Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4iogI3WCTh.exe

Overview

General Information

Sample name:4iogI3WCTh.exe
renamed because original name is a hash value
Original sample name:f4e673616e807b25a98f0655c693d411.exe
Analysis ID:1583032
MD5:f4e673616e807b25a98f0655c693d411
SHA1:7d697956f37a0432d4952806739e4c39ace201a1
SHA256:80e013ba13cf1238703dc670cb3defce7fbf9e3b09beedfdcb6d3197aec5552f
Tags:exeValleyRATuser-abuse_ch
Infos:

Detection

GhostRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected GhostRat
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to capture and log keystrokes
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Found evasive API chain (may stop execution after checking mutex)
Found stalling execution ending in API Sleep call
Loading BitLocker PowerShell Module
Sets debug register (to hijack the execution of another thread)
Suspicious powershell command line found
Tries to detect sandboxes / dynamic malware analysis system (QueryWinSAT)
Uses Register-ScheduledTask to add task schedules
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Installs a global mouse hook
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Registers a DLL
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Network Connection Initiated By Regsvr32.EXE
Sigma detected: Potential Regsvr32 Commandline Flag Anomaly
Sigma detected: Suspicious Electron Application Child Processes
Stores large binary data to the registry
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • 4iogI3WCTh.exe (PID: 4008 cmdline: "C:\Users\user\Desktop\4iogI3WCTh.exe" MD5: F4E673616E807B25A98F0655C693D411)
    • 4iogI3WCTh.tmp (PID: 2316 cmdline: "C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmp" /SL5="$20434,1664838,141312,C:\Users\user\Desktop\4iogI3WCTh.exe" MD5: 8FDC58C7D4C59472615682D6DEA9D190)
      • 4iogI3WCTh.exe (PID: 600 cmdline: "C:\Users\user\Desktop\4iogI3WCTh.exe" /VERYSILENT MD5: F4E673616E807B25A98F0655C693D411)
        • 4iogI3WCTh.tmp (PID: 2496 cmdline: "C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp" /SL5="$20442,1664838,141312,C:\Users\user\Desktop\4iogI3WCTh.exe" /VERYSILENT MD5: 8FDC58C7D4C59472615682D6DEA9D190)
          • msedgewebview2.exe (PID: 2304 cmdline: "C:\Users\user\AppData\Roaming\\NVIDIA app\\724\\msedgewebview2.exe" MD5: 71FDF2D301949413F8B14E0F12C2E0F5)
            • powershell.exe (PID: 2800 cmdline: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest" MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 3804 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • msedgewebview2.exe (PID: 7232 cmdline: "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe" MD5: 71FDF2D301949413F8B14E0F12C2E0F5)
              • powershell.exe (PID: 7248 cmdline: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest" MD5: 04029E121A0CFA5991749937DD22A1D9)
                • conhost.exe (PID: 7256 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • tasklist.exe (PID: 7608 cmdline: "tasklist" /FI "IMAGENAME eq regsvr32.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
                • conhost.exe (PID: 7620 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • regsvr32.exe (PID: 7672 cmdline: "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll" MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • powershell.exe (PID: 2996 cmdline: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 2424 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • tasklist.exe (PID: 7764 cmdline: "tasklist" /FI "IMAGENAME eq regsvr32.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
    • conhost.exe (PID: 7772 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • regsvr32.exe (PID: 7824 cmdline: "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll" MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • powershell.exe (PID: 7840 cmdline: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • tasklist.exe (PID: 8144 cmdline: "tasklist" /FI "IMAGENAME eq regsvr32.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
    • conhost.exe (PID: 8152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • regsvr32.exe (PID: 2700 cmdline: "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll" MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • powershell.exe (PID: 1448 cmdline: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 5100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • tasklist.exe (PID: 5944 cmdline: "tasklist" /FI "IMAGENAME eq regsvr32.exe" MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
    • conhost.exe (PID: 7488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • regsvr32.exe (PID: 4312 cmdline: "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll" MD5: B0C2FA35D14A9FAD919E99D9D75E1B9E)
  • powershell.exe (PID: 1516 cmdline: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 4048 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 url": ["154.39.239.95:1445", "154.39.239.95:1445"]}
SourceRuleDescriptionAuthorStrings
00000012.00000002.3094660374.0000000000BAA000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x26a28:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x29f5e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000012.00000003.1931212895.0000000000BA9000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x27a28:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x2af5e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
00000012.00000002.3096785341.0000000002720000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x22388:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x258be:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
Process Memory Space: regsvr32.exe PID: 7672JoeSecurity_GhostRatYara detected GhostRatJoe Security
    SourceRuleDescriptionAuthorStrings
    18.2.regsvr32.exe.272130d.1.raw.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x2107b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    • 0x245b1:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    18.3.regsvr32.exe.baf9ad.0.raw.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x2107b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    • 0x245b1:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    18.2.regsvr32.exe.baf9ad.0.raw.unpackWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0x2107b:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    • 0x245b1:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB

    System Summary

    barindex
    Source: Network ConnectionAuthor: Dmitriy Lifanov, oscd.community: Data: DestinationIp: 154.39.239.95, DestinationIsIpv6: false, DestinationPort: 1445, EventID: 3, Image: C:\Windows\System32\regsvr32.exe, Initiated: true, ProcessId: 7672, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49736
    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll", CommandLine: "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll", CommandLine|base64offset|contains: , Image: C:\Windows\System32\regsvr32.exe, NewProcessName: C:\Windows\System32\regsvr32.exe, OriginalFileName: C:\Windows\System32\regsvr32.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe", ParentImage: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe, ParentProcessId: 7232, ParentProcessName: msedgewebview2.exe, ProcessCommandLine: "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll", ProcessId: 7672, ProcessName: regsvr32.exe
    Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest", CommandLine: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest", CommandLine|base64offset|contains: -, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\\NVIDIA app\\724\\msedgewebview2.exe", ParentImage: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe, ParentProcessId: 2304, ParentProcessName: msedgewebview2.exe, ProcessCommandLine: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest", ProcessId: 2800, ProcessName: powershell.exe
    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest", CommandLine: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest", CommandLine|base64offset|contains: -, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\\NVIDIA app\\724\\msedgewebview2.exe", ParentImage: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe, ParentProcessId: 2304, ParentProcessName: msedgewebview2.exe, ProcessCommandLine: "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest", ProcessId: 2800, ProcessName: powershell.exe
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2025-01-01T16:22:25.381051+010020528751A Network Trojan was detected192.168.2.449736154.39.239.951445TCP
    2025-01-01T16:23:34.432562+010020528751A Network Trojan was detected192.168.2.449737154.39.239.951445TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: regsvr32.exe.7672.18.memstrminMalware Configuration Extractor: GhostRat {"C2 url": ["154.39.239.95:1445", "154.39.239.95:1445"]}
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\is-A0K1V.tmpReversingLabs: Detection: 47%
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll (copy)ReversingLabs: Detection: 47%
    Source: 4iogI3WCTh.exeReversingLabs: Detection: 47%
    Source: 4iogI3WCTh.exeVirustotal: Detection: 47%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.4% probability
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1C35A0 BCryptGenRandom,SystemFunction036,HeapFree,TlsSetValue,HeapFree,HeapFree,TlsSetValue,4_2_00007FFDFF1C35A0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1C3150 TlsGetValue,BCryptGenRandom,SystemFunction036,TlsGetValue,TlsGetValue,TlsSetValue,HeapFree,HeapFree,TlsSetValue,HeapFree,HeapFree,4_2_00007FFDFF1C3150
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1C3150 TlsGetValue,BCryptGenRandom,SystemFunction036,TlsGetValue,TlsGetValue,TlsSetValue,HeapFree,HeapFree,TlsSetValue,HeapFree,HeapFree,18_2_00007FFDFF1C3150
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1C35A0 BCryptGenRandom,SystemFunction036,HeapFree,TlsSetValue,HeapFree,HeapFree,TlsSetValue,18_2_00007FFDFF1C35A0
    Source: 4iogI3WCTh.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Microsoft Edge WebView2 Runtime_is1Jump to behavior
    Source: Binary string: msedgewebview2.exe.pdbOGP source: 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005DB2000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000004.00000000.1652015949.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000000.1748884605.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000002.3096660732.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp
    Source: Binary string: msedgewebview2.exe.pdb source: 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005DB2000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000004.00000000.1652015949.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000000.1748884605.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000002.3096660732.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp
    Source: C:\Windows\System32\regsvr32.exeFile opened: z:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: x:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: v:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: t:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: r:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: p:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: n:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: l:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: j:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: h:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: f:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: b:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: y:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: w:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: u:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: s:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: q:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: o:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: m:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: k:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: i:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: g:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile opened: e:Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: c:
    Source: C:\Windows\System32\regsvr32.exeFile opened: [:Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C99960 GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,lstrcpyW,lstrcatW,18_2_02C99960

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49736 -> 154.39.239.95:1445
    Source: Network trafficSuricata IDS: 2052875 - Severity 1 - ET MALWARE Anonymous RAT CnC Checkin : 192.168.2.4:49737 -> 154.39.239.95:1445
    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 154.39.239.95 1445Jump to behavior
    Source: Malware configuration extractorURLs: 154.39.239.95:1445
    Source: Malware configuration extractorURLs: 154.39.239.95:1445
    Source: global trafficTCP traffic: 192.168.2.4:49736 -> 154.39.239.95:1445
    Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: unknownTCP traffic detected without corresponding DNS query: 154.39.239.95
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C93660 select,recv,_errno,_errno,_errno,18_2_02C93660
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
    Source: 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://crl.entrust.net/2048ca.crl0
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
    Source: powershell.exe, 0000001B.00000002.2593657575.000001B542100000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsXbe;c
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4Cod
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
    Source: 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://crl4.digi
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
    Source: powershell.exe, 00000005.00000002.1728566872.00000231AF8F2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2011774321.0000026BAE922000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1864557259.0000026744423000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2236249896.000001A05A89F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2562965151.000001B539C8B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.3020355477.000001AE603FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0
    Source: 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://ocsp.digicert.com0A
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://ocsp.entrust.net02
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://ocsp.entrust.net03
    Source: powershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
    Source: powershell.exe, 00000005.00000002.1733782261.00000231B7C8F000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2589140588.000001B542008000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.micros
    Source: powershell.exe, 00000005.00000002.1698180699.000002319FAA9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1847876321.0000026B9EAD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1783904068.00000267345D8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2078437647.000001A04AA58000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2344779647.000001B529E49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
    Source: powershell.exe, 00000005.00000002.1698180699.000002319F881000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1847876321.0000026B9E8B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1783904068.00000267343B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2078437647.000001A04A831000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2344779647.000001B529C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2694346489.000001AE50391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
    Source: powershell.exe, 00000005.00000002.1698180699.000002319FAA9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1847876321.0000026B9EAD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1783904068.00000267345D8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2078437647.000001A04AA58000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2344779647.000001B529E49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
    Source: powershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://www.digicert.com/CPS0
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: http://www.entrust.net/rpa03
    Source: 4iogI3WCTh.exe, 00000000.00000003.1639795686.000000007FD30000.00000004.00001000.00020000.00000000.sdmp, 4iogI3WCTh.exe, 00000000.00000003.1639572060.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000001.00000000.1640326476.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 4iogI3WCTh.tmp.0.drString found in binary or memory: http://www.innosetup.com/
    Source: powershell.exe, 00000008.00000002.2026513817.0000026BB6E2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
    Source: powershell.exe, 00000008.00000002.2026513817.0000026BB6E2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c/
    Source: powershell.exe, 00000008.00000002.2023594423.0000026BB6DED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
    Source: powershell.exe, 00000008.00000002.2026513817.0000026BB6E2F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.cz
    Source: 4iogI3WCTh.exe, 00000000.00000003.1639795686.000000007FD30000.00000004.00001000.00020000.00000000.sdmp, 4iogI3WCTh.exe, 00000000.00000003.1639572060.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000001.00000000.1640326476.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 4iogI3WCTh.tmp.0.drString found in binary or memory: http://www.remobjects.com/ps
    Source: powershell.exe, 00000016.00000002.2265845423.000001A0630D9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://.VisualC
    Source: powershell.exe, 00000005.00000002.1698180699.000002319F881000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1847876321.0000026B9E8B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1783904068.00000267343B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2078437647.000001A04A831000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2344779647.000001B529C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2694346489.000001AE50391000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
    Source: powershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
    Source: powershell.exe, 00000021.00000002.3020355477.000001AE603FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
    Source: powershell.exe, 00000021.00000002.3020355477.000001AE603FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
    Source: powershell.exe, 00000021.00000002.3020355477.000001AE603FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
    Source: 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005DB2000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000004.00000000.1652015949.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000000.1748884605.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000002.3096660732.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: https://crashpad.chromium.org/
    Source: 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005DB2000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000004.00000000.1652015949.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000000.1748884605.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000002.3096660732.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: https://crashpad.chromium.org/bug/new
    Source: 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005DB2000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000004.00000000.1652015949.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000000.1748884605.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000002.3096660732.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpString found in binary or memory: https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
    Source: is-A0K1V.tmp.3.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support/rust/deps
    Source: powershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
    Source: powershell.exe, 00000005.00000002.1728566872.00000231AF8F2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2011774321.0000026BAE922000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1864557259.0000026744423000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2236249896.000001A05A89F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2562965151.000001B539C8B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.3020355477.000001AE603FB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
    Source: 4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drString found in binary or memory: https://www.entrust.net/rpa0

    Key, Mouse, Clipboard, Microphone and Screen Capturing

    barindex
    Source: C:\Windows\System32\regsvr32.exeCode function: [esc]18_2_02CA2000
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CA2000 Sleep,GetTickCount,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,GlobalUnlock,CloseClipboard,GetKeyState,lstrlenW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,18_2_02CA2000
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CA2000 Sleep,GetTickCount,GetTickCount,OpenClipboard,GetClipboardData,GlobalSize,GlobalLock,wsprintfW,GlobalUnlock,CloseClipboard,GetKeyState,lstrlenW,lstrlenW,lstrlenW,wsprintfW,wsprintfW,wsprintfW,lstrlenW,18_2_02CA2000
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9EBE0 GetDesktopWindow,GetDC,CreateCompatibleDC,GetDC,GetDeviceCaps,GetDeviceCaps,ReleaseDC,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CreateCompatibleBitmap,SelectObject,SetStretchBltMode,GetSystemMetrics,GetSystemMetrics,StretchBlt,GetDIBits,DeleteObject,DeleteObject,ReleaseDC,DeleteObject,DeleteObject,ReleaseDC,18_2_02C9EBE0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CA1BF0 SHGetFolderPathW,lstrcatW,CreateMutexW,WaitForSingleObject,CreateFileW,GetFileSize,CloseHandle,DeleteFileW,ReleaseMutex,DirectInput8Create,GetTickCount,GetKeyState,18_2_02CA1BF0
    Source: C:\Windows\System32\regsvr32.exeWindows user hook set: 0 mouse low level C:\Windows\system32\DINPUT8.dllJump to behavior

