82887d741cd483975f232b230e5517c8d5956b3040cede77fd0bc6258c
                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                        • Instruction Fuzzy Hash: C99131722090A7CADB2D47BA857403EFFF15A923A231A079EF5F2CA1C5FE24C5559620
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4a17d1279fa7f6689b23573df6204397ffbf66e2a4bf84c5ce92655f21ede73a
                        • Instruction ID: 2154f5dbcdf3479dc0bd17dade51bdd70674a2ef2afe98c574208dd557ed18d6
                        • Opcode Fuzzy Hash: 4a17d1279fa7f6689b23573df6204397ffbf66e2a4bf84c5ce92655f21ede73a
                        • Instruction Fuzzy Hash: FD61487120C70D96EE34ABEC8D95BBE63A4DF42780F14091EFB83DB281DA659E42C355
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bf427220efbc8e410b57a69291966d119fdc60e036259b8e97d30b028b9f6b07
                        • Instruction ID: b94369970b7315c1fac4fea7fdef3b500a12e7d6ac5388612ce92874373f30ac
                        • Opcode Fuzzy Hash: bf427220efbc8e410b57a69291966d119fdc60e036259b8e97d30b028b9f6b07
                        • Instruction Fuzzy Hash: F361CC3120870D57DE388BE89991BBF2398EF02744F90095AFB43CB281DA56DD42CB51
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                        • Instruction ID: 1eae899dda3bc7d99eeb9cf2521cf30e3ddd5ab7e2976fc12d3111027d185498
                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                        • Instruction Fuzzy Hash: D78195326080E78DDB2D83BA857443EFFE15A923A131A079DF5F6CB1C1EE24D554E660
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b2ed0e31286c98fcb88becd3cd6bf6ae29ab2c2ebaf46d435423bb7f9e340781
                        • Instruction ID: 72d44aee2e36fdcd14fad4f262a78991424a1ed074a893f813686fc9547c0b12
                        • Opcode Fuzzy Hash: b2ed0e31286c98fcb88becd3cd6bf6ae29ab2c2ebaf46d435423bb7f9e340781
                        • Instruction Fuzzy Hash: 6221A5326216158BD728CF7DC82367A73E5A754310F55866EE4A7C37D0DE36A904DB80
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 00B52B30
                        • DeleteObject.GDI32(00000000), ref: 00B52B43
                        • DestroyWindow.USER32 ref: 00B52B52
                        • GetDesktopWindow.USER32 ref: 00B52B6D
                        • GetWindowRect.USER32(00000000), ref: 00B52B74
                        • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00B52CA3
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00B52CB1
                        • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B52CF8
                        • GetClientRect.USER32(00000000,?), ref: 00B52D04
                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00B52D40
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B52D62
                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B52D75
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B52D80
                        • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B52D89
                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B52D98
                        • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B52DA1
                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B52DA8
                        • GlobalFree.KERNEL32(00000000), ref: 00B52DB3
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B52DC5
                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00B6FC38,00000000), ref: 00B52DDB
                        • GlobalFree.KERNEL32(00000000), ref: 00B52DEB
                        • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00B52E11
                        • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00B52E30
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B52E52
                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B5303F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                        • String ID: $AutoIt v3$DISPLAY$static
                        • API String ID: 2211948467-2373415609
                        • Opcode ID: a5d4927c77f58d18a6010f7b36ad55eaec0eefa38e53e3e96084aab8098e1f0c
                        • Instruction ID: 7433bca378d113c8faaae1bf1f62af1a5925080792e3acee730da5b7c83cabc0
                        • Opcode Fuzzy Hash: a5d4927c77f58d18a6010f7b36ad55eaec0eefa38e53e3e96084aab8098e1f0c
                        • Instruction Fuzzy Hash: D4029C71900205EFDB14DF64DD89EAE7BB9FF49311F048599F916AB2A1CB74AD00CB60
                        APIs
                        • SetTextColor.GDI32(?,00000000), ref: 00B6712F
                        • GetSysColorBrush.USER32(0000000F), ref: 00B67160
                        • GetSysColor.USER32(0000000F), ref: 00B6716C
                        • SetBkColor.GDI32(?,000000FF), ref: 00B67186
                        • SelectObject.GDI32(?,?), ref: 00B67195
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00B671C0
                        • GetSysColor.USER32(00000010), ref: 00B671C8
                        • CreateSolidBrush.GDI32(00000000), ref: 00B671CF
                        • FrameRect.USER32(?,?,00000000), ref: 00B671DE
                        • DeleteObject.GDI32(00000000), ref: 00B671E5
                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00B67230
                        • FillRect.USER32(?,?,?), ref: 00B67262
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B67284
                          • Part of subcall function 00B673E8: GetSysColor.USER32(00000012), ref: 00B67421
                          • Part of subcall function 00B673E8: SetTextColor.GDI32(?,?), ref: 00B67425
                          • Part of subcall function 00B673E8: GetSysColorBrush.USER32(0000000F), ref: 00B6743B
                          • Part of subcall function 00B673E8: GetSysColor.USER32(0000000F), ref: 00B67446
                          • Part of subcall function 00B673E8: GetSysColor.USER32(00000011), ref: 00B67463
                          • Part of subcall function 00B673E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B67471
                          • Part of subcall function 00B673E8: SelectObject.GDI32(?,00000000), ref: 00B67482
                          • Part of subcall function 00B673E8: SetBkColor.GDI32(?,00000000), ref: 00B6748B
                          • Part of subcall function 00B673E8: SelectObject.GDI32(?,?), ref: 00B67498
                          • Part of subcall function 00B673E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00B674B7
                          • Part of subcall function 00B673E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B674CE
                          • Part of subcall function 00B673E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00B674DB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                        • String ID:
                        • API String ID: 4124339563-0
                        • Opcode ID: e543e5e24a7731b47bacf9b897a5db0960a44bcc415595dbbc995b6e3b984503
                        • Instruction ID: 9ccbc588462c18786cbff73ab5517ae60e624f1d3b02279b0549d5cf152970e2
                        • Opcode Fuzzy Hash: e543e5e24a7731b47bacf9b897a5db0960a44bcc415595dbbc995b6e3b984503
                        • Instruction Fuzzy Hash: 66A19272008301AFDB009F64DC49E6B7BE9FF49324F100A19F9A2A71E1DBB9E944CB51
                        APIs
                        • DestroyWindow.USER32(?,?), ref: 00AE8E14
                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00B26AC5
                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00B26AFE
                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00B26F43
                          • Part of subcall function 00AE8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AE8BE8,?,00000000,?,?,?,?,00AE8BBA,00000000,?), ref: 00AE8FC5
                        • SendMessageW.USER32(?,00001053), ref: 00B26F7F
                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00B26F96
                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00B26FAC
                        • ImageList_Destroy.COMCTL32(00000000,?), ref: 00B26FB7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                        • String ID: 0
                        • API String ID: 2760611726-4108050209
                        • Opcode ID: 8d28efe1172b4344a75cbe6f056138120b8fafc253a14820de86ff5bf9beaccd
                        • Instruction ID: e8aa224dec50f3ded8c910327e4b1ce7b611bc4a732ed03338826a2a4ba76bb8
                        • Opcode Fuzzy Hash: 8d28efe1172b4344a75cbe6f056138120b8fafc253a14820de86ff5bf9beaccd
                        • Instruction Fuzzy Hash: A512BE30200261DFDB25DF18E995BB6BBF1FB45300F1444A9F4898B2A1CB79EC52DB91
                        APIs
                        • DestroyWindow.USER32(00000000), ref: 00B5273E
                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00B5286A
                        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00B528A9
                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00B528B9
                        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00B52900
                        • GetClientRect.USER32(00000000,?), ref: 00B5290C
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00B52955
                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00B52964
                        • GetStockObject.GDI32(00000011), ref: 00B52974
                        • SelectObject.GDI32(00000000,00000000), ref: 00B52978
                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00B52988
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B52991
                        • DeleteDC.GDI32(00000000), ref: 00B5299A
                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00B529C6
                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 00B529DD
                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00B52A1D
                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00B52A31
                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00B52A42
                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00B52A77
                        • GetStockObject.GDI32(00000011), ref: 00B52A82
                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00B52A8D
                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00B52A97
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                        • API String ID: 2910397461-517079104
                        • Opcode ID: 5e7884cd9b0d5857f989ee76f9434721063d1b28a4a738677f5174f39ba86b43
                        • Instruction ID: d9d2e7c4e437ab73289898739bedd5533195ddfd351f508590db4f09724ba9cf
                        • Opcode Fuzzy Hash: 5e7884cd9b0d5857f989ee76f9434721063d1b28a4a738677f5174f39ba86b43
                        • Instruction Fuzzy Hash: 2FB16C71A00215AFEB14DFA8DC46FAE7BB9EB09711F008555F915E72E0DBB4AD00CBA4
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00B44AED
                        • GetDriveTypeW.KERNEL32(?,00B6CB68,?,\\.\,00B6CC08), ref: 00B44BCA
                        • SetErrorMode.KERNEL32(00000000,00B6CB68,?,\\.\,00B6CC08), ref: 00B44D36
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$DriveType
                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                        • API String ID: 2907320926-4222207086
                        • Opcode ID: b6a128f0f8d411ed76aa96339171cb780567a0799a8abc4b249f5a0b06d1952d
                        • Instruction ID: f2c7bfd3836e5ee47a1f7e6a2dc5aa877000a89ae8e9a1cb010cb8f62f91a312
                        • Opcode Fuzzy Hash: b6a128f0f8d411ed76aa96339171cb780567a0799a8abc4b249f5a0b06d1952d
                        • Instruction Fuzzy Hash: 74618030605105ABCF04DF24CAC2A7977E0EF05345B2884F6F816AB6A2DB75EF61EB41
                        APIs
                        • GetSysColor.USER32(00000012), ref: 00B67421
                        • SetTextColor.GDI32(?,?), ref: 00B67425
                        • GetSysColorBrush.USER32(0000000F), ref: 00B6743B
                        • GetSysColor.USER32(0000000F), ref: 00B67446
                        • CreateSolidBrush.GDI32(?), ref: 00B6744B
                        • GetSysColor.USER32(00000011), ref: 00B67463
                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B67471
                        • SelectObject.GDI32(?,00000000), ref: 00B67482
                        • SetBkColor.GDI32(?,00000000), ref: 00B6748B
                        • SelectObject.GDI32(?,?), ref: 00B67498
                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00B674B7
                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B674CE
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00B674DB
                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B6752A
                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00B67554
                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00B67572
                        • DrawFocusRect.USER32(?,?), ref: 00B6757D
                        • GetSysColor.USER32(00000011), ref: 00B6758E
                        • SetTextColor.GDI32(?,00000000), ref: 00B67596
                        • DrawTextW.USER32(?,00B670F5,000000FF,?,00000000), ref: 00B675A8
                        • SelectObject.GDI32(?,?), ref: 00B675BF
                        • DeleteObject.GDI32(?), ref: 00B675CA
                        • SelectObject.GDI32(?,?), ref: 00B675D0
                        • DeleteObject.GDI32(?), ref: 00B675D5
                        • SetTextColor.GDI32(?,?), ref: 00B675DB
                        • SetBkColor.GDI32(?,?), ref: 00B675E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                        • String ID:
                        • API String ID: 1996641542-0
                        • Opcode ID: 8f4197ebb1d2341ba6f6b29eb59c5567085935b33733d9474ef53f4d653581c8
                        • Instruction ID: 6e1c93542975e2c430372f257c11ebb3837873ec7fb9cbe5b2ae23ddf2c8e573
                        • Opcode Fuzzy Hash: 8f4197ebb1d2341ba6f6b29eb59c5567085935b33733d9474ef53f4d653581c8
                        • Instruction Fuzzy Hash: AB613D72904218AFDF019FA4DC49AAE7FB9FB09320F114165F915BB2E1DBB99940CB90
                        APIs
                        • GetCursorPos.USER32(?), ref: 00B61128
                        • GetDesktopWindow.USER32 ref: 00B6113D
                        • GetWindowRect.USER32(00000000), ref: 00B61144
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B61199
                        • DestroyWindow.USER32(?), ref: 00B611B9
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00B611ED
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B6120B
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B6121D
                        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00B61232
                        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00B61245
                        • IsWindowVisible.USER32(00000000), ref: 00B612A1
                        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00B612BC
                        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00B612D0
                        • GetWindowRect.USER32(00000000,?), ref: 00B612E8
                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00B6130E
                        • GetMonitorInfoW.USER32(00000000,?), ref: 00B61328
                        • CopyRect.USER32(?,?), ref: 00B6133F
                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 00B613AA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                        • String ID: ($0$tooltips_class32
                        • API String ID: 698492251-4156429822
                        • Opcode ID: 932f62aa3c00dff7c8145484b7925b6e16a2516dddb41e0084b939c6fcbe8ffc
                        • Instruction ID: 1621f5915347ed1069f841e942f645dfd12fb12b638b41a4fd053e73a5c820a8
                        • Opcode Fuzzy Hash: 932f62aa3c00dff7c8145484b7925b6e16a2516dddb41e0084b939c6fcbe8ffc
                        • Instruction Fuzzy Hash: 5DB19E71604341AFD700DF68C985B6ABBE4FF84310F048959F99A9B2A1CB75EC44CBA6
                        APIs
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AE8968
                        • GetSystemMetrics.USER32(00000007), ref: 00AE8970
                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AE899B
                        • GetSystemMetrics.USER32(00000008), ref: 00AE89A3
                        • GetSystemMetrics.USER32(00000004), ref: 00AE89C8
                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00AE89E5
                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00AE89F5
                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00AE8A28
                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00AE8A3C
                        • GetClientRect.USER32(00000000,000000FF), ref: 00AE8A5A
                        • GetStockObject.GDI32(00000011), ref: 00AE8A76
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00AE8A81
                          • Part of subcall function 00AE912D: GetCursorPos.USER32(?), ref: 00AE9141
                          • Part of subcall function 00AE912D: ScreenToClient.USER32(00000000,?), ref: 00AE915E
                          • Part of subcall function 00AE912D: GetAsyncKeyState.USER32(00000001), ref: 00AE9183
                          • Part of subcall function 00AE912D: GetAsyncKeyState.USER32(00000002), ref: 00AE919D
                        • SetTimer.USER32(00000000,00000000,00000028,00AE90FC), ref: 00AE8AA8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                        • String ID: AutoIt v3 GUI
                        • API String ID: 1458621304-248962490
                        • Opcode ID: a64d3400fbd2d8cc0ff539a7992d4cc1fb95a1d4680f20d9d2afdc43c8d1b41b
                        • Instruction ID: 0609475de3262fc544b82a79251c8b9d7ae8c4e1be1a702f75f46b006c24af19
                        • Opcode Fuzzy Hash: a64d3400fbd2d8cc0ff539a7992d4cc1fb95a1d4680f20d9d2afdc43c8d1b41b
                        • Instruction Fuzzy Hash: 56B17E35A002499FDB14DFA8DC46BAE3BB5FB48314F10426AFA19A72D0DB78E841CB51
                        APIs
                          • Part of subcall function 00B310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B31114
                          • Part of subcall function 00B310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00B30B9B,?,?,?), ref: 00B31120
                          • Part of subcall function 00B310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00B30B9B,?,?,?), ref: 00B3112F
                          • Part of subcall function 00B310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00B30B9B,?,?,?), ref: 00B31136
                          • Part of subcall function 00B310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B3114D
                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B30DF5
                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B30E29
                        • GetLengthSid.ADVAPI32(?), ref: 00B30E40
                        • GetAce.ADVAPI32(?,00000000,?), ref: 00B30E7A
                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B30E96
                        • GetLengthSid.ADVAPI32(?), ref: 00B30EAD
                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00B30EB5
                        • HeapAlloc.KERNEL32(00000000), ref: 00B30EBC
                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B30EDD
                        • CopySid.ADVAPI32(00000000), ref: 00B30EE4
                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B30F13
                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B30F35
                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B30F47
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B30F6E
                        • HeapFree.KERNEL32(00000000), ref: 00B30F75
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B30F7E
                        • HeapFree.KERNEL32(00000000), ref: 00B30F85
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B30F8E
                        • HeapFree.KERNEL32(00000000), ref: 00B30F95
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00B30FA1
                        • HeapFree.KERNEL32(00000000), ref: 00B30FA8
                          • Part of subcall function 00B31193: GetProcessHeap.KERNEL32(00000008,00B30BB1,?,00000000,?,00B30BB1,?), ref: 00B311A1
                          • Part of subcall function 00B31193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00B30BB1,?), ref: 00B311A8
                          • Part of subcall function 00B31193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00B30BB1,?), ref: 00B311B7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                        • String ID:
                        • API String ID: 4175595110-0
                        • Opcode ID: caececc92b6f08963595032abb4d18201abe738fbb1b883e222c55f4acc530d0
                        • Instruction ID: fbdb85e1eda251ec49b892e010f83d4e9218f17bc9acc8b25f3b538a35d4b92d
                        • Opcode Fuzzy Hash: caececc92b6f08963595032abb4d18201abe738fbb1b883e222c55f4acc530d0
                        • Instruction Fuzzy Hash: 77715B7290021AEBDF20AFA4DC44FAEBBB8FF05300F244255F959A7191DB759905CB60
                        APIs
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B5C4BD
                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00B6CC08,00000000,?,00000000,?,?), ref: 00B5C544
                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00B5C5A4
                        • _wcslen.LIBCMT ref: 00B5C5F4
                        • _wcslen.LIBCMT ref: 00B5C66F
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00B5C6B2
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00B5C7C1
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00B5C84D
                        • RegCloseKey.ADVAPI32(?), ref: 00B5C881
                        • RegCloseKey.ADVAPI32(00000000), ref: 00B5C88E
                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00B5C960
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                        • API String ID: 9721498-966354055
                        • Opcode ID: 0ce04d68d5a1e668e2670abf079650a3138bb454619b7eb8b8c75d0c79bfecf1
                        • Instruction ID: 125707e93c6c79b03ff049e8544d1adeb5d5a6ba0f9114ab57e2ddf56e0ca7d0
                        • Opcode Fuzzy Hash: 0ce04d68d5a1e668e2670abf079650a3138bb454619b7eb8b8c75d0c79bfecf1
                        • Instruction Fuzzy Hash: 6F1279356043019FDB14DF14C991B2ABBE5EF88715F14889DF88A9B3A2DB31ED45CB82
                        APIs
                        • CharUpperBuffW.USER32(?,?), ref: 00B609C6
                        • _wcslen.LIBCMT ref: 00B60A01
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B60A54
                        • _wcslen.LIBCMT ref: 00B60A8A
                        • _wcslen.LIBCMT ref: 00B60B06
                        • _wcslen.LIBCMT ref: 00B60B81
                          • Part of subcall function 00AEF9F2: _wcslen.LIBCMT ref: 00AEF9FD
                          • Part of subcall function 00B32BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B32BFA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$MessageSend$BuffCharUpper
                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                        • API String ID: 1103490817-4258414348
                        • Opcode ID: 6dc3cfa326de76c016572fda2d1f968ae92b14d62e33a889f1a973d975a50319
                        • Instruction ID: c3029143ac790cb25d4b7782d7923987901e364803e1ed5634cf20ff5c8892d5
                        • Opcode Fuzzy Hash: 6dc3cfa326de76c016572fda2d1f968ae92b14d62e33a889f1a973d975a50319
                        • Instruction Fuzzy Hash: 51E18D322183018FCB14EF26C59092BB7E1FF98354B5489ADF8969B362DB35ED45CB81
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                        • API String ID: 1256254125-909552448
                        • Opcode ID: c7999d3077dab49c6e75f401e0b1e8a41c1bd19336e51c10f0ee345082f93ea6
                        • Instruction ID: ef47af696ebdcb0c3aa590861954d53e5432eb83ced4a9e4fd8f2624c574462b
                        • Opcode Fuzzy Hash: c7999d3077dab49c6e75f401e0b1e8a41c1bd19336e51c10f0ee345082f93ea6
                        • Instruction Fuzzy Hash: 4671F43361022A8FCF10DE68CD817BB3BD2EB60755B2505E8FC6697285EA34CD49C3A0
                        APIs
                        • _wcslen.LIBCMT ref: 00B6835A
                        • _wcslen.LIBCMT ref: 00B6836E
                        • _wcslen.LIBCMT ref: 00B68391
                        • _wcslen.LIBCMT ref: 00B683B4
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00B683F2
                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00B6361A,?), ref: 00B6844E
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B68487
                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00B684CA
                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B68501
                        • FreeLibrary.KERNEL32(?), ref: 00B6850D
                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B6851D
                        • DestroyIcon.USER32(?), ref: 00B6852C
                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00B68549
                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00B68555
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                        • String ID: .dll$.exe$.icl
                        • API String ID: 799131459-1154884017
                        • Opcode ID: fe5d0fad1e9c34b4e95bae92ce1c321e9fafbe22fe6a9d877048da70cbc5317c
                        • Instruction ID: 40fc5637e3cc55591b09b5916dbccbb711a893e3ec5af8dfa81af8c3929d7c44
                        • Opcode Fuzzy Hash: fe5d0fad1e9c34b4e95bae92ce1c321e9fafbe22fe6a9d877048da70cbc5317c
                        • Instruction Fuzzy Hash: 4D61C271540219BAEB14DF64CC81BBF7BA8FF18711F10468AF956DA1D1DFB8AA40C7A0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                        • API String ID: 0-1645009161
                        • Opcode ID: b0bc719a8878e66d9a8699cbb0272dedc7b5226914faec52e40d10557dadcc62
                        • Instruction ID: 8ced9b7c0b638c9d917e2a43447bc0f02be77caa4af7b552e65d4d598992f611
                        • Opcode Fuzzy Hash: b0bc719a8878e66d9a8699cbb0272dedc7b5226914faec52e40d10557dadcc62
                        • Instruction Fuzzy Hash: E8811671604205BBDB25AF60DD42FFE37E8EF54300F044466F90AAA296FB74DA51C7A1
                        APIs
                        • CharLowerBuffW.USER32(?,?), ref: 00B43EF8
                        • _wcslen.LIBCMT ref: 00B43F03
                        • _wcslen.LIBCMT ref: 00B43F5A
                        • _wcslen.LIBCMT ref: 00B43F98
                        • GetDriveTypeW.KERNEL32(?), ref: 00B43FD6
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B4401E
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B44059
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B44087
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: SendString_wcslen$BuffCharDriveLowerType
                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                        • API String ID: 1839972693-4113822522
                        • Opcode ID: 514d0f08a3bce315582cf1efe5dce9dc2c4593c5fba67b9180d0aa9558dbe049
                        • Instruction ID: a2fd56e7168100b5402f9c2762b7b856df11be7dd3f178f065993a4e9e116b99
                        • Opcode Fuzzy Hash: 514d0f08a3bce315582cf1efe5dce9dc2c4593c5fba67b9180d0aa9558dbe049
                        • Instruction Fuzzy Hash: 1471EF326042029FC710EF24C98196BB7F4EF98B54F14496EF89697361EB30EE49DB91
                        APIs
                        • LoadIconW.USER32(00000063), ref: 00B35A2E
                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00B35A40
                        • SetWindowTextW.USER32(?,?), ref: 00B35A57
                        • GetDlgItem.USER32(?,000003EA), ref: 00B35A6C
                        • SetWindowTextW.USER32(00000000,?), ref: 00B35A72
                        • GetDlgItem.USER32(?,000003E9), ref: 00B35A82
                        • SetWindowTextW.USER32(00000000,?), ref: 00B35A88
                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00B35AA9
                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00B35AC3
                        • GetWindowRect.USER32(?,?), ref: 00B35ACC
                        • _wcslen.LIBCMT ref: 00B35B33
                        • SetWindowTextW.USER32(?,?), ref: 00B35B6F
                        • GetDesktopWindow.USER32 ref: 00B35B75
                        • GetWindowRect.USER32(00000000), ref: 00B35B7C
                        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00B35BD3
                        • GetClientRect.USER32(?,?), ref: 00B35BE0
                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 00B35C05
                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00B35C2F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                        • String ID:
                        • API String ID: 895679908-0
                        • Opcode ID: d76ffd4b817bed0905bfc45c560ff99102f7ee3e00aa9e8411fad31dc37f068c
                        • Instruction ID: 3330913b61bb53709d1cc9f16ac6e30f4902ca48d62794685cce9f706c950c31
                        • Opcode Fuzzy Hash: d76ffd4b817bed0905bfc45c560ff99102f7ee3e00aa9e8411fad31dc37f068c
                        • Instruction Fuzzy Hash: 85715D31900B09AFDB20DFA8CE85AAEBBF5FF48705F204558E586A35A0DB75A944CB50
                        APIs
                        • LoadCursorW.USER32(00000000,00007F89), ref: 00B4FE27
                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00B4FE32
                        • LoadCursorW.USER32(00000000,00007F00), ref: 00B4FE3D
                        • LoadCursorW.USER32(00000000,00007F03), ref: 00B4FE48
                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00B4FE53
                        • LoadCursorW.USER32(00000000,00007F01), ref: 00B4FE5E
                        • LoadCursorW.USER32(00000000,00007F81), ref: 00B4FE69
                        • LoadCursorW.USER32(00000000,00007F88), ref: 00B4FE74
                        • LoadCursorW.USER32(00000000,00007F80), ref: 00B4FE7F
                        • LoadCursorW.USER32(00000000,00007F86), ref: 00B4FE8A
                        • LoadCursorW.USER32(00000000,00007F83), ref: 00B4FE95
                        • LoadCursorW.USER32(00000000,00007F85), ref: 00B4FEA0
                        • LoadCursorW.USER32(00000000,00007F82), ref: 00B4FEAB
                        • LoadCursorW.USER32(00000000,00007F84), ref: 00B4FEB6
                        • LoadCursorW.USER32(00000000,00007F04), ref: 00B4FEC1
                        • LoadCursorW.USER32(00000000,00007F02), ref: 00B4FECC
                        • GetCursorInfo.USER32(?), ref: 00B4FEDC
                        • GetLastError.KERNEL32 ref: 00B4FF1E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Cursor$Load$ErrorInfoLast
                        • String ID:
                        • API String ID: 3215588206-0
                        • Opcode ID: 78a49f3822310eab8f2ab573ba257bb94547fd8009e01e10590def3c82c00a24
                        • Instruction ID: aeb02948e391a93e174e6e1b5caec7ce75d981ff8eae02e58cab4c2c362a0053
                        • Opcode Fuzzy Hash: 78a49f3822310eab8f2ab573ba257bb94547fd8009e01e10590def3c82c00a24
                        • Instruction Fuzzy Hash: 484144B0D0531A6BDB109FBA8C8586EBFE8FF04754B50456AE11DE7281DB789901CE91
                        APIs
                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00AF00C6
                          • Part of subcall function 00AF00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00BA070C,00000FA0,F4B05E56,?,?,?,?,00B123B3,000000FF), ref: 00AF011C
                          • Part of subcall function 00AF00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00B123B3,000000FF), ref: 00AF0127
                          • Part of subcall function 00AF00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00B123B3,000000FF), ref: 00AF0138
                          • Part of subcall function 00AF00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00AF014E
                          • Part of subcall function 00AF00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00AF015C
                          • Part of subcall function 00AF00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00AF016A
                          • Part of subcall function 00AF00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00AF0195
                          • Part of subcall function 00AF00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00AF01A0
                        • ___scrt_fastfail.LIBCMT ref: 00AF00E7
                          • Part of subcall function 00AF00A3: __onexit.LIBCMT ref: 00AF00A9
                        Strings
                        • SleepConditionVariableCS, xrefs: 00AF0154
                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00AF0122
                        • WakeAllConditionVariable, xrefs: 00AF0162
                        • InitializeConditionVariable, xrefs: 00AF0148
                        • kernel32.dll, xrefs: 00AF0133
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                        • API String ID: 66158676-1714406822
                        • Opcode ID: 027a8ae0e187384fe263269a3922f185cbf685868bb4fbf299af494a77245173
                        • Instruction ID: ee4b44af9548254ce449dfc922e429235d5fcab75e3f00b81c2e57b383e61c60
                        • Opcode Fuzzy Hash: 027a8ae0e187384fe263269a3922f185cbf685868bb4fbf299af494a77245173
                        • Instruction Fuzzy Hash: 2C21F6326447156FE7106BE4BD06F7A77D4EB06B51F00027AFA41A32E2DFB8AC008A94
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                        • API String ID: 176396367-1603158881
                        • Opcode ID: 59ba2074ffa27f2ff391401ae085e58f2ce63b546c50f9073e56336bc07b6bbe
                        • Instruction ID: 72015e78556b9b224fefc1181b90714f18a330b75ed6254b50cf6adadbac1ace