    System Summary

    barindex
    Source: 18.2.regsvr32.exe.272130d.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 18.3.regsvr32.exe.baf9ad.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 18.2.regsvr32.exe.baf9ad.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 00000012.00000002.3094660374.0000000000BAA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 00000012.00000003.1931212895.0000000000BA9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: 00000012.00000002.3096785341.0000000002720000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1CCC50 memset,GetModuleHandleA,LoadLibraryA,GetProcAddress,HeapFree,HeapFree,GetModuleHandleA,GetProcAddress,HeapFree,HeapFree,AddVectoredExceptionHandler,NtQueryInformationProcess,NtQuerySystemInformation,NtOpenThread,HeapFree,HeapFree,NtGetContextThread,NtSetContextThread,NtClose,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,4_2_00007FFDFF1CCC50
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1CCC50 memset,GetModuleHandleA,LoadLibraryA,GetProcAddress,HeapFree,HeapFree,GetModuleHandleA,GetProcAddress,HeapFree,HeapFree,AddVectoredExceptionHandler,NtQueryInformationProcess,NtQuerySystemInformation,NtOpenThread,HeapFree,HeapFree,RtlFreeHeap,NtGetContextThread,NtSetContextThread,NtClose,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,18_2_00007FFDFF1CCC50
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1D4700 NtWriteFile,WaitForSingleObject,RtlNtStatusToDosError,18_2_00007FFDFF1D4700
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02743E28 NtCreateSection,NtMapViewOfSection,VirtualAlloc,NtUnmapViewOfSection,NtMapViewOfSection,VirtualProtect,VirtualProtect,VirtualProtect,18_2_02743E28
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9E0C7 ExitWindowsEx,18_2_02C9E0C7
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9E0E8 ExitWindowsEx,18_2_02C9E0E8
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9E097 ExitProcess,ExitWindowsEx,18_2_02C9E097
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D952B04_2_00007FF600D952B0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600E148104_2_00007FF600E14810
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D558104_2_00007FF600D55810
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D553E04_2_00007FF600D553E0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D5BFE04_2_00007FF600D5BFE0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600E1FDE04_2_00007FF600E1FDE0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D54DC04_2_00007FF600D54DC0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D5CBB24_2_00007FF600D5CBB2
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D5C9404_2_00007FF600D5C940
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600E4A32E4_2_00007FF600E4A32E
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D5EF004_2_00007FF600D5EF00
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D520C04_2_00007FF600D520C0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D540D04_2_00007FF600D540D0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D5C2A04_2_00007FF600D5C2A0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D552804_2_00007FF600D55280
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D574804_2_00007FF600D57480
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D5CC804_2_00007FF600D5CC80
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D5DE904_2_00007FF600D5DE90
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D538604_2_00007FF600D53860
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D532604_2_00007FF600D53260
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D5DC684_2_00007FF600D5DC68
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600D556704_2_00007FF600D55670
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1B1D704_2_00007FFDFF1B1D70
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1FFA504_2_00007FFDFF1FFA50
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1FE7604_2_00007FFDFF1FE760
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1F80804_2_00007FFDFF1F8080
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1B60604_2_00007FFDFF1B6060
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E9FD04_2_00007FFDFF1E9FD0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1D00104_2_00007FFDFF1D0010
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E30504_2_00007FFDFF1E3050
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1CFEA04_2_00007FFDFF1CFEA0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1ECEE04_2_00007FFDFF1ECEE0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1D4EF04_2_00007FFDFF1D4EF0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1BBD904_2_00007FFDFF1BBD90
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E3D8E4_2_00007FFDFF1E3D8E
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1C4D624_2_00007FFDFF1C4D62
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E3C844_2_00007FFDFF1E3C84
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1C5C904_2_00007FFDFF1C5C90
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1FDD004_2_00007FFDFF1FDD00
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E3D004_2_00007FFDFF1E3D00
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1C6CF04_2_00007FFDFF1C6CF0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1BDD404_2_00007FFDFF1BDD40
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1FED394_2_00007FFDFF1FED39
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1D8B904_2_00007FFDFF1D8B90
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1CCC504_2_00007FFDFF1CCC50
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E3A994_2_00007FFDFF1E3A99
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1B5A8D4_2_00007FFDFF1B5A8D
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1DAA904_2_00007FFDFF1DAA90
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1BCAA04_2_00007FFDFF1BCAA0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1B5B0B4_2_00007FFDFF1B5B0B
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E3AFF4_2_00007FFDFF1E3AFF
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1D9AF04_2_00007FFDFF1D9AF0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1B5B3E4_2_00007FFDFF1B5B3E
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1B36264_2_00007FFDFF1B3626
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E39AF4_2_00007FFDFF1E39AF
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1B9A104_2_00007FFDFF1B9A10
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1D19F04_2_00007FFDFF1D19F0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1FD8704_2_00007FFDFF1FD870
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1F49004_2_00007FFDFF1F4900
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E39564_2_00007FFDFF1E3956
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1DF8004_2_00007FFDFF1DF800
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1FD6C04_2_00007FFDFF1FD6C0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1CE6C04_2_00007FFDFF1CE6C0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF2036A04_2_00007FFDFF2036A0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E36E74_2_00007FFDFF1E36E7
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1DB6F04_2_00007FFDFF1DB6F0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1D35F04_2_00007FFDFF1D35F0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1DB6404_2_00007FFDFF1DB640
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1B36264_2_00007FFDFF1B3626
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1D14804_2_00007FFDFF1D1480
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1F24904_2_00007FFDFF1F2490
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E34C04_2_00007FFDFF1E34C0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1ED4E04_2_00007FFDFF1ED4E0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1FF5204_2_00007FFDFF1FF520
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1CF5304_2_00007FFDFF1CF530
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1F83D04_2_00007FFDFF1F83D0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF2082804_2_00007FFDFF208280
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF2082604_2_00007FFDFF208260
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1D53404_2_00007FFDFF1D5340
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF2073504_2_00007FFDFF207350
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1D91804_2_00007FFDFF1D9180
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1F02104_2_00007FFDFF1F0210
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E409B4_2_00007FFDFF1E409B
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E40B24_2_00007FFDFF1E40B2
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1F30B04_2_00007FFDFF1F30B0
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1E40EF4_2_00007FFDFF1E40EF
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1C31504_2_00007FFDFF1C3150
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1BD1504_2_00007FFDFF1BD150
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B8B4DFB5_2_00007FFD9B8B4DFB
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9EBE018_2_02C9EBE0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9336018_2_02C93360
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9679018_2_02C96790
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CAFF9418_2_02CAFF94
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C974F018_2_02C974F0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9844018_2_02C98440
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CA15C018_2_02CA15C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CAAA5C18_2_02CAAA5C
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CB0A0018_2_02CB0A00
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CA1BF018_2_02CA1BF0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C93BA018_2_02C93BA0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CAD32818_2_02CAD328
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CAB0BC18_2_02CAB0BC
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9B05018_2_02C9B050
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9285018_2_02C92850
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CAC87018_2_02CAC870
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CBC80418_2_02CBC804
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9C1A018_2_02C9C1A0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9593018_2_02C95930
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C98EC018_2_02C98EC0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CABEDC18_2_02CABEDC
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CAAE8018_2_02CAAE80
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9965018_2_02C99650
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CB365018_2_02CB3650
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9F79018_2_02C9F790
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CA5F9018_2_02CA5F90
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CB0F3018_2_02CB0F30
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CAF4E818_2_02CAF4E8
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CBB4EC18_2_02CBB4EC
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CB9CA018_2_02CB9CA0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9946018_2_02C99460
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CB041418_2_02CB0414
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CBCD4018_2_02CBCD40
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CBBD5018_2_02CBBD50
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CB2D0018_2_02CB2D00
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9F52018_2_02C9F520
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1B1D7018_2_00007FFDFF1B1D70
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1CCC5018_2_00007FFDFF1CCC50
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1D35F018_2_00007FFDFF1D35F0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1B362618_2_00007FFDFF1B3626
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1C315018_2_00007FFDFF1C3150
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E9FD018_2_00007FFDFF1E9FD0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1D001018_2_00007FFDFF1D0010
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E305018_2_00007FFDFF1E3050
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1CFEA018_2_00007FFDFF1CFEA0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1ECEE018_2_00007FFDFF1ECEE0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1D4EF018_2_00007FFDFF1D4EF0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1BBD9018_2_00007FFDFF1BBD90
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E3D8E18_2_00007FFDFF1E3D8E
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1C4D6218_2_00007FFDFF1C4D62
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E3C8418_2_00007FFDFF1E3C84
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1C5C9018_2_00007FFDFF1C5C90
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1FDD0018_2_00007FFDFF1FDD00
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E3D0018_2_00007FFDFF1E3D00
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1C6CF018_2_00007FFDFF1C6CF0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1BDD4018_2_00007FFDFF1BDD40
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1FED3918_2_00007FFDFF1FED39
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1D8B9018_2_00007FFDFF1D8B90
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E3A9918_2_00007FFDFF1E3A99
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1B5A8D18_2_00007FFDFF1B5A8D
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1DAA9018_2_00007FFDFF1DAA90
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1BCAA018_2_00007FFDFF1BCAA0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1B5B0B18_2_00007FFDFF1B5B0B
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E3AFF18_2_00007FFDFF1E3AFF
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1D9AF018_2_00007FFDFF1D9AF0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1B5B3E18_2_00007FFDFF1B5B3E
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1B362618_2_00007FFDFF1B3626
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E39AF18_2_00007FFDFF1E39AF
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1B9A1018_2_00007FFDFF1B9A10
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1D19F018_2_00007FFDFF1D19F0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1FFA5018_2_00007FFDFF1FFA50
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1FD87018_2_00007FFDFF1FD870
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1F490018_2_00007FFDFF1F4900
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E395618_2_00007FFDFF1E3956
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1FE76018_2_00007FFDFF1FE760
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1DF80018_2_00007FFDFF1DF800
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1FD6C018_2_00007FFDFF1FD6C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1CE6C018_2_00007FFDFF1CE6C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF2036A018_2_00007FFDFF2036A0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E36E718_2_00007FFDFF1E36E7
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1DB6F018_2_00007FFDFF1DB6F0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1DB64018_2_00007FFDFF1DB640
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1D148018_2_00007FFDFF1D1480
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1F249018_2_00007FFDFF1F2490
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E34C018_2_00007FFDFF1E34C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1ED4E018_2_00007FFDFF1ED4E0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1FF52018_2_00007FFDFF1FF520
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1CF53018_2_00007FFDFF1CF530
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1F83D018_2_00007FFDFF1F83D0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF20828018_2_00007FFDFF208280
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF20826018_2_00007FFDFF208260
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1D534018_2_00007FFDFF1D5340
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF20735018_2_00007FFDFF207350
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1D918018_2_00007FFDFF1D9180
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1F021018_2_00007FFDFF1F0210
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1F808018_2_00007FFDFF1F8080
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E409B18_2_00007FFDFF1E409B
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1B606018_2_00007FFDFF1B6060
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E40B218_2_00007FFDFF1E40B2
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1F30B018_2_00007FFDFF1F30B0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1E40EF18_2_00007FFDFF1E40EF
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_00007FFDFF1BD15018_2_00007FFDFF1BD150
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_025A73D018_2_025A73D0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_025A339018_2_025A3390
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_025A686018_2_025A6860
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_025AA30C18_2_025AA30C
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_025B489818_2_025B4898
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_025A288018_2_025A2880
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_025AE1C018_2_025AE1C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_025A6F7018_2_025A6F70
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_025B6C5018_2_025B6C50
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02743E2818_2_02743E28
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_0274361C18_2_0274361C
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_0272767D18_2_0272767D
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_0272AA1918_2_0272AA19
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02727ADD18_2_02727ADD
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02723A9D18_2_02723A9D
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02726F6D18_2_02726F6D
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_0273735D18_2_0273735D
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_0274274018_2_02742740
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02734FA518_2_02734FA5
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02722F8D18_2_02722F8D
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_027470D418_2_027470D4
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_027448DC18_2_027448DC
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_0272E8CD18_2_0272E8CD
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_027439F818_2_027439F8
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BDFA6518_2_02BDFA65
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BD5A6118_2_02BD5A61
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BC626118_2_02BC6261
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BC232118_2_02BC2321
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BD109118_2_02BD1091
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BDB9AD18_2_02BDB9AD
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BC899118_2_02BC8991
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BC912118_2_02BC9121
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BCE6B118_2_02BCE6B1
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BDFEE518_2_02BDFEE5
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BD16C118_2_02BD16C1
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BC2E3118_2_02BC2E31
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BC367118_2_02BC3671
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BCEFF118_2_02BCEFF1
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BE27D118_2_02BE27D1
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BC6FC118_2_02BC6FC1
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BE04D118_2_02BE04D1
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BC540118_2_02BC5401
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BCBC7118_2_02BCBC71
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BDA52D18_2_02BDA52D
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: String function: 00007FFDFF1B9EF0 appears 69 times
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: String function: 00007FFDFF1D40B0 appears 52 times
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: String function: 00007FFDFF1BB6C0 appears 44 times
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: String function: 00007FFDFF20B554 appears 94 times
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: String function: 00007FFDFF1EC8D0 appears 46 times
    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFDFF1B9EF0 appears 69 times
    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFDFF1D40B0 appears 52 times
    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFDFF1BB6C0 appears 44 times
    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFDFF20B554 appears 94 times
    Source: C:\Windows\System32\regsvr32.exeCode function: String function: 00007FFDFF1EC8D0 appears 46 times
    Source: 4iogI3WCTh.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
    Source: 4iogI3WCTh.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
    Source: 4iogI3WCTh.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
    Source: 4iogI3WCTh.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
    Source: 4iogI3WCTh.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
    Source: is-6A565.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
    Source: is-6A565.tmp.3.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
    Source: is-183JO.tmp.3.drStatic PE information: Number of sections : 13 > 10
    Source: is-A0K1V.tmp.3.drStatic PE information: Number of sections : 11 > 10
    Source: 4iogI3WCTh.exe, 00000000.00000003.1639795686.000000007FE3E000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs 4iogI3WCTh.exe
    Source: 4iogI3WCTh.exe, 00000000.00000003.1639572060.00000000024C2000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs 4iogI3WCTh.exe
    Source: 4iogI3WCTh.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
    Source: 18.2.regsvr32.exe.272130d.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 18.3.regsvr32.exe.baf9ad.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 18.2.regsvr32.exe.baf9ad.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 00000012.00000002.3094660374.0000000000BAA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 00000012.00000003.1931212895.0000000000BA9000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: 00000012.00000002.3096785341.0000000002720000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@39/41@0/1
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1D7AC0 memset,FormatMessageW,GetLastError,HeapFree,HeapFree,4_2_00007FFDFF1D7AC0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C992E0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,CloseHandle,18_2_02C992E0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9A900 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,18_2_02C9A900
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C98E00 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,18_2_02C98E00
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C98C80 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,CloseHandle,GetModuleHandleA,GetProcAddress,OpenProcess,18_2_02C98C80
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C98180 GetDriveTypeW,GetDiskFreeSpaceExW,GlobalMemoryStatusEx,18_2_02C98180
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF2036A0 SetLastError,GetCurrentDirectoryW,GetLastError,GetLastError,HeapFree,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlLookupFunctionEntry,CreateToolhelp32Snapshot,memset,Module32FirstW,Module32NextW,UnmapViewOfFile,CloseHandle,HeapFree,UnmapViewOfFile,CloseHandle,CloseHandle,HeapFree,HeapFree,HeapFree,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,HeapFree,HeapFree,HeapFree,HeapFree,HeapFree,UnmapViewOfFile,CloseHandle,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,HeapFree,HeapFree,GetLastError,HeapFree,4_2_00007FFDFF2036A0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C97A90 CoInitialize,CoCreateInstance,SysFreeString,CoUninitialize,18_2_02C97A90
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpFile created: C:\Users\user\AppData\Local\unins000.datJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7256:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3804:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2424:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7848:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8152:120:WilError_03
    Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\2024.12.25
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7772:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7620:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5100:120:WilError_03
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7488:120:WilError_03
    Source: C:\Windows\System32\regsvr32.exeMutant created: \Sessions\1\BaseNamedObjects\yEsBQ
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeFile created: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmpJump to behavior
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
    Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'REGSVR32.EXE'
    Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'REGSVR32.EXE'
    Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'REGSVR32.EXE'
    Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process WHERE Caption = 'REGSVR32.EXE'
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
    Source: 4iogI3WCTh.exeReversingLabs: Detection: 47%
    Source: 4iogI3WCTh.exeVirustotal: Detection: 47%
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeFile read: C:\Users\user\Desktop\4iogI3WCTh.exeJump to behavior
    Source: unknownProcess created: C:\Users\user\Desktop\4iogI3WCTh.exe "C:\Users\user\Desktop\4iogI3WCTh.exe"
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeProcess created: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmp "C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmp" /SL5="$20434,1664838,141312,C:\Users\user\Desktop\4iogI3WCTh.exe"
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpProcess created: C:\Users\user\Desktop\4iogI3WCTh.exe "C:\Users\user\Desktop\4iogI3WCTh.exe" /VERYSILENT
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeProcess created: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp "C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp" /SL5="$20442,1664838,141312,C:\Users\user\Desktop\4iogI3WCTh.exe" /VERYSILENT
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpProcess created: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe "C:\Users\user\AppData\Roaming\\NVIDIA app\\724\\msedgewebview2.exe"
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe"
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq regsvr32.exe"
    Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll"
    Source: unknownProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq regsvr32.exe"
    Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll"
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq regsvr32.exe"
    Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll"
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq regsvr32.exe"
    Source: C:\Windows\System32\tasklist.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: unknownProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll"
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeProcess created: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmp "C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmp" /SL5="$20434,1664838,141312,C:\Users\user\Desktop\4iogI3WCTh.exe" Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpProcess created: C:\Users\user\Desktop\4iogI3WCTh.exe "C:\Users\user\Desktop\4iogI3WCTh.exe" /VERYSILENTJump to behavior
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeProcess created: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp "C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp" /SL5="$20442,1664838,141312,C:\Users\user\Desktop\4iogI3WCTh.exe" /VERYSILENTJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpProcess created: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe "C:\Users\user\AppData\Roaming\\NVIDIA app\\724\\msedgewebview2.exe"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq regsvr32.exe"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll"Jump to behavior
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: edputil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: appresolver.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: bcp47langs.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: slc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: sppc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: msimg32.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: mpr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: rstrtmgr.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: ncrypt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: ntasn1.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: explorerframe.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: sfc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpSection loaded: sfc_os.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: napinsp.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: pnrpnsp.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: wshbth.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: nlaapi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: winrnr.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: dinput8.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: inputhost.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: resourcepolicyclient.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: devenum.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: devobj.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: msdmo.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: version.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: apphelp.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: aclayers.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: sfc_os.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\regsvr32.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq regsvr32.exe"
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpWindow found: window name: TMainFormJump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpRegistry value created: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Microsoft Edge WebView2 Runtime_is1Jump to behavior
    Source: 4iogI3WCTh.exeStatic file information: File size 2044814 > 1048576
    Source: Binary string: msedgewebview2.exe.pdbOGP source: 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005DB2000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000004.00000000.1652015949.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000000.1748884605.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000002.3096660732.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp
    Source: Binary string: msedgewebview2.exe.pdb source: 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005DB2000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000004.00000000.1652015949.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000000.1748884605.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000002.3096660732.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600E1F800 LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,4_2_00007FF600E1F800
    Source: _setup64.tmp.1.drStatic PE information: real checksum: 0x0 should be: 0x8546
    Source: 4iogI3WCTh.exeStatic PE information: real checksum: 0x0 should be: 0x1ff4e0
    Source: is-6A565.tmp.3.drStatic PE information: real checksum: 0x0 should be: 0x1295e0
    Source: is-A0K1V.tmp.3.drStatic PE information: real checksum: 0xcdffe should be: 0xd3a10
    Source: _setup64.tmp.3.drStatic PE information: real checksum: 0x0 should be: 0x8546
    Source: 4iogI3WCTh.tmp.2.drStatic PE information: real checksum: 0x0 should be: 0x11ef3f
    Source: 4iogI3WCTh.tmp.0.drStatic PE information: real checksum: 0x0 should be: 0x11ef3f
    Source: is-183JO.tmp.3.drStatic PE information: section name: .gxfg
    Source: is-183JO.tmp.3.drStatic PE information: section name: .retplne
    Source: is-183JO.tmp.3.drStatic PE information: section name: CPADinfo
    Source: is-183JO.tmp.3.drStatic PE information: section name: LZMADEC
    Source: is-183JO.tmp.3.drStatic PE information: section name: _RDATA
    Source: is-183JO.tmp.3.drStatic PE information: section name: malloc_h
    Source: is-A0K1V.tmp.3.drStatic PE information: section name: .xdata
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll"
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B79D2A5 pushad ; iretd 5_2_00007FFD9B79D2A6
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B8BDBFA push E85AE7B6h; ret 5_2_00007FFD9B8BDBF9
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B8BDB72 push E85AE7B6h; ret 5_2_00007FFD9B8BDBF9
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B8B5B83 pushad ; ret 5_2_00007FFD9B8B5BA1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B8B607C push esp; ret 5_2_00007FFD9B8B60AA
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B8B60AC push esp; ret 5_2_00007FFD9B8B60BA
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B8B604C push esp; ret 5_2_00007FFD9B8B60AA
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFD9B980B5C push ds; ret 5_2_00007FFD9B980B5D
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CBFAB8 pushfq ; retf 0002h18_2_02CBFAB9
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CBFA78 pushfq ; retf 0002h18_2_02CBFA79
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CBFA08 push rax; retf 0002h18_2_02CBFA0A
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CBFA20 push rax; retf 0002h18_2_02CBFA22
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CBFA38 push rax; retf 0002h18_2_02CBFA3A
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CC0238 push rax; retf 0002h18_2_02CC023A
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CBFB58 pushfq ; retf 0002h18_2_02CBFB59
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CC00D8 push rax; retf 0002h18_2_02CC00DA
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CC0097 push rdx; retf 0002h18_2_02CC00A2
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CC00A8 push rax; retf 0002h18_2_02CC00AA
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C900B7 push rdi; ret 18_2_02C900BD
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CBF971 push rbp; retf 18_2_02CBF974
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_025AB348 push esp; iretd 18_2_025AB349
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_025B5DBA push ebp; iretd 18_2_025B5DC4
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_0272BA55 push esp; iretd 18_2_0272BA56
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_027364C7 push ebp; iretd 18_2_027364D1
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BDF787 push cs; retf 18_2_02BDF788
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BC8428 push ecx; ret 18_2_02BC8429
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BC847D push eax; ret 18_2_02BC847E
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02BE0449 pushfd ; ret 18_2_02BE044A
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeFile created: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpFile created: C:\Users\user\AppData\Local\Temp\is-VFQ39.tmp\_isetup\_shfoldr.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpFile created: C:\Users\user\AppData\Local\Temp\is-VFQ39.tmp\_isetup\_setup64.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpFile created: C:\Users\user\AppData\Roaming\NVIDIA app\724\is-A0K1V.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N408J.tmp\_isetup\_setup64.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpFile created: C:\Users\user\AppData\Roaming\NVIDIA app\724\is-183JO.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpFile created: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe (copy)Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpFile created: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll (copy)Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpFile created: C:\Users\user\AppData\Local\is-6A565.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpFile created: C:\Users\user\AppData\Local\unins000.exe (copy)Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpFile created: C:\Users\user\AppData\Local\Temp\is-N408J.tmp\_isetup\_shfoldr.dllJump to dropped file
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeFile created: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpJump to dropped file

    Boot Survival

    barindex
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9E03A OpenEventLogW,ClearEventLogW,CloseEventLog,18_2_02C9E03A
    Source: C:\Windows\System32\regsvr32.exeKey value created or modified: HKEY_CURRENT_USER\Console\1 d33f351a4aeea5e608853d1a56661059Jump to behavior
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\4iogI3WCTh.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

    Malware Analysis System Evasion

    barindex
    Source: C:\Windows\System32\regsvr32.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleep
    Source: C:\Windows\System32\regsvr32.exeStalling execution: Execution stalls by calling Sleep
    Source: C:\Windows\System32\regsvr32.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{05DF8D13-C355-47F4-A11E-851B338CEFB8}Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6186Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3627Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6535
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3010
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8755
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 660
    Source: C:\Windows\System32\regsvr32.exeWindow / User API: threadDelayed 2884Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeWindow / User API: threadDelayed 3567Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeWindow / User API: threadDelayed 2636Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7123
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2626
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6850
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2809
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7190
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1132
    Source: C:\Windows\System32\regsvr32.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-VFQ39.tmp\_isetup\_shfoldr.dllJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\NVIDIA app\724\is-A0K1V.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-VFQ39.tmp\_isetup\_setup64.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N408J.tmp\_isetup\_setup64.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpDropped PE file which has not been started: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll (copy)Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\is-6A565.tmpJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\unins000.exe (copy)Jump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-N408J.tmp\_isetup\_shfoldr.dllJump to dropped file
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeAPI coverage: 1.4 %
    Source: C:\Windows\System32\regsvr32.exeAPI coverage: 7.3 %
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4956Thread sleep count: 6186 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4956Thread sleep count: 3627 > 30Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2316Thread sleep time: -5534023222112862s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 600Thread sleep count: 6535 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 600Thread sleep count: 3010 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7196Thread sleep time: -4611686018427385s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7332Thread sleep count: 8755 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7356Thread sleep time: -6456360425798339s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7328Thread sleep count: 660 > 30
    Source: C:\Windows\System32\regsvr32.exe TID: 7708Thread sleep count: 296 > 30Jump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 7740Thread sleep count: 2884 > 30Jump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 7740Thread sleep time: -2884000s >= -30000sJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 7748Thread sleep count: 3567 > 30Jump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 7748Thread sleep time: -35670s >= -30000sJump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 7740Thread sleep count: 2636 > 30Jump to behavior
    Source: C:\Windows\System32\regsvr32.exe TID: 7740Thread sleep time: -2636000s >= -30000sJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7936Thread sleep count: 7123 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7936Thread sleep count: 2626 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7972Thread sleep time: -5534023222112862s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5004Thread sleep count: 6850 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3804Thread sleep count: 2809 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4136Thread sleep time: -3689348814741908s >= -30000s
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6540Thread sleep count: 7190 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6540Thread sleep count: 1132 > 30
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6648Thread sleep time: -4611686018427385s >= -30000s
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
    Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
    Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\regsvr32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C99960 GetLogicalDriveStringsW,lstrcmpiW,lstrcmpiW,QueryDosDeviceW,lstrlenW,lstrcpyW,lstrcpyW,lstrcatW,18_2_02C99960
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C989F0 GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,18_2_02C989F0
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
    Source: powershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
    Source: powershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
    Source: 4iogI3WCTh.tmp, 00000001.00000002.1644578663.0000000000628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
    Source: 4iogI3WCTh.tmp, 00000001.00000002.1644578663.0000000000628000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}{
    Source: powershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
    Source: regsvr32.exe, 00000012.00000002.3094660374.0000000000BAA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
    Source: C:\Windows\System32\regsvr32.exeAPI call chain: ExitProcess graph end node
    Source: C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmpProcess information queried: ProcessInformationJump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600EC99DC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF600EC99DC
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600E1F800 LoadLibraryW,GetProcAddress,LoadLibraryW,GetProcAddress,4_2_00007FF600E1F800
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C97BF0 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,LookupAccountSidW,GetLastError,GetProcessHeap,HeapFree,18_2_02C97BF0
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\tasklist.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600EC99DC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00007FF600EC99DC
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600EA3F68 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00007FF600EA3F68
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CA15C0 Sleep,SleepEx,CloseHandle,GetLocalTime,wsprintfW,SetUnhandledExceptionFilter,CloseHandle,EnumWindows,Sleep,EnumWindows,Sleep,CreateEventA,RegOpenKeyExW,Sleep,SleepEx,RegOpenKeyExW,RegQueryValueExW,Sleep,WaitForSingleObject,CloseHandle,Sleep,WaitForSingleObject,CloseHandle,Sleep,CloseHandle,18_2_02CA15C0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CAC1C4 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,18_2_02CAC1C4
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CA4CD0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,18_2_02CA4CD0

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: C:\Windows\System32\regsvr32.exeNetwork Connect: 154.39.239.95 1445Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C98EC0 GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,18_2_02C98EC0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C98EC0 GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread,18_2_02C98EC0
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02C9A410 VirtualAllocEx,TerminateProcess,OpenProcess,WriteProcessMemory,WriteProcessMemory,CreateRemoteThread,WaitForSingleObject,VirtualFreeEx,18_2_02C9A410
    Source: C:\Windows\System32\regsvr32.exeThread register set: 7672 5Jump to behavior
    Source: C:\Windows\System32\regsvr32.exeCode function: GetSystemDirectoryA,CreateProcessA,OpenProcess,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetCurrentProcess,GetProcessId,GetModuleFileNameA,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,VirtualAllocEx,WriteProcessMemory,VirtualProtectEx,CreateRemoteThread,Sleep,VirtualProtectEx,VirtualProtectEx,ResumeThread, Windows\System32\svchost.exe18_2_02C98EC0
    Source: C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmpProcess created: C:\Users\user\Desktop\4iogI3WCTh.exe "C:\Users\user\Desktop\4iogI3WCTh.exe" /VERYSILENTJump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\tasklist.exe "tasklist" /FI "IMAGENAME eq regsvr32.exe"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\regsvr32.exe "regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"c:\users\user\appdata\roaming\nvidia app\724\msedgewebview2.exe\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{226c52d4-f263-4d4a-8ae7-8e60e9b5a5f5}' -description 'default' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"c:\users\user\appdata\roaming\nvidia app\724\msedgewebview2.exe\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{226c52d4-f263-4d4a-8ae7-8e60e9b5a5f5}' -description 'default' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"c:\users\user\appdata\roaming\nvidia app\724\msedgewebview2.exe\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{226c52d4-f263-4d4a-8ae7-8e60e9b5a5f5}' -description 'default' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"c:\users\user\appdata\roaming\nvidia app\724\msedgewebview2.exe\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{226c52d4-f263-4d4a-8ae7-8e60e9b5a5f5}' -description 'default' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"c:\users\user\appdata\roaming\nvidia app\724\msedgewebview2.exe\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{226c52d4-f263-4d4a-8ae7-8e60e9b5a5f5}' -description 'default' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"
    Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"c:\users\user\appdata\roaming\nvidia app\724\msedgewebview2.exe\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{226c52d4-f263-4d4a-8ae7-8e60e9b5a5f5}' -description 'default' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"c:\users\user\appdata\roaming\nvidia app\724\msedgewebview2.exe\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{226c52d4-f263-4d4a-8ae7-8e60e9b5a5f5}' -description 'default' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"Jump to behavior
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" "register-scheduledtask -action (new-scheduledtaskaction -execute \"c:\users\user\appdata\roaming\nvidia app\724\msedgewebview2.exe\") -trigger (new-scheduledtasktrigger -once -at (get-date).addminutes(1) -repetitioninterval (new-timespan -minutes 1)) -taskname 'microsoftedgeupdatetaskmachineua{226c52d4-f263-4d4a-8ae7-8e60e9b5a5f5}' -description 'default' -settings (new-scheduledtasksettingsset -allowstartifonbatteries -dontstopifgoingonbatteries -executiontimelimit 0) -runlevel highest"Jump to behavior
    Source: regsvr32.exe, 00000012.00000002.3098361442.0000000002E10000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
    Source: C:\Windows\System32\regsvr32.exeCode function: gethostname,gethostbyname,inet_ntoa,inet_ntoa,MultiByteToWideChar,MultiByteToWideChar,GetLastInputInfo,GetTickCount,wsprintfW,MultiByteToWideChar,MultiByteToWideChar,GetSystemInfo,wsprintfW,GetForegroundWindow,GetWindowTextW,lstrlenW,lstrlenW,GetModuleHandleW,GetProcAddress,GetNativeSystemInfo,GetSystemInfo,wsprintfW,GetCurrentProcessId,GetTickCount,_localtime64,wsprintfW,GetLocaleInfoW,GetSystemDirectoryW,GetCurrentHwProfileW,18_2_02C96790
    Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,EnumSystemLocalesA,GetUserDefaultLCID,GetLocaleInfoW,GetLocaleInfoW,GetACP,IsValidCodePage,IsValidLocale,GetLocaleInfoA,GetLocaleInfoA,_itow_s,18_2_02CB6254
    Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,18_2_02CB5BD8
    Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,malloc,GetLocaleInfoW,WideCharToMultiByte,free,18_2_02CB73F4
    Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,GetLocaleInfoW,18_2_02CB6020
    Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,18_2_02CB61E8
    Source: C:\Windows\System32\regsvr32.exeCode function: EnumSystemLocalesA,18_2_02CB6150
    Source: C:\Windows\System32\regsvr32.exeCode function: GetLocaleInfoW,18_2_02CB5CC0
    Source: C:\Windows\System32\regsvr32.exeCode function: GetLastError,free,free,GetLocaleInfoW,GetLocaleInfoW,free,GetLocaleInfoW,18_2_02CAE590
    Source: C:\Windows\System32\regsvr32.exeCode function: _getptd,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoW,18_2_02CB5D50
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FFDFF1FFA50 GetCurrentProcessId,ProcessPrng,HeapFree,CreateNamedPipeW,GetLastError,HeapFree,HeapFree,HeapFree,CloseHandle,HeapFree,HeapFree,HeapFree,HeapFree,CloseHandle,4_2_00007FFDFF1FFA50
    Source: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exeCode function: 4_2_00007FF600EA4214 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,4_2_00007FF600EA4214
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CAFF94 _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,18_2_02CAFF94
    Source: C:\Windows\System32\regsvr32.exeCode function: 18_2_02CABA94 HeapCreate,GetVersion,HeapSetInformation,18_2_02CABA94
    Source: regsvr32.exeBinary or memory string: acs.exe
    Source: regsvr32.exeBinary or memory string: vsserv.exe
    Source: regsvr32.exeBinary or memory string: avcenter.exe
    Source: regsvr32.exeBinary or memory string: kxetray.exe
    Source: regsvr32.exeBinary or memory string: KSafeTray.exe
    Source: regsvr32.exeBinary or memory string: avp.exe
    Source: regsvr32.exeBinary or memory string: cfp.exe
    Source: regsvr32.exeBinary or memory string: 360Safe.exe
    Source: regsvr32.exeBinary or memory string: rtvscan.exe
    Source: regsvr32.exeBinary or memory string: 360tray.exe
    Source: regsvr32.exeBinary or memory string: TMBMSRV.exe
    Source: regsvr32.exeBinary or memory string: ashDisp.exe
    Source: regsvr32.exeBinary or memory string: 360Tray.exe
    Source: regsvr32.exeBinary or memory string: avgwdsvc.exe
    Source: regsvr32.exeBinary or memory string: AYAgent.aye
    Source: regsvr32.exeBinary or memory string: RavMonD.exe
    Source: regsvr32.exeBinary or memory string: QUHLPSVC.EXE
    Source: regsvr32.exeBinary or memory string: Mcshield.exe
    Source: regsvr32.exeBinary or memory string: K7TSecurity.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 7672, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: regsvr32.exe PID: 7672, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire Infrastructure1
    Replication Through Removable Media
    1
    Windows Management Instrumentation
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Deobfuscate/Decode Files or Information
    121
    Input Capture
    2
    System Time Discovery
    Remote Services1
    Archive Collected Data
    1
    Ingress Tool Transfer
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault Accounts11
    Native API
    1
    Windows Service
    1
    Access Token Manipulation
    2
    Obfuscated Files or Information
    LSASS Memory11
    Peripheral Device Discovery
    Remote Desktop Protocol1
    Screen Capture
    2
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain Accounts1
    Command and Scripting Interpreter
    1
    Scheduled Task/Job
    1
    Windows Service
    1
    DLL Side-Loading
    Security Account Manager2
    File and Directory Discovery
    SMB/Windows Admin Shares121
    Input Capture
    1
    Non-Standard Port
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal Accounts1
    Scheduled Task/Job
    Login Hook423
    Process Injection
    1
    Masquerading
    NTDS37
    System Information Discovery
    Distributed Component Object Model2
    Clipboard Data
    1
    Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud Accounts1
    PowerShell
    Network Logon Script1
    Scheduled Task/Job
    1
    Modify Registry
    LSA Secrets231
    Security Software Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
    Virtualization/Sandbox Evasion
    Cached Domain Credentials21
    Virtualization/Sandbox Evasion
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Access Token Manipulation
    DCSync4
    Process Discovery
    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job423
    Process Injection
    Proc Filesystem1
    Application Window Discovery
    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
    Regsvr32
    /etc/passwd and /etc/shadow2
    System Owner/User Discovery
    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
    Indicator Removal
    Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet
    behaviorgraph top1 signatures2 2 Behavior Graph ID: 1583032 Sample: 4iogI3WCTh.exe Startdate: 01/01/2025 Architecture: WINDOWS Score: 100 83 Suricata IDS alerts for network traffic 2->83 85 Found malware configuration 2->85 87 Malicious sample detected (through community Yara rule) 2->87 89 7 other signatures 2->89 12 4iogI3WCTh.exe 2 2->12         started        15 powershell.exe 2->15         started        18 powershell.exe 2->18         started        20 8 other processes 2->20 process3 file4 79 C:\Users\user\AppData\...\4iogI3WCTh.tmp, PE32 12->79 dropped 22 4iogI3WCTh.tmp 3 5 12->22         started        107 Loading BitLocker PowerShell Module 15->107 25 conhost.exe 15->25         started        27 conhost.exe 18->27         started        29 conhost.exe 20->29         started        31 conhost.exe 20->31         started        33 conhost.exe 20->33         started        35 2 other processes 20->35 signatures5 process6 file7 67 C:\Users\user\AppData\Local\...\_shfoldr.dll, PE32 22->67 dropped 69 C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+ 22->69 dropped 37 4iogI3WCTh.exe 2 22->37         started        process8 file9 65 C:\Users\user\AppData\...\4iogI3WCTh.tmp, PE32 37->65 dropped 40 4iogI3WCTh.tmp 22 11 37->40         started        process10 file11 71 C:\Users\user\...\msedgewebview2.exe (copy), PE32+ 40->71 dropped 73 C:\Users\user\...\msedge_elf.dll (copy), PE32+ 40->73 dropped 75 C:\Users\user\AppData\...\is-A0K1V.tmp, PE32+ 40->75 dropped 77 5 other files (none is malicious) 40->77 dropped 43 msedgewebview2.exe 40->43         started        process12 signatures13 101 Suspicious powershell command line found 43->101 46 msedgewebview2.exe 43->46         started        49 powershell.exe 37 43->49         started        process14 signatures15 103 Suspicious powershell command line found 46->103 51 regsvr32.exe 3 1 46->51         started        55 powershell.exe 46->55         started        57 tasklist.exe 1 46->57         started        105 Loading BitLocker PowerShell Module 49->105 59 conhost.exe 49->59         started        process16 dnsIp17 81 154.39.239.95, 1445, 49736, 49737 COGENT-174US United States 51->81 91 System process connects to network (likely due to code injection or exploit) 51->91 93 Found evasive API chain (may stop execution after checking mutex) 51->93 95 Found stalling execution ending in API Sleep call 51->95 99 5 other signatures 51->99 97 Loading BitLocker PowerShell Module 55->97 61 conhost.exe 55->61         started        63 conhost.exe 57->63         started        signatures18 process19