                        • Opcode Fuzzy Hash: 59ba2074ffa27f2ff391401ae085e58f2ce63b546c50f9073e56336bc07b6bbe
                        • Instruction Fuzzy Hash: 6BE1B532A00516ABCF159FA8C8916FFBBF0FF54B10F7581A9E456B7250DB30AE858790
                        APIs
                        • CharLowerBuffW.USER32(00000000,00000000,00B6CC08), ref: 00B44527
                        • _wcslen.LIBCMT ref: 00B4453B
                        • _wcslen.LIBCMT ref: 00B44599
                        • _wcslen.LIBCMT ref: 00B445F4
                        • _wcslen.LIBCMT ref: 00B4463F
                        • _wcslen.LIBCMT ref: 00B446A7
                          • Part of subcall function 00AEF9F2: _wcslen.LIBCMT ref: 00AEF9FD
                        • GetDriveTypeW.KERNEL32(?,00B96BF0,00000061), ref: 00B44743
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharDriveLowerType
                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                        • API String ID: 2055661098-1000479233
                        • Opcode ID: 6db28b2e01aaea67866ba582532eeb6db2edb39e851119f1713a40e1d1b43fd8
                        • Instruction ID: a6fed9393e02c28d3f1c414538f1e982f60f2e131775fcb85953ffab7f5f2ca3
                        • Opcode Fuzzy Hash: 6db28b2e01aaea67866ba582532eeb6db2edb39e851119f1713a40e1d1b43fd8
                        • Instruction Fuzzy Hash: 1DB10E316083029FCB10DF28C991A7AB7E4EFA5720F5049ADF496C7291E730DE55DB92
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00B6CC08), ref: 00B540BB
                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00B540CD
                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00B6CC08), ref: 00B540F2
                        • FreeLibrary.KERNEL32(00000000,?,00B6CC08), ref: 00B5413E
                        • StringFromGUID2.OLE32(?,?,00000028,?,00B6CC08), ref: 00B541A8
                        • SysFreeString.OLEAUT32(00000009), ref: 00B54262
                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00B542C8
                        • SysFreeString.OLEAUT32(?), ref: 00B542F2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                        • String ID: GetModuleHandleExW$kernel32.dll
                        • API String ID: 354098117-199464113
                        • Opcode ID: ea8ff89203e33b94939142f5ad0b56c4722b39c97d995c101152cc5b597bb91f
                        • Instruction ID: c430dfb007200ca7a882e8379b4c65d6f9f7a7de056821372d10e525874b9c2a
                        • Opcode Fuzzy Hash: ea8ff89203e33b94939142f5ad0b56c4722b39c97d995c101152cc5b597bb91f
                        • Instruction Fuzzy Hash: D8123B75A00115AFDB14CF54C884EAEBBF5FF45319F2480D8E905AB261DB31ED86CBA0
                        APIs
                        • GetMenuItemCount.USER32(00BA1990), ref: 00B12F8D
                        • GetMenuItemCount.USER32(00BA1990), ref: 00B1303D
                        • GetCursorPos.USER32(?), ref: 00B13081
                        • SetForegroundWindow.USER32(00000000), ref: 00B1308A
                        • TrackPopupMenuEx.USER32(00BA1990,00000000,?,00000000,00000000,00000000), ref: 00B1309D
                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00B130A9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                        • String ID: 0
                        • API String ID: 36266755-4108050209
                        • Opcode ID: 7ef2849babcf1e18626b98a4f2f0bba36f38e059857312a25ef5145e1551e1b0
                        • Instruction ID: d8426a02b983d5af8320605305f5b260b722a8a4181294cd6b947f09262bd3f5
                        • Opcode Fuzzy Hash: 7ef2849babcf1e18626b98a4f2f0bba36f38e059857312a25ef5145e1551e1b0
                        • Instruction Fuzzy Hash: E1710731640205BEEB219F24CC89FEABFF4FF15324F204256F5156A2E0C7B1A960CB91
                        APIs
                        • DestroyWindow.USER32(00000000,?), ref: 00B66DEB
                          • Part of subcall function 00AD6B57: _wcslen.LIBCMT ref: 00AD6B6A
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00B66E5F
                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00B66E81
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B66E94
                        • DestroyWindow.USER32(?), ref: 00B66EB5
                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00AD0000,00000000), ref: 00B66EE4
                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B66EFD
                        • GetDesktopWindow.USER32 ref: 00B66F16
                        • GetWindowRect.USER32(00000000), ref: 00B66F1D
                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B66F35
                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00B66F4D
                          • Part of subcall function 00AE9944: GetWindowLongW.USER32(?,000000EB), ref: 00AE9952
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                        • String ID: 0$tooltips_class32
                        • API String ID: 2429346358-3619404913
                        • Opcode ID: 6f4a85a8598bec155e83407760c2d78e6196bcbb7bfe3068c00fa52301947a74
                        • Instruction ID: c523d78799fb3d213f9854e3977b702dc8989dd3b7725b7f3635506e1b87f076
                        • Opcode Fuzzy Hash: 6f4a85a8598bec155e83407760c2d78e6196bcbb7bfe3068c00fa52301947a74
                        • Instruction Fuzzy Hash: 93716674104240AFDB21CF18DC48FBBBBE9FB99304F04085EF999872A1CB79A906CB15
                        APIs
                          • Part of subcall function 00AE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AE9BB2
                        • DragQueryPoint.SHELL32(?,?), ref: 00B69147
                          • Part of subcall function 00B67674: ClientToScreen.USER32(?,?), ref: 00B6769A
                          • Part of subcall function 00B67674: GetWindowRect.USER32(?,?), ref: 00B67710
                          • Part of subcall function 00B67674: PtInRect.USER32(?,?,00B68B89), ref: 00B67720
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00B691B0
                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00B691BB
                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00B691DE
                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00B69225
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00B6923E
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00B69255
                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00B69277
                        • DragFinish.SHELL32(?), ref: 00B6927E
                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00B69371
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                        • API String ID: 221274066-3440237614
                        • Opcode ID: 440c461bee2c59722ce209d79e3aa5c003a3aab9ceb53c480bb06dd15d175354
                        • Instruction ID: 2404a2673b60a725b7133b319a4970b06bfafcd18f212462a6cefd250d9752c4
                        • Opcode Fuzzy Hash: 440c461bee2c59722ce209d79e3aa5c003a3aab9ceb53c480bb06dd15d175354
                        • Instruction Fuzzy Hash: E2617971108301AFD701EF64DD85DAFBBE8EF89750F00096EF596932A0DB749A49CB52
                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B4C4B0
                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00B4C4C3
                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00B4C4D7
                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00B4C4F0
                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00B4C533
                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00B4C549
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B4C554
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B4C584
                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00B4C5DC
                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00B4C5F0
                        • InternetCloseHandle.WININET(00000000), ref: 00B4C5FB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                        • String ID:
                        • API String ID: 3800310941-3916222277
                        • Opcode ID: a5e22b4caf37a00afc06e339caafb65a5bece24bdb8b9eafc7d4e21a9c462606
                        • Instruction ID: f85f840ffcca8db895ffeef173a83f19157990a7fcb7bbaa6aa11eee16d93f2f
                        • Opcode Fuzzy Hash: a5e22b4caf37a00afc06e339caafb65a5bece24bdb8b9eafc7d4e21a9c462606
                        • Instruction Fuzzy Hash: 8B516DB0501208BFDB619FA0C989ABB7FFCFF18B54F008459F98597250DB74EA44AB60
                        APIs
                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00B68592
                        • GetFileSize.KERNEL32(00000000,00000000), ref: 00B685A2
                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00B685AD
                        • CloseHandle.KERNEL32(00000000), ref: 00B685BA
                        • GlobalLock.KERNEL32(00000000), ref: 00B685C8
                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00B685D7
                        • GlobalUnlock.KERNEL32(00000000), ref: 00B685E0
                        • CloseHandle.KERNEL32(00000000), ref: 00B685E7
                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00B685F8
                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00B6FC38,?), ref: 00B68611
                        • GlobalFree.KERNEL32(00000000), ref: 00B68621
                        • GetObjectW.GDI32(?,00000018,000000FF), ref: 00B68641
                        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00B68671
                        • DeleteObject.GDI32(00000000), ref: 00B68699
                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00B686AF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                        • String ID:
                        • API String ID: 3840717409-0
                        • Opcode ID: 3a3842bb46ae17bea18ea892d0d418044e45a4e17d33592136605da18becb173
                        • Instruction ID: 4f443c58ca57ee8fb7b16361146ba001ad1f49eedd4737624e71ab1383e94c9b
                        • Opcode Fuzzy Hash: 3a3842bb46ae17bea18ea892d0d418044e45a4e17d33592136605da18becb173
                        • Instruction Fuzzy Hash: 3C411A75600204AFDB11DFA5DC88EBA7BB8FF89B11F104159F946E72A0DB789D01CB60
                        APIs
                        • VariantInit.OLEAUT32(00000000), ref: 00B41502
                        • VariantCopy.OLEAUT32(?,?), ref: 00B4150B
                        • VariantClear.OLEAUT32(?), ref: 00B41517
                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00B415FB
                        • VarR8FromDec.OLEAUT32(?,?), ref: 00B41657
                        • VariantInit.OLEAUT32(?), ref: 00B41708
                        • SysFreeString.OLEAUT32(?), ref: 00B4178C
                        • VariantClear.OLEAUT32(?), ref: 00B417D8
                        • VariantClear.OLEAUT32(?), ref: 00B417E7
                        • VariantInit.OLEAUT32(00000000), ref: 00B41823
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                        • API String ID: 1234038744-3931177956
                        • Opcode ID: 5641bdccd76de27625454cb36c5c5e9997421dd2fb0a4f5487619f99a37a63b8
                        • Instruction ID: 133041c481620c83a88185e4928c9df8b16490c9e5192fd8b5d156e0002dc8cf
                        • Opcode Fuzzy Hash: 5641bdccd76de27625454cb36c5c5e9997421dd2fb0a4f5487619f99a37a63b8
                        • Instruction Fuzzy Hash: 6BD1E271E00119DBDB00EF69D885BB9B7F5FF54700F148896E446AB280DB34EE81EB61
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                          • Part of subcall function 00B5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B5B6AE,?,?), ref: 00B5C9B5
                          • Part of subcall function 00B5C998: _wcslen.LIBCMT ref: 00B5C9F1
                          • Part of subcall function 00B5C998: _wcslen.LIBCMT ref: 00B5CA68
                          • Part of subcall function 00B5C998: _wcslen.LIBCMT ref: 00B5CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B5B6F4
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B5B772
                        • RegDeleteValueW.ADVAPI32(?,?), ref: 00B5B80A
                        • RegCloseKey.ADVAPI32(?), ref: 00B5B87E
                        • RegCloseKey.ADVAPI32(?), ref: 00B5B89C
                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00B5B8F2
                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B5B904
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B5B922
                        • FreeLibrary.KERNEL32(00000000), ref: 00B5B983
                        • RegCloseKey.ADVAPI32(00000000), ref: 00B5B994
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 146587525-4033151799
                        • Opcode ID: 4fd3c7202e57239b2b91cb189f99fded6d83c9c6f1c29f4cbda94f1fa8f75160
                        • Instruction ID: 9e125323f4ab1472781856974abd42e9b633682c9f2b0996443d83a3b73945cf
                        • Opcode Fuzzy Hash: 4fd3c7202e57239b2b91cb189f99fded6d83c9c6f1c29f4cbda94f1fa8f75160
                        • Instruction Fuzzy Hash: 31C16930208201AFD714DF14C495F2ABBE5EF84319F1485DDE9AA8B3A2CB75ED49CB91
                        APIs
                        • GetDC.USER32(00000000), ref: 00B525D8
                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00B525E8
                        • CreateCompatibleDC.GDI32(?), ref: 00B525F4
                        • SelectObject.GDI32(00000000,?), ref: 00B52601
                        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00B5266D
                        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00B526AC
                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00B526D0
                        • SelectObject.GDI32(?,?), ref: 00B526D8
                        • DeleteObject.GDI32(?), ref: 00B526E1
                        • DeleteDC.GDI32(?), ref: 00B526E8
                        • ReleaseDC.USER32(00000000,?), ref: 00B526F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                        • String ID: (
                        • API String ID: 2598888154-3887548279
                        • Opcode ID: 7a061623ea36de38baa2bfc4c28e5777e2b69c5cfc76cdd76f03f400728c9cfc
                        • Instruction ID: 962982a48f56d2c18ab8554b71c05f9c6fc4388ef506ef9379885ff8a6b6c984
                        • Opcode Fuzzy Hash: 7a061623ea36de38baa2bfc4c28e5777e2b69c5cfc76cdd76f03f400728c9cfc
                        • Instruction Fuzzy Hash: 9961E275D01219EFCF05CFA8D884AAEBBF5FF48310F20856AE955A7250D774A941CF90
                        APIs
                        • ___free_lconv_mon.LIBCMT ref: 00B0DAA1
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D659
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D66B
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D67D
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D68F
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D6A1
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D6B3
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D6C5
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D6D7
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D6E9
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D6FB
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D70D
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D71F
                          • Part of subcall function 00B0D63C: _free.LIBCMT ref: 00B0D731
                        • _free.LIBCMT ref: 00B0DA96
                          • Part of subcall function 00B029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00B0D7D1,00000000,00000000,00000000,00000000,?,00B0D7F8,00000000,00000007,00000000,?,00B0DBF5,00000000), ref: 00B029DE
                          • Part of subcall function 00B029C8: GetLastError.KERNEL32(00000000,?,00B0D7D1,00000000,00000000,00000000,00000000,?,00B0D7F8,00000000,00000007,00000000,?,00B0DBF5,00000000,00000000), ref: 00B029F0
                        • _free.LIBCMT ref: 00B0DAB8
                        • _free.LIBCMT ref: 00B0DACD
                        • _free.LIBCMT ref: 00B0DAD8
                        • _free.LIBCMT ref: 00B0DAFA
                        • _free.LIBCMT ref: 00B0DB0D
                        • _free.LIBCMT ref: 00B0DB1B
                        • _free.LIBCMT ref: 00B0DB26
                        • _free.LIBCMT ref: 00B0DB5E
                        • _free.LIBCMT ref: 00B0DB65
                        • _free.LIBCMT ref: 00B0DB82
                        • _free.LIBCMT ref: 00B0DB9A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                        • String ID:
                        • API String ID: 161543041-0
                        • Opcode ID: 48c4878af547dbb2b52df0594a0c025d7262a21c19046216c8bf7d0f776d3cf4
                        • Instruction ID: 73338cbd4d48a4b2f06ec5df318665ffa173171346ae954a5d0293d8b8ae548a
                        • Opcode Fuzzy Hash: 48c4878af547dbb2b52df0594a0c025d7262a21c19046216c8bf7d0f776d3cf4
                        • Instruction Fuzzy Hash: 40312A326046059FEB21ABB9E849B6A7FE9FF00350F6544A9E449D72D1DB35EC44CB20
                        APIs
                        • GetClassNameW.USER32(?,?,00000100), ref: 00B3369C
                        • _wcslen.LIBCMT ref: 00B336A7
                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00B33797
                        • GetClassNameW.USER32(?,?,00000400), ref: 00B3380C
                        • GetDlgCtrlID.USER32(?), ref: 00B3385D
                        • GetWindowRect.USER32(?,?), ref: 00B33882
                        • GetParent.USER32(?), ref: 00B338A0
                        • ScreenToClient.USER32(00000000), ref: 00B338A7
                        • GetClassNameW.USER32(?,?,00000100), ref: 00B33921
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00B3395D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                        • String ID: %s%u
                        • API String ID: 4010501982-679674701
                        • Opcode ID: b24cfcef94429f47da803c68a05bd28cacd10d4dbe0d8d989e365a1c047bc44f
                        • Instruction ID: ec218aa16de75301aca2005134f0761306eb71c738f524713c291ef514445526
                        • Opcode Fuzzy Hash: b24cfcef94429f47da803c68a05bd28cacd10d4dbe0d8d989e365a1c047bc44f
                        • Instruction Fuzzy Hash: C291A071204606EFD718DF64C885FABF7E8FF44710F208669FA9A82190DB74EA45CB91
                        APIs
                        • GetClassNameW.USER32(?,?,00000400), ref: 00B34994
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00B349DA
                        • _wcslen.LIBCMT ref: 00B349EB
                        • CharUpperBuffW.USER32(?,00000000), ref: 00B349F7
                        • _wcsstr.LIBVCRUNTIME ref: 00B34A2C
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00B34A64
                        • GetWindowTextW.USER32(?,?,00000400), ref: 00B34A9D
                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00B34AE6
                        • GetClassNameW.USER32(?,?,00000400), ref: 00B34B20
                        • GetWindowRect.USER32(?,?), ref: 00B34B8B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                        • String ID: ThumbnailClass
                        • API String ID: 1311036022-1241985126
                        • Opcode ID: 91957d1cd2a67dc4e72d5bf08dc8b7a8f8519b3dd708c7a82a1114ed554e8817
                        • Instruction ID: 6e76a1552c199f03723b550799ff7ec0aaf58fb3961cbe327f960ff8835fe331
                        • Opcode Fuzzy Hash: 91957d1cd2a67dc4e72d5bf08dc8b7a8f8519b3dd708c7a82a1114ed554e8817
                        • Instruction Fuzzy Hash: 6291AE311082059FDB04CF14C985BBABBE8FF44314F2484AAFD859A196EB74ED45CBA1
                        APIs
                        • GetMenuItemInfoW.USER32(00BA1990,000000FF,00000000,00000030), ref: 00B3BFAC
                        • SetMenuItemInfoW.USER32(00BA1990,00000004,00000000,00000030), ref: 00B3BFE1
                        • Sleep.KERNEL32(000001F4), ref: 00B3BFF3
                        • GetMenuItemCount.USER32(?), ref: 00B3C039
                        • GetMenuItemID.USER32(?,00000000), ref: 00B3C056
                        • GetMenuItemID.USER32(?,-00000001), ref: 00B3C082
                        • GetMenuItemID.USER32(?,?), ref: 00B3C0C9
                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B3C10F
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B3C124
                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B3C145
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ItemMenu$Info$CheckCountRadioSleep
                        • String ID: 0
                        • API String ID: 1460738036-4108050209
                        • Opcode ID: 1925385810c419df915bc41d1e84eb60e1e844811b77c265c2d923c458a52ca1
                        • Instruction ID: d4fbb973e6cb1d587c5cc28fac7eba6b327f7f0275557d95289e69f37b6f27d6
                        • Opcode Fuzzy Hash: 1925385810c419df915bc41d1e84eb60e1e844811b77c265c2d923c458a52ca1
                        • Instruction Fuzzy Hash: F4618EB190028AAFDF15CFA8DD89ABE7FF8EB05344F204195E951B3291CB75AD04DB60
                        APIs
                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00B5CC64
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00B5CC8D
                        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00B5CD48
                          • Part of subcall function 00B5CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00B5CCAA
                          • Part of subcall function 00B5CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00B5CCBD
                          • Part of subcall function 00B5CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B5CCCF
                          • Part of subcall function 00B5CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00B5CD05
                          • Part of subcall function 00B5CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00B5CD28
                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B5CCF3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                        • String ID: RegDeleteKeyExW$advapi32.dll
                        • API String ID: 2734957052-4033151799
                        • Opcode ID: 4b25ca6038ff6e9ff578c7288db75e5ce6add64186194ab9bff1d615f5b7daff
                        • Instruction ID: 407802573e761a1cdd859dad154e466d20c539961586a55cfb4b7453c71f647e
                        • Opcode Fuzzy Hash: 4b25ca6038ff6e9ff578c7288db75e5ce6add64186194ab9bff1d615f5b7daff
                        • Instruction Fuzzy Hash: C4317E71901228BFDB219B91DC88EFFBFBDEF05741F0001E5E905E3190DBB49A499AA0
                        APIs
                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00B43D40
                        • _wcslen.LIBCMT ref: 00B43D6D
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00B43D9D
                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00B43DBE
                        • RemoveDirectoryW.KERNEL32(?), ref: 00B43DCE
                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00B43E55
                        • CloseHandle.KERNEL32(00000000), ref: 00B43E60
                        • CloseHandle.KERNEL32(00000000), ref: 00B43E6B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                        • String ID: :$\$\??\%s
                        • API String ID: 1149970189-3457252023
                        • Opcode ID: bc54bc7266ba2faa0211ad6814fe72062e75735cf004541b3aee8504b5b2f044
                        • Instruction ID: 3aa1dd24de9efabfea8be290d67f631ca044c701d08cee0fc913d5db24d8ffd6
                        • Opcode Fuzzy Hash: bc54bc7266ba2faa0211ad6814fe72062e75735cf004541b3aee8504b5b2f044
                        • Instruction Fuzzy Hash: 92318E72900209AADB219FA0DC49FEB37FCEF89B00F1441B5F605D61A0EBB497448B24
                        APIs
                        • timeGetTime.WINMM ref: 00B3E6B4
                          • Part of subcall function 00AEE551: timeGetTime.WINMM(?,?,00B3E6D4), ref: 00AEE555
                        • Sleep.KERNEL32(0000000A), ref: 00B3E6E1
                        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00B3E705
                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00B3E727
                        • SetActiveWindow.USER32 ref: 00B3E746
                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00B3E754
                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00B3E773
                        • Sleep.KERNEL32(000000FA), ref: 00B3E77E
                        • IsWindow.USER32 ref: 00B3E78A
                        • EndDialog.USER32(00000000), ref: 00B3E79B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                        • String ID: BUTTON
                        • API String ID: 1194449130-3405671355
                        • Opcode ID: 1e69e708f17c76fe042fe516a7f2131cdfa9208a9cbe57ca9eb0076deb21c58e
                        • Instruction ID: 28d273472f1f2988cda6b63cb6248abcb22c2ca2d61cd3c0196c7a81b3e6ca82
                        • Opcode Fuzzy Hash: 1e69e708f17c76fe042fe516a7f2131cdfa9208a9cbe57ca9eb0076deb21c58e
                        • Instruction Fuzzy Hash: 45216270240205AFEB105F68EC9AA363FE9E756748F200466F566836F1DFB5DC008A24
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00B3EA5D
                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00B3EA73
                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B3EA84
                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00B3EA96
                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00B3EAA7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: SendString$_wcslen
                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                        • API String ID: 2420728520-1007645807
                        • Opcode ID: 9547fed9ba799d7b3b5fb4a3433f81dde897dea4a34c11dac41d66dc3071701d
                        • Instruction ID: c3ca2b346744326b30e087eb6ca830b88e865bad75fc70bac5eb62b86db56b55
                        • Opcode Fuzzy Hash: 9547fed9ba799d7b3b5fb4a3433f81dde897dea4a34c11dac41d66dc3071701d
                        • Instruction Fuzzy Hash: BE117731A5025979DB10A7A2DD4AEFF7BFCEBD5B40F1004767411A21E1DE705D05C5B1
                        APIs
                        • GetKeyboardState.USER32(?), ref: 00B3A012
                        • SetKeyboardState.USER32(?), ref: 00B3A07D
                        • GetAsyncKeyState.USER32(000000A0), ref: 00B3A09D
                        • GetKeyState.USER32(000000A0), ref: 00B3A0B4
                        • GetAsyncKeyState.USER32(000000A1), ref: 00B3A0E3
                        • GetKeyState.USER32(000000A1), ref: 00B3A0F4
                        • GetAsyncKeyState.USER32(00000011), ref: 00B3A120
                        • GetKeyState.USER32(00000011), ref: 00B3A12E
                        • GetAsyncKeyState.USER32(00000012), ref: 00B3A157
                        • GetKeyState.USER32(00000012), ref: 00B3A165
                        • GetAsyncKeyState.USER32(0000005B), ref: 00B3A18E
                        • GetKeyState.USER32(0000005B), ref: 00B3A19C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: 602546d5b059f529084118a26438c119bcd2b73eb9aa6248a4dabc5be4337c81
                        • Instruction ID: 5ef70aca039c61847dd568a93734a08c105dfbc58edf65aa221d2a0067032e5d
                        • Opcode Fuzzy Hash: 602546d5b059f529084118a26438c119bcd2b73eb9aa6248a4dabc5be4337c81
                        • Instruction Fuzzy Hash: 9B519A30A0478829FB35EB6089557EABFF5DF12380F3845DDD5C2571C2DAA4AA4CC762
                        APIs
                        • GetDlgItem.USER32(?,00000001), ref: 00B35CE2
                        • GetWindowRect.USER32(00000000,?), ref: 00B35CFB
                        • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00B35D59
                        • GetDlgItem.USER32(?,00000002), ref: 00B35D69
                        • GetWindowRect.USER32(00000000,?), ref: 00B35D7B
                        • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00B35DCF
                        • GetDlgItem.USER32(?,000003E9), ref: 00B35DDD
                        • GetWindowRect.USER32(00000000,?), ref: 00B35DEF
                        • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00B35E31
                        • GetDlgItem.USER32(?,000003EA), ref: 00B35E44
                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00B35E5A
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00B35E67
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$ItemMoveRect$Invalidate
                        • String ID:
                        • API String ID: 3096461208-0
                        • Opcode ID: 87666f5111106bb42ba58ac48803f2096f87794ba15e776307fdf682b8b38ddc
                        • Instruction ID: c37a18dbf8ea6d649307e3a71d4b4cb948fb0ee356e9b6a52178a00111277061
                        • Opcode Fuzzy Hash: 87666f5111106bb42ba58ac48803f2096f87794ba15e776307fdf682b8b38ddc
                        • Instruction Fuzzy Hash: 9E510DB0B00615AFDB18CF68CD89AAE7BB5FB48301F208169F515E7290DBB49E008B60
                        APIs
                          • Part of subcall function 00AE8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AE8BE8,?,00000000,?,?,?,?,00AE8BBA,00000000,?), ref: 00AE8FC5
                        • DestroyWindow.USER32(?), ref: 00AE8C81
                        • KillTimer.USER32(00000000,?,?,?,?,00AE8BBA,00000000,?), ref: 00AE8D1B
                        • DestroyAcceleratorTable.USER32(00000000), ref: 00B26973
                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00AE8BBA,00000000,?), ref: 00B269A1
                        • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00AE8BBA,00000000,?), ref: 00B269B8
                        • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00AE8BBA,00000000), ref: 00B269D4
                        • DeleteObject.GDI32(00000000), ref: 00B269E6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                        • String ID:
                        • API String ID: 641708696-0
                        • Opcode ID: 3f06c12d83496d28be4451887b6161d5125f0ffdd6a488dd99d94f762eb9566a
                        • Instruction ID: 42e5c43d828434da7d140fe21a35464f534c3b5b179f59c748e34a5264eeee47
                        • Opcode Fuzzy Hash: 3f06c12d83496d28be4451887b6161d5125f0ffdd6a488dd99d94f762eb9566a
                        • Instruction Fuzzy Hash: 7E61CE31002650DFCB619F1ADA49B267BF1FB86312F20895DE08A975A0CF7DAC81CF90
                        APIs
                          • Part of subcall function 00AE9944: GetWindowLongW.USER32(?,000000EB), ref: 00AE9952
                        • GetSysColor.USER32(0000000F), ref: 00AE9862
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ColorLongWindow
                        • String ID:
                        • API String ID: 259745315-0
                        • Opcode ID: 2c8da9413bfeb26de0adbc93bacfeb1fe5720e7f765a68333425de18fca0f67f
                        • Instruction ID: 96fdf3a95456dc6c45d2f7ba324f929fe4d492e2d254d7aed1bbdfebcd2a00a8
                        • Opcode Fuzzy Hash: 2c8da9413bfeb26de0adbc93bacfeb1fe5720e7f765a68333425de18fca0f67f
                        • Instruction Fuzzy Hash: 7641DF32100790AFDB205F399C88BBA3BA5EB16330F144655F9A69B2F2CB749C42DB11
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00B1F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00B39717
                        • LoadStringW.USER32(00000000,?,00B1F7F8,00000001), ref: 00B39720
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00B1F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00B39742
                        • LoadStringW.USER32(00000000,?,00B1F7F8,00000001), ref: 00B39745
                        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00B39866
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message_wcslen
                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                        • API String ID: 747408836-2268648507
                        • Opcode ID: d1563eaa3d82a8cb2933e7bff3bad32984f908b1a649aa76b0067262b56e9df1
                        • Instruction ID: a7d8fdcd9d78ea8ff12dff17425a1933aedbfbe5329bbcb206dd765ffd91f8b1
                        • Opcode Fuzzy Hash: d1563eaa3d82a8cb2933e7bff3bad32984f908b1a649aa76b0067262b56e9df1
                        • Instruction Fuzzy Hash: 06414172900109AADF04EBE0DE86DEE77B8EF55740F200066F50676291EB755F48DB61
                        APIs
                          • Part of subcall function 00AD6B57: _wcslen.LIBCMT ref: 00AD6B6A
                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00B307A2
                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00B307BE
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00B307DA
                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00B30804
                        • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00B3082C
                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00B30837
                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00B3083C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                        • API String ID: 323675364-22481851
                        • Opcode ID: 10052b9d5d48dfdc27b373419fd360e27df671871e59f0a617449f6b5a788bfd
                        • Instruction ID: 340f3aae59f66b7d9380a0a1f0b3845e2845d2b4e8b8e07e1512b28a178f8411
                        • Opcode Fuzzy Hash: 10052b9d5d48dfdc27b373419fd360e27df671871e59f0a617449f6b5a788bfd
                        • Instruction Fuzzy Hash: 9B413C72C10229ABDF21EF94DD95DEDB7B8FF04340F144166E912A72A0EB709E04CB90
                        APIs
                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00B6403B
                        • CreateCompatibleDC.GDI32(00000000), ref: 00B64042
                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00B64055
                        • SelectObject.GDI32(00000000,00000000), ref: 00B6405D
                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B64068