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    4iogI3WCTh.exe47%ReversingLabsWin32.Packed.Generic
    4iogI3WCTh.exe47%VirustotalBrowse
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\is-N408J.tmp\_isetup\_setup64.tmp0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\is-N408J.tmp\_isetup\_shfoldr.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp4%ReversingLabs
    C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmp4%ReversingLabs
    C:\Users\user\AppData\Local\Temp\is-VFQ39.tmp\_isetup\_setup64.tmp0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\is-VFQ39.tmp\_isetup\_shfoldr.dll0%ReversingLabs
    C:\Users\user\AppData\Local\is-6A565.tmp4%ReversingLabs
    C:\Users\user\AppData\Local\unins000.exe (copy)4%ReversingLabs
    C:\Users\user\AppData\Roaming\NVIDIA app\724\is-183JO.tmp0%ReversingLabs
    C:\Users\user\AppData\Roaming\NVIDIA app\724\is-A0K1V.tmp48%ReversingLabsWin64.Trojan.Generic
    C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll (copy)48%ReversingLabsWin64.Trojan.Generic
    C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe (copy)0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://.VisualC0%Avira URL Cloudsafe
    http://crl4.digi0%Avira URL Cloudsafe
    http://www.microsoft.c/0%Avira URL Cloudsafe
    http://crl.microsXbe;c0%Avira URL Cloudsafe
    http://www.microsoft.cz0%Avira URL Cloudsafe
    http://schemas.micros0%Avira URL Cloudsafe
    154.39.239.95:14450%Avira URL Cloudsafe
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    154.39.239.95:1445true
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.innosetup.com/4iogI3WCTh.exe, 00000000.00000003.1639795686.000000007FD30000.00000004.00001000.00020000.00000000.sdmp, 4iogI3WCTh.exe, 00000000.00000003.1639572060.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000001.00000000.1640326476.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 4iogI3WCTh.tmp.0.drfalse
      high
      http://nuget.org/NuGet.exepowershell.exe, 00000005.00000002.1728566872.00000231AF8F2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2011774321.0000026BAE922000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1864557259.0000026744423000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2236249896.000001A05A89F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2562965151.000001B539C8B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.3020355477.000001AE603FB000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://crashpad.chromium.org/4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005DB2000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000004.00000000.1652015949.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000000.1748884605.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000002.3096660732.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpfalse
            high
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000005.00000002.1698180699.000002319FAA9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1847876321.0000026B9EAD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1783904068.00000267345D8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2078437647.000001A04AA58000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2344779647.000001B529E49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://ocsp.entrust.net034iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drfalse
                  high
                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://ocsp.entrust.net024iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drfalse
                      high
                      http://www.entrust.net/rpa034iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drfalse
                        high
                        https://crashpad.chromium.org/bug/new4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005DB2000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000004.00000000.1652015949.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000000.1748884605.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000002.3096660732.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpfalse
                          high
                          http://www.microsoft.c/powershell.exe, 00000008.00000002.2026513817.0000026BB6E2F000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.microsoft.copowershell.exe, 00000008.00000002.2023594423.0000026BB6DED000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://contoso.com/Licensepowershell.exe, 00000021.00000002.3020355477.000001AE603FB000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://contoso.com/Iconpowershell.exe, 00000021.00000002.3020355477.000001AE603FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://aia.entrust.net/ts1-chain256.cer014iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drfalse
                                  high
                                  http://schemas.microspowershell.exe, 00000005.00000002.1733782261.00000231B7C8F000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2589140588.000001B542008000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://docs.rs/getrandom#nodejs-es-module-support/rust/depsis-A0K1V.tmp.3.drfalse
                                    high
                                    https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005DB2000.00000004.00001000.00020000.00000000.sdmp, msedgewebview2.exe, 00000004.00000000.1652015949.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000000.1748884605.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmp, msedgewebview2.exe, 0000000A.00000002.3096660732.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpfalse
                                      high
                                      http://crl.microsXbe;cpowershell.exe, 0000001B.00000002.2593657575.000001B542100000.00000004.00000020.00020000.00000000.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://github.com/Pester/Pesterpowershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://crl4.digi4iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000005.00000002.1698180699.000002319FAA9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1847876321.0000026B9EAD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1783904068.00000267345D8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2078437647.000001A04AA58000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2344779647.000001B529E49000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2694346489.000001AE505B9000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://contoso.com/powershell.exe, 00000021.00000002.3020355477.000001AE603FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://nuget.org/nuget.exepowershell.exe, 00000005.00000002.1728566872.00000231AF8F2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.2011774321.0000026BAE922000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1864557259.0000026744423000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2236249896.000001A05A89F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2562965151.000001B539C8B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.3020355477.000001AE603FB000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://.VisualCpowershell.exe, 00000016.00000002.2265845423.000001A0630D9000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://aka.ms/pscore68powershell.exe, 00000005.00000002.1698180699.000002319F881000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1847876321.0000026B9E8B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1783904068.00000267343B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2078437647.000001A04A831000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2344779647.000001B529C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2694346489.000001AE50391000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.microsoft.cpowershell.exe, 00000008.00000002.2026513817.0000026BB6E2F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.remobjects.com/ps4iogI3WCTh.exe, 00000000.00000003.1639795686.000000007FD30000.00000004.00001000.00020000.00000000.sdmp, 4iogI3WCTh.exe, 00000000.00000003.1639572060.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000001.00000000.1640326476.0000000000401000.00000020.00000001.01000000.00000004.sdmp, 4iogI3WCTh.tmp.0.drfalse
                                                    high
                                                    http://crl.entrust.net/ts1ca.crl04iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drfalse
                                                      high
                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000005.00000002.1698180699.000002319F881000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000008.00000002.1847876321.0000026B9E8B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000B.00000002.1783904068.00000267343B1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000016.00000002.2078437647.000001A04A831000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001B.00000002.2344779647.000001B529C21000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000021.00000002.2694346489.000001AE50391000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.microsoft.czpowershell.exe, 00000008.00000002.2026513817.0000026BB6E2F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://crl.entrust.net/2048ca.crl04iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drfalse
                                                          high
                                                          https://www.entrust.net/rpa04iogI3WCTh.tmp, 00000003.00000002.1663567578.000000000018E000.00000004.00000010.00020000.00000000.sdmp, 4iogI3WCTh.tmp, 00000003.00000003.1652827323.0000000005B20000.00000004.00001000.00020000.00000000.sdmp, is-A0K1V.tmp.3.drfalse
                                                            high
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            154.39.239.95
                                                            unknownUnited States
                                                            174COGENT-174UStrue
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1583032
                                                            Start date and time:2025-01-01 16:21:05 +01:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 9m 3s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:35
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:4iogI3WCTh.exe
                                                            renamed because original name is a hash value
                                                            Original Sample Name:f4e673616e807b25a98f0655c693d411.exe
                                                            Detection:MAL
                                                            Classification:mal100.troj.spyw.evad.winEXE@39/41@0/1
                                                            EGA Information:
                                                            • Successful, ratio: 66.7%
                                                            HCA Information:
                                                            • Successful, ratio: 88%
                                                            • Number of executed functions: 18
                                                            • Number of non-executed functions: 209
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, msedgewebview2.exe, conhost.exe
                                                            • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                            • Execution Graph export aborted for target powershell.exe, PID 2800 because it is empty
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                            • Report size getting too big, too many NtCreateKey calls found.
                                                            • Report size getting too big, too many NtEnumerateKey calls found.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            TimeTypeDescription
                                                            10:21:56API Interceptor136x Sleep call for process: powershell.exe modified
                                                            10:23:00API Interceptor1354841x Sleep call for process: regsvr32.exe modified
                                                            15:22:00Task SchedulerRun new task: MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5} path: C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe
                                                            No context
                                                            No context
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            COGENT-174USReceipt-#202431029B.exeGet hashmaliciousXWormBrowse
                                                            • 154.39.0.150
                                                            arm.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 38.55.246.3
                                                            m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 38.55.246.3
                                                            ppc.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 38.55.246.3
                                                            mpsl.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 38.55.246.3
                                                            debug.dbg.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 38.55.246.3
                                                            x86_64.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 38.55.246.3
                                                            arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 38.55.246.3
                                                            sh4.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 38.55.246.3
                                                            mips.elfGet hashmaliciousMirai, MoobotBrowse
                                                            • 38.55.246.3
                                                            No context
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            C:\Users\user\AppData\Local\Temp\is-N408J.tmp\_isetup\_setup64.tmpsetup.exeGet hashmaliciousUnknownBrowse
                                                              RXxeYma4d5.exeGet hashmaliciousGhostRatBrowse
                                                                017069451a4dbc523a1165a2f1bd361a762bb40856778.exeGet hashmaliciousUnknownBrowse
                                                                  vc8Kx5C54G.exeGet hashmaliciousSocks5SystemzBrowse
                                                                    AbC0LBkVhr.exeGet hashmaliciousSocks5SystemzBrowse
                                                                      Mg5bMQ2lWi.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                        KRdh0OaXqH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                          wG1fFAzGfH.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                            AGcC2uK0El.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                              6hvZpn91O8.exeGet hashmaliciousPetite Virus, Socks5SystemzBrowse
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:data
                                                                                Category:modified
                                                                                Size (bytes):64
                                                                                Entropy (8bit):0.34726597513537405
                                                                                Encrypted:false
                                                                                SSDEEP:3:Nlll:Nll
                                                                                MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                Malicious:false
                                                                                Preview:@...e...........................................................
                                                                                Process:C:\Windows\System32\regsvr32.exe
                                                                                File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                Category:dropped
                                                                                Size (bytes):124896
                                                                                Entropy (8bit):7.944547559215277
                                                                                Encrypted:false
                                                                                SSDEEP:3072:FNalrrRVSotgWB5x9DY/BKwl4UjXSsOvRgRLVAiSa64fJTXP:zaNr/XLY/BKwWiCNvRgtVjSa6yTXP
                                                                                MD5:4FDDCA6D02ECB4783C2F9AAC0D4E6708
                                                                                SHA1:735BB5DD7DF3D2069ED0ABEBDF79685ACFD745EF
                                                                                SHA-256:10C7E26C41C3EE01CB1291CB42C6773DB13A77E5E881CA5736BE28EA172896C9
                                                                                SHA-512:96D308FF995D381CF00997BA312F3C3B1DBCCA7648A5AEB0BD0C1BF39C6ECEAFA74BE763C9F373853DAB5B526E7C7F60461558FC8935C505C88B5D2F0A0ED4AE
                                                                                Malicious:false
                                                                                Preview:PK.........v.Y..IOJ..........CRT.zlib.[y8...Od....!{.l.PHJ.5.2....Q.i..."K...F..F(dd(.(Lc.Kd...t.......?....>.|.y..~..|."rG..t.W...q.S.=3.....E>.......F.q.>!..W..9.#.....B.p...-.!.v.69.j..E..}Q...D.../x...M7.X.Dn....N9..)s;{..3ku.U...B....>.@.........K.s=........;.6...a..#.-.o..>.|.p/.....4..9.]/...G..,z.x...!....p/r.<m".$..'...c...+...3...^n.%..N]G^.b........./}.S-Q...+">...2.-...3j.6.r.m...0.fLh.b..U2QI.}.PZ...E]#...H........IMb.J.5.o....6L.Ia.7....W$...)e.(..m.sf.4...|....U...}.........^n.....x}M..R..i.>1..p..BU............:*.....(T.J}...H.U*yg...;.]iG.f.G....!.FO}../.]z.....sK..?..%f!...n*O.....:.*w..:vLc`...^[..r.E.].7N.$.......}H..>n....;....`Y.~. .\...].....A+.......s...~..&._....?X...7.o.....?\...7.o..?.W.1.....w.........&....uq.*.{.......C;.. O.'.G.y.Z...UX.g.3%.r.......S...Bw.l....cE...}.E....L.}......?.....Q..iaU...c.Fl..2x.........e..c.7{C........;...'~.........}.#...._....^..........\.N...)w..=...h..0h.:X...W..&.
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmp
                                                                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):6144
                                                                                Entropy (8bit):4.215994423157539
                                                                                Encrypted:false
                                                                                SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                                                MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                                                SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                                                SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                                                SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Joe Sandbox View:
                                                                                • Filename: setup.exe, Detection: malicious, Browse
                                                                                • Filename: RXxeYma4d5.exe, Detection: malicious, Browse
                                                                                • Filename: 017069451a4dbc523a1165a2f1bd361a762bb40856778.exe, Detection: malicious, Browse
                                                                                • Filename: vc8Kx5C54G.exe, Detection: malicious, Browse
                                                                                • Filename: AbC0LBkVhr.exe, Detection: malicious, Browse
                                                                                • Filename: Mg5bMQ2lWi.exe, Detection: malicious, Browse
                                                                                • Filename: KRdh0OaXqH.exe, Detection: malicious, Browse
                                                                                • Filename: wG1fFAzGfH.exe, Detection: malicious, Browse
                                                                                • Filename: AGcC2uK0El.exe, Detection: malicious, Browse
                                                                                • Filename: 6hvZpn91O8.exe, Detection: malicious, Browse
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):23312
                                                                                Entropy (8bit):4.596242908851566
                                                                                Encrypted:false
                                                                                SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\4iogI3WCTh.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1160704
                                                                                Entropy (8bit):6.385672321945446
                                                                                Encrypted:false
                                                                                SSDEEP:24576:cYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5oNx9fX:nGUhni7iSFCQ6R
                                                                                MD5:8FDC58C7D4C59472615682D6DEA9D190
                                                                                SHA1:8E131FE09FD238493719B4FD92E6C833BF3596C1
                                                                                SHA-256:26A5BE637EE680B1EC11D1ADF2FD0972CC52078CBD200D9273F8BB826707C83B
                                                                                SHA-512:B05B9FD8FF3D627B562CBD2968466FB54ADBC2FA5591EBE803300A3C5EF7887BC1761D8013B47AAB0F5387265C8B7B15078A01ABB75D4C3180671780181EBE24
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 4%
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O..........................................@..............................................@...............................7..................................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc................"..............@..@....................................@..@........................................................................................................................................
                                                                                Process:C:\Users\user\Desktop\4iogI3WCTh.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1160704
                                                                                Entropy (8bit):6.385672321945446
                                                                                Encrypted:false
                                                                                SSDEEP:24576:cYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5oNx9fX:nGUhni7iSFCQ6R
                                                                                MD5:8FDC58C7D4C59472615682D6DEA9D190
                                                                                SHA1:8E131FE09FD238493719B4FD92E6C833BF3596C1
                                                                                SHA-256:26A5BE637EE680B1EC11D1ADF2FD0972CC52078CBD200D9273F8BB826707C83B
                                                                                SHA-512:B05B9FD8FF3D627B562CBD2968466FB54ADBC2FA5591EBE803300A3C5EF7887BC1761D8013B47AAB0F5387265C8B7B15078A01ABB75D4C3180671780181EBE24
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 4%
                                                                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O..........................................@..............................................@...............................7..................................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc................"..............@..@....................................@..@........................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp
                                                                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):6144
                                                                                Entropy (8bit):4.215994423157539
                                                                                Encrypted:false
                                                                                SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                                                                MD5:4FF75F505FDDCC6A9AE62216446205D9
                                                                                SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                                                                SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                                                                SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp
                                                                                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):23312
                                                                                Entropy (8bit):4.596242908851566
                                                                                Encrypted:false
                                                                                SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                                                                MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                                                                SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                                                                SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                                                                SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1183079
                                                                                Entropy (8bit):6.358030873431536
                                                                                Encrypted:false
                                                                                SSDEEP:24576:UYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5oNx9fl:vGUhni7iSFCQ6z
                                                                                MD5:AB7D17B24C62300DDE903ACEA8FB451E
                                                                                SHA1:86B4F5E4FB796F59D4C9B99FC40EE03F869174EC
                                                                                SHA-256:A226B5CBFD2181CA533FC751FBCB664005DA56C1B93ABB41D3E541117B3E6A9A
                                                                                SHA-512:D379C7A32E35EA3B409DE1547E26574A4B0093D492ED41CAEB73BC5B25BB23737CA37E4C8D072BF98C993A40A0DABC961CC9E81A5B806334699F1558119E3D9D
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 4%
                                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O..........................................@..............................................@...............................7..................................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc................"..............@..@....................................@..@........................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp
                                                                                File Type:InnoSetup Log Microsoft Edge WebView2 Runtime, version 0x418, 4039 bytes, 813848\37\user\376, C:\Users\user\AppData\Local\376\377\377\0
                                                                                Category:dropped
                                                                                Size (bytes):4039
                                                                                Entropy (8bit):3.8548008369987743
                                                                                Encrypted:false
                                                                                SSDEEP:96:PPUr1dblhcpvwvJu82tiKkCdfc1AGlEDA4MZAe2LDzLCHhJ:41dphcpvcJu1iQf7fDSmDCHj
                                                                                MD5:E3444EEB8383524AA9C9A50E773F5BEC
                                                                                SHA1:17295DD050064526F8B0BE29E69D8E892B499411
                                                                                SHA-256:F15D8A856E8E97E2A347DD6A018D2A50F6650DEECBCE124DBFC52FEE9B9CB355
                                                                                SHA-512:FDFAD4FCFEAAAC1AB9CCB998FD426F703BD0A8D260161C0B1C3134057797D4964AC15E5563692969F69116DF4F65A8706706730011E23639DDCDEA9B31B54109
                                                                                Malicious:false
                                                                                Preview:Inno Setup Uninstall Log (b)....................................Microsoft Edge WebView2 Runtime.................................................................................................Microsoft Edge WebView2 Runtime.............................................................................................................%................................................................................................................)...................s........8.1.3.8.4.8......j.o.n.e.s......C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l..................6.*.. ..............IFPS...............................................................................................................................................................BOOLEAN..............TWIZARDFORM....TWIZARDFORM.................!MAIN....-1..(...dll:shell32.dll.ShellExecuteW........................HASCMDLINEPARAM....26 @16..PARAMCOUNT.......COMPARETEXT.........PARAMSTR...........E.......INITIALIZESE
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp
                                                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):1183079
                                                                                Entropy (8bit):6.358030873431536
                                                                                Encrypted:false
                                                                                SSDEEP:24576:UYwCLCUplZhgjXj8YcgoniqO3CBiO0jaS+EtjC67V5oNx9fl:vGUhni7iSFCQ6z
                                                                                MD5:AB7D17B24C62300DDE903ACEA8FB451E
                                                                                SHA1:86B4F5E4FB796F59D4C9B99FC40EE03F869174EC
                                                                                SHA-256:A226B5CBFD2181CA533FC751FBCB664005DA56C1B93ABB41D3E541117B3E6A9A
                                                                                SHA-512:D379C7A32E35EA3B409DE1547E26574A4B0093D492ED41CAEB73BC5B25BB23737CA37E4C8D072BF98C993A40A0DABC961CC9E81A5B806334699F1558119E3D9D
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 4%
                                                                                Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L...V..O..........................................@..............................................@...............................7..................................................................................X...x............................text...<........................... ..`.itext.............................. ..`.data..../.......0..................@....bss....pa...............................idata...7.......8..................@....tls....<............ ...................rdata............... ..............@..@.rsrc................"..............@..@....................................@..@........................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):226
                                                                                Entropy (8bit):4.879827856514398
                                                                                Encrypted:false
                                                                                SSDEEP:6:KdhlRu9TbX+A8/5RFYpquUk5uUX0CdiYCvjA1G:KLuVA5cpN5H07vvWG
                                                                                MD5:540DEC862D2DA724038D74A036CB5A91
                                                                                SHA1:4BE947A12B2BB11455B1DF6F5D173523C1E3D4F4
                                                                                SHA-256:3204A19052305E09F1EC2E91D2381668756BD5777C45AF5F720068F7E404882D
                                                                                SHA-512:C597FC3FD14E64661215C78C3E391DA3DBF435784102B2BD224F486BCBC6AEE79F028736683B4B4596EF3C59F37BD0038161DB71081216C2A9B30E83988E4893
                                                                                Malicious:false
                                                                                Preview:<assembly.. xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>.. <assemblyIdentity.. name='131.0.2903.99'.. version='131.0.2903.99'.. type='win32'/>.. <file name='msedge_elf.dll'/>..</assembly>..
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp
                                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):3338280
                                                                                Entropy (8bit):6.4960533185169735
                                                                                Encrypted:false
                                                                                SSDEEP:49152:Vn2/NI1JwFkNBl0ZzuoodNNetmnzbojD2VgE5Yee0tQ+57YwYAoioA25p:oFk3QlOVgqUbp
                                                                                MD5:71FDF2D301949413F8B14E0F12C2E0F5
                                                                                SHA1:C57E8EFF6BFC0BE6420E97CFD6DE895C937FD5B7
                                                                                SHA-256:1E7E2C05C6C634AA7F11C8C217BF9C21FBE336F128D744FBAF3FC91D643925A0
                                                                                SHA-512:752FE30B893A1E0A0FBD93FB91DCEEA2B88F5E1C067E8F780FBEDCF1FD4A11EC1317D65BBC3C11086926A2D37A49E5F519C40F7D65DBA335079DC2044DD53F58
                                                                                Malicious:false
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...R.Yg.........."......~'..0.......B.........@.............................04......3...`.........................................Qm-......m-.P.....2.x....@0..,....2.((....4..,..H1-.T.....................-.(....'.@........... v-......W-. ....................text....}'......~'................. ..`.rdata.......'.......'.............@..@.data........P.......6..............@....pdata...,...@0......2/.............@..@.gxfg..../...p1..0...`0.............@..@.retplne......1.......0..................tls....I.....1.......0.............@...CPADinfo8.....1.......0.............@...LZMADEC.......1.......0............. ..`_RDATA........1.......0.............@..@malloc_h......2.......0............. ..`.rsrc...x.....2.......0.............@..@.reloc...,....4.......2.............@..B................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp
                                                                                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):859869
                                                                                Entropy (8bit):6.876255920793919
                                                                                Encrypted:false
                                                                                SSDEEP:24576:AT44HVKh+ckwZ/DFtffUVoSjHJH1/e5MS:AdVKh+ckwZ/DF5fajHN1/e5MS
                                                                                MD5:DD247AC7C8775CF2C020F1E06D186B79
                                                                                SHA1:C9419A3F25DAFD281724EAE83787D68CD6AB8AA7
                                                                                SHA-256:59FE220B22C341F168D0726898C5065EAB294480DCC732B649C5F5CAB7A9DF7B
                                                                                SHA-512:9D5ECCF13C230E8754D28B0ED550D28183996F9D93064AA7FBEFC994A6B6F6C2B9EA41A8D499F2C34A654451B7E33AB87B91EADA4B7160D4142379F265738820
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 48%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....Cmg....3.....&"...*.~..........0........................................@............`... ..............................................................P..P"......(&...0..............................`;..(.......................8............................text....|.......~..................`..`.data...............................@....rdata.............................@..@.pdata..P"...P...$...>..............@..@.xdata...L.......N...b..............@..@.bss.....................................edata..............................@..@.idata..............................@....CRT....`...........................@....tls......... ......................@....reloc.......0......................@..B........................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):226
                                                                                Entropy (8bit):4.879827856514398
                                                                                Encrypted:false
                                                                                SSDEEP:6:KdhlRu9TbX+A8/5RFYpquUk5uUX0CdiYCvjA1G:KLuVA5cpN5H07vvWG
                                                                                MD5:540DEC862D2DA724038D74A036CB5A91
                                                                                SHA1:4BE947A12B2BB11455B1DF6F5D173523C1E3D4F4
                                                                                SHA-256:3204A19052305E09F1EC2E91D2381668756BD5777C45AF5F720068F7E404882D
                                                                                SHA-512:C597FC3FD14E64661215C78C3E391DA3DBF435784102B2BD224F486BCBC6AEE79F028736683B4B4596EF3C59F37BD0038161DB71081216C2A9B30E83988E4893
                                                                                Malicious:false
                                                                                Preview:<assembly.. xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>.. <assemblyIdentity.. name='131.0.2903.99'.. version='131.0.2903.99'.. type='win32'/>.. <file name='msedge_elf.dll'/>..</assembly>..
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp
                                                                                File Type:PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):859869
                                                                                Entropy (8bit):6.876255920793919
                                                                                Encrypted:false
                                                                                SSDEEP:24576:AT44HVKh+ckwZ/DFtffUVoSjHJH1/e5MS:AdVKh+ckwZ/DF5fajHN1/e5MS
                                                                                MD5:DD247AC7C8775CF2C020F1E06D186B79
                                                                                SHA1:C9419A3F25DAFD281724EAE83787D68CD6AB8AA7
                                                                                SHA-256:59FE220B22C341F168D0726898C5065EAB294480DCC732B649C5F5CAB7A9DF7B
                                                                                SHA-512:9D5ECCF13C230E8754D28B0ED550D28183996F9D93064AA7FBEFC994A6B6F6C2B9EA41A8D499F2C34A654451B7E33AB87B91EADA4B7160D4142379F265738820
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 48%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....Cmg....3.....&"...*.~..........0........................................@............`... ..............................................................P..P"......(&...0..............................`;..(.......................8............................text....|.......~..................`..`.data...............................@....rdata.............................@..@.pdata..P"...P...$...>..............@..@.xdata...L.......N...b..............@..@.bss.....................................edata..............................@..@.idata..............................@....CRT....`...........................@....tls......... ......................@....reloc.......0......................@..B........................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp
                                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):3338280
                                                                                Entropy (8bit):6.4960533185169735
                                                                                Encrypted:false
                                                                                SSDEEP:49152:Vn2/NI1JwFkNBl0ZzuoodNNetmnzbojD2VgE5Yee0tQ+57YwYAoioA25p:oFk3QlOVgqUbp
                                                                                MD5:71FDF2D301949413F8B14E0F12C2E0F5
                                                                                SHA1:C57E8EFF6BFC0BE6420E97CFD6DE895C937FD5B7
                                                                                SHA-256:1E7E2C05C6C634AA7F11C8C217BF9C21FBE336F128D744FBAF3FC91D643925A0
                                                                                SHA-512:752FE30B893A1E0A0FBD93FB91DCEEA2B88F5E1C067E8F780FBEDCF1FD4A11EC1317D65BBC3C11086926A2D37A49E5F519C40F7D65DBA335079DC2044DD53F58
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...R.Yg.........."......~'..0.......B.........@.............................04......3...`.........................................Qm-......m-.P.....2.x....@0..,....2.((....4..,..H1-.T.....................-.(....'.@........... v-......W-. ....................text....}'......~'................. ..`.rdata.......'.......'.............@..@.data........P.......6..............@....pdata...,...@0......2/.............@..@.gxfg..../...p1..0...`0.............@..@.retplne......1.......0..................tls....I.....1.......0.............@...CPADinfo8.....1.......0.............@...LZMADEC.......1.......0............. ..`_RDATA........1.......0.............@..@malloc_h......2.......0............. ..`.rsrc...x.....2.......0.............@..@.reloc...,....4.......2.............@..B................................................................................................
                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                Entropy (8bit):7.965694801345935
                                                                                TrID:
                                                                                • Win32 Executable (generic) a (10002005/4) 98.86%
                                                                                • Inno Setup installer (109748/4) 1.08%
                                                                                • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                File name:4iogI3WCTh.exe
                                                                                File size:2'044'814 bytes
                                                                                MD5:f4e673616e807b25a98f0655c693d411
                                                                                SHA1:7d697956f37a0432d4952806739e4c39ace201a1
                                                                                SHA256:80e013ba13cf1238703dc670cb3defce7fbf9e3b09beedfdcb6d3197aec5552f
                                                                                SHA512:c7e329b4d0f1085da58568d1979b10486f33886f963005a618e977d0c27ee5ae4483d611406fa5a836985a49398704c66187c03652a936b26f8bbced2f1f56c4
                                                                                SSDEEP:49152:3WX/qQfkYzgrW/r1DNKHOkjSKVpTfCyMHGVa52a:mTfccDMRSKVZfCyi3
                                                                                TLSH:CC952312B7C34836E16018B8EC4BC4886D177D6D2DE164273DB9EB4F6D7C2C2687EA91
                                                                                File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                Icon Hash:b8868baba9aba2d8
                                                                                Entrypoint:0x416478
                                                                                Entrypoint Section:.itext
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x4FC4B854 [Tue May 29 11:51:48 2012 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:5
                                                                                OS Version Minor:0
                                                                                File Version Major:5
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:5
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:483f0c4259a9148c34961abbda6146c1
                                                                                Instruction
                                                                                push ebp
                                                                                mov ebp, esp
                                                                                add esp, FFFFFFA4h
                                                                                push ebx
                                                                                push esi
                                                                                push edi
                                                                                xor eax, eax
                                                                                mov dword ptr [ebp-3Ch], eax
                                                                                mov dword ptr [ebp-40h], eax
                                                                                mov dword ptr [ebp-5Ch], eax
                                                                                mov dword ptr [ebp-30h], eax
                                                                                mov dword ptr [ebp-38h], eax
                                                                                mov dword ptr [ebp-34h], eax
                                                                                mov dword ptr [ebp-2Ch], eax
                                                                                mov dword ptr [ebp-28h], eax
                                                                                mov dword ptr [ebp-14h], eax
                                                                                mov eax, 004152B8h
                                                                                call 00007F4B8C8BDFC1h
                                                                                xor eax, eax
                                                                                push ebp
                                                                                push 00416B45h
                                                                                push dword ptr fs:[eax]
                                                                                mov dword ptr fs:[eax], esp
                                                                                xor edx, edx
                                                                                push ebp
                                                                                push 00416B01h
                                                                                push dword ptr fs:[edx]
                                                                                mov dword ptr fs:[edx], esp
                                                                                mov eax, dword ptr [0041AB48h]
                                                                                call 00007F4B8C8CC86Bh
                                                                                call 00007F4B8C8CC412h
                                                                                lea edx, dword ptr [ebp-14h]
                                                                                xor eax, eax
                                                                                call 00007F4B8C8C6094h
                                                                                mov edx, dword ptr [ebp-14h]
                                                                                mov eax, 0041D6E8h
                                                                                call 00007F4B8C8BC5F7h
                                                                                push 00000002h
                                                                                push 00000000h
                                                                                push 00000001h
                                                                                mov ecx, dword ptr [0041D6E8h]
                                                                                mov dl, 01h
                                                                                mov eax, dword ptr [0040F080h]
                                                                                call 00007F4B8C8C697Fh
                                                                                mov dword ptr [0041D6ECh], eax
                                                                                xor edx, edx
                                                                                push ebp
                                                                                push 00416AADh
                                                                                push dword ptr fs:[edx]
                                                                                mov dword ptr fs:[edx], esp
                                                                                call 00007F4B8C8CC8F3h
                                                                                mov dword ptr [0041D6F4h], eax
                                                                                mov eax, dword ptr [0041D6F4h]
                                                                                cmp dword ptr [eax+0Ch], 01h
                                                                                jne 00007F4B8C8CDC5Ah
                                                                                mov eax, dword ptr [0041D6F4h]
                                                                                mov edx, 00000028h
                                                                                call 00007F4B8C8C6E48h
                                                                                mov edx, dword ptr [0041D6F4h]
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x1e0000xf9e.idata
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x210000xb230.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x200000x18.rdata
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x1e3500x24c.idata
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x10000x143f80x14400c9bb3afc1ceaaa31127ccfa204c657efFalse0.5487316743827161data6.482216817915366IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .itext0x160000xbe80xc001ba5adf2e1058c0460dcc814ba86fb32False0.6246744791666666data6.005798728198158IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .data0x170000xd9c0xe00d5b22eff9e08edaa95f493c1a71158c0False0.2924107142857143data2.669288666959085IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .bss0x180000x574c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .idata0x1e0000xf9e0x1000b47eaca4c149ee829de76a342b5560d5False0.35595703125data4.9677831942996935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .tls0x1f0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                .rdata0x200000x180x2003746f5876803f8f30db5bb2deb8772aeFalse0.05078125data0.190488766434666IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x210000xb2300xb400a8a3dde713ee44ed84d94490c3c52914False0.16378038194444444data3.9756020825062692IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                RT_ICON0x213ec0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.16532258064516128
                                                                                RT_ICON0x216d40x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.32094594594594594
                                                                                RT_ICON0x217fc0xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.18310234541577824
                                                                                RT_STRING0x226a40xc4data0.5969387755102041
                                                                                RT_STRING0x227680xccdata0.6225490196078431
                                                                                RT_STRING0x228340x174data0.5510752688172043
                                                                                RT_STRING0x229a80x39cdata0.34523809523809523
                                                                                RT_STRING0x22d440x34cdata0.4218009478672986
                                                                                RT_STRING0x230900x294data0.4106060606060606
                                                                                RT_RCDATA0x233240x82e8dataEnglishUnited States0.11261637622344235
                                                                                RT_RCDATA0x2b60c0x10data1.5
                                                                                RT_RCDATA0x2b61c0x1a0data0.8149038461538461
                                                                                RT_RCDATA0x2b7bc0x2cdata1.1590909090909092
                                                                                RT_GROUP_ICON0x2b7e80x30dataEnglishUnited States0.9583333333333334
                                                                                RT_VERSION0x2b8180x4b8COM executable for DOSEnglishUnited States0.3228476821192053
                                                                                RT_MANIFEST0x2bcd00x560XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4251453488372093
                                                                                DLLImport
                                                                                oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                                advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                                                                                user32.dllGetKeyboardType, LoadStringW, MessageBoxA, CharNextW
                                                                                kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetSystemInfo, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenW, lstrcpynW, LoadLibraryExW, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetCommandLineW, FreeLibrary, FindFirstFileW, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle, CloseHandle
                                                                                kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleW
                                                                                user32.dllCreateWindowExW, TranslateMessage, SetWindowLongW, PeekMessageW, MsgWaitForMultipleObjects, MessageBoxW, LoadStringW, GetSystemMetrics, ExitWindowsEx, DispatchMessageW, DestroyWindow, CharUpperBuffW, CallWindowProcW
                                                                                kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, SizeofResource, SignalObjectAndWait, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, RemoveDirectoryW, ReadFile, MultiByteToWideChar, LockResource, LoadResource, LoadLibraryW, LeaveCriticalSection, InitializeCriticalSection, GetWindowsDirectoryW, GetVersionExW, GetUserDefaultLangID, GetThreadLocale, GetSystemInfo, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeProcess, GetEnvironmentVariableW, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentProcess, GetCommandLineW, GetCPInfo, InterlockedExchange, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FindResourceW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateProcessW, CreateFileW, CreateEventW, CreateDirectoryW, CompareStringW, CloseHandle
                                                                                advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW
                                                                                comctl32.dllInitCommonControls
                                                                                kernel32.dllSleep
                                                                                advapi32.dllAdjustTokenPrivileges
                                                                                oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                EnglishUnited States
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2025-01-01T16:22:25.381051+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.449736154.39.239.951445TCP
                                                                                2025-01-01T16:23:34.432562+01002052875ET MALWARE Anonymous RAT CnC Checkin1192.168.2.449737154.39.239.951445TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Jan 1, 2025 16:22:25.375720978 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:25.380531073 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:25.380621910 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:25.381051064 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:25.386620998 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.268737078 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.268997908 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.273871899 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.273890972 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.273933887 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.588936090 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.588948011 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.588959932 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.588969946 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.588979006 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.588989973 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.589000940 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.589004993 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.589013100 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.589024067 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.589030027 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.589035988 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.589065075 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.589075089 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.589159966 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.593858004 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.593868971 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.593879938 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.593916893 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.593949080 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.861298084 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861320019 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861331940 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861342907 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861355066 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861366034 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861377954 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861377954 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.861388922 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861402035 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861413002 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861413002 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.861423969 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861424923 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.861444950 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861462116 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861464977 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.861476898 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861486912 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861490011 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.861500978 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861511946 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861516953 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.861524105 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861535072 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861546993 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861547947 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.861558914 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861558914 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.861572981 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861582994 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:26.861603975 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:26.861635923 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.043917894 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.043932915 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.043943882 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.043989897 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.044033051 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.044080019 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.044109106 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.044302940 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.044322014 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.044332981 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.044365883 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.044380903 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.044393063 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.044399023 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.044445992 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.044987917 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.044998884 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.045011044 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.045022011 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.045033932 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.045034885 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.045099974 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.045598984 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.045644045 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.045679092 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.045691013 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.045701981 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.045712948 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.045722961 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.045727968 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.045762062 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.046572924 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.046583891 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.046595097 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.046611071 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.046622038 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.046622992 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.046633959 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.046662092 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.047481060 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.047492027 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.047504902 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.047538996 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.047552109 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.047558069 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.047564030 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.047574997 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.047631979 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.048281908 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.048326969 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.048373938 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.048389912 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.048402071 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.048413038 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.048424006 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.048439026 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.048472881 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.049194098 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.049205065 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.049216986 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.049225092 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.049253941 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.049283981 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.267688036 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.267705917 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.267716885 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.267728090 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.267752886 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.267793894 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.267822027 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.267832041 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.267882109 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.267913103 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.267924070 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.267935038 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.267968893 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.268136024 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268179893 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268192053 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268194914 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.268209934 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268222094 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268224955 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.268259048 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.268429041 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268474102 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268524885 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.268580914 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268630981 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268640995 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268651962 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268685102 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.268703938 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268712044 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.268716097 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268728018 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.268764019 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.269129992 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269143105 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269153118 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269182920 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.269207954 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.269289017 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269304037 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269315004 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269345045 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269351006 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.269362926 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269373894 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269386053 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269393921 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.269443989 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.269462109 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269474030 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269484997 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269496918 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.269515038 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.269541979 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.270287037 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.270303965 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.270314932 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.270330906 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.270334005 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.270344019 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.270354033 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.270363092 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.270365953 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.270382881 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.270389080 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.270395041 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.270406008 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.270410061 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.270418882 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.270440102 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.270464897 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.271137953 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.271148920 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.271159887 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.271178007 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.271189928 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.271192074 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.271202087 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.271218061 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.271225929 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.271238089 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.271245956 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.271250010 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.271261930 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.271274090 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.271282911 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.271302938 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.272175074 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.272192955 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.272202969 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.272212982 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.272227049 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.272237062 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.272238016 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.272250891 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.272252083 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.272262096 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.272274971 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.272280931 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.272285938 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.272299051 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.272316933 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.272357941 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.272969007 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.272979975 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.273001909 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.273013115 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.273024082 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.273030043 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.273036957 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.273056030 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.273082018 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.354408979 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.354419947 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.354432106 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.354444981 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.354454994 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.354496002 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.354520082 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.491235018 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491254091 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491266012 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491282940 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491295099 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491297960 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.491307020 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491327047 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491339922 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491350889 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.491364956 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491374969 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.491393089 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.491395950 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491440058 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.491472006 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491482019 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491523027 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.491535902 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491547108 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491559029 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491588116 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.491589069 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491600990 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491614103 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491624117 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491628885 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.491633892 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.491657019 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.491687059 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.491851091 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492024899 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492037058 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492048979 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492064953 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492075920 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492082119 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492091894 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492104053 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492108107 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492117882 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492120981 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492137909 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492147923 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492149115 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492160082 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492171049 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492182016 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492192030 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492192984 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492206097 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492218018 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492218018 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492229939 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492238045 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492244005 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492253065 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492257118 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492273092 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492302895 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492783070 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492794037 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492805958 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492831945 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492835045 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492845058 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492857933 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492868900 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492880106 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.492886066 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492916107 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.492937088 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.493091106 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493158102 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493168116 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493180037 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493190050 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493215084 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.493231058 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.493297100 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493308067 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493318081 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493328094 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493338108 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493347883 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493359089 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493362904 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.493370056 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493381977 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.493410110 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.493437052 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.496170998 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496354103 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496364117 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496381998 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496391058 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.496395111 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496406078 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496417046 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496424913 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.496428967 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496440887 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496452093 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496458054 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.496464968 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496475935 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496488094 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496499062 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496505976 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.496511936 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496522903 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.496535063 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.496828079 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496843100 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496881008 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.496913910 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496925116 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496934891 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496944904 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.496958971 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.496987104 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.497116089 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.497126102 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.497138023 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.497152090 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.497164011 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.497167110 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.497174025 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.497185946 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.497185946 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.497196913 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.497229099 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.497380018 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.497390032 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.497401953 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.497411013 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.497421980 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.497440100 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.497471094 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:27.578262091 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.578273058 CET144549736154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:27.578320026 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:28.604742050 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:28.609658957 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:28.609769106 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:30.588661909 CET497361445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:33.563939095 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:33.568908930 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:33.568922043 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:33.569013119 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:33.569063902 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:34.113107920 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:34.113351107 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:34.118232012 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:44.760441065 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:44.765347004 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:45.075850010 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:22:45.119762897 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:45.190085888 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:22:45.194876909 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:01.541727066 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:01.546561003 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:01.856856108 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:01.901010990 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:01.925146103 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:01.929941893 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:17.604309082 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:17.609057903 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:17.919558048 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:17.963542938 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:17.988104105 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:17.992858887 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:34.432562113 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:34.437347889 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:34.748145103 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:34.806049109 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:34.810925007 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:50.510545969 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:50.510588884 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:50.515520096 CET144549737154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:50.515573025 CET497371445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:52.448637009 CET500051445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:52.453515053 CET144550005154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:52.453576088 CET500051445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:58.691724062 CET500051445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:58.696608067 CET144550005154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:58.696636915 CET144550005154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:58.696646929 CET144550005154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:58.696726084 CET144550005154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:59.242759943 CET144550005154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:23:59.243051052 CET500051445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:23:59.247802973 CET144550005154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:24:09.182615042 CET500051445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:24:09.187549114 CET144550005154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:24:09.501919031 CET144550005154.39.239.95192.168.2.4
                                                                                Jan 1, 2025 16:24:09.522770882 CET500051445192.168.2.4154.39.239.95
                                                                                Jan 1, 2025 16:24:09.527771950 CET144550005154.39.239.95192.168.2.4

                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:10:21:53
                                                                                Start date:01/01/2025
                                                                                Path:C:\Users\user\Desktop\4iogI3WCTh.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\4iogI3WCTh.exe"
                                                                                Imagebase:0x400000
                                                                                File size:2'044'814 bytes
                                                                                MD5 hash:F4E673616E807B25A98F0655C693D411
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:1
                                                                                Start time:10:21:53
                                                                                Start date:01/01/2025
                                                                                Path:C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmp
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\is-T7IAT.tmp\4iogI3WCTh.tmp" /SL5="$20434,1664838,141312,C:\Users\user\Desktop\4iogI3WCTh.exe"
                                                                                Imagebase:0x400000
                                                                                File size:1'160'704 bytes
                                                                                MD5 hash:8FDC58C7D4C59472615682D6DEA9D190
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Antivirus matches:
                                                                                • Detection: 4%, ReversingLabs
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:2
                                                                                Start time:10:21:53
                                                                                Start date:01/01/2025
                                                                                Path:C:\Users\user\Desktop\4iogI3WCTh.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\Desktop\4iogI3WCTh.exe" /VERYSILENT
                                                                                Imagebase:0x400000
                                                                                File size:2'044'814 bytes
                                                                                MD5 hash:F4E673616E807B25A98F0655C693D411
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:3
                                                                                Start time:10:21:53
                                                                                Start date:01/01/2025
                                                                                Path:C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\is-ST0J4.tmp\4iogI3WCTh.tmp" /SL5="$20442,1664838,141312,C:\Users\user\Desktop\4iogI3WCTh.exe" /VERYSILENT
                                                                                Imagebase:0x400000
                                                                                File size:1'160'704 bytes
                                                                                MD5 hash:8FDC58C7D4C59472615682D6DEA9D190
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:Borland Delphi
                                                                                Antivirus matches:
                                                                                • Detection: 4%, ReversingLabs
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:4
                                                                                Start time:10:21:54
                                                                                Start date:01/01/2025
                                                                                Path:C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Users\user\AppData\Roaming\\NVIDIA app\\724\\msedgewebview2.exe"
                                                                                Imagebase:0x7ff600d50000
                                                                                File size:3'338'280 bytes
                                                                                MD5 hash:71FDF2D301949413F8B14E0F12C2E0F5
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Target ID:5
                                                                                Start time:10:21:54
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
                                                                                Imagebase:0x7ff788560000
                                                                                File size:452'608 bytes
                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:6
                                                                                Start time:10:21:54
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff7699e0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:8
                                                                                Start time:10:22:01
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
                                                                                Imagebase:0x7ff788560000
                                                                                File size:452'608 bytes
                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:9
                                                                                Start time:10:22:01
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff7699e0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:10
                                                                                Start time:10:22:04
                                                                                Start date:01/01/2025
                                                                                Path:C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe"
                                                                                Imagebase:0x7ff600d50000
                                                                                File size:3'338'280 bytes
                                                                                MD5 hash:71FDF2D301949413F8B14E0F12C2E0F5
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Target ID:11
                                                                                Start time:10:22:04
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
                                                                                Imagebase:0x7ff788560000
                                                                                File size:452'608 bytes
                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:12
                                                                                Start time:10:22:04
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff7699e0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:16
                                                                                Start time:10:22:19
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\tasklist.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"tasklist" /FI "IMAGENAME eq regsvr32.exe"
                                                                                Imagebase:0x7ff66c980000
                                                                                File size:106'496 bytes
                                                                                MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:moderate
                                                                                Has exited:true

                                                                                Target ID:17
                                                                                Start time:10:22:19
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff7699e0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:18
                                                                                Start time:10:22:20
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\regsvr32.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll"
                                                                                Imagebase:0x7ff6adac0000
                                                                                File size:25'088 bytes
                                                                                MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000012.00000002.3094660374.0000000000BAA000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000012.00000003.1931212895.0000000000BA9000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000012.00000002.3096785341.0000000002720000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                Has exited:false

                                                                                Target ID:19
                                                                                Start time:10:22:33
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\tasklist.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"tasklist" /FI "IMAGENAME eq regsvr32.exe"
                                                                                Imagebase:0x7ff66c980000
                                                                                File size:106'496 bytes
                                                                                MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:20
                                                                                Start time:10:22:33
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff7699e0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:21
                                                                                Start time:10:22:33
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\regsvr32.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll"
                                                                                Imagebase:0x7ff6adac0000
                                                                                File size:25'088 bytes
                                                                                MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:22
                                                                                Start time:10:22:33
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
                                                                                Imagebase:0x7ff788560000
                                                                                File size:452'608 bytes
                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:23
                                                                                Start time:10:22:33
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff7699e0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:24
                                                                                Start time:10:22:58
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\tasklist.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"tasklist" /FI "IMAGENAME eq regsvr32.exe"
                                                                                Imagebase:0x7ff66c980000
                                                                                File size:106'496 bytes
                                                                                MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:25
                                                                                Start time:10:22:58
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff7699e0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:26
                                                                                Start time:10:22:58
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\regsvr32.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll"
                                                                                Imagebase:0x7ff6adac0000
                                                                                File size:25'088 bytes
                                                                                MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:27
                                                                                Start time:10:22:59
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
                                                                                Imagebase:0x7ff788560000
                                                                                File size:452'608 bytes
                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:28
                                                                                Start time:10:22:59
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff7699e0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:30
                                                                                Start time:10:23:31
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\tasklist.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"tasklist" /FI "IMAGENAME eq regsvr32.exe"
                                                                                Imagebase:0x7ff66c980000
                                                                                File size:106'496 bytes
                                                                                MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:31
                                                                                Start time:10:23:31
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff7699e0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:32
                                                                                Start time:10:23:32
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\regsvr32.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"regsvr32" /s /i:SYNC "C:\Users\user\AppData\Roaming\NVIDIA app\724\msedge_elf.dll"
                                                                                Imagebase:0x7ff6adac0000
                                                                                File size:25'088 bytes
                                                                                MD5 hash:B0C2FA35D14A9FAD919E99D9D75E1B9E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:33
                                                                                Start time:10:23:32
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"C:\Users\user\AppData\Roaming\NVIDIA app\724\msedgewebview2.exe\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{226C52D4-F263-4D4A-8AE7-8E60E9B5A5F5}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries -ExecutionTimeLimit 0) -RunLevel Highest"
                                                                                Imagebase:0x7ff788560000
                                                                                File size:452'608 bytes
                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:34
                                                                                Start time:10:23:32
                                                                                Start date:01/01/2025
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff7699e0000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:false

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:1.4%
                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                  Signature Coverage:29.2%
                                                                                  Total number of Nodes:271
                                                                                  Total number of Limit Nodes:31
                                                                                  execution_graph 49049 7ff600d952b0 49054 7ff600d952e2 49049->49054 49058 7ff600d95470 ReleaseSRWLockExclusive 49049->49058 49051 7ff600d9536c TryAcquireSRWLockExclusive 49053 7ff600d95393 49051->49053 49051->49054 49052 7ff600d95446 49056 7ff600d9545c 49052->49056 49074 7ff600ea3ce0 8 API calls 2 library calls 49052->49074 49057 7ff600d9558b 49053->49057 49063 7ff600d953a8 49053->49063 49054->49051 49054->49057 49064 7ff600d95440 49054->49064 49075 7ff600e0c8c0 TryAcquireSRWLockExclusive AcquireSRWLockExclusive 49054->49075 49057->49058 49076 7ff600e1f200 32 API calls 49057->49076 49058->49052 49061 7ff600d9564f TryAcquireSRWLockExclusive 49065 7ff600d95679 49061->49065 49070 7ff600d95681 49061->49070 49063->49058 49063->49064 49066 7ff600d95403 ReleaseSRWLockExclusive 49063->49066 49064->49052 49064->49061 49077 7ff600e0c620 12 API calls 49064->49077 49078 7ff600e0c8c0 TryAcquireSRWLockExclusive AcquireSRWLockExclusive 49065->49078 49066->49064 49069 7ff600d9570c ReleaseSRWLockExclusive 49069->49070 49070->49058 49070->49069 49071 7ff600d957d1 49070->49071 49072 7ff600d95876 49071->49072 49079 7ff600ea3ce0 8 API calls 2 library calls 49071->49079 49074->49056 49075->49054 49076->49064 49077->49064 49078->49070 49079->49072 49080 7ff600eb3194 49081 7ff600eb32d0 49080->49081 49082 7ff600eb333f 49081->49082 49083 7ff600eb32f5 GetModuleHandleW 49081->49083 49092 7ff600eb3464 49082->49092 49083->49082 49090 7ff600eb3302 49083->49090 49086 7ff600eb3382 49087 7ff600eb338d 49100 7ff600eb329c 11 API calls 49087->49100 49090->49082 49099 7ff600eb3208 GetModuleHandleExW GetProcAddress FreeLibrary 49090->49099 49101 7ff600ec8a78 EnterCriticalSection 49092->49101 49094 7ff600eb3480 49095 7ff600eb3398 EnterCriticalSection LeaveCriticalSection 49094->49095 49096 7ff600eb3489 49095->49096 49097 7ff600ec8a94 LeaveCriticalSection 49096->49097 49098 7ff600eb337b 49097->49098 49098->49086 49098->49087 49099->49082 49102 7ff600ec90a0 49109 7ff600eadb24 49102->49109 49104 7ff600ec90b4 49105 7ff600ec90d2 49104->49105 49106 7ff600ec90c0 GetOEMCP 49104->49106 49107 7ff600ec90d7 GetACP 49105->49107 49108 7ff600ec90e7 49105->49108 49106->49108 49107->49108 49110 7ff600eadb48 49109->49110 49114 7ff600eadb43 49109->49114 49110->49114 49115 7ff600ec76b4 GetLastError 49110->49115 49112 7ff600eadb63 49144 7ff600ec7d38 49112->49144 49114->49104 49116 7ff600ec76f5 FlsSetValue 49115->49116 49117 7ff600ec76d8 FlsGetValue 49115->49117 49119 7ff600ec76e5 __free_lconv_mon 49116->49119 49120 7ff600ec7707 49116->49120 49118 7ff600ec76ef 49117->49118 49117->49119 49118->49116 49121 7ff600ec7761 SetLastError 49119->49121 49125 7ff600ec7734 FlsSetValue 49120->49125 49126 7ff600ec7724 FlsSetValue 49120->49126 49122 7ff600ec7781 49121->49122 49123 7ff600ec776e 49121->49123 49149 7ff600eb9b30 47 API calls 49122->49149 49123->49112 49128 7ff600ec7740 FlsSetValue 49125->49128 49129 7ff600ec7752 49125->49129 49126->49119 49127 7ff600ec7786 49130 7ff600ec77b4 FlsSetValue 49127->49130 49131 7ff600ec7799 FlsGetValue 49127->49131 49128->49119 49148 7ff600ec7a48 EnterCriticalSection LeaveCriticalSection 49129->49148 49134 7ff600ec77c1 49130->49134 49141 7ff600ec77a6 __free_lconv_mon 49130->49141 49133 7ff600ec77ae 49131->49133 49131->49141 49133->49130 49137 7ff600ec77ee FlsSetValue 49134->49137 49138 7ff600ec77de FlsSetValue 49134->49138 49136 7ff600ec7829 49139 7ff600ec780c 49137->49139 49140 7ff600ec77fa FlsSetValue 49137->49140 49138->49141 49150 7ff600ec7a48 EnterCriticalSection LeaveCriticalSection 49139->49150 49140->49141 49143 7ff600ec77ac __free_lconv_mon 49141->49143 49151 7ff600eb9b30 47 API calls 49141->49151 49143->49112 49145 7ff600ec7d4d 49144->49145 49147 7ff600ec7d60 49144->49147 49145->49147 49152 7ff600ecc6d4 49145->49152 49147->49114 49148->49119 49149->49127 49150->49143 49151->49136 49153 7ff600ec76b4 47 API calls 49152->49153 49154 7ff600ecc6e3 49153->49154 49155 7ff600ecc72e 49154->49155 49162 7ff600ec8a78 EnterCriticalSection 49154->49162 49155->49147 49157 7ff600ecc70c 49158 7ff600ec8a94 LeaveCriticalSection 49157->49158 49159 7ff600ecc729 49158->49159 49159->49155 49160 7ff600eb9b30 47 API calls 49159->49160 49161 7ff600ecc741 49160->49161 49163 7ffdff1fedf5 49168 7ffdff1ffa50 49163->49168 49166 7ffdff1fee15 49167 7ffdff1fef4b CloseHandle 49167->49166 49169 7ffdff1ffab0 GetCurrentProcessId 49168->49169 49203 7ffdff1ffac4 49169->49203 49170 7ffdff1ffad0 ProcessPrng 49170->49170 49170->49203 49172 7ffdff1ffb77 HeapFree 49172->49203 49174 7ffdff200138 49252 7ffdff1b87a0 46 API calls 49174->49252 49183 7ffdff200121 49251 7ffdff1b87a0 46 API calls 49183->49251 49185 7ffdff1fff19 GetLastError 49191 7ffdff1fffd3 49185->49191 49185->49203 49186 7ffdff200046 49187 7ffdff20005c 49186->49187 49188 7ffdff20004b HeapFree 49186->49188 49227 7ffdff1f2ba0 49187->49227 49188->49187 49193 7ffdff1fffff 49191->49193 49194 7ffdff1fffee HeapFree 49191->49194 49197 7ffdff20000f HeapFree 49193->49197 49198 7ffdff20001d 49193->49198 49194->49193 49197->49198 49201 7ffdff1fee06 49198->49201 49202 7ffdff200023 CloseHandle 49198->49202 49200 7ffdff2000e9 49200->49201 49204 7ffdff20010e HeapFree 49200->49204 49201->49166 49201->49167 49202->49201 49203->49169 49203->49170 49203->49172 49203->49174 49203->49183 49203->49185 49203->49186 49203->49191 49205 7ffdff1fff74 HeapFree 49203->49205 49206 7ffdff1b8d40 49203->49206 49221 7ffdff203630 49203->49221 49244 7ffdff1da2a0 49203->49244 49250 7ffdff1d40b0 HeapFree 49203->49250 49204->49201 49205->49169 49207 7ffdff1b8e2d 49206->49207 49211 7ffdff1b8d60 49206->49211 49208 7ffdff1b8e5b 49207->49208 49254 7ffdff1bb1c0 46 API calls 49207->49254 49208->49203 49210 7ffdff1b8e9b 49255 7ffdff1b87c0 46 API calls 49210->49255 49211->49207 49211->49210 49213 7ffdff203630 HeapAlloc 49211->49213 49215 7ffdff1b8e1b 49213->49215 49215->49207 49253 7ffdff1b87a0 46 API calls 49215->49253 49222 7ffdff203645 HeapAlloc 49221->49222 49225 7ffdff20364b 49221->49225 49222->49203 49224 7ffdff25f7f0 49222->49224 49225->49222 49226 7ffdff203696 49225->49226 49226->49203 49256 7ffdff1f2f10 49227->49256 49232 7ffdff1f2c49 49233 7ffdff1f2dc0 HeapFree 49232->49233 49239 7ffdff1f2c0b 49232->49239 49233->49239 49234 7ffdff1f2cf2 CreateFileW 49235 7ffdff1f2d99 GetLastError 49234->49235 49237 7ffdff1f2d33 49234->49237 49235->49232 49235->49239 49236 7ffdff1f2d76 49236->49239 49240 7ffdff1f2d7e HeapFree 49236->49240 49237->49236 49238 7ffdff1f2d44 GetLastError 49237->49238 49238->49236 49241 7ffdff1f2d53 SetFileInformationByHandle 49238->49241 49239->49193 49239->49200 49240->49239 49241->49236 49242 7ffdff1f2dde GetLastError CloseHandle 49241->49242 49242->49239 49243 7ffdff1f2dff 49242->49243 49243->49233 49245 7ffdff1da2b5 49244->49245 49249 7ffdff1da2e2 49244->49249 49246 7ffdff1da2ee 49245->49246 49247 7ffdff1da2c9 HeapReAlloc 49245->49247 49248 7ffdff203630 HeapAlloc 49246->49248 49246->49249 49247->49249 49248->49249 49249->49203 49250->49203 49257 7ffdff1f2f37 49256->49257 49258 7ffdff1f2f62 49256->49258 49260 7ffdff1f3078 49257->49260 49261 7ffdff1f2f44 49257->49261 49320 7ffdff1f3800 49258->49320 49333 7ffdff1b87c0 46 API calls 49260->49333 49262 7ffdff203630 HeapAlloc 49261->49262 49264 7ffdff1f2f59 49262->49264 49264->49258 49265 7ffdff1f307d 49264->49265 49334 7ffdff1b87a0 46 API calls 49265->49334 49268 7ffdff1f303f 49271 7ffdff1f2bd1 49268->49271 49324 7ffdff1f3760 49268->49324 49269 7ffdff1f3010 49269->49271 49272 7ffdff1f302f HeapFree 49269->49272 49271->49239 49278 7ffdff1f30b0 49271->49278 49272->49271 49283 7ffdff1f30d9 49278->49283 49279 7ffdff1f2bfe 49279->49232 49279->49234 49279->49239 49280 7ffdff1f3273 SetLastError GetFullPathNameW 49282 7ffdff1f329c GetLastError 49280->49282 49280->49283 49282->49283 49284 7ffdff1f3342 GetLastError 49282->49284 49283->49279 49283->49280 49285 7ffdff1f32b5 GetLastError 49283->49285 49287 7ffdff1f32ed 49283->49287 49338 7ffdff1da340 47 API calls 49283->49338 49288 7ffdff1f335b HeapFree 49284->49288 49289 7ffdff1f3370 49284->49289 49285->49283 49286 7ffdff1f36be 49285->49286 49340 7ffdff1ba1f0 46 API calls 49286->49340 49291 7ffdff1f36d8 49287->49291 49292 7ffdff1f32f6 49287->49292 49288->49289 49289->49279 49290 7ffdff1f3399 HeapFree 49289->49290 49290->49279 49341 7ffdff1b9e80 49291->49341 49301 7ffdff1f348e 49292->49301 49311 7ffdff1f3319 49292->49311 49296 7ffdff1f349b 49297 7ffdff1f34ad 49296->49297 49339 7ffdff1da340 47 API calls 49296->49339 49302 7ffdff1f3582 memcpy 49297->49302 49301->49296 49306 7ffdff1da2a0 2 API calls 49301->49306 49307 7ffdff1f35ac 49302->49307 49308 7ffdff1f35b4 49302->49308 49305 7ffdff1f3442 memcpy 49305->49296 49305->49302 49312 7ffdff1f3677 49306->49312 49313 7ffdff1f3760 47 API calls 49307->49313 49308->49279 49315 7ffdff1f35d7 HeapFree 49308->49315 49311->49305 49317 7ffdff1da2a0 2 API calls 49311->49317 49312->49296 49316 7ffdff1f36ef 49312->49316 49313->49308 49315->49279 49344 7ffdff1b87a0 46 API calls 49316->49344 49319 7ffdff1f352e 49317->49319 49319->49305 49319->49316 49321 7ffdff1f3829 49320->49321 49323 7ffdff1f2f90 49321->49323 49335 7ffdff1da340 47 API calls 49321->49335 49323->49268 49323->49269 49325 7ffdff1f37e9 49324->49325 49327 7ffdff1f3777 49324->49327 49336 7ffdff1b87a0 46 API calls 49325->49336 49329 7ffdff1da2a0 2 API calls 49327->49329 49328 7ffdff1f37cf 49332 7ffdff1f37d6 49328->49332 49337 7ffdff1b87a0 46 API calls 49328->49337 49329->49328 49332->49271 49335->49323 49338->49283 49339->49297 49345 7ffdff1b94e0 46 API calls 49341->49345 49346 7ffdff1fed91 49347 7ffdff1f2ba0 69 API calls 49346->49347 49348 7ffdff1feded 49347->49348 49349 7ff600e1f800 49350 7ff600e1f8a6 LoadLibraryW 49349->49350 49354 7ff600e1f82a 49349->49354 49351 7ff600e1f916 49350->49351 49352 7ff600e1f8b8 GetProcAddress 49350->49352 49353 7ff600e1f8d8 49352->49353 49352->49354 49355 7ff600e1f8e1 LoadLibraryW 49353->49355 49354->49353 49354->49355 49358 7ff600e1f87c 49354->49358 49355->49351 49356 7ff600e1f8f3 GetProcAddress 49355->49356 49356->49354 49357 7ff600e1f913 49356->49357 49357->49351 49359 7ff600e1f89b 49358->49359 49361 7ff600ea3ce0 8 API calls 2 library calls 49358->49361 49361->49359 49362 7ffdff203270 49363 7ffdff2033de 49362->49363 49366 7ffdff20328a 49362->49366 49380 7ffdff203400 46 API calls 49363->49380 49364 7ffdff2032ab 49367 7ffdff2032ba ReadFile 49364->49367 49368 7ffdff2033c1 49364->49368 49366->49364 49378 7ffdff1da200 47 API calls 49366->49378 49370 7ffdff20330b GetLastError 49367->49370 49376 7ffdff2032f1 49367->49376 49379 7ffdff1da200 47 API calls 49368->49379 49369 7ffdff2033f2 49373 7ffdff203338 49370->49373 49373->49376 49377 7ffdff1d40b0 HeapFree 49373->49377 49374 7ffdff2033d2 49377->49376 49378->49364 49379->49374 49380->49369 49381 7ffdff2030a0 49382 7ffdff2030b9 49381->49382 49388 7ffdff2030f1 49381->49388 49384 7ffdff2030c9 49382->49384 49385 7ffdff203106 GetLastError 49382->49385 49383 7ffdff2031c7 CloseHandle CloseHandle 49383->49388 49384->49388 49389 7ffdff203171 GetLastError 49384->49389 49398 7ffdff1d40b0 HeapFree 49385->49398 49388->49383 49390 7ffdff203630 HeapAlloc 49388->49390 49393 7ffdff20320b 49388->49393 49400 7ffdff1d40b0 HeapFree 49388->49400 49391 7ffdff20319e 49389->49391 49390->49388 49391->49388 49399 7ffdff1d40b0 HeapFree 49391->49399 49394 7ffdff203224 HeapFree 49393->49394 49395 7ffdff20323e CloseHandle CloseHandle HeapFree 49393->49395 49394->49395 49401 7ffdff20bb90 6 API calls 49395->49401 49397 7ffdff203269 49398->49388 49399->49388 49400->49388 49401->49397 49402 7ff600ec782c GetLastError 49403 7ff600ec786d FlsSetValue 49402->49403 49407 7ff600ec7850 49402->49407 49404 7ff600ec787f 49403->49404 49405 7ff600ec785d __free_lconv_mon 49403->49405 49408 7ff600ec78ac FlsSetValue 49404->49408 49409 7ff600ec789c FlsSetValue 49404->49409 49406 7ff600ec78d9 SetLastError 49405->49406 49407->49403 49407->49405 49410 7ff600ec78b8 FlsSetValue 49408->49410 49411 7ff600ec78ca 49408->49411 49409->49405 49410->49405 49413 7ff600ec7a48 EnterCriticalSection LeaveCriticalSection 49411->49413 49413->49405
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID: !$($/$/i:S$Could not find central directory endInvalid digital signature header$Could not read enough bytesFromUtf8Errorbyteserrorinvalid seek to a negative or overflowing position$Encrypted files are not supportedInvalid local file headerInvalid Central Directory header$SYNC$Support for multi-disk files is not implemented$ZQ$called `Result::unwrap()` on an `Err` value$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
                                                                                  • API String ID: 3298025750-1660721834
                                                                                  • Opcode ID: fbfe40eca320aa8c0a065b08ee0eec9281792f96c6d33ef7d80ceee36d9426fc
                                                                                  • Instruction ID: 9b150b05a4ccfc3cb340ddfd5f009cb71a9318e0550ae670a484390f0d35a008
                                                                                  • Opcode Fuzzy Hash: fbfe40eca320aa8c0a065b08ee0eec9281792f96c6d33ef7d80ceee36d9426fc
                                                                                  • Instruction Fuzzy Hash: DD535862B0CBC280EB719B15A4647AAA3A0FB84784F444236DBAD97BDDDF7CD145CB40
                                                                                  APIs
                                                                                  • HeapFree.KERNEL32(?,00000003,?,?,00007FFDFF1FEC30,00000000,00000000,00000000,00000003,?,?,00007FFDFF1FFA41), ref: 00007FFDFF1F817C
                                                                                  • HeapFree.KERNEL32(?,00000003,?,?,00007FFDFF1FEC30,00000000,00000000,00000000,00000003,?,?,00007FFDFF1FFA41), ref: 00007FFDFF1F8264
                                                                                  • HeapFree.KERNEL32(?,00000003,?,?,00007FFDFF1FEC30,00000000,00000000,00000000,00000003,?,?,00007FFDFF1FFA41), ref: 00007FFDFF1F8382
                                                                                  • HeapFree.KERNEL32(?,00000003,?,?,00007FFDFF1FEC30,00000000,00000000,00000000,00000003,?,?,00007FFDFF1FFA41), ref: 00007FFDFF1F83AC
                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 00007FFDFF1F8453
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$EnvironmentStrings
                                                                                  • String ID: .exeprogram not found$PATHlibrary\std\src\sys_common\process.rs$\?\\$]?\\$assertion failed: self.height > 0
                                                                                  • API String ID: 2767186067-2173948767
                                                                                  • Opcode ID: 438d530565eb0e12457dbd3d83dd6ad7e9905329718b40961276f865af7bf96e
                                                                                  • Instruction ID: a0245f55102d1041b4e3700003bd1392dfff067be3dbece459562974700c2350
                                                                                  • Opcode Fuzzy Hash: 438d530565eb0e12457dbd3d83dd6ad7e9905329718b40961276f865af7bf96e
                                                                                  • Instruction Fuzzy Hash: 6E435E62F09AC285EB709F259860BF923A1FB44798F444236DA7D9B7DDDF38A645C300