                        • DeleteDC.GDI32(00000000), ref: 00B64072
                        • GetWindowLongW.USER32(?,000000EC), ref: 00B6407C
                        • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00B64092
                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00B6409E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                        • String ID: static
                        • API String ID: 2559357485-2160076837
                        • Opcode ID: 1e777a10cc7d5ee11aca9a412e3797074f0df78e4c3af744b546367682d1227a
                        • Instruction ID: 5fd28bde674240f556ce65000f364b634bccf09c6eb7574b7ab29ba607f4486f
                        • Opcode Fuzzy Hash: 1e777a10cc7d5ee11aca9a412e3797074f0df78e4c3af744b546367682d1227a
                        • Instruction Fuzzy Hash: D1316E32501215ABDF219FA4CC09FEA3FA8FF0E720F110251FA69A61E0CBB9D850DB54
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00B53C5C
                        • CoInitialize.OLE32(00000000), ref: 00B53C8A
                        • CoUninitialize.OLE32 ref: 00B53C94
                        • _wcslen.LIBCMT ref: 00B53D2D
                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00B53DB1
                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00B53ED5
                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00B53F0E
                        • CoGetObject.OLE32(?,00000000,00B6FB98,?), ref: 00B53F2D
                        • SetErrorMode.KERNEL32(00000000), ref: 00B53F40
                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00B53FC4
                        • VariantClear.OLEAUT32(?), ref: 00B53FD8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                        • String ID:
                        • API String ID: 429561992-0
                        • Opcode ID: ba07f9cc128c5d6fcdf528a990c30fb4679aa40651f863e736e1d36a31e49ed5
                        • Instruction ID: f5e9c7c004b85dcdd10bc15c9a315fcc99628f31933bace146ba1c73b105feed
                        • Opcode Fuzzy Hash: ba07f9cc128c5d6fcdf528a990c30fb4679aa40651f863e736e1d36a31e49ed5
                        • Instruction Fuzzy Hash: D6C124716083059FD700DF64C884A2BBBE9EF89785F10499DF98A9B350DB31ED09CB62
                        APIs
                        • CoInitialize.OLE32(00000000), ref: 00B47AF3
                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00B47B8F
                        • SHGetDesktopFolder.SHELL32(?), ref: 00B47BA3
                        • CoCreateInstance.OLE32(00B6FD08,00000000,00000001,00B96E6C,?), ref: 00B47BEF
                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00B47C74
                        • CoTaskMemFree.OLE32(?,?), ref: 00B47CCC
                        • SHBrowseForFolderW.SHELL32(?), ref: 00B47D57
                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00B47D7A
                        • CoTaskMemFree.OLE32(00000000), ref: 00B47D81
                        • CoTaskMemFree.OLE32(00000000), ref: 00B47DD6
                        • CoUninitialize.OLE32 ref: 00B47DDC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                        • String ID:
                        • API String ID: 2762341140-0
                        • Opcode ID: 06a455867948c69c45fcd50d1b580ee461e2c25030595dfbdc54a8ac541c5a22
                        • Instruction ID: 120425e7f6eadd54fe462b5049208ad2df330549bd35956d1419d9bfeedb84e2
                        • Opcode Fuzzy Hash: 06a455867948c69c45fcd50d1b580ee461e2c25030595dfbdc54a8ac541c5a22
                        • Instruction Fuzzy Hash: A6C11E75A04119AFCB14DF64C884DAEBBF5FF48304B1485A9E81ADB361DB31EE45CB90
                        APIs
                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00B65504
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B65515
                        • CharNextW.USER32(00000158), ref: 00B65544
                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00B65585
                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00B6559B
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B655AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CharNext
                        • String ID:
                        • API String ID: 1350042424-0
                        • Opcode ID: 48ca161ea73d5627b8178504fcdc9c1b61e86109f430f10efad3ce9dab5ab22e
                        • Instruction ID: b03ee4e771ea6c1e859c73725088e852e053de4592328286e1ded5eadf5b8254
                        • Opcode Fuzzy Hash: 48ca161ea73d5627b8178504fcdc9c1b61e86109f430f10efad3ce9dab5ab22e
                        • Instruction Fuzzy Hash: 30619071900609EFDF208F64CC85AFE7BF9EB05724F104185F665A72D0DB789AA1DB60
                        APIs
                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00B2FAAF
                        • SafeArrayAllocData.OLEAUT32(?), ref: 00B2FB08
                        • VariantInit.OLEAUT32(?), ref: 00B2FB1A
                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00B2FB3A
                        • VariantCopy.OLEAUT32(?,?), ref: 00B2FB8D
                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00B2FBA1
                        • VariantClear.OLEAUT32(?), ref: 00B2FBB6
                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00B2FBC3
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00B2FBCC
                        • VariantClear.OLEAUT32(?), ref: 00B2FBDE
                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00B2FBE9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                        • String ID:
                        • API String ID: 2706829360-0
                        • Opcode ID: b3ee3ed61a0aa51abc1d9e46f71c07fc5509e4abeb3f8fb588564d9b8f4acb7d
                        • Instruction ID: 7ac63490bb43810f1955d7af1f58a529d9057fc2696aeead147cf468795fc7f0
                        • Opcode Fuzzy Hash: b3ee3ed61a0aa51abc1d9e46f71c07fc5509e4abeb3f8fb588564d9b8f4acb7d
                        • Instruction Fuzzy Hash: D1414135A0021A9FCF00DF64D8589BDBBB9EF48354F008075E94AA7361CB74E946CFA0
                        APIs
                        • GetKeyboardState.USER32(?), ref: 00B39CA1
                        • GetAsyncKeyState.USER32(000000A0), ref: 00B39D22
                        • GetKeyState.USER32(000000A0), ref: 00B39D3D
                        • GetAsyncKeyState.USER32(000000A1), ref: 00B39D57
                        • GetKeyState.USER32(000000A1), ref: 00B39D6C
                        • GetAsyncKeyState.USER32(00000011), ref: 00B39D84
                        • GetKeyState.USER32(00000011), ref: 00B39D96
                        • GetAsyncKeyState.USER32(00000012), ref: 00B39DAE
                        • GetKeyState.USER32(00000012), ref: 00B39DC0
                        • GetAsyncKeyState.USER32(0000005B), ref: 00B39DD8
                        • GetKeyState.USER32(0000005B), ref: 00B39DEA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: State$Async$Keyboard
                        • String ID:
                        • API String ID: 541375521-0
                        • Opcode ID: 841ac7983220c53e89fdf35d856ebfdb3276e93b1cb11e6584858d4cee056102
                        • Instruction ID: 575e763eb8ebaa64fc8bb76be5d697b6f1ee61a2388770e6bcf8e4903c424ed5
                        • Opcode Fuzzy Hash: 841ac7983220c53e89fdf35d856ebfdb3276e93b1cb11e6584858d4cee056102
                        • Instruction Fuzzy Hash: 5041D8345047CA69FF309664C8053B6BEE0EF21344F5480EADAC7576C2DBE4A9C8CB92
                        APIs
                        • WSAStartup.WSOCK32(00000101,?), ref: 00B505BC
                        • inet_addr.WSOCK32(?), ref: 00B5061C
                        • gethostbyname.WSOCK32(?), ref: 00B50628
                        • IcmpCreateFile.IPHLPAPI ref: 00B50636
                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00B506C6
                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00B506E5
                        • IcmpCloseHandle.IPHLPAPI(?), ref: 00B507B9
                        • WSACleanup.WSOCK32 ref: 00B507BF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                        • String ID: Ping
                        • API String ID: 1028309954-2246546115
                        • Opcode ID: 51c826c3d64cc867273f1042f771f61da889d9795fd61bdcf68fe599a3e2771b
                        • Instruction ID: d408597afc781a49b9c940aef566772872f742f933396d43d2329e19af2c1176
                        • Opcode Fuzzy Hash: 51c826c3d64cc867273f1042f771f61da889d9795fd61bdcf68fe599a3e2771b
                        • Instruction Fuzzy Hash: 5391AE356142019FD320EF15C588F1ABBE0EF48318F1485E9E86A9B7A2D770ED49CF81
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharLower
                        • String ID: cdecl$none$stdcall$winapi
                        • API String ID: 707087890-567219261
                        • Opcode ID: ba7e1652bc73ca7eb4d03239b5a6b2da232ed4f0f52cc2d8d662c844212c56b7
                        • Instruction ID: 116aa84684e90a90a4983e1c9f083ff8945630284a4472f4b3815222816cab6d
                        • Opcode Fuzzy Hash: ba7e1652bc73ca7eb4d03239b5a6b2da232ed4f0f52cc2d8d662c844212c56b7
                        • Instruction Fuzzy Hash: 74518F32A001169BCB14DF68C981ABEB7F6EF64725B2042A9E966F72C4DB31DD44C790
                        APIs
                        • CoInitialize.OLE32 ref: 00B53774
                        • CoUninitialize.OLE32 ref: 00B5377F
                        • CoCreateInstance.OLE32(?,00000000,00000017,00B6FB78,?), ref: 00B537D9
                        • IIDFromString.OLE32(?,?), ref: 00B5384C
                        • VariantInit.OLEAUT32(?), ref: 00B538E4
                        • VariantClear.OLEAUT32(?), ref: 00B53936
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                        • API String ID: 636576611-1287834457
                        • Opcode ID: 31b79d1862dfa286679bc9686d19a95c4f4400b5eca5db01c669c6ed21fe9f0d
                        • Instruction ID: 639f27ebd66dcd67dfb219e24c9ed95ff8cf38a473aa052a0c77f833c2b089c7
                        • Opcode Fuzzy Hash: 31b79d1862dfa286679bc9686d19a95c4f4400b5eca5db01c669c6ed21fe9f0d
                        • Instruction Fuzzy Hash: E561C070608301AFD711DF54C888F6ABBE4EF49B51F104999F9859B391DB70EE48CBA2
                        APIs
                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00B433CF
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00B433F0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: LoadString$_wcslen
                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                        • API String ID: 4099089115-3080491070
                        • Opcode ID: e4c7e648f4e208ec996ba8514b88c89269785ff4ae9b8c389db3b67110aa456b
                        • Instruction ID: e68033a462230fb40dffb2a400be1175000b2c07e4dd08501aa4107ef717df78
                        • Opcode Fuzzy Hash: e4c7e648f4e208ec996ba8514b88c89269785ff4ae9b8c389db3b67110aa456b
                        • Instruction Fuzzy Hash: 86518232900109BADF14EBA0CE46EEEB7F8EF14740F1441A6F506722A1EB756F58DB61
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                        • API String ID: 1256254125-769500911
                        • Opcode ID: a2ede27708cb9f95fa7dde831cc7c212c8a647f9c61654bdd57cdc30a5c80689
                        • Instruction ID: 0562bc501af5bbed39c457cd890adf6bb0421470e717100684b712c3937bdeb6
                        • Opcode Fuzzy Hash: a2ede27708cb9f95fa7dde831cc7c212c8a647f9c61654bdd57cdc30a5c80689
                        • Instruction Fuzzy Hash: 1E41E732A000269BCB105FBDC9919BEB7E5EBA0754F3441A9E625D7289E735CD81C790
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00B453A0
                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00B45416
                        • GetLastError.KERNEL32 ref: 00B45420
                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00B454A7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Error$Mode$DiskFreeLastSpace
                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                        • API String ID: 4194297153-14809454
                        • Opcode ID: 1f11ee39c5f2080f306eb12c7c6b06f655046c6c8c4ba34f7e7094c8897c6502
                        • Instruction ID: 14ace5d6f990a2bd5483451040935d7fb438e3ae928099a37e824919f949717b
                        • Opcode Fuzzy Hash: 1f11ee39c5f2080f306eb12c7c6b06f655046c6c8c4ba34f7e7094c8897c6502
                        • Instruction Fuzzy Hash: 0E31C335A009089FDB20DF68C484AAA7BF4EF05305F1480A5E406DF397DB75DE82DB91
                        APIs
                        • CreateMenu.USER32 ref: 00B63C79
                        • SetMenu.USER32(?,00000000), ref: 00B63C88
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B63D10
                        • IsMenu.USER32(?), ref: 00B63D24
                        • CreatePopupMenu.USER32 ref: 00B63D2E
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B63D5B
                        • DrawMenuBar.USER32 ref: 00B63D63
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                        • String ID: 0$F
                        • API String ID: 161812096-3044882817
                        • Opcode ID: 74d665fb22d94763402551379207c76fcd2f40d7fddf91219f0984eb6e8eb7c4
                        • Instruction ID: df28f8b626ce40ff7a51312d2c59bab3219a130f42eae3d7322ebe69e3330684
                        • Opcode Fuzzy Hash: 74d665fb22d94763402551379207c76fcd2f40d7fddf91219f0984eb6e8eb7c4
                        • Instruction Fuzzy Hash: 3C419A78A01209EFDB14CF64DC84AAA7BF5FF49700F140069F956A73A0DB74AA10CF90
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                          • Part of subcall function 00B33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00B33CCA
                        • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00B31F64
                        • GetDlgCtrlID.USER32 ref: 00B31F6F
                        • GetParent.USER32 ref: 00B31F8B
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B31F8E
                        • GetDlgCtrlID.USER32(?), ref: 00B31F97
                        • GetParent.USER32(?), ref: 00B31FAB
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B31FAE
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$ClassName_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 711023334-1403004172
                        • Opcode ID: 92b2b28673518c6bad8262cfb8be7554ab53be7a62f1c384356a7ad70280c083
                        • Instruction ID: 9851eb284069a8ff666e0fa6a007f7de7124886a6f365f3ade91aefe4af68903
                        • Opcode Fuzzy Hash: 92b2b28673518c6bad8262cfb8be7554ab53be7a62f1c384356a7ad70280c083
                        • Instruction Fuzzy Hash: 7221B074A00214BBCF05AFA4DC859FEBBB8EF15310F104596F961672E1CB7899049B64
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                          • Part of subcall function 00B33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00B33CCA
                        • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00B32043
                        • GetDlgCtrlID.USER32 ref: 00B3204E
                        • GetParent.USER32 ref: 00B3206A
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B3206D
                        • GetDlgCtrlID.USER32(?), ref: 00B32076
                        • GetParent.USER32(?), ref: 00B3208A
                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B3208D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CtrlParent$ClassName_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 711023334-1403004172
                        • Opcode ID: c43e2639dd58d65c51ac5d86d1afc02bc6f199182785bfc1ddbf3bc7ce32586b
                        • Instruction ID: 66ef19c34387dc20afc74689b4b71230a6ab0cd939b896256c354fa1bdc275f0
                        • Opcode Fuzzy Hash: c43e2639dd58d65c51ac5d86d1afc02bc6f199182785bfc1ddbf3bc7ce32586b
                        • Instruction Fuzzy Hash: E821A475A00214BBCF15AFA0DC85EFEBFF8EF15340F104056F992A72A1DA798918DB64
                        APIs
                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00B63A9D
                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00B63AA0
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B63AC7
                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B63AEA
                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00B63B62
                        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00B63BAC
                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00B63BC7
                        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00B63BE2
                        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00B63BF6
                        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00B63C13
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$LongWindow
                        • String ID:
                        • API String ID: 312131281-0
                        • Opcode ID: 6a35649ffb9567a264ee6be6aae14b7f5615e042e88bb78cfd8b236fd767ab92
                        • Instruction ID: a62dfb554a5d1c2785d5ef840fd01cf463765f5d5be3de6dfa63038d19c0ce95
                        • Opcode Fuzzy Hash: 6a35649ffb9567a264ee6be6aae14b7f5615e042e88bb78cfd8b236fd767ab92
                        • Instruction Fuzzy Hash: FC617A75900208AFDB10DFA8CC81EEE77F8EF09704F14019AFA15A72A1D778AE46DB50
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00B3B151
                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00B3A1E1,?,00000001), ref: 00B3B165
                        • GetWindowThreadProcessId.USER32(00000000), ref: 00B3B16C
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B3A1E1,?,00000001), ref: 00B3B17B
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B3B18D
                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00B3A1E1,?,00000001), ref: 00B3B1A6
                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B3A1E1,?,00000001), ref: 00B3B1B8
                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00B3A1E1,?,00000001), ref: 00B3B1FD
                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00B3A1E1,?,00000001), ref: 00B3B212
                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00B3A1E1,?,00000001), ref: 00B3B21D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                        • String ID:
                        • API String ID: 2156557900-0
                        • Opcode ID: 7460ae6f7c414e1d871bc2a4432bd72cac1e50d3784d3ee47ac191af6269637f
                        • Instruction ID: 052c03f6e99064ca34338c923bd5c7ae0a61947ed77002f31da53eb096291547
                        • Opcode Fuzzy Hash: 7460ae6f7c414e1d871bc2a4432bd72cac1e50d3784d3ee47ac191af6269637f
                        • Instruction Fuzzy Hash: 5A318971510204BFDB209F24DC9AF7EBFE9EB52711F204155FA02D7194DBB89A408F64
                        APIs
                        • _free.LIBCMT ref: 00B02C94
                          • Part of subcall function 00B029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00B0D7D1,00000000,00000000,00000000,00000000,?,00B0D7F8,00000000,00000007,00000000,?,00B0DBF5,00000000), ref: 00B029DE
                          • Part of subcall function 00B029C8: GetLastError.KERNEL32(00000000,?,00B0D7D1,00000000,00000000,00000000,00000000,?,00B0D7F8,00000000,00000007,00000000,?,00B0DBF5,00000000,00000000), ref: 00B029F0
                        • _free.LIBCMT ref: 00B02CA0
                        • _free.LIBCMT ref: 00B02CAB
                        • _free.LIBCMT ref: 00B02CB6
                        • _free.LIBCMT ref: 00B02CC1
                        • _free.LIBCMT ref: 00B02CCC
                        • _free.LIBCMT ref: 00B02CD7
                        • _free.LIBCMT ref: 00B02CE2
                        • _free.LIBCMT ref: 00B02CED
                        • _free.LIBCMT ref: 00B02CFB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 21ae2a7a73639f9e3ea9062fe2bc1bb5015006c7bf8874b3f493d0b08ae099b9
                        • Instruction ID: 7cd5a45373e7fc5adeec254b4ac0722e4b703b0cadc4ee7a20a4c93354a279e8
                        • Opcode Fuzzy Hash: 21ae2a7a73639f9e3ea9062fe2bc1bb5015006c7bf8874b3f493d0b08ae099b9
                        • Instruction Fuzzy Hash: 81116376500108AFCB02EF54D986CDD3FA9FF05390F6145A5FA489B3A2DA31EE549B90
                        APIs
                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00AD1459
                        • OleUninitialize.OLE32(?,00000000), ref: 00AD14F8
                        • UnregisterHotKey.USER32(?), ref: 00AD16DD
                        • DestroyWindow.USER32(?), ref: 00B124B9
                        • FreeLibrary.KERNEL32(?), ref: 00B1251E
                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00B1254B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                        • String ID: close all
                        • API String ID: 469580280-3243417748
                        • Opcode ID: a5e987e49fbb4714448e3f909a043902a77b93a9bfd960ddf4383683afdec670
                        • Instruction ID: 7caa41af037833ad214f05f7f44b092857e038a2f43d5d7cb54d9585be12e6d8
                        • Opcode Fuzzy Hash: a5e987e49fbb4714448e3f909a043902a77b93a9bfd960ddf4383683afdec670
                        • Instruction Fuzzy Hash: A3D158317012129FCB19EF15C995A69F7A1FF05700F5481AEE44A6B3A2DB30ED62CF51
                        APIs
                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B47FAD
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00B47FC1
                        • GetFileAttributesW.KERNEL32(?), ref: 00B47FEB
                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00B48005
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00B48017
                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00B48060
                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00B480B0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CurrentDirectory$AttributesFile
                        • String ID: *.*
                        • API String ID: 769691225-438819550
                        • Opcode ID: 496681eb03cec5008f7e8d8ea54aa33c0c85a3551cf70bc91edf017394d82d15
                        • Instruction ID: 76ef4dcdffbb3f6665855c94f22e03193ab20857a2c962c41ed17471d415840c
                        • Opcode Fuzzy Hash: 496681eb03cec5008f7e8d8ea54aa33c0c85a3551cf70bc91edf017394d82d15
                        • Instruction Fuzzy Hash: 3781A1715882419BCB24EF14C4849AEB3E8FF88310F544D9AF885D7250EB35DE49EB92
                        APIs
                        • SetWindowLongW.USER32(?,000000EB), ref: 00AD5C7A
                          • Part of subcall function 00AD5D0A: GetClientRect.USER32(?,?), ref: 00AD5D30
                          • Part of subcall function 00AD5D0A: GetWindowRect.USER32(?,?), ref: 00AD5D71
                          • Part of subcall function 00AD5D0A: ScreenToClient.USER32(?,?), ref: 00AD5D99
                        • GetDC.USER32 ref: 00B146F5
                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00B14708
                        • SelectObject.GDI32(00000000,00000000), ref: 00B14716
                        • SelectObject.GDI32(00000000,00000000), ref: 00B1472B
                        • ReleaseDC.USER32(?,00000000), ref: 00B14733
                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00B147C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                        • String ID: U
                        • API String ID: 4009187628-3372436214
                        • Opcode ID: 4a0c4fc024193830e16268200397d7d990de764ff878bce6b23a570b05565984
                        • Instruction ID: 75531ffe7fba316827a33cbb8a29c14f6a607cbb571e396367ec49cc99275c02
                        • Opcode Fuzzy Hash: 4a0c4fc024193830e16268200397d7d990de764ff878bce6b23a570b05565984
                        • Instruction Fuzzy Hash: 5571EF30900205DFCF218F64C985AFA3BF5FF4A365F5442AAED565A2A6C7319C81DF60
                        APIs
                        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00B435E4
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                        • LoadStringW.USER32(00BA2390,?,00000FFF,?), ref: 00B4360A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: LoadString$_wcslen
                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                        • API String ID: 4099089115-2391861430
                        • Opcode ID: b9a28068e31e7e190144711c05d48ea424735f5ca6a5c044153f32672fefafa8
                        • Instruction ID: 6316721c127908ea0ab96effa0dee4b15575871b0d1b884d6c8aeaa96865853e
                        • Opcode Fuzzy Hash: b9a28068e31e7e190144711c05d48ea424735f5ca6a5c044153f32672fefafa8
                        • Instruction Fuzzy Hash: 79518272900209BADF14EBA0DD42EEEBBB4EF14700F144166F116722A1EB715B98EF61
                        APIs
                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B4C272
                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B4C29A
                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B4C2CA
                        • GetLastError.KERNEL32 ref: 00B4C322
                        • SetEvent.KERNEL32(?), ref: 00B4C336
                        • InternetCloseHandle.WININET(00000000), ref: 00B4C341
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                        • String ID:
                        • API String ID: 3113390036-3916222277
                        • Opcode ID: 04f7ae07df3ce5c134e7d75d733a973af7d27e0162d93433672bde11f1ac9086
                        • Instruction ID: 2f8a49cc9b65a561653148c179698b7a2a1125b50bf4a72e57d5da3388d3eb95
                        • Opcode Fuzzy Hash: 04f7ae07df3ce5c134e7d75d733a973af7d27e0162d93433672bde11f1ac9086
                        • Instruction Fuzzy Hash: F031A0B1601208AFD7619FA48C88ABB7FFCEB49B44F14855EF486D3250DB74DE04AB64
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00B13AAF,?,?,Bad directive syntax error,00B6CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00B398BC
                        • LoadStringW.USER32(00000000,?,00B13AAF,?), ref: 00B398C3
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00B39987
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: HandleLoadMessageModuleString_wcslen
                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                        • API String ID: 858772685-4153970271
                        • Opcode ID: 9203587d8190b226bc24d214595b6d9b0dc55169b2964d1a0f8b862a39517b85
                        • Instruction ID: b26d5030920a14b3706dfd612ff49c00b7e270def501dd099da42a6f25f337b2
                        • Opcode Fuzzy Hash: 9203587d8190b226bc24d214595b6d9b0dc55169b2964d1a0f8b862a39517b85
                        • Instruction Fuzzy Hash: 7521913290021EAFDF11AF90CD06EFE77B5FF18700F0444A6F516661A2EB759A28DB51
                        APIs
                        • GetParent.USER32 ref: 00B320AB
                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00B320C0
                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00B3214D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameParentSend
                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                        • API String ID: 1290815626-3381328864
                        • Opcode ID: 6bff5469a0274dcae495c566209af0c00f83e561bdd4356b106cd22ab687d92b
                        • Instruction ID: c2b33f156d5a30bca7d157259e406fcdddae2cf51129b9e1da84ebf6ced719fe
                        • Opcode Fuzzy Hash: 6bff5469a0274dcae495c566209af0c00f83e561bdd4356b106cd22ab687d92b
                        • Instruction Fuzzy Hash: 151106766C8B0AB9FA123720DD06DB737DCCB08364F3001E6FB04B60E1EEB568025618
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d4c919349757cbee2d88a2c55a3c291a10d4f4cc407cd2a14fb25699927dae36
                        • Instruction ID: 152e18308d7c9b8ad65c565a127a97f8fea2e7b3cbc43dbb25dff4fcd585568f
                        • Opcode Fuzzy Hash: d4c919349757cbee2d88a2c55a3c291a10d4f4cc407cd2a14fb25699927dae36
                        • Instruction Fuzzy Hash: DCC1CD74A04249AFDB11AFA8C885BADBFF0AF0A310F1441D9F955A73D2DB319A41CB61
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                        • String ID:
                        • API String ID: 1282221369-0
                        • Opcode ID: 51d4635efed83a63ef449c071cac6b7100f459f0aa85a1c8b9cf70260e0e4904
                        • Instruction ID: 200dd94fe1a16fb987501ee24e9f196c142f5d050144f580fab33d0d78342dfc
                        • Opcode Fuzzy Hash: 51d4635efed83a63ef449c071cac6b7100f459f0aa85a1c8b9cf70260e0e4904
                        • Instruction Fuzzy Hash: AD613572904302AFDB21AFB89885A6D7FE5EF01350F1442FDFD45A72C2EB3199098751
                        APIs
                        • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00B65186
                        • ShowWindow.USER32(?,00000000), ref: 00B651C7
                        • ShowWindow.USER32(?,00000005,?,00000000), ref: 00B651CD
                        • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00B651D1
                          • Part of subcall function 00B66FBA: DeleteObject.GDI32(00000000), ref: 00B66FE6
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B6520D
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B6521A
                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00B6524D
                        • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00B65287
                        • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00B65296
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                        • String ID:
                        • API String ID: 3210457359-0
                        • Opcode ID: 642a7f73ebff69e9cdbd63cc163375bd5938e830fa587ca0ea415efe07d5cc57
                        • Instruction ID: d5f02c500aa08268a448e14bb22db6b96f621951dbfefad2ae506323a4cb5924
                        • Opcode Fuzzy Hash: 642a7f73ebff69e9cdbd63cc163375bd5938e830fa587ca0ea415efe07d5cc57
                        • Instruction Fuzzy Hash: 0451B170A40A08BFEF309F24CC56BD93BE5FB06321F144092F615A62E0C7BDA9A0DB51
                        APIs
                        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00B26890
                        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00B268A9
                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00B268B9
                        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00B268D1
                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00B268F2
                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00AE8874,00000000,00000000,00000000,000000FF,00000000), ref: 00B26901
                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00B2691E
                        • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00AE8874,00000000,00000000,00000000,000000FF,00000000), ref: 00B2692D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                        • String ID:
                        • API String ID: 1268354404-0
                        • Opcode ID: 8b98a5187375e5b1f5902bcb824608a542f2f3c6de6be528f170b7738f229651
                        • Instruction ID: 6782fe757e3718399048d36c33524adc0ae48fb445b2c3e5b80c2ccaf50ee71b
                        • Opcode Fuzzy Hash: 8b98a5187375e5b1f5902bcb824608a542f2f3c6de6be528f170b7738f229651
                        • Instruction Fuzzy Hash: 9E519870600209EFDB20CF29DC95BAA7BF5EB48750F104519F95A9B2E0DBB4E990DB50
                        APIs
                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B4C182
                        • GetLastError.KERNEL32 ref: 00B4C195
                        • SetEvent.KERNEL32(?), ref: 00B4C1A9
                          • Part of subcall function 00B4C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B4C272
                          • Part of subcall function 00B4C253: GetLastError.KERNEL32 ref: 00B4C322
                          • Part of subcall function 00B4C253: SetEvent.KERNEL32(?), ref: 00B4C336
                          • Part of subcall function 00B4C253: InternetCloseHandle.WININET(00000000), ref: 00B4C341
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                        • String ID:
                        • API String ID: 337547030-0
                        • Opcode ID: 7f54b9db83ccf7f63c6661a6f56e840ad941814e2d95b3fe3aefd4c5ebb976ac
                        • Instruction ID: bab3d7bbdb58240cf45f00ba69b4ea1a68849edc8cffa4325caca5092a4bec1a
                        • Opcode Fuzzy Hash: 7f54b9db83ccf7f63c6661a6f56e840ad941814e2d95b3fe3aefd4c5ebb976ac
                        • Instruction Fuzzy Hash: A031A171102641AFDB619FB5DC44A76BFF8FF18B00B00445DF99A83610DBB5EA14AF60
                        APIs
                          • Part of subcall function 00B33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B33A57
                          • Part of subcall function 00B33A3D: GetCurrentThreadId.KERNEL32 ref: 00B33A5E
                          • Part of subcall function 00B33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00B325B3), ref: 00B33A65
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00B325BD
                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00B325DB
                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00B325DF
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00B325E9
                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00B32601
                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00B32605
                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00B3260F
                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00B32623
                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00B32627
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                        • String ID:
                        • API String ID: 2014098862-0
                        • Opcode ID: ee397519903cfce4f3238af8f07d1013b7367f179cdf0fbd221cbe03cb51e14c