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1512 7ffdff1ffa50-7ffdff1ffaa5 1513 7ffdff1ffab0-7ffdff1ffac2 GetCurrentProcessId 1512->1513 1514 7ffdff1ffaf8-7ffdff1ffb75 call 7ffdff1b8d40 1513->1514 1515 7ffdff1ffac4 1513->1515 1519 7ffdff1ffb8c-7ffdff1ffbb6 1514->1519 1520 7ffdff1ffb77-7ffdff1ffb87 HeapFree 1514->1520 1516 7ffdff1ffad0-7ffdff1ffaf6 ProcessPrng 1515->1516 1516->1514 1516->1516 1521 7ffdff1ffbb8-7ffdff1ffbbf 1519->1521 1522 7ffdff1ffbd0-7ffdff1ffbe5 1519->1522 1520->1519 1524 7ffdff1ffbc1-7ffdff1ffbc5 1521->1524 1525 7ffdff1ffbf0-7ffdff1ffc02 1521->1525 1523 7ffdff1ffca4-7ffdff1ffcb8 call 7ffdff203630 1522->1523 1538 7ffdff200138-7ffdff20013d 1523->1538 1539 7ffdff1ffcbe-7ffdff1ffcd6 1523->1539 1529 7ffdff1ffc51-7ffdff1ffc54 1524->1529 1526 7ffdff1ffc45-7ffdff1ffc4e 1525->1526 1527 7ffdff1ffc04-7ffdff1ffc15 1525->1527 1526->1529 1530 7ffdff1fff8c-7ffdff1fff9f 1527->1530 1531 7ffdff1ffc1b-7ffdff1ffc3e 1527->1531 1532 7ffdff1ffc56-7ffdff1ffc96 1529->1532 1530->1529 1537 7ffdff1fffa5-7ffdff1fffce 1530->1537 1531->1529 1534 7ffdff1ffc40 1531->1534 1535 7ffdff1ffc9c-7ffdff1ffca0 1532->1535 1536 7ffdff200141-7ffdff20014b call 7ffdff1b87a0 1532->1536 1534->1537 1535->1523 1542 7ffdff200150-7ffdff20015b 1536->1542 1537->1532 1538->1536 1541 7ffdff1ffcf1-7ffdff1ffcf4 1539->1541 1543 7ffdff1ffcf6-7ffdff1ffcfa 1541->1543 1544 7ffdff1ffd60-7ffdff1ffd65 1541->1544 1547 7ffdff20019a-7ffdff2001a8 1542->1547 1548 7ffdff20015d-7ffdff200195 HeapFree 1542->1548 1545 7ffdff1ffcfc-7ffdff1ffcfe 1543->1545 1546 7ffdff1ffd40-7ffdff1ffd44 1543->1546 1549 7ffdff1ffd6b-7ffdff1ffd7e 1544->1549 1550 7ffdff1ffed0-7ffdff1fff13 call 7ffdff20b584 1544->1550 1551 7ffdff1ffd01-7ffdff1ffd04 1545->1551 1546->1544 1553 7ffdff1ffd46-7ffdff1ffd4d 1546->1553 1554 7ffdff2001aa-7ffdff2001b3 HeapFree 1547->1554 1555 7ffdff2001b8-7ffdff2001bb 1547->1555 1548->1547 1556 7ffdff1ffde0-7ffdff1ffde6 1549->1556 1557 7ffdff1ffd80-7ffdff1ffd86 1549->1557 1575 7ffdff1fff19-7ffdff1fff33 GetLastError 1550->1575 1576 7ffdff200046-7ffdff200049 1550->1576 1559 7ffdff1ffd06-7ffdff1ffd34 1551->1559 1560 7ffdff1ffce0-7ffdff1ffce3 1551->1560 1561 7ffdff1ffd53-7ffdff1ffd58 1553->1561 1562 7ffdff1ffe22-7ffdff1ffe33 1553->1562 1554->1555 1563 7ffdff2001c5-7ffdff2001ce call 7ffdff20bb90 1555->1563 1564 7ffdff2001bd-7ffdff2001c0 CloseHandle 1555->1564 1567 7ffdff1ffce6-7ffdff1ffcee 1556->1567 1565 7ffdff1ffd8c-7ffdff1ffdce 1557->1565 1566 7ffdff20012f 1557->1566 1559->1557 1560->1567 1561->1551 1569 7ffdff1ffe35-7ffdff1ffe45 1562->1569 1570 7ffdff1ffe73-7ffdff1ffe7f 1562->1570 1564->1563 1572 7ffdff1ffdeb 1565->1572 1573 7ffdff1ffdd0-7ffdff1ffddd 1565->1573 1574 7ffdff200131-7ffdff200136 call 7ffdff1b87a0 1566->1574 1567->1541 1579 7ffdff1ffe47-7ffdff1ffe6a 1569->1579 1580 7ffdff1ffe86-7ffdff1ffe99 1569->1580 1570->1580 1582 7ffdff1ffded-7ffdff1ffe0a call 7ffdff1da2a0 1572->1582 1573->1582 1574->1542 1584 7ffdff1fff39-7ffdff1fff3c 1575->1584 1585 7ffdff1fffd3-7ffdff1fffec 1575->1585 1577 7ffdff20005c-7ffdff2000b4 call 7ffdff1f2ba0 1576->1577 1578 7ffdff20004b-7ffdff200057 HeapFree 1576->1578 1597 7ffdff2000b9-7ffdff2000bc 1577->1597 1578->1577 1589 7ffdff1ffe6c 1579->1589 1590 7ffdff1ffe9b-7ffdff1ffebc 1579->1590 1580->1589 1580->1590 1601 7ffdff200121-7ffdff20012d 1582->1601 1602 7ffdff1ffe10-7ffdff1ffe1d 1582->1602 1586 7ffdff1fff50-7ffdff1fff53 1584->1586 1587 7ffdff1fff3e-7ffdff1fff44 1584->1587 1591 7ffdff1fffff-7ffdff20000d 1585->1591 1592 7ffdff1fffee-7ffdff1ffffa HeapFree 1585->1592 1586->1585 1596 7ffdff1fff55-7ffdff1fff5b 1586->1596 1595 7ffdff1fff5d-7ffdff1fff6e call 7ffdff1d40b0 1587->1595 1589->1570 1590->1550 1598 7ffdff20000f-7ffdff200018 HeapFree 1591->1598 1599 7ffdff20001d-7ffdff200021 1591->1599 1592->1591 1595->1513 1611 7ffdff1fff74-7ffdff1fff87 HeapFree 1595->1611 1596->1585 1596->1595 1604 7ffdff2000e9-7ffdff200108 1597->1604 1605 7ffdff2000be-7ffdff2000de 1597->1605 1598->1599 1606 7ffdff20002b-7ffdff200045 1599->1606 1607 7ffdff200023-7ffdff200026 CloseHandle 1599->1607 1601->1574 1602->1567 1604->1606 1610 7ffdff20010e-7ffdff20011c HeapFree 1604->1610 1605->1598 1609 7ffdff2000e4 1605->1609 1607->1606 1609->1599 1610->1606 1611->1513
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CurrentFreeHeapPrng
                                                                                  • String ID:
                                                                                  • API String ID: 2687294623-0
                                                                                  • Opcode ID: fceb44e27e5dd72fb5a5ad19f0c294b97442bf41cb646bf3afeacaad0d38f75c
                                                                                  • Instruction ID: 7cccc6d561d06525f19e7ae06b088c08969d3bcde0456e28126a86fa225e37c2
                                                                                  • Opcode Fuzzy Hash: fceb44e27e5dd72fb5a5ad19f0c294b97442bf41cb646bf3afeacaad0d38f75c
                                                                                  • Instruction Fuzzy Hash: 86129F23F08A9189E7648B259860BBA27A0FB447A8F484336DE7E877DDDF78D445C340

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1640 7ffdff1b6060-7ffdff1b608e call 7ffdff20b674 1643 7ffdff1b6105-7ffdff1b611f 1640->1643 1644 7ffdff1b6090-7ffdff1b60ba call 7ffdff20c078 GetModuleFileNameW 1640->1644 1644->1643 1647 7ffdff1b60bc-7ffdff1b60c4 1644->1647 1647->1643 1648 7ffdff1b6207-7ffdff1b62a3 call 7ffdff1b9e80 call 7ffdff1f4eb0 1647->1648 1653 7ffdff1b62a9-7ffdff1b631c call 7ffdff1ccaa0 call 7ffdff203630 1648->1653 1654 7ffdff1b7f33-7ffdff1b7f6a call 7ffdff1bb1c0 1648->1654 1663 7ffdff1b7f6f-7ffdff1b7f7e call 7ffdff1b87a0 1653->1663 1664 7ffdff1b6322-7ffdff1b663a call 7ffdff1b8d40 call 7ffdff20b60c call 7ffdff20b7cc call 7ffdff1b8d40 call 7ffdff1ccc00 call 7ffdff203630 1653->1664 1660 7ffdff1b813e-7ffdff1b82e6 HeapFree call 7ffdff1b1770 1654->1660 1672 7ffdff1b83fb-7ffdff1b8404 1660->1672 1673 7ffdff1b83ae-7ffdff1b83c2 call 7ffdff20bb90 1660->1673 1663->1660 1693 7ffdff1b6640-7ffdff1b678a call 7ffdff2080b0 call 7ffdff2027d0 1664->1693 1694 7ffdff1b7f83-7ffdff1b7f92 call 7ffdff1b87a0 1664->1694 1675 7ffdff1b8406 1672->1675 1676 7ffdff1b839b-7ffdff1b83a9 HeapFree 1672->1676 1681 7ffdff1b83da-7ffdff1b83e3 1673->1681 1682 7ffdff1b83c4-7ffdff1b83d5 HeapFree 1673->1682 1675->1673 1676->1673 1681->1672 1685 7ffdff1b83e5-7ffdff1b83f6 HeapFree 1681->1685 1682->1681 1685->1672 1701 7ffdff1b7f97-7ffdff1b7fc8 call 7ffdff1bb1c0 1693->1701 1702 7ffdff1b6790-7ffdff1b67d4 1693->1702 1694->1660 1701->1660 1704 7ffdff1b67dc call 7ffdff1b1770 1702->1704 1706 7ffdff1b67e1-7ffdff1b6e9c call 7ffdff1f4eb0 call 7ffdff1f71b0 HeapFree call 7ffdff1b6060 1704->1706 1706->1654
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FileModuleName
                                                                                  • String ID: $$$
                                                                                  • API String ID: 514040917-233714265
                                                                                  • Opcode ID: ce73ce1ada085a5ca2ae938c063113766c90b9e5e731682de3bfba0677b67b52
                                                                                  • Instruction ID: 339956c890906bb06932d5f68ea2d3fe6403c325703cfbdd2646ba333e67b152
                                                                                  • Opcode Fuzzy Hash: ce73ce1ada085a5ca2ae938c063113766c90b9e5e731682de3bfba0677b67b52
                                                                                  • Instruction Fuzzy Hash: F6021722A0CBC180E7B09B11E4647EAB3A5FB88744F544235DAED87BA9DF7CD549CB40

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1826 7ff600e1f800-7ff600e1f828 1827 7ff600e1f8a6-7ff600e1f8b6 LoadLibraryW 1826->1827 1828 7ff600e1f82a-7ff600e1f83c 1826->1828 1829 7ff600e1f916-7ff600e1f917 1827->1829 1830 7ff600e1f8b8-7ff600e1f8d2 GetProcAddress 1827->1830 1832 7ff600e1f847-7ff600e1f849 1828->1832 1833 7ff600e1f919-7ff600e1f91f 1829->1833 1830->1828 1831 7ff600e1f8d8-7ff600e1f8d9 1830->1831 1834 7ff600e1f8db-7ff600e1f8dc 1831->1834 1832->1834 1835 7ff600e1f84f-7ff600e1f866 1832->1835 1836 7ff600e1f8de-7ff600e1f8df 1834->1836 1837 7ff600e1f868-7ff600e1f87a 1835->1837 1838 7ff600e1f8e1-7ff600e1f8f1 LoadLibraryW 1835->1838 1836->1838 1837->1836 1842 7ff600e1f87c-7ff600e1f894 1837->1842 1838->1833 1839 7ff600e1f8f3-7ff600e1f90d GetProcAddress 1838->1839 1839->1837 1840 7ff600e1f913-7ff600e1f914 1839->1840 1840->1829 1843 7ff600e1f896-7ff600e1f89b call 7ff600ea3ce0 1842->1843 1844 7ff600e1f89c-7ff600e1f8a5 1842->1844 1843->1844
                                                                                  APIs
                                                                                  • LoadLibraryW.KERNEL32(?,?,?,?,?,?,00007FF600E1F6E6,?,?,00000518,00000000,00007FF600E1F597), ref: 00007FF600E1F8AD
                                                                                  • GetProcAddress.KERNEL32(?,?,?,?,?,?,00007FF600E1F6E6,?,?,00000518,00000000,00007FF600E1F597), ref: 00007FF600E1F8C2
                                                                                  • LoadLibraryW.KERNEL32(?,?,?,?,?,?,00007FF600E1F6E6,?,?,00000518,00000000,00007FF600E1F597), ref: 00007FF600E1F8E8
                                                                                  • GetProcAddress.KERNEL32(?,?,?,?,?,?,00007FF600E1F6E6,?,?,00000518,00000000,00007FF600E1F597), ref: 00007FF600E1F8FD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressLibraryLoadProc
                                                                                  • String ID: ProcessPrng$bcryptprimitives.dll
                                                                                  • API String ID: 2574300362-2667675608
                                                                                  • Opcode ID: 5a0c0f51a3f4aa7e9dbaeae2f82cae117ef1f02cd69cd5ea1cdda0f7bdd660f4
                                                                                  • Instruction ID: 6f31d75e31e05cc7627d955b42bd3711a736c68830467bf2f17e8d5327df5038
                                                                                  • Opcode Fuzzy Hash: 5a0c0f51a3f4aa7e9dbaeae2f82cae117ef1f02cd69cd5ea1cdda0f7bdd660f4
                                                                                  • Instruction Fuzzy Hash: 16314D31F0AB06A1FB698F25E85427563E0AF98B90F784435CA8E97B64EE3CE5418304

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1901 7ff600d952b0-7ff600d952dc 1902 7ff600d95470-7ff600d95471 1901->1902 1903 7ff600d952e2-7ff600d95341 1901->1903 1904 7ff600d95473 1902->1904 1905 7ff600d95343-7ff600d9535b 1903->1905 1906 7ff600d9535d-7ff600d95366 1903->1906 1907 7ff600d95476-7ff600d9547e ReleaseSRWLockExclusive 1904->1907 1905->1906 1908 7ff600d9536c-7ff600d9538d TryAcquireSRWLockExclusive 1906->1908 1909 7ff600d954ad-7ff600d954c7 1906->1909 1910 7ff600d95446-7ff600d95455 1907->1910 1911 7ff600d954a0-7ff600d954a8 call 7ff600e0c8c0 1908->1911 1912 7ff600d95393-7ff600d953a2 1908->1912 1913 7ff600d954ce-7ff600d954ec 1909->1913 1914 7ff600d954c9 call 7ff600ea0f3c 1909->1914 1918 7ff600d95457-7ff600d9545c call 7ff600ea3ce0 1910->1918 1919 7ff600d9545d-7ff600d9546f 1910->1919 1911->1909 1915 7ff600d953a8-7ff600d953dc call 7ff600e0c930 1912->1915 1916 7ff600d9558b-7ff600d955aa 1912->1916 1921 7ff600d954f2-7ff600d954f6 1913->1921 1922 7ff600d955fd-7ff600d95605 call 7ff600e1f200 1913->1922 1914->1913 1915->1904 1937 7ff600d953e2-7ff600d95401 1915->1937 1924 7ff600d955b0-7ff600d955f3 1916->1924 1925 7ff600d957c3-7ff600d957c4 1916->1925 1918->1919 1921->1908 1929 7ff600d954fc-7ff600d9550b 1921->1929 1947 7ff600d9560d-7ff600d95624 1922->1947 1924->1922 1931 7ff600d957c6-7ff600d957c7 1925->1931 1934 7ff600d95651-7ff600d95655 1929->1934 1935 7ff600d95511-7ff600d95526 1929->1935 1939 7ff600d957c9-7ff600d957cc 1931->1939 1936 7ff600d95659-7ff600d95677 TryAcquireSRWLockExclusive 1934->1936 1940 7ff600d9562f-7ff600d95649 call 7ff600e0c620 1935->1940 1941 7ff600d9552c 1935->1941 1943 7ff600d95681-7ff600d95691 1936->1943 1944 7ff600d95679-7ff600d9567c call 7ff600e0c8c0 1936->1944 1945 7ff600d95480-7ff600d95481 1937->1945 1946 7ff600d95403-7ff600d9543a ReleaseSRWLockExclusive 1937->1946 1939->1907 1942 7ff600d95530-7ff600d95586 1940->1942 1955 7ff600d9564f 1940->1955 1941->1942 1954 7ff600d95440-7ff600d95444 1942->1954 1952 7ff600d95697-7ff600d956b6 1943->1952 1953 7ff600d9574c-7ff600d95780 call 7ff600e0c930 1943->1953 1944->1943 1950 7ff600d95483-7ff600d9548a 1945->1950 1946->1954 1947->1940 1950->1947 1957 7ff600d95490-7ff600d9549e 1950->1957 1952->1931 1958 7ff600d956bc-7ff600d95708 1952->1958 1953->1939 1961 7ff600d95782-7ff600d957a1 1953->1961 1954->1910 1954->1950 1955->1936 1957->1910 1965 7ff600d9570c-7ff600d95741 ReleaseSRWLockExclusive 1958->1965 1963 7ff600d957d1-7ff600d957f4 1961->1963 1964 7ff600d957a3-7ff600d957a8 1961->1964 1968 7ff600d957f6-7ff600d95800 1963->1968 1966 7ff600d957aa-7ff600d957ae 1964->1966 1967 7ff600d957bd-7ff600d957c1 1964->1967 1965->1953 1969 7ff600d957b2-7ff600d957b8 1966->1969 1967->1969 1968->1968 1970 7ff600d95802-7ff600d9580c 1968->1970 1969->1965 1971 7ff600d9580e-7ff600d9584d call 7ff600d95880 1970->1971 1972 7ff600d95859-7ff600d9586f 1970->1972 1977 7ff600d95852 1971->1977 1974 7ff600d95871-7ff600d95876 call 7ff600ea3ce0 1972->1974 1975 7ff600d95877-7ff600d9587f 1972->1975 1974->1975 1977->1972
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExclusiveLock$Release$Acquire
                                                                                  • String ID:
                                                                                  • API String ID: 1021914862-0
                                                                                  • Opcode ID: 224a45e544231f32f11fdf08f87741da0663b91ffaa8d1a9425e7b058fb14494
                                                                                  • Instruction ID: fecde85f27f78dddb92e885ace71c747b69f52557c1891dc6586a229414ca94b
                                                                                  • Opcode Fuzzy Hash: 224a45e544231f32f11fdf08f87741da0663b91ffaa8d1a9425e7b058fb14494
                                                                                  • Instruction Fuzzy Hash: 13F1C072B08A4596EB55CB15E85437A37A0FB48BA4F604231DBAE877E8DF3CE545C310

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2232 7ffdff1fe760-7ffdff1fe7ab 2233 7ffdff1fe7bd-7ffdff1fe7c6 2232->2233 2234 7ffdff1fe7c8-7ffdff1fe7cb 2233->2234 2235 7ffdff1fe7b0 2233->2235 2237 7ffdff1fe878-7ffdff1fe87f 2234->2237 2238 7ffdff1fe7d1-7ffdff1fe7d8 2234->2238 2236 7ffdff1fe7b3-7ffdff1fe7b7 2235->2236 2236->2233 2239 7ffdff1febc5-7ffdff1febd9 2236->2239 2242 7ffdff1fe8c2-7ffdff1fe8c9 2237->2242 2243 7ffdff1fe881-7ffdff1fe885 2237->2243 2240 7ffdff1fe7da-7ffdff1fe7dd 2238->2240 2241 7ffdff1fe7df-7ffdff1fe7f3 2238->2241 2246 7ffdff1fe840-7ffdff1fe846 2240->2246 2247 7ffdff1fe7f5-7ffdff1fe807 2241->2247 2248 7ffdff1fe832-7ffdff1fe83d 2241->2248 2249 7ffdff1fe8cb-7ffdff1fe8ce call 7ffdff1f3760 2242->2249 2250 7ffdff1fe8d3-7ffdff1fe8e9 2242->2250 2244 7ffdff1fe887 2243->2244 2245 7ffdff1fe893-7ffdff1fe895 2243->2245 2251 7ffdff1fe88a-7ffdff1fe891 2244->2251 2252 7ffdff1fe8a0-7ffdff1fe8a3 2245->2252 2246->2236 2253 7ffdff1fe84b-7ffdff1fe860 2247->2253 2254 7ffdff1fe809-7ffdff1fe82e 2247->2254 2248->2246 2249->2250 2256 7ffdff1fe8ec-7ffdff1fe8f8 2250->2256 2251->2256 2257 7ffdff1fe8b8-7ffdff1fe8bb 2252->2257 2258 7ffdff1fe8a5-7ffdff1fe8ac 2252->2258 2253->2246 2260 7ffdff1fe862-7ffdff1fe873 2253->2260 2254->2246 2259 7ffdff1fe830 2254->2259 2261 7ffdff1fe913-7ffdff1fe917 2256->2261 2257->2242 2265 7ffdff1fe8bd-7ffdff1fe8c0 2257->2265 2258->2242 2264 7ffdff1fe8ae-7ffdff1fe8b4 2258->2264 2259->2260 2260->2236 2262 7ffdff1fe919-7ffdff1fe91f 2261->2262 2263 7ffdff1fe940-7ffdff1fe947 2261->2263 2266 7ffdff1fe925-7ffdff1fe92c 2262->2266 2267 7ffdff1fea20-7ffdff1fea25 2262->2267 2268 7ffdff1feb0a-7ffdff1feb0e 2263->2268 2269 7ffdff1fe94d-7ffdff1fe954 2263->2269 2264->2252 2270 7ffdff1fe8b6 2264->2270 2265->2251 2271 7ffdff1fe900-7ffdff1fe910 2266->2271 2272 7ffdff1fe92e-7ffdff1fe931 call 7ffdff1f3760 2266->2272 2273 7ffdff1fea27-7ffdff1fea2e 2267->2273 2274 7ffdff1fea45-7ffdff1fea4b 2267->2274 2277 7ffdff1feb14-7ffdff1feb24 2268->2277 2278 7ffdff1febc3 2268->2278 2275 7ffdff1fe967-7ffdff1fe978 2269->2275 2276 7ffdff1fe956-7ffdff1fe95f 2269->2276 2270->2242 2271->2261 2289 7ffdff1fe936 2272->2289 2280 7ffdff1fea77-7ffdff1fea80 2273->2280 2281 7ffdff1fea30-7ffdff1fea3a 2273->2281 2282 7ffdff1febda-7ffdff1fec37 call 7ffdff1b94e0 call 7ffdff1f8080 2274->2282 2283 7ffdff1fea51-7ffdff1fea5e 2274->2283 2285 7ffdff1fe97a-7ffdff1fe98a 2275->2285 2286 7ffdff1fe9b7-7ffdff1fe9c9 2275->2286 2276->2267 2284 7ffdff1fe965 2276->2284 2287 7ffdff1feb39-7ffdff1feb53 call 7ffdff1da340 2277->2287 2288 7ffdff1feb26-7ffdff1feb29 2277->2288 2278->2239 2280->2271 2297 7ffdff1fea86 2280->2297 2281->2271 2290 7ffdff1fea40 2281->2290 2331 7ffdff1feccf-7ffdff1fecdb 2282->2331 2332 7ffdff1fec3d-7ffdff1fec41 2282->2332 2291 7ffdff1fea64-7ffdff1fea6b 2283->2291 2292 7ffdff1feaef-7ffdff1feb02 call 7ffdff1da340 2283->2292 2284->2266 2293 7ffdff1fe98c-7ffdff1fe9af 2285->2293 2294 7ffdff1fe9d0-7ffdff1fe9e3 2285->2294 2286->2267 2299 7ffdff1fe9cb 2286->2299 2308 7ffdff1feb55-7ffdff1feb67 2287->2308 2309 7ffdff1feb35-7ffdff1feb37 2287->2309 2295 7ffdff1feb2b-7ffdff1feb33 2288->2295 2296 7ffdff1feba1-7ffdff1feba8 2288->2296 2289->2271 2290->2272 2305 7ffdff1feace-7ffdff1feae4 2291->2305 2306 7ffdff1fea6d-7ffdff1fea71 2291->2306 2292->2306 2324 7ffdff1feb08 2292->2324 2293->2262 2307 7ffdff1fe9b5 2293->2307 2294->2262 2301 7ffdff1fe9e9-7ffdff1fea0f 2294->2301 2295->2308 2295->2309 2303 7ffdff1febaa-7ffdff1febad call 7ffdff1f3760 2296->2303 2304 7ffdff1febb2-7ffdff1febbf 2296->2304 2297->2272 2299->2266 2301->2266 2312 7ffdff1fea15 2301->2312 2303->2304 2304->2278 2305->2271 2314 7ffdff1feaea 2305->2314 2317 7ffdff1fea8b-7ffdff1fea9d 2306->2317 2318 7ffdff1fea73-7ffdff1fea75 2306->2318 2307->2301 2313 7ffdff1feb70-7ffdff1feb82 2308->2313 2319 7ffdff1feb8c-7ffdff1feb8f 2309->2319 2312->2267 2313->2313 2321 7ffdff1feb84-7ffdff1feb8a 2313->2321 2314->2272 2326 7ffdff1feaa0-7ffdff1feab2 2317->2326 2325 7ffdff1feabc-7ffdff1feabf 2318->2325 2322 7ffdff1feb90-7ffdff1feb9c 2319->2322 2321->2319 2328 7ffdff1feb9e 2321->2328 2322->2322 2322->2328 2324->2305 2327 7ffdff1feac0-7ffdff1feacc 2325->2327 2326->2326 2330 7ffdff1feab4-7ffdff1feaba 2326->2330 2327->2305 2327->2327 2328->2296 2330->2305 2330->2325 2333 7ffdff1fec64-7ffdff1fec80 2332->2333 2334 7ffdff1fec94-7ffdff1fec99 2333->2334 2335 7ffdff1fec82-7ffdff1fec8f HeapFree 2333->2335 2336 7ffdff1fec9b-7ffdff1feca8 HeapFree 2334->2336 2337 7ffdff1fecad-7ffdff1fecb6 2334->2337 2335->2334 2336->2337 2338 7ffdff1fecb8-7ffdff1feccd HeapFree 2337->2338 2339 7ffdff1fec50-7ffdff1fec62 call 7ffdff1f8080 2337->2339 2338->2339 2339->2331 2339->2333
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c82598d90d550b72ee476d5cddae3e5e921dd7659936aa46976c6ac262945f66
                                                                                  • Instruction ID: f1a09179eae9c51fbf856bcf81509ff29f413e3aab55b15a9af3e94403e81d01
                                                                                  • Opcode Fuzzy Hash: c82598d90d550b72ee476d5cddae3e5e921dd7659936aa46976c6ac262945f66
                                                                                  • Instruction Fuzzy Hash: 55E10063F18A8281EB658B259520B7F67A1FF91788F485731DE7E066E8DF7CE5818300

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFreeHandleHeap$ErrorLastObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 3984667017-0
                                                                                  • Opcode ID: cfa682ff03c4f44f18bee66fc3c727f52537c13954e66ac81976801c894b316b
                                                                                  • Instruction ID: 4a3e0437cda4f7f4fc14de4a540bb15fd5cfe0c74e7281dbffcc0530fba28dec
                                                                                  • Opcode Fuzzy Hash: cfa682ff03c4f44f18bee66fc3c727f52537c13954e66ac81976801c894b316b
                                                                                  • Instruction Fuzzy Hash: 5C515B23A08AC584E7609F62D8647E92760FB44788F484236EE6DCABDDDF789589C340

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1723 7ffdff201e80-7ffdff201eaf 1724 7ffdff201eb5-7ffdff201ec7 1723->1724 1725 7ffdff202292-7ffdff2022a5 call 7ffdff1ba1f0 1723->1725 1726 7ffdff2022aa-7ffdff2022bd call 7ffdff1ba1f0 1724->1726 1727 7ffdff201ecd-7ffdff20200a 1724->1727 1725->1726 1729 7ffdff2022c2-7ffdff2022db call 7ffdff1ba1f0 1726->1729 1727->1729 1730 7ffdff202010-7ffdff20207d memcpy * 4 1727->1730 1733 7ffdff2021ab-7ffdff2021ae 1730->1733 1734 7ffdff202083-7ffdff202086 1730->1734 1736 7ffdff2021b4-7ffdff2021c7 call 7ffdff1ba1f0 1733->1736 1737 7ffdff20227e-7ffdff202291 1733->1737 1734->1736 1738 7ffdff20208c-7ffdff2020d0 memcpy * 2 1734->1738 1742 7ffdff2021cc-7ffdff2021d2 1736->1742 1740 7ffdff202112-7ffdff202117 1738->1740 1741 7ffdff2020d2-7ffdff2020e3 1738->1741 1744 7ffdff20218b-7ffdff20218f 1740->1744 1745 7ffdff202119 1740->1745 1743 7ffdff2020f0-7ffdff20210d 1741->1743 1747 7ffdff2021e0-7ffdff202252 1742->1747 1743->1743 1748 7ffdff20210f 1743->1748 1744->1737 1746 7ffdff202195-7ffdff2021a2 1744->1746 1749 7ffdff202120-7ffdff202189 1745->1749 1746->1742 1750 7ffdff2021a4-7ffdff2021a6 1746->1750 1747->1747 1751 7ffdff202254-7ffdff202257 1747->1751 1748->1740 1749->1744 1749->1749 1750->1751 1751->1737 1752 7ffdff202259 1751->1752 1753 7ffdff202260-7ffdff20227c 1752->1753 1753->1737 1753->1753
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy
                                                                                  • String ID: assertion failed: old_left_len + count <= CAPACITY$called `Result::unwrap()` on an `Err` value
                                                                                  • API String ID: 3510742995-3830370267
                                                                                  • Opcode ID: e28cc99cdbe1d1161b80fb67a978a9abc618a5c0e5a2e42b35f9e95ab9161b0c
                                                                                  • Instruction ID: 234c993e7d6d4ddc4886c3ab7f5b545315f96f9a3c72b20bb554fe37aa3b868c
                                                                                  • Opcode Fuzzy Hash: e28cc99cdbe1d1161b80fb67a978a9abc618a5c0e5a2e42b35f9e95ab9161b0c
                                                                                  • Instruction Fuzzy Hash: 94C11663A04B8582EB459F14E8017F96768FF58B98F499332DF6D93395DF38A285C300

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 1754 7ffdff1f2ba0-7ffdff1f2bdc call 7ffdff1f2f10 1757 7ffdff1f2c0b-7ffdff1f2c10 1754->1757 1758 7ffdff1f2bde-7ffdff1f2c09 call 7ffdff1f30b0 1754->1758 1760 7ffdff1f2c13-7ffdff1f2c20 1757->1760 1758->1757 1762 7ffdff1f2c21-7ffdff1f2c2b 1758->1762 1763 7ffdff1f2c37-7ffdff1f2c39 1762->1763 1764 7ffdff1f2c2d-7ffdff1f2c2f 1762->1764 1765 7ffdff1f2c3b-7ffdff1f2c43 1763->1765 1767 7ffdff1f2c63-7ffdff1f2c67 1763->1767 1764->1765 1766 7ffdff1f2c31-7ffdff1f2c35 1764->1766 1768 7ffdff1f2c77-7ffdff1f2c7b 1765->1768 1769 7ffdff1f2c45-7ffdff1f2c47 1765->1769 1766->1768 1770 7ffdff1f2c49-7ffdff1f2c5b 1767->1770 1771 7ffdff1f2c69-7ffdff1f2c6d 1767->1771 1772 7ffdff1f2c8d-7ffdff1f2c8f 1768->1772 1773 7ffdff1f2c7d-7ffdff1f2c7f 1768->1773 1769->1768 1769->1770 1774 7ffdff1f2db6-7ffdff1f2dbd 1770->1774 1775 7ffdff1f2c61 1770->1775 1771->1770 1776 7ffdff1f2c6f-7ffdff1f2c73 1771->1776 1778 7ffdff1f2c91-7ffdff1f2c99 1772->1778 1780 7ffdff1f2ca0-7ffdff1f2cb0 1772->1780 1773->1778 1779 7ffdff1f2c81-7ffdff1f2c89 1773->1779 1781 7ffdff1f2dc0-7ffdff1f2dca HeapFree 1774->1781 1775->1760 1776->1770 1777 7ffdff1f2c75 1776->1777 1777->1768 1782 7ffdff1f2c9b-7ffdff1f2c9e 1778->1782 1784 7ffdff1f2cb2-7ffdff1f2cb6 1778->1784 1779->1782 1783 7ffdff1f2c8b 1779->1783 1780->1782 1780->1784 1785 7ffdff1f2dcf-7ffdff1f2dd2 1781->1785 1786 7ffdff1f2cf2-7ffdff1f2d31 CreateFileW 1782->1786 1783->1784 1787 7ffdff1f2cb8-7ffdff1f2cd4 1784->1787 1788 7ffdff1f2cd6-7ffdff1f2cd8 1784->1788 1785->1760 1789 7ffdff1f2d99-7ffdff1f2db0 GetLastError 1786->1789 1790 7ffdff1f2d33-7ffdff1f2d3c 1786->1790 1787->1786 1791 7ffdff1f2cda-7ffdff1f2cdc 1788->1791 1792 7ffdff1f2ce5-7ffdff1f2ce7 1788->1792 1789->1760 1789->1774 1793 7ffdff1f2d79-7ffdff1f2d7c 1790->1793 1794 7ffdff1f2d3e-7ffdff1f2d42 1790->1794 1795 7ffdff1f2ced 1791->1795 1796 7ffdff1f2cde-7ffdff1f2ce3 1791->1796 1792->1770 1792->1795 1798 7ffdff1f2dd7-7ffdff1f2dd9 1793->1798 1799 7ffdff1f2d7e-7ffdff1f2d94 HeapFree 1793->1799 1794->1793 1797 7ffdff1f2d44-7ffdff1f2d51 GetLastError 1794->1797 1795->1786 1796->1786 1797->1793 1800 7ffdff1f2d53-7ffdff1f2d74 SetFileInformationByHandle 1797->1800 1798->1760 1799->1760 1801 7ffdff1f2d76 1800->1801 1802 7ffdff1f2dde-7ffdff1f2dfd GetLastError CloseHandle 1800->1802 1801->1793 1802->1785 1803 7ffdff1f2dff-7ffdff1f2e06 1802->1803 1803->1781
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFreeHeapLast$FileHandle$CloseCreateInformation
                                                                                  • String ID:
                                                                                  • API String ID: 2929975209-0
                                                                                  • Opcode ID: 38fcc76711a0213deb93089215563ba373ce08b229646afb8c47c777b446e7be
                                                                                  • Instruction ID: 4d18287f98bca43877d5c4fcb72652e2744c565cde5e24d881a2bafcaecb8980
                                                                                  • Opcode Fuzzy Hash: 38fcc76711a0213deb93089215563ba373ce08b229646afb8c47c777b446e7be
                                                                                  • Instruction Fuzzy Hash: 6861A163F086D646FB7086219170BB92791AF45788F184331DE7E87ACDDFBDA8A58310

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$ErrorFreeHeapLast$ObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 908592504-0
                                                                                  • Opcode ID: 4298aa4110947bfe5c9ff9accb72ae427ee72d447fa7bcb020a8269d375f2e61
                                                                                  • Instruction ID: e1b5349974fac94351bdf0d701c999070ad1347089377888d0461d8212526a8f
                                                                                  • Opcode Fuzzy Hash: 4298aa4110947bfe5c9ff9accb72ae427ee72d447fa7bcb020a8269d375f2e61
                                                                                  • Instruction Fuzzy Hash: 6B412823A08BC188E7719F61D8647E92760FB4479CF084236EE6D8AADDDF789589C350

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetLastError.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF203106
                                                                                  • GetLastError.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF203171
                                                                                  • CloseHandle.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF2031CA
                                                                                  • CloseHandle.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF2031D3
                                                                                  • HeapFree.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF203230
                                                                                  • CloseHandle.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF203241
                                                                                  • CloseHandle.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF20324A
                                                                                  • HeapFree.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF20325C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$ErrorFreeHeapLast
                                                                                  • String ID:
                                                                                  • API String ID: 2056089037-0
                                                                                  • Opcode ID: a7d48adf411b1f9489ff9b97180360af9167b3e19d8b93aaaca9e7b3bd2fe902
                                                                                  • Instruction ID: 132ee58ff0e06c534b672086d2f36b185b3335ca7d5e60e1c7748a097c884c6a
                                                                                  • Opcode Fuzzy Hash: a7d48adf411b1f9489ff9b97180360af9167b3e19d8b93aaaca9e7b3bd2fe902
                                                                                  • Instruction Fuzzy Hash: 0F416523B08B4285EB24DB2295617BD67A1EB88784F484631DE7ED77DADF3CE9458300

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 2506987500-0
                                                                                  • Opcode ID: b56dea6cb73fc9b56703c4709b2027bc621aa76816c84145973931551c731a8d
                                                                                  • Instruction ID: 2bae1e24b9ddebdc45ba8d4c619aa2afb7d4575a8344d76869460526f8fe36bf
                                                                                  • Opcode Fuzzy Hash: b56dea6cb73fc9b56703c4709b2027bc621aa76816c84145973931551c731a8d
                                                                                  • Instruction Fuzzy Hash: B1116021F0C256A1FA58A3319A5693D29429F447B0F744B34E9AEE77EEDE2DB4438700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFreeHandleHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1642312469-0
                                                                                  • Opcode ID: a6d343e71d077978c8e156747e5163b3d87f03e85517c32c21585745529b7e21
                                                                                  • Instruction ID: 6fa476140bd96fe3f203c137a0be3dcd2c2193b45444f0ddf16ca595a36807df
                                                                                  • Opcode Fuzzy Hash: a6d343e71d077978c8e156747e5163b3d87f03e85517c32c21585745529b7e21
                                                                                  • Instruction Fuzzy Hash: 2A713866E15AD684EB709F22DC60BFD23A1FB84B98F404236CA2D9B7DDDF3895418700

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2342 7ffdff203270-7ffdff203284 2343 7ffdff20328a-7ffdff203297 2342->2343 2344 7ffdff2033de-7ffdff2033f3 call 7ffdff203400 2342->2344 2345 7ffdff203299-7ffdff2032a5 2343->2345 2346 7ffdff2032ad-7ffdff2032b4 2343->2346 2348 7ffdff2032ab 2345->2348 2349 7ffdff2033a3-7ffdff2033bb call 7ffdff1da200 2345->2349 2350 7ffdff2032ba-7ffdff2032ef ReadFile 2346->2350 2351 7ffdff2033c1-7ffdff2033d9 call 7ffdff1da200 2346->2351 2348->2346 2349->2350 2349->2351 2353 7ffdff20330b-7ffdff203336 GetLastError 2350->2353 2354 7ffdff2032f1 2350->2354 2359 7ffdff203338-7ffdff203345 2353->2359 2360 7ffdff203355-7ffdff20335d 2353->2360 2357 7ffdff2032f4-7ffdff2032fc 2354->2357 2362 7ffdff2032fe-7ffdff203309 2357->2362 2363 7ffdff20334d 2357->2363 2364 7ffdff203347-7ffdff20334b 2359->2364 2365 7ffdff20337f-7ffdff203383 2359->2365 2366 7ffdff203361-7ffdff20337d call 7ffdff1d40b0 2360->2366 2368 7ffdff203351-7ffdff203353 2362->2368 2363->2368 2364->2366 2367 7ffdff203385-7ffdff20338f 2365->2367 2366->2365 2371 7ffdff203390-7ffdff203393 2366->2371 2368->2367 2371->2357 2372 7ffdff203399-7ffdff20339e 2371->2372 2372->2362
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFileLastRead
                                                                                  • String ID:
                                                                                  • API String ID: 1948546556-0
                                                                                  • Opcode ID: 4dcf40ea932a4df618902db9eb42e27f590e638ff9cb20d7303d3cb83be7cdde
                                                                                  • Instruction ID: 87e1d5bf5e1e3f0ddf99dd183868adebf42303ca60e054fb8927f71ed6921719
                                                                                  • Opcode Fuzzy Hash: 4dcf40ea932a4df618902db9eb42e27f590e638ff9cb20d7303d3cb83be7cdde
                                                                                  • Instruction Fuzzy Hash: 72412C63B08B4189EB248B66D5A07BD27A1EB04B84F188635DE7DD77C9DF7CE8518340

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2373 7ff600ecc4d4-7ff600ecc4f5 2374 7ff600ecc570-7ff600ecc57a 2373->2374 2375 7ff600ecc4f7-7ff600ecc501 2373->2375 2377 7ff600ecc5c3-7ff600ecc5db call 7ff600ecc69c 2374->2377 2378 7ff600ecc57c-7ff600ecc57f 2374->2378 2375->2374 2376 7ff600ecc503-7ff600ecc50d 2375->2376 2376->2374 2379 7ff600ecc50f-7ff600ecc512 2376->2379 2385 7ff600ecc5df-7ff600ecc5ea 2377->2385 2378->2377 2380 7ff600ecc581-7ff600ecc5be call 7ff600e7ff30 * 4 2378->2380 2379->2374 2383 7ff600ecc514-7ff600ecc51e 2379->2383 2380->2377 2386 7ff600ecc520-7ff600ecc523 2383->2386 2387 7ff600ecc536-7ff600ecc540 2383->2387 2389 7ff600ecc5ec-7ff600ecc5f2 2385->2389 2390 7ff600ecc606-7ff600ecc60b 2385->2390 2386->2387 2391 7ff600ecc525-7ff600ecc531 call 7ff600e7ff30 call 7ff600ecb70c 2386->2391 2393 7ff600ecc542-7ff600ecc545 2387->2393 2394 7ff600ecc558-7ff600ecc56b call 7ff600e7ff30 * 2 2387->2394 2389->2390 2396 7ff600ecc5f4-7ff600ecc5f7 2389->2396 2398 7ff600ecc620-7ff600ecc62c 2390->2398 2399 7ff600ecc60d-7ff600ecc614 2390->2399 2391->2387 2393->2394 2401 7ff600ecc547-7ff600ecc553 call 7ff600e7ff30 call 7ff600ecbb08 2393->2401 2394->2374 2396->2390 2403 7ff600ecc5f9-7ff600ecc601 call 7ff600e7ff30 * 2 2396->2403 2398->2385 2408 7ff600ecc62e-7ff600ecc644 2398->2408 2399->2398 2405 7ff600ecc616-7ff600ecc619 2399->2405 2401->2394 2403->2390 2405->2398 2412 7ff600ecc61b call 7ff600e7ff30 2405->2412 2412->2398
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: __free_lconv_mon__free_lconv_num
                                                                                  • String ID:
                                                                                  • API String ID: 2148069796-0
                                                                                  • Opcode ID: 81b9c93780bff18e7441eb59178c2ad727a2e1b9be613c2960ee2683208b9e85
                                                                                  • Instruction ID: 8508ed77ab76e2311eff3e05b3efbd22bc04e9da9b064eb3293736058cac6198
                                                                                  • Opcode Fuzzy Hash: 81b9c93780bff18e7441eb59178c2ad727a2e1b9be613c2960ee2683208b9e85
                                                                                  • Instruction Fuzzy Hash: 22413032F2A642A4EF549F21D5507BC2790AF84B48F784432DA4DA679EDF2DE883C350

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2420 7ffdff1da2a0-7ffdff1da2b3 2421 7ffdff1da2b5-7ffdff1da2c0 2420->2421 2422 7ffdff1da313 2420->2422 2424 7ffdff1da2c2-7ffdff1da2c7 2421->2424 2425 7ffdff1da2ee-7ffdff1da2f1 2421->2425 2423 7ffdff1da31b 2422->2423 2428 7ffdff1da320-7ffdff1da32b 2423->2428 2424->2425 2429 7ffdff1da2c9-7ffdff1da2e0 HeapReAlloc 2424->2429 2426 7ffdff1da32c-7ffdff1da332 2425->2426 2427 7ffdff1da2f3-7ffdff1da307 call 7ffdff203630 2425->2427 2431 7ffdff1da2e2-7ffdff1da2ec 2426->2431 2432 7ffdff1da334 2426->2432 2427->2431 2433 7ffdff1da309-7ffdff1da311 2427->2433 2429->2431 2429->2433 2431->2428 2432->2433 2433->2423
                                                                                  APIs
                                                                                  • HeapReAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000004,00007FFDFF1D8DF2), ref: 00007FFDFF1DA2D8
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocHeap
                                                                                  • String ID:
                                                                                  • API String ID: 4292702814-0
                                                                                  • Opcode ID: 57b4c8917531aa89a4a40f83ae940fd55842c2f83d1ea938bbb383108463c6cd
                                                                                  • Instruction ID: a87f2eda94482e2c19ab243adfc3d313ad928b7f4f3c72d608aa74518a7996e4
                                                                                  • Opcode Fuzzy Hash: 57b4c8917531aa89a4a40f83ae940fd55842c2f83d1ea938bbb383108463c6cd
                                                                                  • Instruction Fuzzy Hash: 0A114F22F09B4291EB258B12A560B7D63F1AB08394F584375DEBD867C9EF3DA581C200