                        • Instruction ID: 19ce6f3716aa3b485991bf7e64b4e6909d9f22b8efeb68e6312aafd0be434c94
                        • Opcode Fuzzy Hash: ee397519903cfce4f3238af8f07d1013b7367f179cdf0fbd221cbe03cb51e14c
                        • Instruction Fuzzy Hash: D901D430390210BBFB107768DC8AF6A3F99DF4EB12F200001F358AF0E1CDE224448A69
                        APIs
                        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00B31449,?,?,00000000), ref: 00B3180C
                        • HeapAlloc.KERNEL32(00000000,?,00B31449,?,?,00000000), ref: 00B31813
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00B31449,?,?,00000000), ref: 00B31828
                        • GetCurrentProcess.KERNEL32(?,00000000,?,00B31449,?,?,00000000), ref: 00B31830
                        • DuplicateHandle.KERNEL32(00000000,?,00B31449,?,?,00000000), ref: 00B31833
                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00B31449,?,?,00000000), ref: 00B31843
                        • GetCurrentProcess.KERNEL32(00B31449,00000000,?,00B31449,?,?,00000000), ref: 00B3184B
                        • DuplicateHandle.KERNEL32(00000000,?,00B31449,?,?,00000000), ref: 00B3184E
                        • CreateThread.KERNEL32(00000000,00000000,00B31874,00000000,00000000,00000000), ref: 00B31868
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                        • String ID:
                        • API String ID: 1957940570-0
                        • Opcode ID: f807edbdba0e3ea7b16133bf4c0f35420d1af9f032d3fcef51364db3ecd7e331
                        • Instruction ID: d6d800fd77f9f8ead9352719894a1528ef65b9d1c07e4693624df85e9d7cbbf9
                        • Opcode Fuzzy Hash: f807edbdba0e3ea7b16133bf4c0f35420d1af9f032d3fcef51364db3ecd7e331
                        • Instruction Fuzzy Hash: 1B01AC75240344BFE610AB65DC49F673BACEB8AB11F104411FA45DB1A1CAB598008B34
                        APIs
                          • Part of subcall function 00B3D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00B3D501
                          • Part of subcall function 00B3D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00B3D50F
                          • Part of subcall function 00B3D4DC: CloseHandle.KERNEL32(00000000), ref: 00B3D5DC
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B5A16D
                        • GetLastError.KERNEL32 ref: 00B5A180
                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B5A1B3
                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B5A268
                        • GetLastError.KERNEL32(00000000), ref: 00B5A273
                        • CloseHandle.KERNEL32(00000000), ref: 00B5A2C4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                        • String ID: SeDebugPrivilege
                        • API String ID: 2533919879-2896544425
                        • Opcode ID: fe64f598cfd2c917033f2f61fe8f34aabb747e787fad50b850eac9603addf06b
                        • Instruction ID: 1d3f8c441d7bafdc277d3e35a966ac36fe3204699b00551f51e1b434a7a2e801
                        • Opcode Fuzzy Hash: fe64f598cfd2c917033f2f61fe8f34aabb747e787fad50b850eac9603addf06b
                        • Instruction Fuzzy Hash: F7618A30208242AFD710DF18C495F25BBE1EF44318F5485DCE8669B7A2CB76ED49CB92
                        APIs
                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00B63925
                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00B6393A
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00B63954
                        • _wcslen.LIBCMT ref: 00B63999
                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00B639C6
                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00B639F4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$Window_wcslen
                        • String ID: SysListView32
                        • API String ID: 2147712094-78025650
                        • Opcode ID: 54560af1251dbb00fc27c87db5d70d4e4b4e09219408441860873ecb813925f9
                        • Instruction ID: ae8263dd154f58e608eff0bd3e15a5273e658c97c48c2e92d5ca1ef7e4865896
                        • Opcode Fuzzy Hash: 54560af1251dbb00fc27c87db5d70d4e4b4e09219408441860873ecb813925f9
                        • Instruction Fuzzy Hash: 3541C431A00219ABEF219F64CC45FEA7BE9EF08750F100566F959E72D1D7B99E80CB90
                        APIs
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B3BCFD
                        • IsMenu.USER32(00000000), ref: 00B3BD1D
                        • CreatePopupMenu.USER32 ref: 00B3BD53
                        • GetMenuItemCount.USER32(016B4748), ref: 00B3BDA4
                        • InsertMenuItemW.USER32(016B4748,?,00000001,00000030), ref: 00B3BDCC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                        • String ID: 0$2
                        • API String ID: 93392585-3793063076
                        • Opcode ID: 6f7c55fa67754c0e2bc9cb4d4bed659c882d030193f7d4725d3e5f82e1f8102b
                        • Instruction ID: ceec24c9215532ae9e232806cf841129b071186d272f8bfe46a551cfde77a848
                        • Opcode Fuzzy Hash: 6f7c55fa67754c0e2bc9cb4d4bed659c882d030193f7d4725d3e5f82e1f8102b
                        • Instruction Fuzzy Hash: FA51AF70A00209ABDB20DFA8D8C4FAEBBF4FF55314F3441A9E651E7299D770A941CB51
                        APIs
                        • LoadIconW.USER32(00000000,00007F03), ref: 00B3C913
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: IconLoad
                        • String ID: blank$info$question$stop$warning
                        • API String ID: 2457776203-404129466
                        • Opcode ID: 2925e2fad56d2131b9faa7dc36212d1650083a4bf819ccc581ba7c4ccf8e48c0
                        • Instruction ID: f308bf158bd62f61be1ce99f3b74a5641071a76124f83e5441c83483d3a90e20
                        • Opcode Fuzzy Hash: 2925e2fad56d2131b9faa7dc36212d1650083a4bf819ccc581ba7c4ccf8e48c0
                        • Instruction Fuzzy Hash: CA11EE32689306BAA70167D49C82DBB7BDCDF15354F3101FAF500B61C2D7A46F005364
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                        • String ID: 0.0.0.0
                        • API String ID: 642191829-3771769585
                        • Opcode ID: 8c6f9e2b7e36e3becbb3baee7dc5be38947f1ab731695d8bcf86c63e9a7d4ac2
                        • Instruction ID: d118b98006d6c40bd1df7b38ce9a38d6db9ffe14f3b0f6d5625012ecbee755e4
                        • Opcode Fuzzy Hash: 8c6f9e2b7e36e3becbb3baee7dc5be38947f1ab731695d8bcf86c63e9a7d4ac2
                        • Instruction Fuzzy Hash: B1110631904128AFCF20AB64ED4AEFF7BECDF14710F1401AAF54997091EFB59A818A50
                        APIs
                          • Part of subcall function 00AE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AE9BB2
                        • GetSystemMetrics.USER32(0000000F), ref: 00B69FC7
                        • GetSystemMetrics.USER32(0000000F), ref: 00B69FE7
                        • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00B6A224
                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00B6A242
                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00B6A263
                        • ShowWindow.USER32(00000003,00000000), ref: 00B6A282
                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00B6A2A7
                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 00B6A2CA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                        • String ID:
                        • API String ID: 1211466189-0
                        • Opcode ID: 0b27d156800a15f57f37b872c8e8d3bc0986e3b519d8a61f4e0d9f9fedfbf69f
                        • Instruction ID: dd982d4c1ee990694e65ae1ce3c18aa9ba722c0b8d49a1bfe10f605e2ab4b795
                        • Opcode Fuzzy Hash: 0b27d156800a15f57f37b872c8e8d3bc0986e3b519d8a61f4e0d9f9fedfbf69f
                        • Instruction Fuzzy Hash: 64B1A731600215ABDF14CF68C9D57AE7BF2FF45701F0880A9EC89AB295DB79A940CF61
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$LocalTime
                        • String ID:
                        • API String ID: 952045576-0
                        • Opcode ID: 99d476fe6884ecf4ffedd58b19c2b4865d806eeb142063170373adef495b439a
                        • Instruction ID: 152d4e65cfe648df67751f504a28728544b942ceb51d9c0436196aece444f984
                        • Opcode Fuzzy Hash: 99d476fe6884ecf4ffedd58b19c2b4865d806eeb142063170373adef495b439a
                        • Instruction Fuzzy Hash: 9C41D065D1021C76DB11EBF4888A9EFB7ACAF45700F508466F628E3162FB34E245C3E6
                        APIs
                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00B2682C,00000004,00000000,00000000), ref: 00AEF953
                        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00B2682C,00000004,00000000,00000000), ref: 00B2F3D1
                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00B2682C,00000004,00000000,00000000), ref: 00B2F454
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ShowWindow
                        • String ID:
                        • API String ID: 1268545403-0
                        • Opcode ID: 2ca2e36cac586b75273df05713fbbf8e9a10b5814d74bfff828d606b0275dbe1
                        • Instruction ID: 06625f75e994be75a722eed675fbde6dee15f871dc2d384c498a9f46bb1a0b56
                        • Opcode Fuzzy Hash: 2ca2e36cac586b75273df05713fbbf8e9a10b5814d74bfff828d606b0275dbe1
                        • Instruction Fuzzy Hash: 274109316086C0BEC7359B3ADD8877A7BE1EB56310F15447DE0DB57662CA75A880CB11
                        APIs
                        • DeleteObject.GDI32(00000000), ref: 00B62D1B
                        • GetDC.USER32(00000000), ref: 00B62D23
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B62D2E
                        • ReleaseDC.USER32(00000000,00000000), ref: 00B62D3A
                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00B62D76
                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00B62D87
                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00B65A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00B62DC2
                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00B62DE1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                        • String ID:
                        • API String ID: 3864802216-0
                        • Opcode ID: dce0198bba9d88f86756db93f42cc2126bd507cc7af8f6c49cefac80e0542f75
                        • Instruction ID: cfb7b203fa403e314ef2b6b961f713fedaa7b420f4ac9483bfa134dad4a4ef33
                        • Opcode Fuzzy Hash: dce0198bba9d88f86756db93f42cc2126bd507cc7af8f6c49cefac80e0542f75
                        • Instruction Fuzzy Hash: 98315A72201614BBEB118F50CC8AFBB3FA9EB09715F044065FE489B291CAB99C50CBA4
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: 807e42a04471778abe39d62c5904a7c764568abb101110a1e1255bfbacfcf730
                        • Instruction ID: 7f65723e8839f8989f41f1b6694a879313e3c0ac1327e6fecffc1dbd46e7e83d
                        • Opcode Fuzzy Hash: 807e42a04471778abe39d62c5904a7c764568abb101110a1e1255bfbacfcf730
                        • Instruction Fuzzy Hash: 4B21A7B1644A0AF7D62459209E83FBA33DDEF21384FA400A0FE059E581F724ED10C1E5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: NULL Pointer assignment$Not an Object type
                        • API String ID: 0-572801152
                        • Opcode ID: ad72f98ebbfe3b15fbc281b5484a48cc359bbb83c89a7f88fc7bd8a4c426af39
                        • Instruction ID: 614400e50078eeefdc7934c0139fe5a0f190e096a05c5ffbf47afb46afd42ced
                        • Opcode Fuzzy Hash: ad72f98ebbfe3b15fbc281b5484a48cc359bbb83c89a7f88fc7bd8a4c426af39
                        • Instruction Fuzzy Hash: 0ED18E71A0060A9FDF20CF98C891BAEB7F5FF48356F1480E9E915AB281D7719949CB50
                        APIs
                        • GetCPInfo.KERNEL32(?,?), ref: 00B115CE
                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00B11651
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00B116E4
                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00B116FB
                          • Part of subcall function 00B03820: RtlAllocateHeap.NTDLL(00000000,?,00BA1444,?,00AEFDF5,?,?,00ADA976,00000010,00BA1440,00AD13FC,?,00AD13C6,?,00AD1129), ref: 00B03852
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00B11777
                        • __freea.LIBCMT ref: 00B117A2
                        • __freea.LIBCMT ref: 00B117AE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                        • String ID:
                        • API String ID: 2829977744-0
                        • Opcode ID: ad826e568b904b929def443eb19021b16915d69eedacde52b97b05ced6de7ec1
                        • Instruction ID: 8d9dbe0ccd72fe545d6e2ba2d24e8e0d74a497349186fd8360848faaa7d69961
                        • Opcode Fuzzy Hash: ad826e568b904b929def443eb19021b16915d69eedacde52b97b05ced6de7ec1
                        • Instruction Fuzzy Hash: 3491B671E012169EDF208E78CC81AEE7BF6DF59710F984A99EA01E7281DB35DD80C760
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearInit
                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                        • API String ID: 2610073882-625585964
                        • Opcode ID: a5099675889a0b7f440ccfec38ecdc4a0d36b2c467e6362a101215f1c1c905d1
                        • Instruction ID: bc4d1cdc70a0874b1d1753edd656d728acc100d849ce964b2d4cf23ca7617863
                        • Opcode Fuzzy Hash: a5099675889a0b7f440ccfec38ecdc4a0d36b2c467e6362a101215f1c1c905d1
                        • Instruction Fuzzy Hash: B0917171A00215ABDF24CFA5D884FAE7BF8EF45719F1085D9F905AB280D7709989CFA0
                        APIs
                        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00B4125C
                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00B41284
                        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00B412A8
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00B412D8
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00B4135F
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00B413C4
                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00B41430
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                        • String ID:
                        • API String ID: 2550207440-0
                        • Opcode ID: 902e9fe51c260c676e094e5cda8293c1a627e8b526f47d50450b502936261544
                        • Instruction ID: 6055dc4c9530a938fc2c5e6caea8e396064c8c178ffe47fae2f8afeaa541b848
                        • Opcode Fuzzy Hash: 902e9fe51c260c676e094e5cda8293c1a627e8b526f47d50450b502936261544
                        • Instruction Fuzzy Hash: 8591C175E00219AFDB00DF98C885BBE77F5FF44314F1488A9E541E7291D7B4AA81DB90
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: 484a6779106b271e471607f34a0b75f24dee93c75b2e5fbd2118be124132750f
                        • Instruction ID: b0b81758a8ceb0cb6239af97a34384d17bb8a1749554dbf83ccf2319691e62c3
                        • Opcode Fuzzy Hash: 484a6779106b271e471607f34a0b75f24dee93c75b2e5fbd2118be124132750f
                        • Instruction Fuzzy Hash: 78915971D40259EFCB10CFAACC84AEEBBB8FF49320F148059E515B7291D778A942CB64
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00B5396B
                        • CharUpperBuffW.USER32(?,?), ref: 00B53A7A
                        • _wcslen.LIBCMT ref: 00B53A8A
                        • VariantClear.OLEAUT32(?), ref: 00B53C1F
                          • Part of subcall function 00B40CDF: VariantInit.OLEAUT32(00000000), ref: 00B40D1F
                          • Part of subcall function 00B40CDF: VariantCopy.OLEAUT32(?,?), ref: 00B40D28
                          • Part of subcall function 00B40CDF: VariantClear.OLEAUT32(?), ref: 00B40D34
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                        • API String ID: 4137639002-1221869570
                        • Opcode ID: 56477e3d228eec96130a10bb2bfd37cacdcafa469e58fe66eb26d4922b4c8299
                        • Instruction ID: 325eb23dcb2bbda0410eccdf40dd80453ace2e9523dc55d3c76ec4a4fc9ffc2d
                        • Opcode Fuzzy Hash: 56477e3d228eec96130a10bb2bfd37cacdcafa469e58fe66eb26d4922b4c8299
                        • Instruction Fuzzy Hash: 149168746083059FCB04DF24C58096AB7E4FF88755F1489AEF88A9B351DB31EE49CB92
                        APIs
                          • Part of subcall function 00B3000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00B2FF41,80070057,?,?,?,00B3035E), ref: 00B3002B
                          • Part of subcall function 00B3000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00B2FF41,80070057,?,?), ref: 00B30046
                          • Part of subcall function 00B3000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00B2FF41,80070057,?,?), ref: 00B30054
                          • Part of subcall function 00B3000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00B2FF41,80070057,?), ref: 00B30064
                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00B54C51
                        • _wcslen.LIBCMT ref: 00B54D59
                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00B54DCF
                        • CoTaskMemFree.OLE32(?), ref: 00B54DDA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                        • String ID: NULL Pointer assignment
                        • API String ID: 614568839-2785691316
                        • Opcode ID: 6be2ee41664c5d9759b0ecdd6c2c24fa3f60863e58892ac39d2973f695fdd7d5
                        • Instruction ID: 6150359713dd99ffb01f39e946da36963b250590a6baadf5ca8210877720848d
                        • Opcode Fuzzy Hash: 6be2ee41664c5d9759b0ecdd6c2c24fa3f60863e58892ac39d2973f695fdd7d5
                        • Instruction Fuzzy Hash: 30911671D002199BDF14DFA4D891AEEB7B8FF08304F1085AAE915A7291DB749E488F60
                        APIs
                        • GetMenu.USER32(?), ref: 00B62183
                        • GetMenuItemCount.USER32(00000000), ref: 00B621B5
                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00B621DD
                        • _wcslen.LIBCMT ref: 00B62213
                        • GetMenuItemID.USER32(?,?), ref: 00B6224D
                        • GetSubMenu.USER32(?,?), ref: 00B6225B
                          • Part of subcall function 00B33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B33A57
                          • Part of subcall function 00B33A3D: GetCurrentThreadId.KERNEL32 ref: 00B33A5E
                          • Part of subcall function 00B33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00B325B3), ref: 00B33A65
                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B622E3
                          • Part of subcall function 00B3E97B: Sleep.KERNELBASE ref: 00B3E9F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                        • String ID:
                        • API String ID: 4196846111-0
                        • Opcode ID: 959fde928d8dc15d8571e812c01072630d4e3bf3dd1f75ea72c5748317357921
                        • Instruction ID: 9d8ba9a4a5ffe81a4133f7d70d4db6ae13727821a415375fe644999d173c1c14
                        • Opcode Fuzzy Hash: 959fde928d8dc15d8571e812c01072630d4e3bf3dd1f75ea72c5748317357921
                        • Instruction Fuzzy Hash: 8A719075E00605AFDB10DF64C881AAEBBF1EF48320F108499E916FB341DB78EE418B90
                        APIs
                        • IsWindow.USER32(016B4900), ref: 00B67F37
                        • IsWindowEnabled.USER32(016B4900), ref: 00B67F43
                        • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00B6801E
                        • SendMessageW.USER32(016B4900,000000B0,?,?), ref: 00B68051
                        • IsDlgButtonChecked.USER32(?,?), ref: 00B68089
                        • GetWindowLongW.USER32(016B4900,000000EC), ref: 00B680AB
                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00B680C3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                        • String ID:
                        • API String ID: 4072528602-0
                        • Opcode ID: bf5f81426ad942adb5bde03ef905910e4c71cd9c974021741f355c7b935fbea9
                        • Instruction ID: 1d3ab44180c102305e7823bf44aeb810b3c1af268670622a21a6a614bc4ca0da
                        • Opcode Fuzzy Hash: bf5f81426ad942adb5bde03ef905910e4c71cd9c974021741f355c7b935fbea9
                        • Instruction Fuzzy Hash: 9171BE34648284AFEB219F64C884FBA7BF5EF1A304F144499F945972A1CF79AC45CB50
                        APIs
                        • GetParent.USER32(?), ref: 00B3AEF9
                        • GetKeyboardState.USER32(?), ref: 00B3AF0E
                        • SetKeyboardState.USER32(?), ref: 00B3AF6F
                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00B3AF9D
                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00B3AFBC
                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00B3AFFD
                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00B3B020
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: f998c896aee27ff3d3faabbcccf8b1dd895f2756f0ae892ac757fb0009311e78
                        • Instruction ID: 3f96eb1777bce132634e257cb898e6de24b787e219d5202a898067b41e1c29b6
                        • Opcode Fuzzy Hash: f998c896aee27ff3d3faabbcccf8b1dd895f2756f0ae892ac757fb0009311e78
                        • Instruction Fuzzy Hash: D551A1A06046D53DFB364234CC45FBBBEE99B06304F2885C9E2D99A8D2C7D9A884D751
                        APIs
                        • GetParent.USER32(00000000), ref: 00B3AD19
                        • GetKeyboardState.USER32(?), ref: 00B3AD2E
                        • SetKeyboardState.USER32(?), ref: 00B3AD8F
                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00B3ADBB
                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00B3ADD8
                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00B3AE17
                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00B3AE38
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessagePost$KeyboardState$Parent
                        • String ID:
                        • API String ID: 87235514-0
                        • Opcode ID: 5531be254cfc164f94569c98a293a6779eff607ce84f9ca37e7640eef3485eac
                        • Instruction ID: af3faef7ac15541b9a6cb1c7da490cbe5764fe097b452ac975b34b482c273792
                        • Opcode Fuzzy Hash: 5531be254cfc164f94569c98a293a6779eff607ce84f9ca37e7640eef3485eac
                        • Instruction Fuzzy Hash: E051D6A15047E53DFB368334CC95B7ABED89B46300F3885D8E1D5568C2D794EC88D752
                        APIs
                        • GetConsoleCP.KERNEL32(00B13CD6,?,?,?,?,?,?,?,?,00B05BA3,?,?,00B13CD6,?,?), ref: 00B05470
                        • __fassign.LIBCMT ref: 00B054EB
                        • __fassign.LIBCMT ref: 00B05506
                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00B13CD6,00000005,00000000,00000000), ref: 00B0552C
                        • WriteFile.KERNEL32(?,00B13CD6,00000000,00B05BA3,00000000,?,?,?,?,?,?,?,?,?,00B05BA3,?), ref: 00B0554B
                        • WriteFile.KERNEL32(?,?,00000001,00B05BA3,00000000,?,?,?,?,?,?,?,?,?,00B05BA3,?), ref: 00B05584
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                        • String ID:
                        • API String ID: 1324828854-0
                        • Opcode ID: f2e3283195ee61c3817875d4c0c5f374535a845e609583ae849df4185088e995
                        • Instruction ID: eb7a722a0692dddae0c65bc66c3f17851d9fd7b95fe598f1b4d5a475593f74b4
                        • Opcode Fuzzy Hash: f2e3283195ee61c3817875d4c0c5f374535a845e609583ae849df4185088e995
                        • Instruction Fuzzy Hash: 8A517E71A006499FDB20CFA8DC85AEEBFF9EF19300F14419AE555E7291D6709A41CF60
                        APIs
                        • _ValidateLocalCookies.LIBCMT ref: 00AF2D4B
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 00AF2D53
                        • _ValidateLocalCookies.LIBCMT ref: 00AF2DE1
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 00AF2E0C
                        • _ValidateLocalCookies.LIBCMT ref: 00AF2E61
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                        • String ID: csm
                        • API String ID: 1170836740-1018135373
                        • Opcode ID: ae04990cfb7fc199456fb8afa3b72961a1ea695c2c27827b00a317151906226a
                        • Instruction ID: 9c6211fa1528e6653dd80dd1098e5f33768f30b63a305afdde9ed51e56b907a7
                        • Opcode Fuzzy Hash: ae04990cfb7fc199456fb8afa3b72961a1ea695c2c27827b00a317151906226a
                        • Instruction Fuzzy Hash: C6418E34A0020DABCF10DFA8C845BAEBBB5BF45364F148155FA14AB292D735AE05CBD0
                        APIs
                          • Part of subcall function 00B5304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00B5307A
                          • Part of subcall function 00B5304E: _wcslen.LIBCMT ref: 00B5309B
                        • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00B51112
                        • WSAGetLastError.WSOCK32 ref: 00B51121
                        • WSAGetLastError.WSOCK32 ref: 00B511C9
                        • closesocket.WSOCK32(00000000), ref: 00B511F9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                        • String ID:
                        • API String ID: 2675159561-0
                        • Opcode ID: 41b985d65fa4f37ef5db5a61f345d0e96031c57ceda7bdb5093ddc82fd42db2a
                        • Instruction ID: e06b631483d473012530beef7633297ba1639bf13c7740849b8ed959be622867
                        • Opcode Fuzzy Hash: 41b985d65fa4f37ef5db5a61f345d0e96031c57ceda7bdb5093ddc82fd42db2a
                        • Instruction Fuzzy Hash: 4A410331200604AFDB109F28C884BB9BBE9FF44325F1484D9FD46AB291CB74AE45CBE1
                        APIs
                          • Part of subcall function 00B3DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B3CF22,?), ref: 00B3DDFD
                          • Part of subcall function 00B3DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B3CF22,?), ref: 00B3DE16
                        • lstrcmpiW.KERNEL32(?,?), ref: 00B3CF45
                        • MoveFileW.KERNEL32(?,?), ref: 00B3CF7F
                        • _wcslen.LIBCMT ref: 00B3D005
                        • _wcslen.LIBCMT ref: 00B3D01B
                        • SHFileOperationW.SHELL32(?), ref: 00B3D061
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                        • String ID: \*.*
                        • API String ID: 3164238972-1173974218
                        • Opcode ID: a172b6a2a3f7748ea6f1f0db1078ff6e89856a534b85190ff46e816c7f9d5d1d
                        • Instruction ID: 208cdfef39253248d3b1eeda1315ebca61ea544714c11fff8df416db9a847165
                        • Opcode Fuzzy Hash: a172b6a2a3f7748ea6f1f0db1078ff6e89856a534b85190ff46e816c7f9d5d1d
                        • Instruction Fuzzy Hash: 8D4134759452185EDF12EBA4D981AEEB7F9EF08340F1000E6E549EB141EF74A648CB50
                        APIs
                        • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00B62E1C
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B62E4F
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B62E84
                        • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00B62EB6
                        • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00B62EE0
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B62EF1
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B62F0B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: LongWindow$MessageSend
                        • String ID:
                        • API String ID: 2178440468-0
                        • Opcode ID: 436f2209c1ea5ce8aa15dba3b144272ac3fb4d974f868d529120cb54c92ed29e
                        • Instruction ID: 7549a6c215a055d19a5857ce0b0940a22583fa8eadbdbfab6f904a90cff484f0
                        • Opcode Fuzzy Hash: 436f2209c1ea5ce8aa15dba3b144272ac3fb4d974f868d529120cb54c92ed29e
                        • Instruction Fuzzy Hash: 31312430644640AFEB20CF58DC85F653BE0FB9A710F1401B5FA508F2B1CBBAA840DB01
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B37769
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B3778F
                        • SysAllocString.OLEAUT32(00000000), ref: 00B37792
                        • SysAllocString.OLEAUT32(?), ref: 00B377B0
                        • SysFreeString.OLEAUT32(?), ref: 00B377B9
                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00B377DE
                        • SysAllocString.OLEAUT32(?), ref: 00B377EC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                        • String ID:
                        • API String ID: 3761583154-0
                        • Opcode ID: f73e8916653c20dde66daf711cdd448939d32cd6df9e186eb368ae702c7d7ce1
                        • Instruction ID: 1069bdc9eafb1a0c092374523165391e8eb5be18d9a3b416d1db0e9fe8c64a23
                        • Opcode Fuzzy Hash: f73e8916653c20dde66daf711cdd448939d32cd6df9e186eb368ae702c7d7ce1
                        • Instruction Fuzzy Hash: A22181B6608219AFDB20DFA9CC88CBB77ECEB09764B148065F915DB290DE74DC41C7A4
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B37842
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B37868
                        • SysAllocString.OLEAUT32(00000000), ref: 00B3786B
                        • SysAllocString.OLEAUT32 ref: 00B3788C
                        • SysFreeString.OLEAUT32 ref: 00B37895
                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00B378AF
                        • SysAllocString.OLEAUT32(?), ref: 00B378BD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                        • String ID:
                        • API String ID: 3761583154-0
                        • Opcode ID: 11f73e2a6560e7ba5f9d4a41118d7c7b92f491fef87a764d7c4d477c21c21c5d
                        • Instruction ID: f0249312e700a9b85febd9d04fba4f7781c717a4e7a65cbe3d4692b2a8f9c464
                        • Opcode Fuzzy Hash: 11f73e2a6560e7ba5f9d4a41118d7c7b92f491fef87a764d7c4d477c21c21c5d
                        • Instruction Fuzzy Hash: FC21A171608205AFDB209FAADC8CDBA77ECEB09360B208165F915DB2E1DE74DC41CB64
                        APIs
                        • GetStdHandle.KERNEL32(0000000C), ref: 00B404F2
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B4052E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CreateHandlePipe
                        • String ID: nul
                        • API String ID: 1424370930-2873401336
                        • Opcode ID: 3d065473d4809d010321a3ea3b7533ee4940ddd35fd72a85704f7b9b3f373407
                        • Instruction ID: 8115fd9b0f547cd6dc70d07d9538b941de9d3b3b951dbba6116b023cbfaf4f48
                        • Opcode Fuzzy Hash: 3d065473d4809d010321a3ea3b7533ee4940ddd35fd72a85704f7b9b3f373407
                        • Instruction Fuzzy Hash: 3B2162755103059BDF20AF29DC84A6A7BF4EF55724F204A69F9E1D72E0D7709A40EF20
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 00B405C6
                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B40601
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CreateHandlePipe
                        • String ID: nul
                        • API String ID: 1424370930-2873401336
                        • Opcode ID: d16b299e36e2f60357517007c6f206730746595b6ae9db6ff780fae1863dd79c
                        • Instruction ID: c9ca19459657b8faf7b05b1d6192054620228796455f3f01f86679ebb5aeaa2e
                        • Opcode Fuzzy Hash: d16b299e36e2f60357517007c6f206730746595b6ae9db6ff780fae1863dd79c
                        • Instruction Fuzzy Hash: 7C21B7355103059BDB20AF69CC44A6A77E4FF95720F204A59FEE2E72D0D7B09A50EB10
                        APIs
                          • Part of subcall function 00AD600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00AD604C
                          • Part of subcall function 00AD600E: GetStockObject.GDI32(00000011), ref: 00AD6060
                          • Part of subcall function 00AD600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AD606A
                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00B64112
                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00B6411F
                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00B6412A
                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00B64139
                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00B64145
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$CreateObjectStockWindow
                        • String ID: Msctls_Progress32
                        • API String ID: 1025951953-3636473452
                        • Opcode ID: ce231e97490dc01ac5cc1a8eda1e742389cbc1035de239e98076dcad66587280
                        • Instruction ID: 071efb8cd8a2ec6df7dc3f333c788a5f2bdca3c6e97f8f2e22f54bf4f345c0a3
                        • Opcode Fuzzy Hash: ce231e97490dc01ac5cc1a8eda1e742389cbc1035de239e98076dcad66587280
                        • Instruction Fuzzy Hash: 9911E2B2140219BEEF108F64CC82EE77F9DEF09398F008111FB18A2090CB769C21DBA4
                        APIs
                          • Part of subcall function 00B0D7A3: _free.LIBCMT ref: 00B0D7CC
                        • _free.LIBCMT ref: 00B0D82D
                          • Part of subcall function 00B029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00B0D7D1,00000000,00000000,00000000,00000000,?,00B0D7F8,00000000,00000007,00000000,?,00B0DBF5,00000000), ref: 00B029DE
                          • Part of subcall function 00B029C8: GetLastError.KERNEL32(00000000,?,00B0D7D1,00000000,00000000,00000000,00000000,?,00B0D7F8,00000000,00000007,00000000,?,00B0DBF5,00000000,00000000), ref: 00B029F0
                        • _free.LIBCMT ref: 00B0D838
                        • _free.LIBCMT ref: 00B0D843
                        • _free.LIBCMT ref: 00B0D897
                        • _free.LIBCMT ref: 00B0D8A2
                        • _free.LIBCMT ref: 00B0D8AD
                        • _free.LIBCMT ref: 00B0D8B8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                        • Instruction ID: 5d328f8704c38d02a1c387408c03fefe1265443b22d23e168cc8a37890ab05ba
                        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                        • Instruction Fuzzy Hash: 42113D71940B04BADA21BFF4CC4BFCB7FDCAF44740F4048A5B299A65D2DA75B9098760
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00B3DA74
                        • LoadStringW.USER32(00000000), ref: 00B3DA7B
                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00B3DA91
                        • LoadStringW.USER32(00000000), ref: 00B3DA98
                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00B3DADC
                        Strings
                        • %s (%d) : ==> %s: %s %s, xrefs: 00B3DAB9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: HandleLoadModuleString$Message
                        • String ID: %s (%d) : ==> %s: %s %s
                        • API String ID: 4072794657-3128320259
                        • Opcode ID: 20b3c095fff24faf29a30ab1690be97c02042e41d4cb24b264ebc5b05ebd8420
                        • Instruction ID: 1e443e98b5dbab7c2f45271f7eb4131a4b9b4c9135b1d07397322a35c452741c
                        • Opcode Fuzzy Hash: 20b3c095fff24faf29a30ab1690be97c02042e41d4cb24b264ebc5b05ebd8420
                        • Instruction Fuzzy Hash: 3501FFF65002087BE7519BA49D89EF676ACE708701F404496F746E3081EAB89E844F74
                        APIs
                        • InterlockedExchange.KERNEL32(016AD040,016AD040), ref: 00B4097B
                        • EnterCriticalSection.KERNEL32(016AD020,00000000), ref: 00B4098D
                        • TerminateThread.KERNEL32(?,000001F6), ref: 00B4099B
                        • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00B409A9
                        • CloseHandle.KERNEL32(?), ref: 00B409B8
                        • InterlockedExchange.KERNEL32(016AD040,000001F6), ref: 00B409C8
                        • LeaveCriticalSection.KERNEL32(016AD020), ref: 00B409CF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                        • String ID:
                        • API String ID: 3495660284-0
                        • Opcode ID: a81b33a2348fbc0ae1106ddd5caff5e61912934dca3774e5e712096bff55d6d4
                        • Instruction ID: a86c90b6796e3f828a01049d4d820bfa5cbd0d558ee17bfc12fce6f367f0b8e3
                        • Opcode Fuzzy Hash: a81b33a2348fbc0ae1106ddd5caff5e61912934dca3774e5e712096bff55d6d4
                        • Instruction Fuzzy Hash: 49F03131442502BBD7415FA4EE9CBE67F35FF01702F501025F241518E0CBB99565DFA0
                        APIs
                        • GetClientRect.USER32(?,?), ref: 00AD5D30
                        • GetWindowRect.USER32(?,?), ref: 00AD5D71
                        • ScreenToClient.USER32(?,?), ref: 00AD5D99
                        • GetClientRect.USER32(?,?), ref: 00AD5ED7
                        • GetWindowRect.USER32(?,?), ref: 00AD5EF8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Rect$Client$Window$Screen
                        • String ID:
                        • API String ID: 1296646539-0
                        • Opcode ID: 94d319351a218a68915f49b2c94e176f153507d139eebd6a2925d3c841816031
                        • Instruction ID: ae6d073c5b749ba42acbdf1b12501f133f66ba5e510998e5f89a9038b4095ce4
                        • Opcode Fuzzy Hash: 94d319351a218a68915f49b2c94e176f153507d139eebd6a2925d3c841816031
                        • Instruction Fuzzy Hash: DBB16735A0068ADBDB10DFB9C4807EEB7F1FF58310F14851AE8AAD7250DB34AA91DB54
                        APIs
                        • __allrem.LIBCMT ref: 00B000BA
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B000D6
                        • __allrem.LIBCMT ref: 00B000ED
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B0010B
                        • __allrem.LIBCMT ref: 00B00122
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B00140
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                        • String ID:
                        • API String ID: 1992179935-0
                        • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                        • Instruction ID: 0abe8d89c2e94c8676303536b3cf66f2380960c570020e82caacc99b50b52732
                        • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                        • Instruction Fuzzy Hash: 0181E772A00B0A9FE720AF68CC41B6BBBE9EF41724F24457AF651D72C1E770D9408790
                        APIs
                          • Part of subcall function 00B53149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,00B5101C,00000000,?,?,00000000), ref: 00B53195
                        • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00B51DC0
                        • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00B51DE1
                        • WSAGetLastError.WSOCK32 ref: 00B51DF2
                        • inet_ntoa.WSOCK32(?), ref: 00B51E8C
                        • htons.WSOCK32(?,?,?,?,?), ref: 00B51EDB
                        • _strlen.LIBCMT ref: 00B51F35
                          • Part of subcall function 00B339E8: _strlen.LIBCMT ref: 00B339F2
                          • Part of subcall function 00AD6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,00AECF58,?,?,?), ref: 00AD6DBA
                          • Part of subcall function 00AD6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,00AECF58,?,?,?), ref: 00AD6DED
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                        • String ID:
                        • API String ID: 1923757996-0
                        • Opcode ID: 3b16d2f9197cf54115514de2eaa28a44b49ad7e954600603dfe6ece5b7bf3ed1
                        • Instruction ID: 51ccbc5478b245902c9b628e308bd36c9fbcb310c076e69df314654b3a1e9731
                        • Opcode Fuzzy Hash: 3b16d2f9197cf54115514de2eaa28a44b49ad7e954600603dfe6ece5b7bf3ed1
                        • Instruction Fuzzy Hash: 48A19C31604340AFC324DB28C895F6A7BE5EF84318F54899DF8565B2E2CB71ED4ACB91
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00AF82D9,00AF82D9,?,?,?,00B0644F,00000001,00000001,8BE85006), ref: 00B06258
                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00B0644F,00000001,00000001,8BE85006,?,?,?), ref: 00B062DE
                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00B063D8
                        • __freea.LIBCMT ref: 00B063E5
                          • Part of subcall function 00B03820: RtlAllocateHeap.NTDLL(00000000,?,00BA1444,?,00AEFDF5,?,?,00ADA976,00000010,00BA1440,00AD13FC,?,00AD13C6,?,00AD1129), ref: 00B03852
                        • __freea.LIBCMT ref: 00B063EE
                        • __freea.LIBCMT ref: 00B06413
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                        • String ID:
                        • API String ID: 1414292761-0
                        • Opcode ID: 0d221fca05d45f68ffcf0550bc7dd8f5e403a79ae7bcff6a31889628d63be0e4
                        • Instruction ID: 5242e57b15f31efb3016077ac97607c64074dddc9c79696dd3bc3300acae8062
                        • Opcode Fuzzy Hash: 0d221fca05d45f68ffcf0550bc7dd8f5e403a79ae7bcff6a31889628d63be0e4
                        • Instruction Fuzzy Hash: F351A072A00216ABDB258F68DC81EBF7FE9EF44750F1546A9F806D61C0EB34DC60C6A4
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                          • Part of subcall function 00B5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B5B6AE,?,?), ref: 00B5C9B5
                          • Part of subcall function 00B5C998: _wcslen.LIBCMT ref: 00B5C9F1
                          • Part of subcall function 00B5C998: _wcslen.LIBCMT ref: 00B5CA68
                          • Part of subcall function 00B5C998: _wcslen.LIBCMT ref: 00B5CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B5BCCA
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B5BD25
                        • RegCloseKey.ADVAPI32(00000000), ref: 00B5BD6A
                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00B5BD99
                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B5BDF3
                        • RegCloseKey.ADVAPI32(?), ref: 00B5BDFF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                        • String ID:
                        • API String ID: 1120388591-0
                        • Opcode ID: e06497de3909ce92fe97629986c15bc86c990da1e1362230d37f262e91d9fd3f
                        • Instruction ID: 62f0fab722134cbb70037b43597cebeb424740f1336d20fb62dd1c44f3c83ddb
                        • Opcode Fuzzy Hash: e06497de3909ce92fe97629986c15bc86c990da1e1362230d37f262e91d9fd3f
                        • Instruction Fuzzy Hash: C8818031208241AFD715DF24C895E2ABBF5FF84308F1449ADF5564B2A2DB31ED49CB92
                        APIs
                        • VariantInit.OLEAUT32(00000035), ref: 00B2F7B9
                        • SysAllocString.OLEAUT32(00000001), ref: 00B2F860
                        • VariantCopy.OLEAUT32(00B2FA64,00000000), ref: 00B2F889
                        • VariantClear.OLEAUT32(00B2FA64), ref: 00B2F8AD
                        • VariantCopy.OLEAUT32(00B2FA64,00000000), ref: 00B2F8B1
                        • VariantClear.OLEAUT32(?), ref: 00B2F8BB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearCopy$AllocInitString
                        • String ID:
                        • API String ID: 3859894641-0
                        • Opcode ID: 25a6eab7109ea5857dcc5abee135512d646afad749e725575efde7b05c7875cb
                        • Instruction ID: 4c6cb19009f50e4f3f6c907be7c0d5a8e04c1c45132f5257b42013648a79bd70
                        • Opcode Fuzzy Hash: 25a6eab7109ea5857dcc5abee135512d646afad749e725575efde7b05c7875cb
                        • Instruction Fuzzy Hash: 60518135600322AACF24AB65E895B79B7F4EF45710B2494B7E90ADF291DA70CC80C796
                        APIs
                          • Part of subcall function 00AD7620: _wcslen.LIBCMT ref: 00AD7625
                          • Part of subcall function 00AD6B57: _wcslen.LIBCMT ref: 00AD6B6A
                        • GetOpenFileNameW.COMDLG32(00000058), ref: 00B494E5
                        • _wcslen.LIBCMT ref: 00B49506
                        • _wcslen.LIBCMT ref: 00B4952D
                        • GetSaveFileNameW.COMDLG32(00000058), ref: 00B49585
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$FileName$OpenSave
                        • String ID: X
                        • API String ID: 83654149-3081909835
                        • Opcode ID: 3099e34194c35897e74d0257ae0ccfa4c6f4d62ddd491c698ac596ddb1befa30
                        • Instruction ID: 6a7922661a31fd7246596a2935759204b50f2d9ee9ad42381459da68de35f4ff
                        • Opcode Fuzzy Hash: 3099e34194c35897e74d0257ae0ccfa4c6f4d62ddd491c698ac596ddb1befa30
                        • Instruction Fuzzy Hash: 51E16D316043419FD724DF24C581A6BB7E0FF85314F1489ADE89A9B3A2DB31DE05DB92
                        APIs
                          • Part of subcall function 00AE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AE9BB2
                        • BeginPaint.USER32(?,?,?), ref: 00AE9241
                        • GetWindowRect.USER32(?,?), ref: 00AE92A5
                        • ScreenToClient.USER32(?,?), ref: 00AE92C2
                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00AE92D3
                        • EndPaint.USER32(?,?,?,?,?), ref: 00AE9321
                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00B271EA
                          • Part of subcall function 00AE9339: BeginPath.GDI32(00000000), ref: 00AE9357
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                        • String ID:
                        • API String ID: 3050599898-0
                        • Opcode ID: 7796fb802c9a09caed44a17a1cc2d15b246d9bfe64aeee294b350e949cd2e300
                        • Instruction ID: 93009ce890e836dbe21663842ab900b18a3bd3cebe31e408c15d35d2ee62b585
                        • Opcode Fuzzy Hash: 7796fb802c9a09caed44a17a1cc2d15b246d9bfe64aeee294b350e949cd2e300
                        • Instruction Fuzzy Hash: 67419B30104351AFD710DF29D885FBB7BA8EF46320F100669F9A4971E1CB709845CB62
                        APIs
                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00B4080C
                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00B40847
                        • EnterCriticalSection.KERNEL32(?), ref: 00B40863
                        • LeaveCriticalSection.KERNEL32(?), ref: 00B408DC
                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00B408F3
                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B40921
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                        • String ID:
                        • API String ID: 3368777196-0
                        • Opcode ID: 4cfe840219cb6339e947bc6f5d1ef2984d85e5f65a9835e657d60e1fcca2e87c
                        • Instruction ID: 52aa98d3d0079460ed6ae17e33aa4c521d273bb70906d7004c2231274a68b289
                        • Opcode Fuzzy Hash: 4cfe840219cb6339e947bc6f5d1ef2984d85e5f65a9835e657d60e1fcca2e87c
                        • Instruction Fuzzy Hash: FD417C71900205EFDF14AF55DD85A6A77B8FF04300F1440A5EE00AB297DB74EE60DBA0
                        APIs
                        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00B2F3AB,00000000,?,?,00000000,?,00B2682C,00000004,00000000,00000000), ref: 00B6824C
                        • EnableWindow.USER32(?,00000000), ref: 00B68272
                        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00B682D1
                        • ShowWindow.USER32(?,00000004), ref: 00B682E5
                        • EnableWindow.USER32(?,00000001), ref: 00B6830B
                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00B6832F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$Show$Enable$MessageSend
                        • String ID:
                        • API String ID: 642888154-0
                        • Opcode ID: 7a0bc35c1f8e8c9531492e81080407a152e98b79dee63efedae84b866f5e5fa6
                        • Instruction ID: 004ba1232c58b5581f69fea1b5f254e8e6f1f81f3585b0499efed4efe1483932
                        • Opcode Fuzzy Hash: 7a0bc35c1f8e8c9531492e81080407a152e98b79dee63efedae84b866f5e5fa6
                        • Instruction Fuzzy Hash: 2D41A334601644AFDB22CF19D8A9BE57BE0FB4A714F1843E9F5484F2A2CB79A841CF54
                        APIs
                        • IsWindowVisible.USER32(?), ref: 00B34C95
                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00B34CB2
                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00B34CEA
                        • _wcslen.LIBCMT ref: 00B34D08
                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00B34D10
                        • _wcsstr.LIBVCRUNTIME ref: 00B34D1A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                        • String ID:
                        • API String ID: 72514467-0
                        • Opcode ID: 076e56dbf20a8a790f09ce1cb78c54e7193a3042664da1d9f7496979d067f98b
                        • Instruction ID: 7a3db21f04d1ff9ca1b0f55fc60a91123138ee2beda15e5378b052992cbc7468
                        • Opcode Fuzzy Hash: 076e56dbf20a8a790f09ce1cb78c54e7193a3042664da1d9f7496979d067f98b
                        • Instruction Fuzzy Hash: 2A210432204204BBEB155B29ED49E7B7FDCDF45750F2080B9F905CB191EFA5EC0086A0
                        APIs
                          • Part of subcall function 00AD3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AD3A97,?,?,00AD2E7F,?,?,?,00000000), ref: 00AD3AC2
                        • _wcslen.LIBCMT ref: 00B4587B
                        • CoInitialize.OLE32(00000000), ref: 00B45995
                        • CoCreateInstance.OLE32(00B6FCF8,00000000,00000001,00B6FB68,?), ref: 00B459AE
                        • CoUninitialize.OLE32 ref: 00B459CC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                        • String ID: .lnk
                        • API String ID: 3172280962-24824748
                        • Opcode ID: 00399055edbc6883c9041cf69284ba3732018bb09f2a30038cfd9b1330769401
                        • Instruction ID: c1b14118e15c0a257ed09d3716a676621abb474388ab20afe3f892742471b685
                        • Opcode Fuzzy Hash: 00399055edbc6883c9041cf69284ba3732018bb09f2a30038cfd9b1330769401
                        • Instruction Fuzzy Hash: D1D14571604B019FC724DF14C58492ABBE5EF89710F14899DF88A9B362DB31EE45CB92
                        APIs
                          • Part of subcall function 00B30FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B30FCA
                          • Part of subcall function 00B30FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B30FD6
                          • Part of subcall function 00B30FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B30FE5
                          • Part of subcall function 00B30FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B30FEC
                          • Part of subcall function 00B30FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B31002
                        • GetLengthSid.ADVAPI32(?,00000000,00B31335), ref: 00B317AE
                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00B317BA
                        • HeapAlloc.KERNEL32(00000000), ref: 00B317C1
                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00B317DA
                        • GetProcessHeap.KERNEL32(00000000,00000000,00B31335), ref: 00B317EE
                        • HeapFree.KERNEL32(00000000), ref: 00B317F5
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                        • String ID:
                        • API String ID: 3008561057-0
                        • Opcode ID: e20499d84ba424fc091d139664fa7d8cde64d94ddb3e63658fd20d6a2b8a9b7f
                        • Instruction ID: 8791ca09892b56c1c45245f6fbc5cdb664632066fa4256b7da917c3f97dc72ce
                        • Opcode Fuzzy Hash: e20499d84ba424fc091d139664fa7d8cde64d94ddb3e63658fd20d6a2b8a9b7f
                        • Instruction Fuzzy Hash: 2411AF71500205EFDB20DFA8CC49BBE7BEDEB42355F244458F481A7250CB759D44CB60
                        APIs
                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00B314FF
                        • OpenProcessToken.ADVAPI32(00000000), ref: 00B31506
                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00B31515
                        • CloseHandle.KERNEL32(00000004), ref: 00B31520
                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B3154F
                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00B31563
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                        • String ID:
                        • API String ID: 1413079979-0
                        • Opcode ID: 7282256a035ea06de90690e5d481c7678cb9165fbd9c41fc5d3fabfa0491aef5
                        • Instruction ID: 46f6a80daf0e3e4a53983e0e76d995788b44ca805e38a06bdb22e238fe256879
                        • Opcode Fuzzy Hash: 7282256a035ea06de90690e5d481c7678cb9165fbd9c41fc5d3fabfa0491aef5
                        • Instruction Fuzzy Hash: 20115672500209ABDF11CFA8DD49BEE7BADEF48744F144065FA05A21A0C7B5CE60DB60
                        APIs
                        • GetLastError.KERNEL32(?,?,00AF3379,00AF2FE5), ref: 00AF3390
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00AF339E
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00AF33B7
                        • SetLastError.KERNEL32(00000000,?,00AF3379,00AF2FE5), ref: 00AF3409
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: 6a9b94a8f90baed9d38fea248cdf2a6701147732f9251ed264761c8fd9bdb125
                        • Instruction ID: fd2de9165c013a8d286f29e2474598051a707afdee0cd622a359bb1db25d8dcc
                        • Opcode Fuzzy Hash: 6a9b94a8f90baed9d38fea248cdf2a6701147732f9251ed264761c8fd9bdb125
                        • Instruction Fuzzy Hash: FA01F733609319BEEF262BF47E85A772E94EB053BAB20032AF710C62F0EF614D155554
                        APIs
                        • GetLastError.KERNEL32(?,?,00B05686,00B13CD6,?,00000000,?,00B05B6A,?,?,?,?,?,00AFE6D1,?,00B98A48), ref: 00B02D78
                        • _free.LIBCMT ref: 00B02DAB
                        • _free.LIBCMT ref: 00B02DD3
                        • SetLastError.KERNEL32(00000000,?,?,?,?,00AFE6D1,?,00B98A48,00000010,00AD4F4A,?,?,00000000,00B13CD6), ref: 00B02DE0
                        • SetLastError.KERNEL32(00000000,?,?,?,?,00AFE6D1,?,00B98A48,00000010,00AD4F4A,?,?,00000000,00B13CD6), ref: 00B02DEC
                        • _abort.LIBCMT ref: 00B02DF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$_free$_abort
                        • String ID:
                        • API String ID: 3160817290-0
                        • Opcode ID: f37937fa2ba0375aac2188c9167c646b7efd20782d69f4c00d7c544dd78c465c
                        • Instruction ID: 914e10ccaf171e187b5fb9401036946e9e6faa8917b2dbdc04f6ff570d4379d0
                        • Opcode Fuzzy Hash: f37937fa2ba0375aac2188c9167c646b7efd20782d69f4c00d7c544dd78c465c
                        • Instruction Fuzzy Hash: B4F0A43650460067D6223734AC0EA2A2EE9EFC27A5F3546F9F825932E2EE748C094164
                        APIs
                          • Part of subcall function 00AE9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AE9693
                          • Part of subcall function 00AE9639: SelectObject.GDI32(?,00000000), ref: 00AE96A2
                          • Part of subcall function 00AE9639: BeginPath.GDI32(?), ref: 00AE96B9
                          • Part of subcall function 00AE9639: SelectObject.GDI32(?,00000000), ref: 00AE96E2
                        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00B68A4E
                        • LineTo.GDI32(?,00000003,00000000), ref: 00B68A62
                        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00B68A70
                        • LineTo.GDI32(?,00000000,00000003), ref: 00B68A80
                        • EndPath.GDI32(?), ref: 00B68A90
                        • StrokePath.GDI32(?), ref: 00B68AA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                        • String ID:
                        • API String ID: 43455801-0
                        • Opcode ID: 51e1722347fbd93c95e578fd91fec5edb2caa8bf0540d1e04f3102eadc331f0e
                        • Instruction ID: 0b930833e26c43103e50e59cef776549940ddad3a71844271d4ace4a3899730f
                        • Opcode Fuzzy Hash: 51e1722347fbd93c95e578fd91fec5edb2caa8bf0540d1e04f3102eadc331f0e
                        • Instruction Fuzzy Hash: 81111B7600014CFFDF129F94DC88EAA7FACEB08390F008052FA599A1A1CB759D55DFA0
                        APIs
                        • GetDC.USER32(00000000), ref: 00B35218
                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00B35229
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B35230
                        • ReleaseDC.USER32(00000000,00000000), ref: 00B35238
                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00B3524F
                        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00B35261
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CapsDevice$Release
                        • String ID:
                        • API String ID: 1035833867-0
                        • Opcode ID: f81aaf8bd7c76b44e2df9b5f810c2ab81c75e7454c2b25b8ac7d8de3399b55f6
                        • Instruction ID: 9bb46c67d032a415574eee01ec4352532112e2b10e659a6484c57d029956224f
                        • Opcode Fuzzy Hash: f81aaf8bd7c76b44e2df9b5f810c2ab81c75e7454c2b25b8ac7d8de3399b55f6
                        • Instruction Fuzzy Hash: AE01A275E01718BBEB109BA59C49E5EBFB8EF48351F144066FA08E7280DAB09C00CFA0
                        APIs
                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AD1BF4
                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00AD1BFC
                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AD1C07
                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AD1C12
                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00AD1C1A
                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AD1C22
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Virtual
                        • String ID:
                        • API String ID: 4278518827-0
                        • Opcode ID: 3180559ebb3f4b71e62b268bc810362b77fe1be2209b1fdd06fa43c4553d93e7
                        • Instruction ID: d14694cd0290d834b33eb96a83c91db35ffd5b7f1bfe3679f710ccb44df4288e
                        • Opcode Fuzzy Hash: 3180559ebb3f4b71e62b268bc810362b77fe1be2209b1fdd06fa43c4553d93e7
                        • Instruction Fuzzy Hash: 64016CB090275A7DE3008F5A8C85B52FFA8FF19354F00411BD15C47941C7F5A864CBE5
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00B3EB30
                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00B3EB46
                        • GetWindowThreadProcessId.USER32(?,?), ref: 00B3EB55
                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B3EB64
                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B3EB6E
                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B3EB75
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                        • String ID:
                        • API String ID: 839392675-0
                        • Opcode ID: 35aa16beade9ca9721ff878f019a9405d25785b97115c0a75398f9c01b34cea3
                        • Instruction ID: 664af613cf80e196efd1323a33750e4f576dd0c0c2e3748a933805c81d65a887
                        • Opcode Fuzzy Hash: 35aa16beade9ca9721ff878f019a9405d25785b97115c0a75398f9c01b34cea3
                        • Instruction Fuzzy Hash: DFF01D72140158BBE6216752DC0DEBB7E7CEFCBB11F000159F652E21D19BE85A0186B9
                        APIs
                        • GetClientRect.USER32(?), ref: 00B27452
                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 00B27469
                        • GetWindowDC.USER32(?), ref: 00B27475
                        • GetPixel.GDI32(00000000,?,?), ref: 00B27484
                        • ReleaseDC.USER32(?,00000000), ref: 00B27496
                        • GetSysColor.USER32(00000005), ref: 00B274B0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ClientColorMessagePixelRectReleaseSendWindow
                        • String ID:
                        • API String ID: 272304278-0
                        • Opcode ID: cc3d6d0ad9c20ec8c5ff15b55fc07e90c6d76c8beed35f975d5645d91a270b88
                        • Instruction ID: 43800913e604f74cc0b556104886671b25b8b8563a188af4d0dbfb78601f95e4
                        • Opcode Fuzzy Hash: cc3d6d0ad9c20ec8c5ff15b55fc07e90c6d76c8beed35f975d5645d91a270b88
                        • Instruction Fuzzy Hash: A0017832400215EFDB506FA4EC09BBA7FB5FB04311F1040A0F96AA31E0CF751E41AB54
                        APIs
                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B3187F
                        • UnloadUserProfile.USERENV(?,?), ref: 00B3188B
                        • CloseHandle.KERNEL32(?), ref: 00B31894
                        • CloseHandle.KERNEL32(?), ref: 00B3189C
                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00B318A5
                        • HeapFree.KERNEL32(00000000), ref: 00B318AC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                        • String ID:
                        • API String ID: 146765662-0
                        • Opcode ID: bc230821d903a06d1a1a7f3dbcc36ef64a636990fb23201a599b0deb60500938
                        • Instruction ID: 450f4e6d8de16615e8203e07a85f72bb10ec21d8aa1aab7e8931309fc72ae941
                        • Opcode Fuzzy Hash: bc230821d903a06d1a1a7f3dbcc36ef64a636990fb23201a599b0deb60500938
                        • Instruction Fuzzy Hash: D9E0E536004101BBDB016FA2ED0C92ABF39FF4AB22B108221F265921B0CFB69420DF60
                        APIs
                          • Part of subcall function 00AD7620: _wcslen.LIBCMT ref: 00AD7625
                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B3C6EE
                        • _wcslen.LIBCMT ref: 00B3C735
                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B3C79C
                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00B3C7CA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ItemMenu$Info_wcslen$Default
                        • String ID: 0
                        • API String ID: 1227352736-4108050209
                        • Opcode ID: d0ca760723c1cef3fa6173c08ab57cd04cc6c71921aa6dd913b2e9e252d4837c
                        • Instruction ID: 27d1758c7dccaa7ed7834b739559ab4534c43779d1793e32d918eece57e7ce2b
                        • Opcode Fuzzy Hash: d0ca760723c1cef3fa6173c08ab57cd04cc6c71921aa6dd913b2e9e252d4837c
                        • Instruction Fuzzy Hash: 2D51DF716043009BD7549FA8C886B6BBBE8EF49310F240AADF996F31A0DB70DD04CB52
                        APIs
                        • ShellExecuteExW.SHELL32(0000003C), ref: 00B5AEA3
                          • Part of subcall function 00AD7620: _wcslen.LIBCMT ref: 00AD7625
                        • GetProcessId.KERNEL32(00000000), ref: 00B5AF38
                        • CloseHandle.KERNEL32(00000000), ref: 00B5AF67
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CloseExecuteHandleProcessShell_wcslen
                        • String ID: <$@
                        • API String ID: 146682121-1426351568
                        • Opcode ID: ea38c384a45d42670179214b26c59a2ec23486830f5cd4972f4f97c50296e817
                        • Instruction ID: a16032f4544ed19cce76e740863822dbd04f30c79cd79a9921dfdeab37c3666a
                        • Opcode Fuzzy Hash: ea38c384a45d42670179214b26c59a2ec23486830f5cd4972f4f97c50296e817
                        • Instruction Fuzzy Hash: 02718970A00219DFCB14EF94D585A9EBBF0FF08310F14859AE816AB3A2DB74ED45CB91
                        APIs
                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00B37206
                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00B3723C
                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00B3724D
                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00B372CF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$AddressCreateInstanceProc
                        • String ID: DllGetClassObject
                        • API String ID: 753597075-1075368562
                        • Opcode ID: 1ac2daef56be4055d417d366d93459ea04b012327af95d039cbe1510115c4781
                        • Instruction ID: 1dc9034371deff5abf4f571c5074ace1cf432fa5a53fa1caa411f810ed871446
                        • Opcode Fuzzy Hash: 1ac2daef56be4055d417d366d93459ea04b012327af95d039cbe1510115c4781
                        • Instruction Fuzzy Hash: 5B414DB1644205AFDB25CF54CC84AAB7BE9EF49310F2480EDBD059F24ADBB5D944CBA0
                        APIs
                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B63E35
                        • IsMenu.USER32(?), ref: 00B63E4A
                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B63E92
                        • DrawMenuBar.USER32 ref: 00B63EA5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Menu$Item$DrawInfoInsert
                        • String ID: 0
                        • API String ID: 3076010158-4108050209
                        • Opcode ID: 0be0bc9246b7332c61e0f0bcb1deecb3655467ecfd3419edf769be876c893f35
                        • Instruction ID: 1b779aece7d4df1ab74a393a7587aec7e6967a40a672582732b48931aab367fe
                        • Opcode Fuzzy Hash: 0be0bc9246b7332c61e0f0bcb1deecb3655467ecfd3419edf769be876c893f35
                        • Instruction Fuzzy Hash: 36416775A00209EFDB10DF54D884AAABBF9FF49750F0441AAF905AB250D739AE41CF70
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                          • Part of subcall function 00B33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00B33CCA
                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00B31E66
                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00B31E79
                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00B31EA9
                          • Part of subcall function 00AD6B57: _wcslen.LIBCMT ref: 00AD6B6A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$_wcslen$ClassName
                        • String ID: ComboBox$ListBox
                        • API String ID: 2081771294-1403004172
                        • Opcode ID: d91cb88507f49622efd527eae1226d2294a0f19fa720e5a58861813e922626ac
                        • Instruction ID: 7b26d1cae74a4b44028f570f6c0833e56423cb6215698ed1b0be383bba3b6d8c
                        • Opcode Fuzzy Hash: d91cb88507f49622efd527eae1226d2294a0f19fa720e5a58861813e922626ac
                        • Instruction Fuzzy Hash: 54213871A40104BEDB14AB68DD85CFFBBFCDF45350F20456AF826A72E1DB794D0A9620
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: HKEY_LOCAL_MACHINE$HKLM
                        • API String ID: 176396367-4004644295
                        • Opcode ID: 0c6a313a7128ce0f7542fe20ec8e05b6bf6c92bfcbca15e1d046ea54e73f1f72
                        • Instruction ID: d44008ca252dfe2ee10d09afa04c0135bbec12b859046fa5c6e100b153bbe1a7
                        • Opcode Fuzzy Hash: 0c6a313a7128ce0f7542fe20ec8e05b6bf6c92bfcbca15e1d046ea54e73f1f72
                        • Instruction Fuzzy Hash: AC31E5336006694ECB20DE6C99402BF3FD3DBA1751B1540E9EC556B249EA70CD48D7A0
                        APIs
                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00B62F8D
                        • LoadLibraryW.KERNEL32(?), ref: 00B62F94
                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00B62FA9
                        • DestroyWindow.USER32(?), ref: 00B62FB1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$DestroyLibraryLoadWindow
                        • String ID: SysAnimate32
                        • API String ID: 3529120543-1011021900
                        • Opcode ID: ad76b62f9258b00cd5ead815770f4c1441ac583a2fce48ac96c706483b08a095
                        • Instruction ID: e0dc2e3040757225e94070914df2dbdbadd8b0aa86cb437242e8485f79d4a7a8
                        • Opcode Fuzzy Hash: ad76b62f9258b00cd5ead815770f4c1441ac583a2fce48ac96c706483b08a095
                        • Instruction Fuzzy Hash: 05219A72204A05ABFB104FA4DC80EBB37F9EB69364F104669FA50D71A0DBB9DC519B60
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00AF4D1E,00B028E9,?,00AF4CBE,00B028E9,00B988B8,0000000C,00AF4E15,00B028E9,00000002), ref: 00AF4D8D
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00AF4DA0
                        • FreeLibrary.KERNEL32(00000000,?,?,?,00AF4D1E,00B028E9,?,00AF4CBE,00B028E9,00B988B8,0000000C,00AF4E15,00B028E9,00000002,00000000), ref: 00AF4DC3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: aa830aefceb9d1b4932b6121e18bf85272e6ab2b83f157991275e7081511d9f3
                        • Instruction ID: c7d553724f29077ee0242a13b31867fd9babdd666da6faee64bf09e30a50976f
                        • Opcode Fuzzy Hash: aa830aefceb9d1b4932b6121e18bf85272e6ab2b83f157991275e7081511d9f3
                        • Instruction Fuzzy Hash: 41F03C34A40208ABDB159B94DC49BBEBFE5EF48752F0040A5FA49A32A0DF745D40DA90
                        APIs
                        • LoadLibraryA.KERNEL32 ref: 00B2D3AD
                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00B2D3BF
                        • FreeLibrary.KERNEL32(00000000), ref: 00B2D3E5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: GetSystemWow64DirectoryW$X64
                        • API String ID: 145871493-2590602151
                        • Opcode ID: a44a8bf1499ec175780e6b05dac8868344f4d812a5399e9036b401b2102b14d6
                        • Instruction ID: 33b05426f574c5a3031dd18dec9cfab209b7d916c1aed229f091865505b49799
                        • Opcode Fuzzy Hash: a44a8bf1499ec175780e6b05dac8868344f4d812a5399e9036b401b2102b14d6
                        • Instruction Fuzzy Hash: B8F05531405630DBD7705B10EC88BBD3BE0EF02B01BA481D9F54EF2150DF64CD40868A
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00AD4EDD,?,00BA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AD4E9C
                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00AD4EAE
                        • FreeLibrary.KERNEL32(00000000,?,?,00AD4EDD,?,00BA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AD4EC0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                        • API String ID: 145871493-3689287502
                        • Opcode ID: 5fc3c88a740397fde2cd221942406672dfa08dda8cc35fc6d5e27b3d02a7587b
                        • Instruction ID: 3fdea7caee1d0fcee0a47d9fa5c1dd866827d49ba27be47a27e7c661c3b46c7c
                        • Opcode Fuzzy Hash: 5fc3c88a740397fde2cd221942406672dfa08dda8cc35fc6d5e27b3d02a7587b
                        • Instruction Fuzzy Hash: 9AE0CD35A055226BD23117256C1CBBF7B94AF86F627090116FD45F3350DFB8CD0140A0
                        APIs
                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00B13CDE,?,00BA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AD4E62
                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00AD4E74
                        • FreeLibrary.KERNEL32(00000000,?,?,00B13CDE,?,00BA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AD4E87
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Library$AddressFreeLoadProc
                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                        • API String ID: 145871493-1355242751
                        • Opcode ID: a58011b16217319b42d2fb722a7cf2bccd12860c752806c8c2c7e85b7e96a9b6
                        • Instruction ID: f841d0cbaec95292f0ed7a0eae085d8013478a0a6c4061ec5924972d43c3c350
                        • Opcode Fuzzy Hash: a58011b16217319b42d2fb722a7cf2bccd12860c752806c8c2c7e85b7e96a9b6
                        • Instruction Fuzzy Hash: 54D01235502661675A221B25AC18EEB7F58AFCAF513050666F946B3265CFB8CD0185D0
                        APIs
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B42C05
                        • DeleteFileW.KERNEL32(?), ref: 00B42C87
                        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00B42C9D
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B42CAE
                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B42CC0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: File$Delete$Copy
                        • String ID:
                        • API String ID: 3226157194-0
                        • Opcode ID: ed57e223f12c3579b2b3fca97da8bc265d2ff2a1adacc3d16bd8e1f44d858767
                        • Instruction ID: b7b5582f1618c5ab6d25f9aad3b37a3b972b7c55fc034ac383766c50cf116560
                        • Opcode Fuzzy Hash: ed57e223f12c3579b2b3fca97da8bc265d2ff2a1adacc3d16bd8e1f44d858767
                        • Instruction Fuzzy Hash: 58B13C71D00119ABDF21DBA4CD85EEEBBBDEF48350F5040A6FA09E6251EA309B449B61
                        APIs
                        • GetCurrentProcessId.KERNEL32 ref: 00B5A427
                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00B5A435
                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00B5A468
                        • CloseHandle.KERNEL32(?), ref: 00B5A63D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Process$CloseCountersCurrentHandleOpen
                        • String ID:
                        • API String ID: 3488606520-0
                        • Opcode ID: 0e1478ec453b5f8483936e4fdcb4fb0037a8bdfba73f08546855fa421fd5e441
                        • Instruction ID: 25824323101686834b8ec9b3d6c4dd522daeb5842c58f9fbe59223913984edee
                        • Opcode Fuzzy Hash: 0e1478ec453b5f8483936e4fdcb4fb0037a8bdfba73f08546855fa421fd5e441
                        • Instruction Fuzzy Hash: 75A19D716043019FD720DF24D982F2AB7E5AF48714F14899DF99A9B392DAB0EC44CB92
                        APIs
                          • Part of subcall function 00B3DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B3CF22,?), ref: 00B3DDFD
                          • Part of subcall function 00B3DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B3CF22,?), ref: 00B3DE16
                          • Part of subcall function 00B3E199: GetFileAttributesW.KERNEL32(?,00B3CF95), ref: 00B3E19A
                        • lstrcmpiW.KERNEL32(?,?), ref: 00B3E473
                        • MoveFileW.KERNEL32(?,?), ref: 00B3E4AC
                        • _wcslen.LIBCMT ref: 00B3E5EB
                        • _wcslen.LIBCMT ref: 00B3E603
                        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00B3E650
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                        • String ID:
                        • API String ID: 3183298772-0
                        • Opcode ID: 6e08c9dd0f897bd0fbb0641adbe8114faf258d5f841e8f678b5c6c77c95bbb32
                        • Instruction ID: 3eb01c1da2f93c86681926dc82ab8688fe8761b16cb597df5b72abdd493e0c72
                        • Opcode Fuzzy Hash: 6e08c9dd0f897bd0fbb0641adbe8114faf258d5f841e8f678b5c6c77c95bbb32
                        • Instruction Fuzzy Hash: 175180B24083459BC724EBA0D8819EF77ECAF84340F10496FF699D3191EF74E6888766
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                          • Part of subcall function 00B5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B5B6AE,?,?), ref: 00B5C9B5
                          • Part of subcall function 00B5C998: _wcslen.LIBCMT ref: 00B5C9F1
                          • Part of subcall function 00B5C998: _wcslen.LIBCMT ref: 00B5CA68
                          • Part of subcall function 00B5C998: _wcslen.LIBCMT ref: 00B5CA9E
                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B5BAA5
                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B5BB00
                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00B5BB63
                        • RegCloseKey.ADVAPI32(?,?), ref: 00B5BBA6
                        • RegCloseKey.ADVAPI32(00000000), ref: 00B5BBB3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                        • String ID:
                        • API String ID: 826366716-0
                        • Opcode ID: d205466220489ab4ce420eed1801e8545a0dd7878ecf310fffb64f739d33a151
                        • Instruction ID: 075316cd6c4c8f422c714f6d0a09097113a82b2614824b208fb2e2fa86c3bda3
                        • Opcode Fuzzy Hash: d205466220489ab4ce420eed1801e8545a0dd7878ecf310fffb64f739d33a151
                        • Instruction Fuzzy Hash: 90616D31208241AFD714DF14C590F2ABBE5FF84308F54859DF89A8B2A2DB71ED49CB92
                        APIs
                        • VariantInit.OLEAUT32(?), ref: 00B38BCD
                        • VariantClear.OLEAUT32 ref: 00B38C3E
                        • VariantClear.OLEAUT32 ref: 00B38C9D
                        • VariantClear.OLEAUT32(?), ref: 00B38D10
                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00B38D3B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Variant$Clear$ChangeInitType
                        • String ID:
                        • API String ID: 4136290138-0
                        • Opcode ID: 51fdc73495a6a7db0e3bfd6dbf4a42b8e3ab7c580aeccfb342fddb3862dccf83
                        • Instruction ID: 0b0072c16d1dc4c39ff37578ba4062b22081ba53c4de789803997cfa698a5180
                        • Opcode Fuzzy Hash: 51fdc73495a6a7db0e3bfd6dbf4a42b8e3ab7c580aeccfb342fddb3862dccf83
                        • Instruction Fuzzy Hash: 1D515BB5A00219EFCB14CF58C894AAAB7F5FF89310F158569F905DB350EB34E911CB90
                        APIs
                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00B48BAE
                        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00B48BDA
                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00B48C32
                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00B48C57
                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00B48C5F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: PrivateProfile$SectionWrite$String
                        • String ID:
                        • API String ID: 2832842796-0
                        • Opcode ID: 8c95451c8602dcf6abcfb92990344b833362782aa69d0a0217e77e446ab85807
                        • Instruction ID: ffb312bde2257be8a9407984846084c786187111d6bbd06f363d4de39a781d03
                        • Opcode Fuzzy Hash: 8c95451c8602dcf6abcfb92990344b833362782aa69d0a0217e77e446ab85807
                        • Instruction Fuzzy Hash: 34515C35A002199FCB05DF65C980A6DBBF5FF48314F088499E84AAB3A2DB35ED41DB91
                        APIs
                        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00B58F40
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00B58FD0
                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00B58FEC
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00B59032
                        • FreeLibrary.KERNEL32(00000000), ref: 00B59052
                          • Part of subcall function 00AEF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00B41043,?,753CE610), ref: 00AEF6E6
                          • Part of subcall function 00AEF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00B2FA64,00000000,00000000,?,?,00B41043,?,753CE610,?,00B2FA64), ref: 00AEF70D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                        • String ID:
                        • API String ID: 666041331-0
                        • Opcode ID: 89f397add0799e8d6ce40d7f1066583bd1d84f2f9487447038c341c065e51416
                        • Instruction ID: 692886a578805cdfe2ef7f999c639dfbafd6748e1001ab4189949ef809f74812
                        • Opcode Fuzzy Hash: 89f397add0799e8d6ce40d7f1066583bd1d84f2f9487447038c341c065e51416
                        • Instruction Fuzzy Hash: E3514835600245DFC704DF58C5949ADBBF1FF49315B0884E9E80AAB362DB31ED8ACB91
                        APIs
                        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00B66C33
                        • SetWindowLongW.USER32(?,000000EC,?), ref: 00B66C4A
                        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00B66C73
                        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00B4AB79,00000000,00000000), ref: 00B66C98
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00B66CC7
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$Long$MessageSendShow
                        • String ID:
                        • API String ID: 3688381893-0
                        • Opcode ID: 9d55ae0bea349b4a0fa5585eb5fb601a676b77c6d99a4e920850fe2e84e62eee
                        • Instruction ID: 1cdaee15f9c2e9aa487a5fffc47da01fe3ee5ce6f835bae3617944521a55093d
                        • Opcode Fuzzy Hash: 9d55ae0bea349b4a0fa5585eb5fb601a676b77c6d99a4e920850fe2e84e62eee
                        • Instruction Fuzzy Hash: DB41D635A04504AFD724CF28CC95FB57FE5EB09350F1402A8F895A72E0C779AD41CA40
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: fa611eec6bde11150b12ec856f1a76cb8cacae7d2680da686252b445b80b3b6b
                        • Instruction ID: 32317794e93de3e8a7b7f0b4ae10c158df6216a4e00764632a7f9452cb3c8ff0
                        • Opcode Fuzzy Hash: fa611eec6bde11150b12ec856f1a76cb8cacae7d2680da686252b445b80b3b6b
                        • Instruction Fuzzy Hash: 4041D232A003009FCB24DF78C985A5DBBF5EF89314F1585A9E615EB391EA31AD05CB90
                        APIs
                        • GetCursorPos.USER32(?), ref: 00AE9141
                        • ScreenToClient.USER32(00000000,?), ref: 00AE915E
                        • GetAsyncKeyState.USER32(00000001), ref: 00AE9183
                        • GetAsyncKeyState.USER32(00000002), ref: 00AE919D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: AsyncState$ClientCursorScreen
                        • String ID:
                        • API String ID: 4210589936-0
                        • Opcode ID: e5daef8d7858f23a5eef6c961165b320a1786bd38459533e2840271d4ae2c625
                        • Instruction ID: fcee6fe01c621c9371eb18080333fafaf38ca98ff27b1510045cfd7d34dba9ff
                        • Opcode Fuzzy Hash: e5daef8d7858f23a5eef6c961165b320a1786bd38459533e2840271d4ae2c625
                        • Instruction Fuzzy Hash: 13416F31A0861AFBDF199F65D844BEEB7B4FF05320F208359E429A32D0CB746950CB91
                        APIs
                        • GetInputState.USER32 ref: 00B438CB
                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00B43922
                        • TranslateMessage.USER32(?), ref: 00B4394B
                        • DispatchMessageW.USER32(?), ref: 00B43955
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B43966
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                        • String ID:
                        • API String ID: 2256411358-0
                        • Opcode ID: baf9936e03db54479e8976f418d9a5a7e58f48fdd5e1145029c266f7d9572b93
                        • Instruction ID: c676667c52b9885d0e849c6ce48ab1cd0d01f619de8f4887bf1197e73d801f80
                        • Opcode Fuzzy Hash: baf9936e03db54479e8976f418d9a5a7e58f48fdd5e1145029c266f7d9572b93
                        • Instruction Fuzzy Hash: BE318A705043419EEB65CB359849B7677E8EB16704F0C4599D4A3831D0EBF49B85EB11
                        APIs
                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 00B4CF38
                        • InternetReadFile.WININET(?,00000000,?,?), ref: 00B4CF6F
                        • GetLastError.KERNEL32(?,00000000,?,?,?,00B4C21E,00000000), ref: 00B4CFB4
                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,00B4C21E,00000000), ref: 00B4CFC8
                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,00B4C21E,00000000), ref: 00B4CFF2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                        • String ID:
                        • API String ID: 3191363074-0
                        • Opcode ID: 976e6fb0236a113784653cda5f8c5e1853134c3e8be586f4f2527b9e977b5909
                        • Instruction ID: 41c01e09073adcdcc4c8c20e15ba1db6da8604f5b78709f8056423c851b69990
                        • Opcode Fuzzy Hash: 976e6fb0236a113784653cda5f8c5e1853134c3e8be586f4f2527b9e977b5909
                        • Instruction Fuzzy Hash: 9A318C71601205EFDB60DFA5C884ABBBFF9EB14710B1044AEF546D3141EB38AE48EB60
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00B31915
                        • PostMessageW.USER32(00000001,00000201,00000001), ref: 00B319C1
                        • Sleep.KERNEL32(00000000,?,?,?), ref: 00B319C9
                        • PostMessageW.USER32(00000001,00000202,00000000), ref: 00B319DA
                        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00B319E2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessagePostSleep$RectWindow
                        • String ID:
                        • API String ID: 3382505437-0
                        • Opcode ID: fb110e6d547c13af122e01abc483998f165ae445645a706e471a706c0bc52d21
                        • Instruction ID: 226e839d0be236bb43ce76ccbc87cb4d01d49cbb5f63404073555e3064602ef1
                        • Opcode Fuzzy Hash: fb110e6d547c13af122e01abc483998f165ae445645a706e471a706c0bc52d21
                        • Instruction Fuzzy Hash: FC31BE71900219EFCB00CFACC998BAE3BB9EB04315F208765FA61A72D0C7B09955CB90
                        APIs
                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00B65745
                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00B6579D
                        • _wcslen.LIBCMT ref: 00B657AF
                        • _wcslen.LIBCMT ref: 00B657BA
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B65816
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$_wcslen
                        • String ID:
                        • API String ID: 763830540-0
                        • Opcode ID: 4f5d6584eb2d0f6e910da26e59e37598d3cd8177a2b397cda21ae8248fbaa1f1
                        • Instruction ID: d2ab3ba8657ccb9aac825283f949c31f6762694eb599b7272b0f8350382cef91
                        • Opcode Fuzzy Hash: 4f5d6584eb2d0f6e910da26e59e37598d3cd8177a2b397cda21ae8248fbaa1f1
                        • Instruction Fuzzy Hash: 712144719046189ADB309FA4CC85AFE7BF8FF04724F104296FA299B1C4DB789995CF50
                        APIs
                        • IsWindow.USER32(00000000), ref: 00B50951
                        • GetForegroundWindow.USER32 ref: 00B50968
                        • GetDC.USER32(00000000), ref: 00B509A4
                        • GetPixel.GDI32(00000000,?,00000003), ref: 00B509B0
                        • ReleaseDC.USER32(00000000,00000003), ref: 00B509E8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$ForegroundPixelRelease
                        • String ID:
                        • API String ID: 4156661090-0
                        • Opcode ID: 72bfdde75fc54ccd7ed5df63a07786fc52970fcfdc683060d04b7c01138bb912
                        • Instruction ID: 75b6b98e506ab7686a0ca9678f9a514fbabf5fa2a5b15bfed4fb7f59f36a61d1
                        • Opcode Fuzzy Hash: 72bfdde75fc54ccd7ed5df63a07786fc52970fcfdc683060d04b7c01138bb912
                        • Instruction Fuzzy Hash: 7D219335A00204AFD704EF69D984AAEBBF5EF48701F0484ADF85AD7392CB74AD44DB50
                        APIs
                        • GetEnvironmentStringsW.KERNEL32 ref: 00B0CDC6
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B0CDE9
                          • Part of subcall function 00B03820: RtlAllocateHeap.NTDLL(00000000,?,00BA1444,?,00AEFDF5,?,?,00ADA976,00000010,00BA1440,00AD13FC,?,00AD13C6,?,00AD1129), ref: 00B03852
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00B0CE0F
                        • _free.LIBCMT ref: 00B0CE22
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00B0CE31
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                        • String ID:
                        • API String ID: 336800556-0
                        • Opcode ID: eac9410fb430c52fee3a8aec283db246ec27964835f682aa80fbcbf2bdc1e4cc
                        • Instruction ID: d461ba2fddaaf649f7cdd3c543877db88b1c04d96e45025db2ebb4d579d5f10f
                        • Opcode Fuzzy Hash: eac9410fb430c52fee3a8aec283db246ec27964835f682aa80fbcbf2bdc1e4cc
                        • Instruction Fuzzy Hash: 6501D8726012157FA3211BB6AC8CC7F6DEDDEC6BA131502A9FD05D7280DF649D0191B0
                        APIs
                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AE9693
                        • SelectObject.GDI32(?,00000000), ref: 00AE96A2
                        • BeginPath.GDI32(?), ref: 00AE96B9
                        • SelectObject.GDI32(?,00000000), ref: 00AE96E2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ObjectSelect$BeginCreatePath
                        • String ID:
                        • API String ID: 3225163088-0
                        • Opcode ID: 983b3204ac802c46b6dd8948aac2d04d862d95933a5e4a358bad5c203d331f2f
                        • Instruction ID: dbf68c45e18e1f16c66cb516a1428c91504a7ef09c96e3cc728d37c5aec995c1
                        • Opcode Fuzzy Hash: 983b3204ac802c46b6dd8948aac2d04d862d95933a5e4a358bad5c203d331f2f
                        • Instruction Fuzzy Hash: D6218030802385EBDB119F29EC167AB3BB8BB02355F100616F410A71F0DBB45992CBA4
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _memcmp
                        • String ID:
                        • API String ID: 2931989736-0
                        • Opcode ID: 73db76b14c4ca6559c3657a00c2fb546691c30c6b4e5b9c62aca5698925ca6cf
                        • Instruction ID: bd6fb8f506c198eab786b0121627505a821a97530a6ffd2f56ee669799ab75ef
                        • Opcode Fuzzy Hash: 73db76b14c4ca6559c3657a00c2fb546691c30c6b4e5b9c62aca5698925ca6cf
                        • Instruction Fuzzy Hash: 7701B57274560AFBD2285510AE82FBB73DDDB31394F6540A0FE049E241F764ED10C2E0
                        APIs
                        • GetLastError.KERNEL32(?,?,?,00AFF2DE,00B03863,00BA1444,?,00AEFDF5,?,?,00ADA976,00000010,00BA1440,00AD13FC,?,00AD13C6), ref: 00B02DFD
                        • _free.LIBCMT ref: 00B02E32
                        • _free.LIBCMT ref: 00B02E59
                        • SetLastError.KERNEL32(00000000,00AD1129), ref: 00B02E66
                        • SetLastError.KERNEL32(00000000,00AD1129), ref: 00B02E6F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$_free
                        • String ID:
                        • API String ID: 3170660625-0
                        • Opcode ID: b02c236b0edad1f2f37c550d09a933ebfbec9a02c78e2d52b1901105edfbac7f
                        • Instruction ID: 628f87345af076a550d956159de8a638036185a25f98a77b8705eae70eb4b4c8
                        • Opcode Fuzzy Hash: b02c236b0edad1f2f37c550d09a933ebfbec9a02c78e2d52b1901105edfbac7f
                        • Instruction Fuzzy Hash: 2901F4362856006BC6123734ED8DD2B2EEDEBD17A1B3140A9F865A32E2EF748C094124
                        APIs
                        • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00B2FF41,80070057,?,?,?,00B3035E), ref: 00B3002B
                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00B2FF41,80070057,?,?), ref: 00B30046
                        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00B2FF41,80070057,?,?), ref: 00B30054
                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00B2FF41,80070057,?), ref: 00B30064
                        • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00B2FF41,80070057,?,?), ref: 00B30070
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: From$Prog$FreeStringTasklstrcmpi
                        • String ID:
                        • API String ID: 3897988419-0
                        • Opcode ID: a3e35db0a548c1e5ac52406aae74f87111ea8f380631dc47cc136070097d016b
                        • Instruction ID: 39d71230c7a4e6f1638d5a2f3bdd08a3b7b0bf83cf963e49aded64c61e03699a
                        • Opcode Fuzzy Hash: a3e35db0a548c1e5ac52406aae74f87111ea8f380631dc47cc136070097d016b
                        • Instruction Fuzzy Hash: 8001F276610208BFDB206F68DC44BBA7EEDEF44751F208064F845D3210DBB8CD008BA0
                        APIs
                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B31114
                        • GetLastError.KERNEL32(?,00000000,00000000,?,?,00B30B9B,?,?,?), ref: 00B31120
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00B30B9B,?,?,?), ref: 00B3112F
                        • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00B30B9B,?,?,?), ref: 00B31136
                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B3114D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 842720411-0
                        • Opcode ID: 88846280306c762d99e97c11165704507ce4cfed912c6ffa9ec691148be85e5b
                        • Instruction ID: 1c468cc3e512a565d71f005d8664d3fba5861f7ca132a27a055d9447a5fa86cd
                        • Opcode Fuzzy Hash: 88846280306c762d99e97c11165704507ce4cfed912c6ffa9ec691148be85e5b
                        • Instruction Fuzzy Hash: 84011D75200605BFDB114F69DC49ABA3FAEEF85360B204455FA85D7390DE75DC009A60
                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B30FCA
                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B30FD6
                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B30FE5
                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B30FEC
                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B31002
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: cbb5537e848c9fe3eb626f5c3919c083697a7f30783ec1d8d06603b51a20f296
                        • Instruction ID: cab94266ed9403251fdd71a4a35e06cc1eb701dcde45c00f88dcf520e4700f01
                        • Opcode Fuzzy Hash: cbb5537e848c9fe3eb626f5c3919c083697a7f30783ec1d8d06603b51a20f296
                        • Instruction Fuzzy Hash: D2F04F35100301BBD7214FA99C59F663FADEF8A761F204454FA85D7291CEB5DC408A60
                        APIs
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00B3102A
                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00B31036
                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B31045
                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00B3104C
                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B31062
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: HeapInformationToken$AllocErrorLastProcess
                        • String ID:
                        • API String ID: 44706859-0
                        • Opcode ID: 766f8807ecfe12ce16d384db5c87e4135fb285f9b9d6b2a2307d22dbbe81e5e5
                        • Instruction ID: 028efb80961ab87e962f2817e29824f4a2107e8ecb4cf48f2db1398b067adf78
                        • Opcode Fuzzy Hash: 766f8807ecfe12ce16d384db5c87e4135fb285f9b9d6b2a2307d22dbbe81e5e5
                        • Instruction Fuzzy Hash: 8DF06D35200301FBDB215FA9EC59F663FADEF8A761F200824FA85D7290CEB5D8408A60
                        APIs
                        • CloseHandle.KERNEL32(?,?,?,?,00B4017D,?,00B432FC,?,00000001,00B12592,?), ref: 00B40324
                        • CloseHandle.KERNEL32(?,?,?,?,00B4017D,?,00B432FC,?,00000001,00B12592,?), ref: 00B40331
                        • CloseHandle.KERNEL32(?,?,?,?,00B4017D,?,00B432FC,?,00000001,00B12592,?), ref: 00B4033E
                        • CloseHandle.KERNEL32(?,?,?,?,00B4017D,?,00B432FC,?,00000001,00B12592,?), ref: 00B4034B
                        • CloseHandle.KERNEL32(?,?,?,?,00B4017D,?,00B432FC,?,00000001,00B12592,?), ref: 00B40358
                        • CloseHandle.KERNEL32(?,?,?,?,00B4017D,?,00B432FC,?,00000001,00B12592,?), ref: 00B40365
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CloseHandle
                        • String ID:
                        • API String ID: 2962429428-0
                        • Opcode ID: 6318b5d6cd070f3582aa1be01ea28436518a8bfe25c7e043160bdf23ee4d0bd6
                        • Instruction ID: 708b3ac86772d82fec4e4ff3fe01df326dd9b35bc3487a580e5e15cbbc5816d0
                        • Opcode Fuzzy Hash: 6318b5d6cd070f3582aa1be01ea28436518a8bfe25c7e043160bdf23ee4d0bd6
                        • Instruction Fuzzy Hash: B401EE72800B118FCB30AF66D880812FBF9FF603053048A3FD29252930C3B0AA58EF84
                        APIs
                        • _free.LIBCMT ref: 00B0D752
                          • Part of subcall function 00B029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00B0D7D1,00000000,00000000,00000000,00000000,?,00B0D7F8,00000000,00000007,00000000,?,00B0DBF5,00000000), ref: 00B029DE
                          • Part of subcall function 00B029C8: GetLastError.KERNEL32(00000000,?,00B0D7D1,00000000,00000000,00000000,00000000,?,00B0D7F8,00000000,00000007,00000000,?,00B0DBF5,00000000,00000000), ref: 00B029F0
                        • _free.LIBCMT ref: 00B0D764
                        • _free.LIBCMT ref: 00B0D776
                        • _free.LIBCMT ref: 00B0D788
                        • _free.LIBCMT ref: 00B0D79A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 15a35884a29af922dc76b569c1eebdc1f33da2bdf3c511f6472ecbc6f9e0ad8a
                        • Instruction ID: 84e1eb492cf63d5f56560e702467be0dd886c6d3f9a6ef361cb2b588d774c40a
                        • Opcode Fuzzy Hash: 15a35884a29af922dc76b569c1eebdc1f33da2bdf3c511f6472ecbc6f9e0ad8a
                        • Instruction Fuzzy Hash: 56F01232544204ABC621EBA8FAC5C167FDDFB447507B40896F048E76C1CB30FC8086B4
                        APIs
                        • GetDlgItem.USER32(?,000003E9), ref: 00B35C58
                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00B35C6F
                        • MessageBeep.USER32(00000000), ref: 00B35C87
                        • KillTimer.USER32(?,0000040A), ref: 00B35CA3
                        • EndDialog.USER32(?,00000001), ref: 00B35CBD
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                        • String ID:
                        • API String ID: 3741023627-0
                        • Opcode ID: 3f9ba200b82b7d26c2e949bdb4e37fff5f403dd28bad783d0731c1ae99b15da1
                        • Instruction ID: 1e6eb5d312f473cb8083d50a117613b951c6c00f5dcaf189f895f3865e2547be
                        • Opcode Fuzzy Hash: 3f9ba200b82b7d26c2e949bdb4e37fff5f403dd28bad783d0731c1ae99b15da1
                        • Instruction Fuzzy Hash: 71013630500B04ABEB315B14DD8EFB67BF8FB04B05F54259AE583A24E1DBF4A985CA94
                        APIs
                        • _free.LIBCMT ref: 00B022BE
                          • Part of subcall function 00B029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00B0D7D1,00000000,00000000,00000000,00000000,?,00B0D7F8,00000000,00000007,00000000,?,00B0DBF5,00000000), ref: 00B029DE
                          • Part of subcall function 00B029C8: GetLastError.KERNEL32(00000000,?,00B0D7D1,00000000,00000000,00000000,00000000,?,00B0D7F8,00000000,00000007,00000000,?,00B0DBF5,00000000,00000000), ref: 00B029F0
                        • _free.LIBCMT ref: 00B022D0
                        • _free.LIBCMT ref: 00B022E3
                        • _free.LIBCMT ref: 00B022F4
                        • _free.LIBCMT ref: 00B02305
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: c86a38432fd5d522739d7ebc613af24ce92bcc1118feb246cd381fb458897a44
                        • Instruction ID: edd9019ef8ef40ca089fc9dd3f9bb484df2ea0c6e307d82caad5613bbf41acbb
                        • Opcode Fuzzy Hash: c86a38432fd5d522739d7ebc613af24ce92bcc1118feb246cd381fb458897a44
                        • Instruction Fuzzy Hash: 42F03AB58202208FCA12BF58BC469583FE4F72A7A0F50099BF410E33F1CF314815ABA4
                        APIs
                        • EndPath.GDI32(?), ref: 00AE95D4
                        • StrokeAndFillPath.GDI32(?,?,00B271F7,00000000,?,?,?), ref: 00AE95F0
                        • SelectObject.GDI32(?,00000000), ref: 00AE9603
                        • DeleteObject.GDI32 ref: 00AE9616
                        • StrokePath.GDI32(?), ref: 00AE9631
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Path$ObjectStroke$DeleteFillSelect
                        • String ID:
                        • API String ID: 2625713937-0
                        • Opcode ID: c0e6079429309183479c2bff3cb1e353e1184f36fce83c7e398f56cb82c9f001
                        • Instruction ID: 61340c3d6bc104dda1aaa6e74114f09c41f038df93a800ad3d44b8ea9984da1a
                        • Opcode Fuzzy Hash: c0e6079429309183479c2bff3cb1e353e1184f36fce83c7e398f56cb82c9f001
                        • Instruction Fuzzy Hash: E0F01431006348EBDB625F6EED19B663F61AB02362F048215F4A5670F1CF788996DF20
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: __freea$_free
                        • String ID: a/p$am/pm
                        • API String ID: 3432400110-3206640213
                        • Opcode ID: 855a3161003bb218deaf09d70fcc9a06c4e53958dee7393980cd4171468bfef3
                        • Instruction ID: cfea14aefbaf947425c953603309167b903cba59d14ec804e6de102815efa8cb
                        • Opcode Fuzzy Hash: 855a3161003bb218deaf09d70fcc9a06c4e53958dee7393980cd4171468bfef3
                        • Instruction Fuzzy Hash: 4AD1EF31900206AACB2C9F6CC895BBABFF5FF05700F2449D9E941AB6D0D6759D80CBA5
                        APIs
                          • Part of subcall function 00AF0242: EnterCriticalSection.KERNEL32(00BA070C,00BA1884,?,?,00AE198B,00BA2518,?,?,?,00AD12F9,00000000), ref: 00AF024D
                          • Part of subcall function 00AF0242: LeaveCriticalSection.KERNEL32(00BA070C,?,00AE198B,00BA2518,?,?,?,00AD12F9,00000000), ref: 00AF028A
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                          • Part of subcall function 00AF00A3: __onexit.LIBCMT ref: 00AF00A9
                        • __Init_thread_footer.LIBCMT ref: 00B57BFB
                          • Part of subcall function 00AF01F8: EnterCriticalSection.KERNEL32(00BA070C,?,?,00AE8747,00BA2514), ref: 00AF0202
                          • Part of subcall function 00AF01F8: LeaveCriticalSection.KERNEL32(00BA070C,?,00AE8747,00BA2514), ref: 00AF0235
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                        • String ID: 5$G$Variable must be of type 'Object'.
                        • API String ID: 535116098-3733170431
                        • Opcode ID: 2e10de759aecab1d11f71dbd29bdb79c47f7903bd89c85c5100896187ba01d53
                        • Instruction ID: 9038fbd792e8a238bf96e6fc3c6fee9c2fd2c43dbe44a64ca83b9b89d963fc60
                        • Opcode Fuzzy Hash: 2e10de759aecab1d11f71dbd29bdb79c47f7903bd89c85c5100896187ba01d53
                        • Instruction Fuzzy Hash: 82917B70B44209AFCB14EF54E991AADB7F1EF49301F1080D9FC069B292DB71AE49CB51
                        APIs
                          • Part of subcall function 00B3B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00B321D0,?,?,00000034,00000800,?,00000034), ref: 00B3B42D
                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00B32760
                          • Part of subcall function 00B3B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00B321FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00B3B3F8
                          • Part of subcall function 00B3B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00B3B355
                          • Part of subcall function 00B3B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00B32194,00000034,?,?,00001004,00000000,00000000), ref: 00B3B365
                          • Part of subcall function 00B3B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00B32194,00000034,?,?,00001004,00000000,00000000), ref: 00B3B37B
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00B327CD
                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00B3281A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                        • String ID: @
                        • API String ID: 4150878124-2766056989
                        • Opcode ID: 40e3b21b048fe03857e2f74289d7a98185410cdacd92aa4f44573d66f9744f00
                        • Instruction ID: d26fb72938432236bbde50d6aa6f1d5fae341a3549bbf2164f1ecdcacaf4d4b5
                        • Opcode Fuzzy Hash: 40e3b21b048fe03857e2f74289d7a98185410cdacd92aa4f44573d66f9744f00
                        • Instruction Fuzzy Hash: C3410976900218BFDB10DBA4CD85EEEBBB8EF09700F204099FA55B7181DB706E45CBA1
                        APIs
                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00B01769
                        • _free.LIBCMT ref: 00B01834
                        • _free.LIBCMT ref: 00B0183E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _free$FileModuleName
                        • String ID: C:\Users\user\Desktop\file.exe
                        • API String ID: 2506810119-1957095476
                        • Opcode ID: 357a34a22490f9d7500ca3df5003a47decdaaba65f8a5ea55b5fed9209004b8e
                        • Instruction ID: 33017be64c60661fc2481ce5649608210988fc673aab186f29636cffc239ec66
                        • Opcode Fuzzy Hash: 357a34a22490f9d7500ca3df5003a47decdaaba65f8a5ea55b5fed9209004b8e
                        • Instruction Fuzzy Hash: CC318EB5A00318EFDB25DF9D9885D9EBFFCEB85310F1045A6F80497291DA708E44CB90
                        APIs
                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00B3C306
                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00B3C34C
                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00BA1990,016B4748), ref: 00B3C395
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Menu$Delete$InfoItem
                        • String ID: 0
                        • API String ID: 135850232-4108050209
                        • Opcode ID: 0dddbbb87689bb74d2a0776a39e287a69c14d559288b118d5c6fa00c9fdaa20a
                        • Instruction ID: 9e49cbecea8f452c35ee190f3b56d04ba81fd62ca848ac9a9a6f1c60950af842
                        • Opcode Fuzzy Hash: 0dddbbb87689bb74d2a0776a39e287a69c14d559288b118d5c6fa00c9fdaa20a
                        • Instruction Fuzzy Hash: 7341B2312043019FD720DF64D885B2ABFE4EF85310F20869DF9A5A72D2D770E904CB56
                        APIs
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00B6CC08,00000000,?,?,?,?), ref: 00B644AA
                        • GetWindowLongW.USER32 ref: 00B644C7
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B644D7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID: SysTreeView32
                        • API String ID: 847901565-1698111956
                        • Opcode ID: 803030aab2a9748e165c2d061285d1542f6274b0ba02bd00871a9d87786ceb0d
                        • Instruction ID: 3807f8a2fc3025e67240b9d10b5fa3ddbcb52289414bf5392a7200f1454b226d
                        • Opcode Fuzzy Hash: 803030aab2a9748e165c2d061285d1542f6274b0ba02bd00871a9d87786ceb0d
                        • Instruction Fuzzy Hash: 76317E31210605ABDB219E38DC46BEA7BA9EB19324F204765F976932E0DB78AC509B50
                        APIs
                          • Part of subcall function 00B5335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00B53077,?,?), ref: 00B53378
                        • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00B5307A
                        • _wcslen.LIBCMT ref: 00B5309B
                        • htons.WSOCK32(00000000,?,?,00000000), ref: 00B53106
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                        • String ID: 255.255.255.255
                        • API String ID: 946324512-2422070025
                        • Opcode ID: bd6437e44ca5ee164ec5e7345cae49f93b8f41f8cbe1de1670a5e1bb4e5119c4
                        • Instruction ID: 7e030e8f8e10a9db8b371892b1f8b1cc7b61755eddcfba9ee278b2ec7a40f43e
                        • Opcode Fuzzy Hash: bd6437e44ca5ee164ec5e7345cae49f93b8f41f8cbe1de1670a5e1bb4e5119c4
                        • Instruction Fuzzy Hash: EC31B2352002059FCB20CF68C585FAA77E0EF14795F2880D9E9159B392DB72DE49C760
                        APIs
                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00B63F40
                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00B63F54
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B63F78
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$Window
                        • String ID: SysMonthCal32
                        • API String ID: 2326795674-1439706946
                        • Opcode ID: a2f9b7c759b0bcc779fddbd3d7584f2de9be98bf7928da0921a407f34916b14e
                        • Instruction ID: ec2b680bcc2a630791c0713085eb422ee6ecd46b630ab9bbc3430e56155ea157
                        • Opcode Fuzzy Hash: a2f9b7c759b0bcc779fddbd3d7584f2de9be98bf7928da0921a407f34916b14e
                        • Instruction Fuzzy Hash: D921BF32600219BBDF118F90CC46FEA3BF9EB48714F110254FA156B1D0DAB9A8508BA0
                        APIs
                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00B64705
                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00B64713
                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00B6471A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$DestroyWindow
                        • String ID: msctls_updown32
                        • API String ID: 4014797782-2298589950
                        • Opcode ID: 8b9e9dbeba5c17795ea81d01ee95e586bec0cc3f60701ccd1cd92d80a29326c6
                        • Instruction ID: 91b8f42698f9bc375195db327eaf5d99a52d9c6ced5b4b2f99c999a62db9e21c
                        • Opcode Fuzzy Hash: 8b9e9dbeba5c17795ea81d01ee95e586bec0cc3f60701ccd1cd92d80a29326c6
                        • Instruction Fuzzy Hash: EE215EB5600609AFDB10DF68DCD1DB737EDEB5B3A4B040499FA019B2A1CB74EC51CA60
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                        • API String ID: 176396367-2734436370
                        • Opcode ID: a489371d3855b55c741c52b0ff3e86ad31ce3a48047ce82caa56aa6e3734541e
                        • Instruction ID: 211cf41531dd71b7b70c8cca4d1b6d0d3f20dfd8d600f854f04018f068485bcd
                        • Opcode Fuzzy Hash: a489371d3855b55c741c52b0ff3e86ad31ce3a48047ce82caa56aa6e3734541e
                        • Instruction Fuzzy Hash: 9D21573220561166D331AB28DD43FBB73D8EFA1300F64406AFA4A97181EBD5ED85C395
                        APIs
                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00B63840
                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00B63850
                        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00B63876
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend$MoveWindow
                        • String ID: Listbox
                        • API String ID: 3315199576-2633736733
                        • Opcode ID: a3a959bf47a6a29b067cae7c74d9cd3545cb2ff50e1373018bb28abeb26ea0f3
                        • Instruction ID: 596b1dcae48001fcbee836d96493f55b59b4b94c2db102f8ed8fb6e5ad6aadcf
                        • Opcode Fuzzy Hash: a3a959bf47a6a29b067cae7c74d9cd3545cb2ff50e1373018bb28abeb26ea0f3
                        • Instruction Fuzzy Hash: 1821B072610118BBEF118F54CC81EBB37EEEF89B50F108164F9059B190CAB9DC5187A0
                        APIs
                        • SetErrorMode.KERNEL32(00000001), ref: 00B44A08
                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00B44A5C
                        • SetErrorMode.KERNEL32(00000000,?,?,00B6CC08), ref: 00B44AD0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorMode$InformationVolume
                        • String ID: %lu
                        • API String ID: 2507767853-685833217
                        • Opcode ID: 62cdcc5ae2ed0824e88a01f2ec72e792cb96c4dc90dcf458068dc33018a9ab45
                        • Instruction ID: 40a1375d834eff2f4843ac58c89c839ce877fcd2e4feb35bbe10fa4908bee3f4
                        • Opcode Fuzzy Hash: 62cdcc5ae2ed0824e88a01f2ec72e792cb96c4dc90dcf458068dc33018a9ab45
                        • Instruction Fuzzy Hash: B1314F75A00109AFDB10DF54C985EAA7BF8EF09308F1480A5F909DB362DB75EE45CB61
                        APIs
                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00B6424F
                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00B64264
                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00B64271
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: msctls_trackbar32
                        • API String ID: 3850602802-1010561917
                        • Opcode ID: 634fedec4bb8a568dfafd48aba8f6032dd364cc73cc5df29abd8469ed38d463d
                        • Instruction ID: a7233bf871bd00e078e9e69120dbd21e49c3f06381e321847dcf0b470e676e18
                        • Opcode Fuzzy Hash: 634fedec4bb8a568dfafd48aba8f6032dd364cc73cc5df29abd8469ed38d463d
                        • Instruction Fuzzy Hash: 5311E031250208BEEF205E28CC46FAB3BECEF85B64F110524FA55E60A0D6B5DC619B20
                        APIs
                          • Part of subcall function 00AD6B57: _wcslen.LIBCMT ref: 00AD6B6A
                          • Part of subcall function 00B32DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00B32DC5
                          • Part of subcall function 00B32DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B32DD6
                          • Part of subcall function 00B32DA7: GetCurrentThreadId.KERNEL32 ref: 00B32DDD
                          • Part of subcall function 00B32DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00B32DE4
                        • GetFocus.USER32 ref: 00B32F78
                          • Part of subcall function 00B32DEE: GetParent.USER32(00000000), ref: 00B32DF9
                        • GetClassNameW.USER32(?,?,00000100), ref: 00B32FC3
                        • EnumChildWindows.USER32(?,00B3303B), ref: 00B32FEB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                        • String ID: %s%d
                        • API String ID: 1272988791-1110647743
                        • Opcode ID: 6cf09be69b30e9a8483a00f89e93f0c88af22ca0a215809f9e458e08cfb484a2
                        • Instruction ID: 464dd28dd444a50750a2c18657520fba1c2e8e1ac8fa051934a053a41d0d77d3
                        • Opcode Fuzzy Hash: 6cf09be69b30e9a8483a00f89e93f0c88af22ca0a215809f9e458e08cfb484a2
                        • Instruction Fuzzy Hash: 2A11AF71600205ABDF157F64CC85FEE37EAEF84304F1440B6F909AB2A2DE7499498B70
                        APIs
                        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00B658C1
                        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00B658EE
                        • DrawMenuBar.USER32(?), ref: 00B658FD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Menu$InfoItem$Draw
                        • String ID: 0
                        • API String ID: 3227129158-4108050209
                        • Opcode ID: 96a0ef44816714f83e0a8ca9f3c7ff9324394b341a1fa4305cd710d690a3cfc2
                        • Instruction ID: 56b2f3f5d50aff2bc323d5d47e9ba9cca671fd9231368fd96b48888ed33e905e
                        • Opcode Fuzzy Hash: 96a0ef44816714f83e0a8ca9f3c7ff9324394b341a1fa4305cd710d690a3cfc2
                        • Instruction Fuzzy Hash: C1016D31500258EFDB219F11DC85BAEBBB4FB45360F1080E9E889D6291DF789A94DF31
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9f02cf75b26e20f61be4b36a4a5fe8f815968df930db36127098674dfaf5fcfa
                        • Instruction ID: 672dcc0e57fad9cddbef27947a7c99f36db586d979edf20d7a6b79ba08c04fe8
                        • Opcode Fuzzy Hash: 9f02cf75b26e20f61be4b36a4a5fe8f815968df930db36127098674dfaf5fcfa
                        • Instruction Fuzzy Hash: CBC14875A1020AEFDB14DFA8C8A4AAEB7F5FF48704F208598E505EB251D731EE41CB94
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: __alldvrm$_strrchr
                        • String ID:
                        • API String ID: 1036877536-0
                        • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                        • Instruction ID: 59a35d2a8e42b9ea72994f57d6658956c4e4612f9b8596859fbd22c9e4312e0f
                        • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                        • Instruction Fuzzy Hash: F1A125B1A003869FDB25CF18C8917AEBFE5EF65350F1841EDE685AB2C1D7349981C750
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Variant$ClearInitInitializeUninitialize
                        • String ID:
                        • API String ID: 1998397398-0
                        • Opcode ID: 8adf0e462ed104647b6c239826d6570fdc001b79872f9b8e777a549ae6909409
                        • Instruction ID: 1dcd41956484b4aeea93dd1e1e0b26ed67476765b837084d6baa10954af95222
                        • Opcode Fuzzy Hash: 8adf0e462ed104647b6c239826d6570fdc001b79872f9b8e777a549ae6909409
                        • Instruction Fuzzy Hash: 40A159756042009FCB10DF28D585A2AB7E5FF88755F04899DFD8A9B362DB30EE05CB92
                        APIs
                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00B6FC08,?), ref: 00B305F0
                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00B6FC08,?), ref: 00B30608
                        • CLSIDFromProgID.OLE32(?,?,00000000,00B6CC40,000000FF,?,00000000,00000800,00000000,?,00B6FC08,?), ref: 00B3062D
                        • _memcmp.LIBVCRUNTIME ref: 00B3064E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: FromProg$FreeTask_memcmp
                        • String ID:
                        • API String ID: 314563124-0
                        • Opcode ID: 5127179e486c96440b7125ba79751403c16cc06beebcf0ef57f711706e0ad27e
                        • Instruction ID: 9d6d4dc5cc98f39861181eee1e02ad187c47c3c48491b136c8009a30593afcb1
                        • Opcode Fuzzy Hash: 5127179e486c96440b7125ba79751403c16cc06beebcf0ef57f711706e0ad27e
                        • Instruction Fuzzy Hash: BF811A71A10109EFCB04DF94C994EEEB7F9FF89315F208599E506AB250DB71AE06CB60
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _free
                        • String ID:
                        • API String ID: 269201875-0
                        • Opcode ID: 53fc0164504f647cb93dc617cdbfc5c584f8749167fef737e0b45d03e509fa3d
                        • Instruction ID: 6f28c7e009b62131cb77183c5645d86ef1d3100c1f7863babd97d4ca17f2a24b
                        • Opcode Fuzzy Hash: 53fc0164504f647cb93dc617cdbfc5c584f8749167fef737e0b45d03e509fa3d
                        • Instruction Fuzzy Hash: 01415B31600204ABDB216FFC9C856FE3EE5EF41770F644AE5F619D33D2E63448815A62
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00B662E2
                        • ScreenToClient.USER32(?,?), ref: 00B66315
                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00B66382
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$ClientMoveRectScreen
                        • String ID:
                        • API String ID: 3880355969-0
                        • Opcode ID: fd0e973d8917632a0fa18ca8c08523275646a04a27b5591b54eaa76daf996f63
                        • Instruction ID: ea6a05b3238f16de18ba2ff9ebc948f245617a3587b124472949785582c4c25b
                        • Opcode Fuzzy Hash: fd0e973d8917632a0fa18ca8c08523275646a04a27b5591b54eaa76daf996f63
                        • Instruction Fuzzy Hash: 86512A74A00209AFCF14DF68D8819AE7BF5FB45360F10859AF9559B390DB34ED81CB54
                        APIs
                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00B51AFD
                        • WSAGetLastError.WSOCK32 ref: 00B51B0B
                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00B51B8A
                        • WSAGetLastError.WSOCK32 ref: 00B51B94
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorLast$socket
                        • String ID:
                        • API String ID: 1881357543-0
                        • Opcode ID: 6f70b12a2baf9ebabffa901b7b027e0a83150e440b7b5b4a4385d291a9a95d4d
                        • Instruction ID: 284b60d4aef531f7be222482ab19a1aacb925ed932400eb0c9c8407da630200e
                        • Opcode Fuzzy Hash: 6f70b12a2baf9ebabffa901b7b027e0a83150e440b7b5b4a4385d291a9a95d4d
                        • Instruction Fuzzy Hash: CF41A034600200AFE720AF24C986F7A77E5EB48718F548499F95A9F3D2D7B2ED41CB91
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 547924383e242634534468c89639d7e1f157923314821290f28586ec5f1967cb
                        • Instruction ID: 70506e74be897b37a5a656c4d96ed75b7d91d693b93976d84c067add341a9aa3
                        • Opcode Fuzzy Hash: 547924383e242634534468c89639d7e1f157923314821290f28586ec5f1967cb
                        • Instruction Fuzzy Hash: 6E41C172A00704AFD7249F78CC41FAEBFE9EB88710F1085AAF555DB2C2D7719A418790
                        APIs
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00B45783
                        • GetLastError.KERNEL32(?,00000000), ref: 00B457A9
                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00B457CE
                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00B457FA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CreateHardLink$DeleteErrorFileLast
                        • String ID:
                        • API String ID: 3321077145-0
                        • Opcode ID: 998f2f45535e8329c964eba68640ccd9adabe407708da52fb6347ef8c2c9afab
                        • Instruction ID: a4dae2502969bbf5b158205086b245cc4955af8e3fcc70d328e1618a67998003
                        • Opcode Fuzzy Hash: 998f2f45535e8329c964eba68640ccd9adabe407708da52fb6347ef8c2c9afab
                        • Instruction Fuzzy Hash: 71414E35600A11DFCB25DF15C544A5EBBE2EF89720B198499EC4BAB362DB34FD00DB91
                        APIs
                        • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00AF6D71,00000000,00000000,00AF82D9,?,00AF82D9,?,00000001,00AF6D71,8BE85006,00000001,00AF82D9,00AF82D9), ref: 00B0D910
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00B0D999
                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00B0D9AB
                        • __freea.LIBCMT ref: 00B0D9B4
                          • Part of subcall function 00B03820: RtlAllocateHeap.NTDLL(00000000,?,00BA1444,?,00AEFDF5,?,?,00ADA976,00000010,00BA1440,00AD13FC,?,00AD13C6,?,00AD1129), ref: 00B03852
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                        • String ID:
                        • API String ID: 2652629310-0
                        • Opcode ID: 89bfbb1a07eb7d7edd73590b99acee4e3494293376eeb315fdf1b20dedab493b
                        • Instruction ID: f3cd8ac5a279e7956c2cf26472cb08561c7cc29a04bae2d2f0938ab5d40f697f
                        • Opcode Fuzzy Hash: 89bfbb1a07eb7d7edd73590b99acee4e3494293376eeb315fdf1b20dedab493b
                        • Instruction Fuzzy Hash: 8031AD72A0020AABDF249FA4DD85EAE7FE5EB41710B0542A8FC04D72D0EB35CD50CBA0
                        APIs
                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00B65352
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B65375
                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B65382
                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B653A8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: LongWindow$InvalidateMessageRectSend
                        • String ID:
                        • API String ID: 3340791633-0
                        • Opcode ID: d1f79740bba0baf566f646d539bc5444fbf12e9832ace3de858ddcec68c32a8c
                        • Instruction ID: 45808bc01ac738403cc721b556173fc5105923b92420f85b3136237889b35433
                        • Opcode Fuzzy Hash: d1f79740bba0baf566f646d539bc5444fbf12e9832ace3de858ddcec68c32a8c
                        • Instruction Fuzzy Hash: 7231D234A55A0CAFEB309E14CC46BE937E5EB05B90F584182FA12973E0C7B899609B49
                        APIs
                        • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00B3ABF1
                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00B3AC0D
                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 00B3AC74
                        • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00B3ACC6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: KeyboardState$InputMessagePostSend
                        • String ID:
                        • API String ID: 432972143-0
                        • Opcode ID: 0425167204f4eaa79a2dcfc1efd79b8e94d79d9499b49c420e916ec37cf1dae1
                        • Instruction ID: 46ef400bbaa3c053acd6df8450ae8fa699b76189cd1852530fd64a72f6a03d82
                        • Opcode Fuzzy Hash: 0425167204f4eaa79a2dcfc1efd79b8e94d79d9499b49c420e916ec37cf1dae1
                        • Instruction Fuzzy Hash: 4B312430A442186FEB258B64CC087FA7BE5EB89710FB8629AE4C1931D0C3799D858752
                        APIs
                        • ClientToScreen.USER32(?,?), ref: 00B6769A
                        • GetWindowRect.USER32(?,?), ref: 00B67710
                        • PtInRect.USER32(?,?,00B68B89), ref: 00B67720
                        • MessageBeep.USER32(00000000), ref: 00B6778C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Rect$BeepClientMessageScreenWindow
                        • String ID:
                        • API String ID: 1352109105-0
                        • Opcode ID: 7791ad70fff2e74cdf2694abc614bc2fb9f5c77fd3b899bc425e9731e420b3dd
                        • Instruction ID: 76c38a7a4e40c1489f1508b53525f88735f8387e48d3a264c94e53c809a49647
                        • Opcode Fuzzy Hash: 7791ad70fff2e74cdf2694abc614bc2fb9f5c77fd3b899bc425e9731e420b3dd
                        • Instruction Fuzzy Hash: 47417C346452149FDB02CF58C895EB97BF5FB49318F1580E9E4259B2A1DF38AD42CF90
                        APIs
                        • GetForegroundWindow.USER32 ref: 00B616EB
                          • Part of subcall function 00B33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B33A57
                          • Part of subcall function 00B33A3D: GetCurrentThreadId.KERNEL32 ref: 00B33A5E
                          • Part of subcall function 00B33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00B325B3), ref: 00B33A65
                        • GetCaretPos.USER32(?), ref: 00B616FF
                        • ClientToScreen.USER32(00000000,?), ref: 00B6174C
                        • GetForegroundWindow.USER32 ref: 00B61752
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                        • String ID:
                        • API String ID: 2759813231-0
                        • Opcode ID: f5b46ff9abdbbf1e4f10c71a8ce67f4933f659351096b4f29e4224b2d8d65412
                        • Instruction ID: 07fac9633d1a2cc2390b3746bb00374bdb3823ba7bd36d25af0757ed68669015
                        • Opcode Fuzzy Hash: f5b46ff9abdbbf1e4f10c71a8ce67f4933f659351096b4f29e4224b2d8d65412
                        • Instruction Fuzzy Hash: 8E314175D00249AFC704DFA9C981CAEBBF9EF48304B5480AAE456E7351EB359E45CBA0
                        APIs
                          • Part of subcall function 00AD7620: _wcslen.LIBCMT ref: 00AD7625
                        • _wcslen.LIBCMT ref: 00B3DFCB
                        • _wcslen.LIBCMT ref: 00B3DFE2
                        • _wcslen.LIBCMT ref: 00B3E00D
                        • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00B3E018
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$ExtentPoint32Text
                        • String ID:
                        • API String ID: 3763101759-0
                        • Opcode ID: 8b047adcd24d04b558d120fb8fdf59d8a1afdc09fe4e1832a577c320862d4504
                        • Instruction ID: a0bbd2366aa1441db170a76356775154b38c20d4a13657edc09b42fcf153ba4e
                        • Opcode Fuzzy Hash: 8b047adcd24d04b558d120fb8fdf59d8a1afdc09fe4e1832a577c320862d4504
                        • Instruction Fuzzy Hash: 7F21A371900214EFCB119FA8D9C2B7EB7F8EF45750F2440A5F915BB285D7709E408BA1
                        APIs
                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00B3D501
                        • Process32FirstW.KERNEL32(00000000,?), ref: 00B3D50F
                        • Process32NextW.KERNEL32(00000000,?), ref: 00B3D52F
                        • CloseHandle.KERNEL32(00000000), ref: 00B3D5DC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                        • String ID:
                        • API String ID: 420147892-0
                        • Opcode ID: 9267bfb14c50239f450a873c7f185251167e88a63599c40ae547215e79169e3c
                        • Instruction ID: c9660f83ab38c364d9fa252d5339e87f9d55f8c4573a13568305efdb78a78ae9
                        • Opcode Fuzzy Hash: 9267bfb14c50239f450a873c7f185251167e88a63599c40ae547215e79169e3c
                        • Instruction Fuzzy Hash: 0E31B1711083009FD300EF54D885AAFBBE8EF99354F14092DF596872A1EB71D948CB93
                        APIs
                          • Part of subcall function 00AE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AE9BB2
                        • GetCursorPos.USER32(?), ref: 00B69001
                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00B27711,?,?,?,?,?), ref: 00B69016
                        • GetCursorPos.USER32(?), ref: 00B6905E
                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00B27711,?,?,?), ref: 00B69094
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                        • String ID:
                        • API String ID: 2864067406-0
                        • Opcode ID: eca41562ca115112fd9a1e371900d07148a838f4947fdaeb6cd7e7f63c330753
                        • Instruction ID: 8cb8d6509832b3b2d16cd7f0a1110c6de9af3d53faf95bafd545cc81b15d32a6
                        • Opcode Fuzzy Hash: eca41562ca115112fd9a1e371900d07148a838f4947fdaeb6cd7e7f63c330753
                        • Instruction Fuzzy Hash: 2321A135601118EFCF258F98CC99EFA7BF9EF4A350F144099F905472A1C7799950DB60
                        APIs
                        • GetFileAttributesW.KERNEL32(?,00B6CB68), ref: 00B3D2FB
                        • GetLastError.KERNEL32 ref: 00B3D30A
                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00B3D319
                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00B6CB68), ref: 00B3D376
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CreateDirectory$AttributesErrorFileLast
                        • String ID:
                        • API String ID: 2267087916-0
                        • Opcode ID: 473eca2caf8938fb3b04262e53efe221e78e3c7cae619c40554c61445c2f10f3
                        • Instruction ID: 4ff86e1f7d983ded2607a7a42c7834321df5b22cb377d426ba4692288a648bdd
                        • Opcode Fuzzy Hash: 473eca2caf8938fb3b04262e53efe221e78e3c7cae619c40554c61445c2f10f3
                        • Instruction Fuzzy Hash: AB21A3705092019F8700DF24E98156F7BE4EE56724F204A5EF499C72E1DB31DD49CB97
                        APIs
                          • Part of subcall function 00B31014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00B3102A
                          • Part of subcall function 00B31014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00B31036
                          • Part of subcall function 00B31014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B31045
                          • Part of subcall function 00B31014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00B3104C
                          • Part of subcall function 00B31014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B31062
                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00B315BE
                        • _memcmp.LIBVCRUNTIME ref: 00B315E1
                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B31617
                        • HeapFree.KERNEL32(00000000), ref: 00B3161E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                        • String ID:
                        • API String ID: 1592001646-0
                        • Opcode ID: 34a721c351feea82110df939a66f2fc9b51ed1e226f274b9562c194dca972c6e
                        • Instruction ID: 008e3a36310fc3244d4fe36f6dbe841832ed19fcbcd490db5b2a7eee3c13c897
                        • Opcode Fuzzy Hash: 34a721c351feea82110df939a66f2fc9b51ed1e226f274b9562c194dca972c6e
                        • Instruction Fuzzy Hash: 6E219031E00109EFDF00DFA9C945BEEB7F8EF54344F294899E441AB241E774AA05CB60
                        APIs
                        • GetWindowLongW.USER32(?,000000EC), ref: 00B6280A
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B62824
                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B62832
                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00B62840
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$Long$AttributesLayered
                        • String ID:
                        • API String ID: 2169480361-0
                        • Opcode ID: f7ab53f02a286ee93f021c8754af6cfc9a9d9704444005cc36eaa7c45784a39e
                        • Instruction ID: 6c888ab8e265e2e731515b7018904b028d377c50ff8da45e856f6798aa0d66b2
                        • Opcode Fuzzy Hash: f7ab53f02a286ee93f021c8754af6cfc9a9d9704444005cc36eaa7c45784a39e
                        • Instruction Fuzzy Hash: 7921F131205911AFE7149B24CC45FBA7B95EF45324F148199F8268B6E2CBB9FC42C7D0
                        APIs
                          • Part of subcall function 00B38D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00B3790A,?,000000FF,?,00B38754,00000000,?,0000001C,?,?), ref: 00B38D8C
                          • Part of subcall function 00B38D7D: lstrcpyW.KERNEL32(00000000,?), ref: 00B38DB2
                          • Part of subcall function 00B38D7D: lstrcmpiW.KERNEL32(00000000,?,00B3790A,?,000000FF,?,00B38754,00000000,?,0000001C,?,?), ref: 00B38DE3
                        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00B38754,00000000,?,0000001C,?,?,00000000), ref: 00B37923
                        • lstrcpyW.KERNEL32(00000000,?), ref: 00B37949
                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00B38754,00000000,?,0000001C,?,?,00000000), ref: 00B37984
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: lstrcmpilstrcpylstrlen
                        • String ID: cdecl
                        • API String ID: 4031866154-3896280584
                        • Opcode ID: dad8d073836a511eb398b11255170a6ae19b1f4c50be1ddc2dea9421897d1386
                        • Instruction ID: ce60851895f9b7ab5475d4fd123ced9b64077cb7abee76c96a93fa839bfc147f
                        • Opcode Fuzzy Hash: dad8d073836a511eb398b11255170a6ae19b1f4c50be1ddc2dea9421897d1386
                        • Instruction Fuzzy Hash: C911E17A200342BBCB259F35C844E7A77E9FF85350B60426AF842C72A4EF719801C7A1
                        APIs
                        • GetWindowLongW.USER32(?,000000F0), ref: 00B67D0B
                        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00B67D2A
                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00B67D42
                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00B4B7AD,00000000), ref: 00B67D6B
                          • Part of subcall function 00AE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AE9BB2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$Long
                        • String ID:
                        • API String ID: 847901565-0
                        • Opcode ID: 5b87a5ded3a694201c5c2164923a0d16f966f0e7ffad7f7ea12c74fa783d56a5
                        • Instruction ID: 0a7f31733405659613adc4c3e4db1ec977ea2a82d91b42bfd4d028c9e4557066
                        • Opcode Fuzzy Hash: 5b87a5ded3a694201c5c2164923a0d16f966f0e7ffad7f7ea12c74fa783d56a5
                        • Instruction Fuzzy Hash: 7A119072644615AFCB509F28CC04ABA3BE5EF46364F158B65F835C72F0EB349951CB50
                        APIs
                        • SendMessageW.USER32(?,00001060,?,00000004), ref: 00B656BB
                        • _wcslen.LIBCMT ref: 00B656CD
                        • _wcslen.LIBCMT ref: 00B656D8
                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B65816
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend_wcslen
                        • String ID:
                        • API String ID: 455545452-0
                        • Opcode ID: 8f55b8fcb7addf34d3fa04b0a675ac94640ab3dca777b5f7c935224ea3c853ba
                        • Instruction ID: cd68f22aba44506a2db4f12f4e27dbc862937188551117676acc5a5cfee30944
                        • Opcode Fuzzy Hash: 8f55b8fcb7addf34d3fa04b0a675ac94640ab3dca777b5f7c935224ea3c853ba
                        • Instruction Fuzzy Hash: 3011D37160060996DB309FA5CCC5AFE77ECEF11764F1041AAFA15D61C1EBB8DA90CB60
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 45708c5205424fe0e9e4a7adf7c824890c7e615b280cdcb3bc67cb9146a4be87
                        • Instruction ID: 2ee000321782a0e2a077ba00e2d5231f4c6b2b8822b5db8398188fe2c2786083
                        • Opcode Fuzzy Hash: 45708c5205424fe0e9e4a7adf7c824890c7e615b280cdcb3bc67cb9146a4be87
                        • Instruction Fuzzy Hash: 0A014BB22096167EF62526BC6CC5F676E9DEF427B8F344BB5F531A22D2EB608C005170
                        APIs
                        • SetTextColor.GDI32(?,?), ref: 00AE98D6
                        • SetBkMode.GDI32(?,00000001), ref: 00AE98E9
                        • GetStockObject.GDI32(00000005), ref: 00AE98F1
                        • GetWindowLongW.USER32(?,000000EB), ref: 00AE9952
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ColorLongModeObjectStockTextWindow
                        • String ID:
                        • API String ID: 2960364272-0
                        • Opcode ID: 85d07ad8bd17b8667032c62f458669989d5484038d2c5b281f8272042f4babaf
                        • Instruction ID: cf6ff180664824f54c480ee19ec6df7b33ae6929c25138bae6f10de005fa6c29
                        • Opcode Fuzzy Hash: 85d07ad8bd17b8667032c62f458669989d5484038d2c5b281f8272042f4babaf
                        • Instruction Fuzzy Hash: 38112F3214A3D04FDB128F66ECA5AF73F65EF57315718015EE182CB2B3CA664941CB51
                        APIs
                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00B31A47
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B31A59
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B31A6F
                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B31A8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: dc2b43c2b3936902c9de1ed42358a0142d996cce21427c79b8f625ed5cd00ba0
                        • Instruction ID: fc61105744c460c03473a30a9eead55685f081dc8f543bc35aab411d972c5305
                        • Opcode Fuzzy Hash: dc2b43c2b3936902c9de1ed42358a0142d996cce21427c79b8f625ed5cd00ba0
                        • Instruction Fuzzy Hash: DF11093AD01219FFEB11DFA9CD85FADBBB8EB08750F200491EA14B7290D6716E50DB94
                        APIs
                        • GetCurrentThreadId.KERNEL32 ref: 00B3E1FD
                        • MessageBoxW.USER32(?,?,?,?), ref: 00B3E230
                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00B3E246
                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00B3E24D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                        • String ID:
                        • API String ID: 2880819207-0
                        • Opcode ID: 035b25820352aac9a7f517e9dd2dfd5ef9bfe4f6e42f6a402473c62c4c5121b4
                        • Instruction ID: 8b8e4952a7464e48cc35f5df96c0a90119e254b6eebe18706256e5f87dee98b1
                        • Opcode Fuzzy Hash: 035b25820352aac9a7f517e9dd2dfd5ef9bfe4f6e42f6a402473c62c4c5121b4
                        • Instruction Fuzzy Hash: F711DB76904254BBCB119FAC9C06AAF7FEDDB46310F144666F924E32D1DBB4DD0487A0
                        APIs
                        • CreateThread.KERNEL32(00000000,?,00AFCFF9,00000000,00000004,00000000), ref: 00AFD218
                        • GetLastError.KERNEL32 ref: 00AFD224
                        • __dosmaperr.LIBCMT ref: 00AFD22B
                        • ResumeThread.KERNEL32(00000000), ref: 00AFD249
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Thread$CreateErrorLastResume__dosmaperr
                        • String ID:
                        • API String ID: 173952441-0
                        • Opcode ID: ec0a7620d4bc11eed958cf658b8a74534d3242530fbbd2a111fd6f3ebf66d149
                        • Instruction ID: 8a9a639cdb7b87c41cec79d743f5b9dc283db3ba10d07948e74e0eba924ba777
                        • Opcode Fuzzy Hash: ec0a7620d4bc11eed958cf658b8a74534d3242530fbbd2a111fd6f3ebf66d149
                        • Instruction Fuzzy Hash: BC01843640520C7BDB225BE5DC09AFA7E6ADF82731F104219FA25961D0DF718901C6A1
                        APIs
                          • Part of subcall function 00AE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AE9BB2
                        • GetClientRect.USER32(?,?), ref: 00B69F31
                        • GetCursorPos.USER32(?), ref: 00B69F3B
                        • ScreenToClient.USER32(?,?), ref: 00B69F46
                        • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00B69F7A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Client$CursorLongProcRectScreenWindow
                        • String ID:
                        • API String ID: 4127811313-0
                        • Opcode ID: 076aa8e008174a3a27e963e7ca6aa768e11655309004e83d16f109d14178bc8b
                        • Instruction ID: 4c61abb223e4b3af8bc7cacec85ee0d8e275191c1f78bfa449f2c42eceaa00de
                        • Opcode Fuzzy Hash: 076aa8e008174a3a27e963e7ca6aa768e11655309004e83d16f109d14178bc8b
                        • Instruction Fuzzy Hash: 01115A3690011AABDB00DFA8C8869FE7BFCFB05311F0144A5F912E3140DB78BA81CBA1
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00AD604C
                        • GetStockObject.GDI32(00000011), ref: 00AD6060
                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00AD606A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CreateMessageObjectSendStockWindow
                        • String ID:
                        • API String ID: 3970641297-0
                        • Opcode ID: d35487969e0accce85c4d7c90416e5f6b7dc90cdff46a6d2dd3d1773d4ab17c4
                        • Instruction ID: e36007ad1a96d46385b3746a248f55bbc278b54c193858387dc6a9d36328fa1a
                        • Opcode Fuzzy Hash: d35487969e0accce85c4d7c90416e5f6b7dc90cdff46a6d2dd3d1773d4ab17c4
                        • Instruction Fuzzy Hash: 87118B72101508BFEF125FA48C44AFABF69FF093A5F044202FA1552250CB769C60DBA0
                        APIs
                        • ___BuildCatchObject.LIBVCRUNTIME ref: 00AF3B56
                          • Part of subcall function 00AF3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00AF3AD2
                          • Part of subcall function 00AF3AA3: ___AdjustPointer.LIBCMT ref: 00AF3AED
                        • _UnwindNestedFrames.LIBCMT ref: 00AF3B6B
                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00AF3B7C
                        • CallCatchBlock.LIBVCRUNTIME ref: 00AF3BA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                        • String ID:
                        • API String ID: 737400349-0
                        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                        • Instruction ID: 0b406460dda75ce215b7683d29088015c0a2780a7792ed7ed85416862e3bea39
                        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                        • Instruction Fuzzy Hash: 5701D73210014DBBDF126F96CD46EFB7B69EF98754F044055FE4866121C732E9619BA0
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00AD13C6,00000000,00000000,?,00B0301A,00AD13C6,00000000,00000000,00000000,?,00B0328B,00000006,FlsSetValue), ref: 00B030A5
                        • GetLastError.KERNEL32(?,00B0301A,00AD13C6,00000000,00000000,00000000,?,00B0328B,00000006,FlsSetValue,00B72290,FlsSetValue,00000000,00000364,?,00B02E46), ref: 00B030B1
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00B0301A,00AD13C6,00000000,00000000,00000000,?,00B0328B,00000006,FlsSetValue,00B72290,FlsSetValue,00000000), ref: 00B030BF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID:
                        • API String ID: 3177248105-0
                        • Opcode ID: 32c9759151184064031c9437637f3101c01c03f87d3f6f44b1db6ee17f453fff
                        • Instruction ID: 876364e75f51659452c0fe6fe11ce6db43ffc695f45627f1fc288e437889bec7
                        • Opcode Fuzzy Hash: 32c9759151184064031c9437637f3101c01c03f87d3f6f44b1db6ee17f453fff
                        • Instruction Fuzzy Hash: 7701F732312222ABCB314B799C88B677FDCEF05FA1B204661F946E71C0EB25D901C6E0
                        APIs
                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00B3747F
                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00B37497
                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00B374AC
                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00B374CA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Type$Register$FileLoadModuleNameUser
                        • String ID:
                        • API String ID: 1352324309-0
                        • Opcode ID: 478b245da8356936555ed6d977d44c4327d1b0ef91a5f7f0d63ead10fa8d8d2d
                        • Instruction ID: 752d267f70d948095d204344aa18bade262757bbd5d76ca89e55d320f6e68171
                        • Opcode Fuzzy Hash: 478b245da8356936555ed6d977d44c4327d1b0ef91a5f7f0d63ead10fa8d8d2d
                        • Instruction Fuzzy Hash: A5117CB12453109BE7308F54EC48BA27FF8EB00B00F2085A9A656D7291DFB4F904DB90
                        APIs
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00B3ACD3,?,00008000), ref: 00B3B0C4
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00B3ACD3,?,00008000), ref: 00B3B0E9
                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00B3ACD3,?,00008000), ref: 00B3B0F3
                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00B3ACD3,?,00008000), ref: 00B3B126
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CounterPerformanceQuerySleep
                        • String ID:
                        • API String ID: 2875609808-0
                        • Opcode ID: 8b986df27140dea46f00ff9c791832f77f018259c64d82fcb18da5229ad22346
                        • Instruction ID: 783818f4970e0f49ccddcd98cbdf2d3614fed7d3118355f1a56d0de2eb126c50
                        • Opcode Fuzzy Hash: 8b986df27140dea46f00ff9c791832f77f018259c64d82fcb18da5229ad22346
                        • Instruction Fuzzy Hash: 7B113C31C1192DD7CF04AFA5E998AFEBFB8FF0A711F204085DA81B7189CB7455508B51
                        APIs
                        • GetWindowRect.USER32(?,?), ref: 00B67E33
                        • ScreenToClient.USER32(?,?), ref: 00B67E4B
                        • ScreenToClient.USER32(?,?), ref: 00B67E6F
                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00B67E8A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ClientRectScreen$InvalidateWindow
                        • String ID:
                        • API String ID: 357397906-0
                        • Opcode ID: ad7163c4eeca55e988d2e1d6f8994561ccb12f982207a564e9053d3251eae711
                        • Instruction ID: 43fb3f4e69e73063a256c3907bad1ece5d2a273396c3e4d4662ef875cce6f5ca
                        • Opcode Fuzzy Hash: ad7163c4eeca55e988d2e1d6f8994561ccb12f982207a564e9053d3251eae711
                        • Instruction Fuzzy Hash: 3D1156B9D0024AAFDB41CF98C8849EEBBF9FF08310F505066E955E3250DB75AA54CF50
                        APIs
                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00B32DC5
                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B32DD6
                        • GetCurrentThreadId.KERNEL32 ref: 00B32DDD
                        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00B32DE4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                        • String ID:
                        • API String ID: 2710830443-0
                        • Opcode ID: 239e594478eadc1dc192dcc8d66f19ece6899aed943f6d9c4545605abe574f1f
                        • Instruction ID: 6aacee54ca702be06ac3af5d958df2d762f3528c604e8133d31d8a470465ca3c
                        • Opcode Fuzzy Hash: 239e594478eadc1dc192dcc8d66f19ece6899aed943f6d9c4545605abe574f1f
                        • Instruction Fuzzy Hash: B1E06D711012247ADB202B62DC0DEFB7EACEF43BA1F200065F506D30809AE98840C6B0
                        APIs
                          • Part of subcall function 00AE9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AE9693
                          • Part of subcall function 00AE9639: SelectObject.GDI32(?,00000000), ref: 00AE96A2
                          • Part of subcall function 00AE9639: BeginPath.GDI32(?), ref: 00AE96B9
                          • Part of subcall function 00AE9639: SelectObject.GDI32(?,00000000), ref: 00AE96E2
                        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00B68887
                        • LineTo.GDI32(?,?,?), ref: 00B68894
                        • EndPath.GDI32(?), ref: 00B688A4
                        • StrokePath.GDI32(?), ref: 00B688B2
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                        • String ID:
                        • API String ID: 1539411459-0
                        • Opcode ID: 2b21ba24015c87577c5c94d2f783cbd3c7bf626fdc5675b75ccb765052e634d6
                        • Instruction ID: 9bf73dc2d735aaf748f6bc351db0bfdb6fac2cab57813a2280221878e2511bc3
                        • Opcode Fuzzy Hash: 2b21ba24015c87577c5c94d2f783cbd3c7bf626fdc5675b75ccb765052e634d6
                        • Instruction Fuzzy Hash: 83F05E36041258FADB126F94AC0AFDE3F59AF0A310F048141FA51660E2CBB95511CFE5
                        APIs
                        • GetSysColor.USER32(00000008), ref: 00AE98CC
                        • SetTextColor.GDI32(?,?), ref: 00AE98D6
                        • SetBkMode.GDI32(?,00000001), ref: 00AE98E9
                        • GetStockObject.GDI32(00000005), ref: 00AE98F1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Color$ModeObjectStockText
                        • String ID:
                        • API String ID: 4037423528-0
                        • Opcode ID: d3939bf37e6c97c169ecef631a02c2ad4d7f3ab7444ba0c46a831bc951d05c80
                        • Instruction ID: 44f9985c73735e852883ede2ddca345eea1d2c22ce4e2d164bd0ba209377d218
                        • Opcode Fuzzy Hash: d3939bf37e6c97c169ecef631a02c2ad4d7f3ab7444ba0c46a831bc951d05c80
                        • Instruction Fuzzy Hash: ADE09B31244280AFDB215F74FC19BF93F50EB12335F048219F6FA550E1CBB546509B11
                        APIs
                        • GetCurrentThread.KERNEL32 ref: 00B31634
                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00B311D9), ref: 00B3163B
                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00B311D9), ref: 00B31648
                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00B311D9), ref: 00B3164F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CurrentOpenProcessThreadToken
                        • String ID:
                        • API String ID: 3974789173-0
                        • Opcode ID: 302408005e87396ff47a2a679ac1f4a30a7b3ded15bd81fbf7ff35ed26cdef1d
                        • Instruction ID: e2b2a4fa156d481a06fb1e3763c597a955e21826a3fc9afd0421eb07946529e5
                        • Opcode Fuzzy Hash: 302408005e87396ff47a2a679ac1f4a30a7b3ded15bd81fbf7ff35ed26cdef1d
                        • Instruction Fuzzy Hash: 8AE08631601211EBD7201FE59D0DB663FBCEF44791F144858F685CA0C0DAB84440C754
                        APIs
                        • GetDesktopWindow.USER32 ref: 00B2D858
                        • GetDC.USER32(00000000), ref: 00B2D862
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00B2D882
                        • ReleaseDC.USER32(?), ref: 00B2D8A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: 53c272a0e319bfbcded2dbc8082619538a7f22c43a69c045134a74a48630e2cd
                        • Instruction ID: cda893f6e9bd4ebec05924c15c4f31b8715c78a860d322701b36a4f1195bf37d
                        • Opcode Fuzzy Hash: 53c272a0e319bfbcded2dbc8082619538a7f22c43a69c045134a74a48630e2cd
                        • Instruction Fuzzy Hash: 9AE01AB5800205DFCB419FA0D90867DBFB1FB08310F149049E88AE7290CBBC5901EF44
                        APIs
                        • GetDesktopWindow.USER32 ref: 00B2D86C
                        • GetDC.USER32(00000000), ref: 00B2D876
                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00B2D882
                        • ReleaseDC.USER32(?), ref: 00B2D8A3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CapsDesktopDeviceReleaseWindow
                        • String ID:
                        • API String ID: 2889604237-0
                        • Opcode ID: 9122423523adfda19f767e334c766a565a18e0041ac4a43925abf00aac422815
                        • Instruction ID: 6aaafc3548693ade4fa9000a59a8f6e888adaeb43f832fc99ad91869a53e23f1
                        • Opcode Fuzzy Hash: 9122423523adfda19f767e334c766a565a18e0041ac4a43925abf00aac422815
                        • Instruction Fuzzy Hash: 17E092B5800205EFCB51AFA1D90866DBFB5FB08311B149449E98AE7290CBBD5A01EF54
                        APIs
                          • Part of subcall function 00AD7620: _wcslen.LIBCMT ref: 00AD7625
                        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00B44ED4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Connection_wcslen
                        • String ID: *$LPT
                        • API String ID: 1725874428-3443410124
                        • Opcode ID: 1b2af334e8dd4768185e63953a18a468b8d82a15a87d199d0e732594c5834076
                        • Instruction ID: 3d063980fb5b52b96665078dff5169cc747589e3b920cbfb803156e4a9d388ac
                        • Opcode Fuzzy Hash: 1b2af334e8dd4768185e63953a18a468b8d82a15a87d199d0e732594c5834076
                        • Instruction Fuzzy Hash: 60914C75A002449FCB14DF58C584EAABBF1EF48304F1980D9E80A9F3A2D735EE95DB91
                        APIs
                        • __startOneArgErrorHandling.LIBCMT ref: 00AFE30D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ErrorHandling__start
                        • String ID: pow
                        • API String ID: 3213639722-2276729525
                        • Opcode ID: 6d75332c751ca47d56411620f3dff1e66b1562ad435b0681149d088fb390d5c4
                        • Instruction ID: 63801076d7bd00e93295bc794d868e4ed9e3974f61de90958faff5ae9acb0451
                        • Opcode Fuzzy Hash: 6d75332c751ca47d56411620f3dff1e66b1562ad435b0681149d088fb390d5c4
                        • Instruction Fuzzy Hash: 4B517B61E4D20696CB11F758C9453B9AFE8EB40740F308AE8F1D64B2F8EF359CD19A42
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID:
                        • String ID: #
                        • API String ID: 0-1885708031
                        • Opcode ID: 349eadaecdcc3ec2ae632db65dfd25462c441d655ff1f424426a430e8462b885
                        • Instruction ID: 08d3125150f03369db7ebd29fa8a31176f42218d4eeb1a492eb5bd7bc233a0f3
                        • Opcode Fuzzy Hash: 349eadaecdcc3ec2ae632db65dfd25462c441d655ff1f424426a430e8462b885
                        • Instruction Fuzzy Hash: D3514435600296DFDF15DF6AD0816FA7BE8EF25310F244095E9A69B2E0DB34DD42CBA0
                        APIs
                        • Sleep.KERNEL32(00000000), ref: 00AEF2A2
                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 00AEF2BB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: GlobalMemorySleepStatus
                        • String ID: @
                        • API String ID: 2783356886-2766056989
                        • Opcode ID: 61c18036c1e9db20f0e60d24be5117b494eb42c4a584026f3934e8f88e399e5c
                        • Instruction ID: 3a2c2fb63a7d6836e5d41f4fb23f3231a632216bd58b118bc7d7eff817f65da7
                        • Opcode Fuzzy Hash: 61c18036c1e9db20f0e60d24be5117b494eb42c4a584026f3934e8f88e399e5c
                        • Instruction Fuzzy Hash: C05138714087459BD320AF14DD86BAFBBF8FB84710F81885DF1DA811A5EB708529CB66
                        APIs
                        • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00B557E0
                        • _wcslen.LIBCMT ref: 00B557EC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: BuffCharUpper_wcslen
                        • String ID: CALLARGARRAY
                        • API String ID: 157775604-1150593374
                        • Opcode ID: 2f3d9f3c83f84b43a9592beea2df782d193037e8d50087b1b850d788305c7919
                        • Instruction ID: 89248374c4fb07d6ba8f720d8f46bc55e691c7944c8377a0c0fb4a8880677e74
                        • Opcode Fuzzy Hash: 2f3d9f3c83f84b43a9592beea2df782d193037e8d50087b1b850d788305c7919
                        • Instruction Fuzzy Hash: 2B41D331E002099FCB14DFA9C991ABEBBF5FF59312F1040A9E805A7351EB719D85CB90
                        APIs
                        • _wcslen.LIBCMT ref: 00B4D130
                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00B4D13A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CrackInternet_wcslen
                        • String ID: |
                        • API String ID: 596671847-2343686810
                        • Opcode ID: a46d143eddb3016bc72840358b9be58950ec3ef33eff9f745baa94d1c9f7f3a4
                        • Instruction ID: 56f4d1ce3709b2831f533fc388f9a037891f26ec6c902f5ec02ef0d9aa3754df
                        • Opcode Fuzzy Hash: a46d143eddb3016bc72840358b9be58950ec3ef33eff9f745baa94d1c9f7f3a4
                        • Instruction Fuzzy Hash: 08313D75D00219ABCF15EFA4CD85AEE7FB9FF04300F00005AF915B6261DB31AA06DB50
                        APIs
                        • DestroyWindow.USER32(?,?,?,?), ref: 00B63621
                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00B6365C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$DestroyMove
                        • String ID: static
                        • API String ID: 2139405536-2160076837
                        • Opcode ID: 0b9dc359ed2ac50173cef77de6d6c47a05954acbe1654c93c722b26985409f82
                        • Instruction ID: 67014d2fb544a99404d717d103b3af58f54b6ae85957666fb104765e0c1b84d6
                        • Opcode Fuzzy Hash: 0b9dc359ed2ac50173cef77de6d6c47a05954acbe1654c93c722b26985409f82
                        • Instruction Fuzzy Hash: 46319071100204AEDB109F68DC81EFB73E9FF58B24F00961AF9A697290DA78AD81C760
                        APIs
                        • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00B6461F
                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B64634
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: '
                        • API String ID: 3850602802-1997036262
                        • Opcode ID: 40cb276f69e46ab470a98dda6a66aaae7062574769a89fa559e09028101664e1
                        • Instruction ID: b55634966142c4b53935f2d3be0a97d0a26cb7f578fc6bb7ddd7f26fb122b893
                        • Opcode Fuzzy Hash: 40cb276f69e46ab470a98dda6a66aaae7062574769a89fa559e09028101664e1
                        • Instruction Fuzzy Hash: 0B313875A0160A9FDF14CFA9C981BDA7BF5FF19300F1044AAE905AB381D774A941CF90
                        APIs
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00B6327C
                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B63287
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID: Combobox
                        • API String ID: 3850602802-2096851135
                        • Opcode ID: 5e02677c6206dbb0819cd7ad1751be258dac31690a6265227b8712aae4eece09
                        • Instruction ID: 6c0611d8c378a92e361e2e9ff81de33f59478f6bf52085d1149d5e817e6d0805
                        • Opcode Fuzzy Hash: 5e02677c6206dbb0819cd7ad1751be258dac31690a6265227b8712aae4eece09
                        • Instruction Fuzzy Hash: 1111E2713002087FFF219E54DCA0EBB3BEAEB987A4F104164FA18972D0D6799D518760
                        APIs
                          • Part of subcall function 00AD600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00AD604C
                          • Part of subcall function 00AD600E: GetStockObject.GDI32(00000011), ref: 00AD6060
                          • Part of subcall function 00AD600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AD606A
                        • GetWindowRect.USER32(00000000,?), ref: 00B6377A
                        • GetSysColor.USER32(00000012), ref: 00B63794
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                        • String ID: static
                        • API String ID: 1983116058-2160076837
                        • Opcode ID: 75adcb7ca94460445b1b23c80d1cb23c1e2eadd5ad0af5afcb996e462226ceda
                        • Instruction ID: ea5285c1581eb53be01f19e028d843ddcbdcb5bd85763e502b03c90c64fb75e9
                        • Opcode Fuzzy Hash: 75adcb7ca94460445b1b23c80d1cb23c1e2eadd5ad0af5afcb996e462226ceda
                        • Instruction Fuzzy Hash: 771129B2610209AFDB00DFA8CC46EFA7BF8FB09754F004955F956E3250DB79E8519B50
                        APIs
                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00B4CD7D
                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00B4CDA6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Internet$OpenOption
                        • String ID: <local>
                        • API String ID: 942729171-4266983199
                        • Opcode ID: b164981d2af4232ebcebf1354056c7c910a5a3c0f3c239fb4919a04b34fa239f
                        • Instruction ID: 11a105d919e7bdb4eeabf642251abe064638b9bee59987fe47b9828dc2211663
                        • Opcode Fuzzy Hash: b164981d2af4232ebcebf1354056c7c910a5a3c0f3c239fb4919a04b34fa239f
                        • Instruction Fuzzy Hash: 0B110671A026317AD7784B668C84EF3BEECEF12BA4F1042B6B15983090D7749A40E6F0
                        APIs
                        • GetWindowTextLengthW.USER32(00000000), ref: 00B634AB
                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00B634BA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: LengthMessageSendTextWindow
                        • String ID: edit
                        • API String ID: 2978978980-2167791130
                        • Opcode ID: eae84c7088e211f551ed32d2dd9777cf6664afa23b8ade08b56c75af610cbcb7
                        • Instruction ID: 7c6d1bd685dc23e39fc10abb099572b2ac9d4feb5df71f3fc9e0d42ce7fb2c91
                        • Opcode Fuzzy Hash: eae84c7088e211f551ed32d2dd9777cf6664afa23b8ade08b56c75af610cbcb7
                        • Instruction Fuzzy Hash: 0311BF71100108ABEB124E64DC80ABB7BEAEF05B74F504364FA61932E0CB79DC919750
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                        • CharUpperBuffW.USER32(?,?,?), ref: 00B36CB6
                        • _wcslen.LIBCMT ref: 00B36CC2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen$BuffCharUpper
                        • String ID: STOP
                        • API String ID: 1256254125-2411985666
                        • Opcode ID: dbf805274c32488bfc3b5a4e1ff13192217671e1fe73d903674d03315ab6ce5b
                        • Instruction ID: afa284bb457f3460171dc02a49f7a2a03fb70a6b451aac0a1ac4e2e5ca6cdfea
                        • Opcode Fuzzy Hash: dbf805274c32488bfc3b5a4e1ff13192217671e1fe73d903674d03315ab6ce5b
                        • Instruction Fuzzy Hash: A1010032A0052AAACB20AFBDDC809BF77F8EB60714B604579E86297291EB31D800C750
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                          • Part of subcall function 00B33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00B33CCA
                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00B31D4C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: b5f4b9487439b0f5ce77ca010c6054089c1318f3391f5fb662346810e7fa7a46
                        • Instruction ID: f6db728463f8e2bc20fe9e8b90fd0affdedc2723adf692bba7e9a597cbd91e6c
                        • Opcode Fuzzy Hash: b5f4b9487439b0f5ce77ca010c6054089c1318f3391f5fb662346810e7fa7a46
                        • Instruction Fuzzy Hash: A0012831640218AB8B14EFA4CD55CFF73E8EB07750F60096AF832673D1EE3099088760
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                          • Part of subcall function 00B33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00B33CCA
                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00B31C46
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: 66567b72a22ad69e87e60474241490b8acc1dfbcc75295c5a218dfb660d32bc7
                        • Instruction ID: e06c434a5549600d879439db8236eed5bcfbd7e6fda993a55dc8c5609e8eea7a
                        • Opcode Fuzzy Hash: 66567b72a22ad69e87e60474241490b8acc1dfbcc75295c5a218dfb660d32bc7
                        • Instruction Fuzzy Hash: 7A01F7717801086ACF14EBA5CA519FF77ECDB11740F60146AB406672C1EA209E0887B1
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                          • Part of subcall function 00B33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00B33CCA
                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00B31CC8
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: d9983ecf088a976a1a33dfd6378b9928b8e17cf7668332b2baa7db838a8c7b8a
                        • Instruction ID: f49b9c517b33fb1f2163c3306c002f5391f432827537c070ec78940693e0bb09
                        • Opcode Fuzzy Hash: d9983ecf088a976a1a33dfd6378b9928b8e17cf7668332b2baa7db838a8c7b8a
                        • Instruction Fuzzy Hash: 8D01D6717802186BCF14EBA4CB41AFF77ECDB11740FA41456B80277281EA60DF08D672
                        APIs
                          • Part of subcall function 00AD9CB3: _wcslen.LIBCMT ref: 00AD9CBD
                          • Part of subcall function 00B33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00B33CCA
                        • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00B31DD3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ClassMessageNameSend_wcslen
                        • String ID: ComboBox$ListBox
                        • API String ID: 624084870-1403004172
                        • Opcode ID: 92bad206766c402a05652d1bb06a9a0abf73d1a1e1ae65e01dd397564da26c90
                        • Instruction ID: 52e555c62cced380b3e7e57777663d0d78e1bc374f59d9cfb86fb31eecd4b321
                        • Opcode Fuzzy Hash: 92bad206766c402a05652d1bb06a9a0abf73d1a1e1ae65e01dd397564da26c90
                        • Instruction Fuzzy Hash: FAF0F471B412186ACB14EBA8CD92AFF77ECEF02740F140D66F822632C1DA6099088260
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: 3, 3, 16, 1
                        • API String ID: 176396367-3042988571
                        • Opcode ID: 59864f5f9ec1de2b51fecae2c2ea3f92fbc597b60e8fa3b24d982658529daaed
                        • Instruction ID: 772b1254e51992c3087dbe0e17f84be2288a79776c0e2f3eb0e7682079e184c8
                        • Opcode Fuzzy Hash: 59864f5f9ec1de2b51fecae2c2ea3f92fbc597b60e8fa3b24d982658529daaed
                        • Instruction Fuzzy Hash: 99E02B0235422010923112B9BDC1B7F56C9CFC975171418AFFE85C2366EFD48D9293A0
                        APIs
                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00B30B23
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Message
                        • String ID: AutoIt$Error allocating memory.
                        • API String ID: 2030045667-4017498283
                        • Opcode ID: 2392c152e9483053d93c10f46815676775f91944e2f6c30208a3c87566c4528d
                        • Instruction ID: 0b273785d997832807f29fcc8827b18d9e6cee7be61e76008d29101e8276b75c
                        • Opcode Fuzzy Hash: 2392c152e9483053d93c10f46815676775f91944e2f6c30208a3c87566c4528d
                        • Instruction Fuzzy Hash: 98E0D8322843482AD31036957D03F997EC4CF05B10F100466F788955D38AD6245006E9
                        APIs
                          • Part of subcall function 00AEF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00AF0D71,?,?,?,00AD100A), ref: 00AEF7CE
                        • IsDebuggerPresent.KERNEL32(?,?,?,00AD100A), ref: 00AF0D75
                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00AD100A), ref: 00AF0D84
                        Strings
                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00AF0D7F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                        • API String ID: 55579361-631824599
                        • Opcode ID: e3a9a55b2edfe42587c4a28a5ba5ee7b16adb19cfbbb633c6f085e5f4d7c7b74
                        • Instruction ID: 04cbb2273e4d20b679f686a2574582655c37ea7bf17fa5e9031de089888f139c
                        • Opcode Fuzzy Hash: e3a9a55b2edfe42587c4a28a5ba5ee7b16adb19cfbbb633c6f085e5f4d7c7b74
                        • Instruction Fuzzy Hash: 38E06D742003518BD7609FBCE504B667FE4AB04744F00896DF982C7652EBB9E4448B91
                        APIs
                        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00B4302F
                        • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00B43044
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: Temp$FileNamePath
                        • String ID: aut
                        • API String ID: 3285503233-3010740371
                        • Opcode ID: 5d463f2a64247ad16a418c3ab580d574c600c8524b5d9e7773366201ddbf6646
                        • Instruction ID: c1955da94df63f3efba2954a4e0eb7f22c634bbfb0e766e4d008d1ae885885c6
                        • Opcode Fuzzy Hash: 5d463f2a64247ad16a418c3ab580d574c600c8524b5d9e7773366201ddbf6646
                        • Instruction Fuzzy Hash: FDD05E7250032867DA20A7A4EC0EFDB3F6CDB04750F0002A2BA95E30E1DEF89984CAD0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: LocalTime
                        • String ID: %.3d$X64
                        • API String ID: 481472006-1077770165
                        • Opcode ID: 7d3ba36299449a20ca243d369f9691671808d06c0d3b72b23b9aa1569871cd7f
                        • Instruction ID: 2cb2646c25b769dd6bfe0540c6d49dfb620755ab78ded2856b67c281685d9b6b
                        • Opcode Fuzzy Hash: 7d3ba36299449a20ca243d369f9691671808d06c0d3b72b23b9aa1569871cd7f
                        • Instruction Fuzzy Hash: 79D01271808128E9CB5097E0EC859F9B3FCEB08301F6084A2F80A92040D628C508AB61
                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B6232C
                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00B6233F
                          • Part of subcall function 00B3E97B: Sleep.KERNELBASE ref: 00B3E9F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: 35b318e88d49d5e55877dd308641780af62421d2e490a898f3ef21358013bbca
                        • Instruction ID: 81edb2a62b9b85d7e1e099f6339930e2d804807be0dd6064b2101a47b5bd318f
                        • Opcode Fuzzy Hash: 35b318e88d49d5e55877dd308641780af62421d2e490a898f3ef21358013bbca
                        • Instruction Fuzzy Hash: E3D01236394310B7EA64B770EC0FFD67E54AB14B10F104A56B796AB1E0CEF8A801CB54
                        APIs
                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B6236C
                        • PostMessageW.USER32(00000000), ref: 00B62373
                          • Part of subcall function 00B3E97B: Sleep.KERNELBASE ref: 00B3E9F3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: FindMessagePostSleepWindow
                        • String ID: Shell_TrayWnd
                        • API String ID: 529655941-2988720461
                        • Opcode ID: 22684f75c8f52bf7a5679fafc8194b19fe83332d261ebf64122adc13fc2f0998
                        • Instruction ID: a419c507da23cdfc0b088552a5531de40e6bf383e42d541cf32c1e8c7a0be696
                        • Opcode Fuzzy Hash: 22684f75c8f52bf7a5679fafc8194b19fe83332d261ebf64122adc13fc2f0998
                        • Instruction Fuzzy Hash: 67D0C9363813107BEA64B770EC0FFD67A54AB14B10F504A56B796AB1E0CAF8A8018A58
                        APIs
                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00B0BE93
                        • GetLastError.KERNEL32 ref: 00B0BEA1
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00B0BEFC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2902060508.0000000000AD1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AD0000, based on PE: true
                        • Associated: 00000000.00000002.2902026808.0000000000AD0000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902132314.0000000000B92000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902197060.0000000000B9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2902216597.0000000000BA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_ad0000_file.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$ErrorLast
                        • String ID:
                        • API String ID: 1717984340-0
                        • Opcode ID: 5840c04dd74f299155e77e44e7a91310b11b025fa8a5cfabbff9164c72ccd06a
                        • Instruction ID: 2320192926b2a58827e0f744dfadf6a93496417ec9cf861ea348aca91172c0c7
                        • Opcode Fuzzy Hash: 5840c04dd74f299155e77e44e7a91310b11b025fa8a5cfabbff9164c72ccd06a
                        • Instruction Fuzzy Hash: 0641B135605206AFCF218FA4CC84EBA7FE5EF42720F1441A9FA599B1E1DB308D01CB60