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 2435 7ffdff1fedf5-7ffdff1fee01 call 7ffdff1ffa50 2437 7ffdff1fee06-7ffdff1fee0f 2435->2437 2438 7ffdff1fee15-7ffdff1fee1d 2437->2438 2439 7ffdff1fef3e-7ffdff1fef49 2437->2439 2442 7ffdff1fee9e-7ffdff1feeb4 2438->2442 2440 7ffdff1fef4b-7ffdff1fef54 CloseHandle 2439->2440 2441 7ffdff1fef57-7ffdff1fef62 2439->2441 2440->2441 2441->2442
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Process$CloseCurrentFreeHandleHeapPrng
                                                                                  • String ID:
                                                                                  • API String ID: 4199747799-0
                                                                                  • Opcode ID: 4be62e6c556ec3346351a61870d323fa1739e9f9d1c35523c750760ad5fc9d98
                                                                                  • Instruction ID: 2c87c9606dbf6dc953e0f8cdbecabb23414bf0a5b0325341088e7b9f4bddabe6
                                                                                  • Opcode Fuzzy Hash: 4be62e6c556ec3346351a61870d323fa1739e9f9d1c35523c750760ad5fc9d98
                                                                                  • Instruction Fuzzy Hash: 43F03A23B0568145E7619B25E9607AD63D49B80BA8F0C8631DE3E87BD9CF7CE4C6D300
                                                                                  APIs
                                                                                  Strings
                                                                                  • stack backtrace:, xrefs: 00007FFDFF2038F3
                                                                                  • note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtraces [... omitted frame ...], xrefs: 00007FFDFF2055EC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$ErrorLast$CloseHandle$FileModule32UnmapViewmemset$CaptureContextCreateCurrentDirectoryEntryFirstFunctionLookupNextSnapshotToolhelp32
                                                                                  • String ID: note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtraces [... omitted frame ...]$stack backtrace:
                                                                                  • API String ID: 858481261-3192684347
                                                                                  • Opcode ID: 09e5637573c4e064e0f652eb0a634184cf0c759bfa2e68a08de6e06b0b7d86df
                                                                                  • Instruction ID: c6e51a58ab8f63ef8d1e802ada43323a854046b92b25c95d1f308f78648631cb
                                                                                  • Opcode Fuzzy Hash: 09e5637573c4e064e0f652eb0a634184cf0c759bfa2e68a08de6e06b0b7d86df
                                                                                  • Instruction Fuzzy Hash: E2033D62A04AC689EB708F25D8657FD33A1FB44788F484236CA6D9BBDDDF389645D300
                                                                                  APIs
                                                                                  Strings
                                                                                  • .debug_abbrev.debug_addr.debug_aranges.debug_cu_index.debug_info.debug_line.debug_line_str.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_str.debug_str_offsets.debug_tu_index.debug_types.debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo., xrefs: 00007FFDFF1DB72A, 00007FFDFF1DBAE9
                                                                                  • .debug_rnglists.dwo.debug_str.dwo.debug_str_offsets.dwo.debug_types.dwo, xrefs: 00007FFDFF1DED3D
                                                                                  • assertion failed: end >= start && end <= len, xrefs: 00007FFDFF1DF0F5, 00007FFDFF1DF13D
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$memcmp
                                                                                  • String ID: .debug_abbrev.debug_addr.debug_aranges.debug_cu_index.debug_info.debug_line.debug_line_str.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_str.debug_str_offsets.debug_tu_index.debug_types.debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo.$.debug_rnglists.dwo.debug_str.dwo.debug_str_offsets.dwo.debug_types.dwo$assertion failed: end >= start && end <= len
                                                                                  • API String ID: 3384217055-3986548874
                                                                                  • Opcode ID: 2f846fa1828be6d94f64d2428e07d67e384862b86ff2f41c5eacc9247d9dc5e4
                                                                                  • Instruction ID: 9812a3f84a9a76fabef71dbdba1899424231082c42c3d5d436e63aa71634841e
                                                                                  • Opcode Fuzzy Hash: 2f846fa1828be6d94f64d2428e07d67e384862b86ff2f41c5eacc9247d9dc5e4
                                                                                  • Instruction Fuzzy Hash: 52335A22F09BC589EB718F25D8647ED33A1FB44788F445236CA6D4BB99DF39A291C340
                                                                                  APIs
                                                                                  Strings
                                                                                  • cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs, xrefs: 00007FFDFF1D3B99
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$AddressProc$LibraryLoad$CreateEvent$CryptFunction036HandleModuleObjectRandomSingleSystemValueWait
                                                                                  • String ID: cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
                                                                                  • API String ID: 3168797044-1168434340
                                                                                  • Opcode ID: 5254ad478ccc7177241345e557fcb222bbc8335646cd33d2d1f36cdd6ef6abc7
                                                                                  • Instruction ID: 4bd907d4506240fb6b681ccbdb3b5d4627e36f8c37782c24e45038fe4df0061a
                                                                                  • Opcode Fuzzy Hash: 5254ad478ccc7177241345e557fcb222bbc8335646cd33d2d1f36cdd6ef6abc7
                                                                                  • Instruction Fuzzy Hash: 97F18F22F09A4640FB14EB66A425BBA5361EF85784F484332E97ED76EEDF7CE1458300
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 13a2399d51f1e29b51e7b954411ffbba37ccaecf0322d9fe853ab7c454f75477
                                                                                  • Instruction ID: 7663b5955e62d60496adef034e484711ccef4d28b80113114c965049d2951200
                                                                                  • Opcode Fuzzy Hash: 13a2399d51f1e29b51e7b954411ffbba37ccaecf0322d9fe853ab7c454f75477
                                                                                  • Instruction Fuzzy Hash: F4629263B087C585EB259B259864BF96365FB44B88F484232DE3DDB7D9DF389285C300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy
                                                                                  • String ID: @$assertion failed: end >= start && end <= len
                                                                                  • API String ID: 3510742995-884486453
                                                                                  • Opcode ID: 83b0d2c804a2d17cdd4d1568f02dadd859c430cf1c076f3a96b1d1d2e213e988
                                                                                  • Instruction ID: 786aa64ac353d5ae0b79de23511a7fb5e4d549053d762f52aa7f55abfef477d6
                                                                                  • Opcode Fuzzy Hash: 83b0d2c804a2d17cdd4d1568f02dadd859c430cf1c076f3a96b1d1d2e213e988
                                                                                  • Instruction Fuzzy Hash: 42C28176F08AC285E7708F2198647F927A1FB54B88F444236CA7D9BBD9DF38A655C300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$AddressHandleInformationModuleProcQuery$ExceptionHandlerLibraryLoadProcessSystemVectoredmemcpymemset
                                                                                  • String ID: called `Result::unwrap()` on an `Err` value
                                                                                  • API String ID: 1664888229-2333694755
                                                                                  • Opcode ID: 8172e6515329652ded644d9a0edfd0989f5716e5b8afd2ee42f4bd8873f6e240
                                                                                  • Instruction ID: 993944a9bfd7e05b6f215574f003057790f5b50f5cca1f889b2d1500f33dfc97
                                                                                  • Opcode Fuzzy Hash: 8172e6515329652ded644d9a0edfd0989f5716e5b8afd2ee42f4bd8873f6e240
                                                                                  • Instruction Fuzzy Hash: 31427B22B0CBC681E7218B15E460BAAB7A1FB85794F444235EABD877D9EF3DE445C700
                                                                                  Strings
                                                                                  • .debug_abbrev.debug_addr.debug_aranges.debug_cu_index.debug_info.debug_line.debug_line_str.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_str.debug_str_offsets.debug_tu_index.debug_types.debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo., xrefs: 00007FFDFF1DB72A, 00007FFDFF1DBAE9
                                                                                  • assertion failed: end >= start && end <= len, xrefs: 00007FFDFF1DF0F5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: .debug_abbrev.debug_addr.debug_aranges.debug_cu_index.debug_info.debug_line.debug_line_str.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_str.debug_str_offsets.debug_tu_index.debug_types.debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo.$assertion failed: end >= start && end <= len
                                                                                  • API String ID: 0-3902390773
                                                                                  • Opcode ID: 39d032b92a1a12b1332f768935ba21eddf85ef91a5f9e677f7b862e58e5345a2
                                                                                  • Instruction ID: 9c5d4016625696dce4424643613c216b846f20c7f257ce473b5d767fb2a91edd
                                                                                  • Opcode Fuzzy Hash: 39d032b92a1a12b1332f768935ba21eddf85ef91a5f9e677f7b862e58e5345a2
                                                                                  • Instruction Fuzzy Hash: A1C24B66F09BC588EB709F21E9547ED23A5FB45788F444636CA6D8BB99DF3CA241C300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Handle$CurrentDuplicateProcess$CloseErrorLast
                                                                                  • String ID: RUST_MIN_STACKlibrary\std\src\thread\mod.rsfailed to spawn thread$cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
                                                                                  • API String ID: 120317985-1624771165
                                                                                  • Opcode ID: a7a26373da3a9d2d51e43068dc015ad600d64288357960b00bdec085fbec96bd
                                                                                  • Instruction ID: e37cf64fef75aedf87c40203b741ff1572f291e718f7c43b47a2de038290a53c
                                                                                  • Opcode Fuzzy Hash: a7a26373da3a9d2d51e43068dc015ad600d64288357960b00bdec085fbec96bd
                                                                                  • Instruction Fuzzy Hash: 55F14B22F0868285FB219B619420BBD2760FF85788F484736EA7E967DEDF7CA545C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 1301e2872d8d33dc24c0c98feb857d5f6bebc45cb55f2481f8866833ccd60381
                                                                                  • Instruction ID: b395b3e730e56fcfadc1cead6615dec1558de7a37dbebbf87e893d89a8032d62
                                                                                  • Opcode Fuzzy Hash: 1301e2872d8d33dc24c0c98feb857d5f6bebc45cb55f2481f8866833ccd60381
                                                                                  • Instruction Fuzzy Hash: 83239A63A08BC58AE7758F25D8647E933A4FB15798F444235DBAD4BBD9DF38A281C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseEnvironmentHandleStrings
                                                                                  • String ID:
                                                                                  • API String ID: 1140201626-0
                                                                                  • Opcode ID: c030696cd6d434510976683d13ef0ed609537dd014d8e4ce769ad43e91dd36b4
                                                                                  • Instruction ID: 7fb91d34d7c6cd4059ddb62095e504447e05c4220ac929d27fe24ea870a09aac
                                                                                  • Opcode Fuzzy Hash: c030696cd6d434510976683d13ef0ed609537dd014d8e4ce769ad43e91dd36b4
                                                                                  • Instruction Fuzzy Hash: 9C126C62F08AC289EB709F2598647FA23A4FB447A8F544336DA3D877D9DF38A545C304
                                                                                  APIs
                                                                                  Strings
                                                                                  • assertion failed: filled <= self.buf.init/rustc/051478957371ee0084a7c0913941d2a8c4757bb9\library\core\src\io\borrowed_buf.rs, xrefs: 00007FFDFF1B5510
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeapmemcpymemset
                                                                                  • String ID: assertion failed: filled <= self.buf.init/rustc/051478957371ee0084a7c0913941d2a8c4757bb9\library\core\src\io\borrowed_buf.rs
                                                                                  • API String ID: 2272576838-4183801151
                                                                                  • Opcode ID: 4f054f8e4e19e29106e1af65f47cb3223a67d80ee22871d64f350aa48d78b9dd
                                                                                  • Instruction ID: 47025f6cbf730af9947328116518df1645b597a1517548001fbb7ba126fec7a2
                                                                                  • Opcode Fuzzy Hash: 4f054f8e4e19e29106e1af65f47cb3223a67d80ee22871d64f350aa48d78b9dd
                                                                                  • Instruction Fuzzy Hash: E6D16A23B0CBC181EB759B11E4647EAA3A1FB89784F444236DAAD966EDDF3CD044CB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FreeHeap$DirectorySystemmemcpy
                                                                                  • String ID: \cmd.exemaximum number of ProcThreadAttributes exceeded
                                                                                  • API String ID: 2652732990-1207947948
                                                                                  • Opcode ID: e31841b91a3d51fdaf1265d39354bef1d39cff5940ec474fdca1294ce6f4f35f
                                                                                  • Instruction ID: 1c3ba806bb2b1f8f4493dd73784849fb27e38d39d1d9c925f3ee92a86034b431
                                                                                  • Opcode Fuzzy Hash: e31841b91a3d51fdaf1265d39354bef1d39cff5940ec474fdca1294ce6f4f35f
                                                                                  • Instruction Fuzzy Hash: 20B1C323F08AC646E7759B219860BBA2394FB44B98F440335DA3E8B7DDEF7C92419340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$FreeHeap
                                                                                  • String ID: called `Result::unwrap()` on an `Err` value
                                                                                  • API String ID: 4250714341-2333694755
                                                                                  • Opcode ID: 77d6d7910d222a6fbb65514acdabdb5332d1765fe32c9b0aba826a4b2411445e
                                                                                  • Instruction ID: 3b9b9e74b255792056f9ae16fed03f4bd3f990afdcf06e54422c6f5a464e09b8
                                                                                  • Opcode Fuzzy Hash: 77d6d7910d222a6fbb65514acdabdb5332d1765fe32c9b0aba826a4b2411445e
                                                                                  • Instruction Fuzzy Hash: F0C2C46360CAC085E3328728A0257EBBBA4FBD5358F444214DBE847ADADB7ED245CF51
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: caa1644d56e6903e210761e739694b7f537ec90383b347763ba604b930fa642b
                                                                                  • Instruction ID: 9376e8b829906eee368c08e431b05af79162acebd477383420f8ce4f290838f7
                                                                                  • Opcode Fuzzy Hash: caa1644d56e6903e210761e739694b7f537ec90383b347763ba604b930fa642b
                                                                                  • Instruction Fuzzy Hash: 8551CA22E0C58281F775E7169468BFA9391EF84B44F884236D67DC66EEDF7CE4858700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 7c6bfc4ec4daf8bccd0858c64a18faaffa8ccce5faacefbc6a7cad9b7e6fc23c
                                                                                  • Instruction ID: ab9d4aa001f569bb4b2442af6521ef15bad470be26eb338df1205345eeed1ec5
                                                                                  • Opcode Fuzzy Hash: 7c6bfc4ec4daf8bccd0858c64a18faaffa8ccce5faacefbc6a7cad9b7e6fc23c
                                                                                  • Instruction Fuzzy Hash: FD51FC22E0C58281E774E716D464BFA9391EF84B44F884236D67EC66EEDF7CE4858700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 59897a74670c148dc2d60e1e09159064bf25d1b95b4df10c41992e997d9b2cb3
                                                                                  • Instruction ID: d877c746e2c220981d0b359a91af12a8f1aede985c40467965d96b0440fdfbb2
                                                                                  • Opcode Fuzzy Hash: 59897a74670c148dc2d60e1e09159064bf25d1b95b4df10c41992e997d9b2cb3
                                                                                  • Instruction Fuzzy Hash: DB51EC22E0C58281F775E7169464BFA5391EF84B44F884236D67EC66EEDF7CE4858700
                                                                                  APIs
                                                                                  Strings
                                                                                  • NTDLL.DLL, xrefs: 00007FFDFF1D7B0C
                                                                                  • assertion failed: self.is_char_boundary(new_len)/rustc/051478957371ee0084a7c0913941d2a8c4757bb9\library\alloc\src\string.rs, xrefs: 00007FFDFF1D7EE7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFormatLastMessagememset
                                                                                  • String ID: NTDLL.DLL$assertion failed: self.is_char_boundary(new_len)/rustc/051478957371ee0084a7c0913941d2a8c4757bb9\library\alloc\src\string.rs
                                                                                  • API String ID: 3213201652-1160814674
                                                                                  • Opcode ID: 7d0419ad284309cd4374accb28fe6e6ae8a505fc58f0253efb77040429660bee
                                                                                  • Instruction ID: 08c0385bacec9a21f8d5ef4bf72cc2bed18f4afae8fe1fbd81de9701315b7837
                                                                                  • Opcode Fuzzy Hash: 7d0419ad284309cd4374accb28fe6e6ae8a505fc58f0253efb77040429660bee
                                                                                  • Instruction Fuzzy Hash: 24C17C23F09B8284EB758F21D860BFC27A1AB44784F844235DA7D46BDDDF7CA6499300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$AllocFree
                                                                                  • String ID:
                                                                                  • API String ID: 1379380650-0
                                                                                  • Opcode ID: 8da30b7bec8accfa36a7b946bbcd10b5db588d1f6b4e97918d0503b075d2ce2d
                                                                                  • Instruction ID: dd23d6de2759ee31c3d9e031976dab3f59fd4777d681f713c1e43d2dd5d35423
                                                                                  • Opcode Fuzzy Hash: 8da30b7bec8accfa36a7b946bbcd10b5db588d1f6b4e97918d0503b075d2ce2d
                                                                                  • Instruction Fuzzy Hash: 4591B267F1869280EB149B269424BB953A1BF49BE4F584331DE3E877E9DF7CA042C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$Value$CryptFunction036RandomSystem
                                                                                  • String ID:
                                                                                  • API String ID: 323188907-0
                                                                                  • Opcode ID: c8b5d4a8c75f3ea6cea0be794ee2b4811a84ecc7a2c5e7d1367716b9eb3fc738
                                                                                  • Instruction ID: fa327beb36cb07808cfde47dafe0e9a293b15010a1217ec43740013c572bf12e
                                                                                  • Opcode Fuzzy Hash: c8b5d4a8c75f3ea6cea0be794ee2b4811a84ecc7a2c5e7d1367716b9eb3fc738
                                                                                  • Instruction Fuzzy Hash: 5D51C312F0C68142FB259B29A022BF953A2AF94744F484230EA7D937E9EF3CD5868700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 09a530fc936fe538a66fe1b6293619f73d5b2157e70e6bd90c254f78e998f4da
                                                                                  • Instruction ID: 077bb08dee664ea86b0f0255f91212e1561ddf78acd9c2c6a108f1955475cdfc
                                                                                  • Opcode Fuzzy Hash: 09a530fc936fe538a66fe1b6293619f73d5b2157e70e6bd90c254f78e998f4da
                                                                                  • Instruction Fuzzy Hash: 9B817E27F0868284E7748B2188B4BFD23A1EB45B48F484236DA7D96ADDDF3CA555C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 1239891234-0
                                                                                  • Opcode ID: ca7995b0427c74961f129d9e3359f77c41b9b354362c1dbd84a5901568778dac
                                                                                  • Instruction ID: b953f1e86eb7e92f87be2a5b2eb50889a8cefe25d71197417c114b0d870fb9de
                                                                                  • Opcode Fuzzy Hash: ca7995b0427c74961f129d9e3359f77c41b9b354362c1dbd84a5901568778dac
                                                                                  • Instruction Fuzzy Hash: 7A318236608F8196DB60CF25E8446AE73A4FB88794F600536EA8D93B59DF3CD545CB00
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: f5132911b1968778408cf26baa82a8a921da3f2466c0fd5ecb262d6e9b40ef5b
                                                                                  • Instruction ID: 9b04f7bbaf7f03c54d2c82adbae3b0162846e44208cba88b63826d0d87d1c64c
                                                                                  • Opcode Fuzzy Hash: f5132911b1968778408cf26baa82a8a921da3f2466c0fd5ecb262d6e9b40ef5b
                                                                                  • Instruction Fuzzy Hash: 1DC1C367F0869285F7258F2198A0BFA23A1FB54B98F445335CA7E5BBD8CF38A551C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 4250714341-0
                                                                                  • Opcode ID: 8dd02e92e88c40f19f032c7e363b032ad23560cc67eae052600dec9b49e44535
                                                                                  • Instruction ID: 2a02a4f4daff15e9287822a1ccd8f37e2187ac55723bd5a7438622c270dc508a
                                                                                  • Opcode Fuzzy Hash: 8dd02e92e88c40f19f032c7e363b032ad23560cc67eae052600dec9b49e44535
                                                                                  • Instruction Fuzzy Hash: F8A19263B08B9195E748CB25A8507BD77A4FB08B88F448639DF7D97789DF38A4A5C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: fd63e856eb015ec5f51c62fc99575096974c0a34329b33ac0cb20281510a4d34
                                                                                  • Instruction ID: 2aab7e74d112e3a624174618719577bd121e5f129f5335dd1921a6d73aceacc2
                                                                                  • Opcode Fuzzy Hash: fd63e856eb015ec5f51c62fc99575096974c0a34329b33ac0cb20281510a4d34
                                                                                  • Instruction Fuzzy Hash: D5813036F0878285E7758F21D8A4BF927A1FB44788F444236DA7D9BAC8DF38A655C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: b857b663233abc2a39a8ba098606bb2f3ce205983c38fa8aa67c63c92e1bdcfd
                                                                                  • Instruction ID: 569907f85a94aa91b5bee67ee5294eef3740e2e409f33dc349e28361e84e6738
                                                                                  • Opcode Fuzzy Hash: b857b663233abc2a39a8ba098606bb2f3ce205983c38fa8aa67c63c92e1bdcfd
                                                                                  • Instruction Fuzzy Hash: 4A819227F086C285E7748F2198B4BF927A2EB44788F454236DA3D8BACDDF38A555D340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 61e925f0bd4845e07c21514a5f9b7ee1f517024c2c21a7bcbae36c40c8faadb3
                                                                                  • Instruction ID: aa18cdc5b1d3fab8328526f6f90c2c76894865f86857d99b91d8f9ca162a8939
                                                                                  • Opcode Fuzzy Hash: 61e925f0bd4845e07c21514a5f9b7ee1f517024c2c21a7bcbae36c40c8faadb3
                                                                                  • Instruction Fuzzy Hash: 14814036F0878285E7358F21D8A4BE927A1FB44788F444236DA7D9BAC8CF38A555C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 44182e887e7d0efc228957ae0501d76aa4f7d58b228effaa487e1b8e7d8d6f09
                                                                                  • Instruction ID: fa2409231e700d8286381b74ead68a5eb0993e8609952be9fc0a305057cdea85
                                                                                  • Opcode Fuzzy Hash: 44182e887e7d0efc228957ae0501d76aa4f7d58b228effaa487e1b8e7d8d6f09
                                                                                  • Instruction Fuzzy Hash: 90815E36F08A8285E775CF21D8A4BE927A1FB44748F444236DA7D9BBD8CF38A655C340
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2094d9726481f2266feefc6f73223e4268ebd1d24990f1577a276635490febd3
                                                                                  • Instruction ID: 4e883ba50ff147fadd0c55edb60e9c5ac1ff8b210e3c19bd0b73c2f6236ba15e
                                                                                  • Opcode Fuzzy Hash: 2094d9726481f2266feefc6f73223e4268ebd1d24990f1577a276635490febd3
                                                                                  • Instruction Fuzzy Hash: 40715F26F0868285E7758B21C8A4BF927A1FB45B88F444236DA7D9BADCCF38A5558340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 495242ae50444dac973720d3591e73a16405e634a3a9191f095da54efb851e3b
                                                                                  • Instruction ID: 3999ca5d69e74759511b00186a10096e26bb8d3b9695cf5e180164cb1bb441c3
                                                                                  • Opcode Fuzzy Hash: 495242ae50444dac973720d3591e73a16405e634a3a9191f095da54efb851e3b
                                                                                  • Instruction Fuzzy Hash: 03614136F08A8285E774CB21C8647E927A1FB45B88F444236DA7D9BBDCDF38A555C340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpymemset
                                                                                  • String ID: []::{closureshim# as mut const ; dyn + unsafe extern "
                                                                                  • API String ID: 1297977491-2319383918
                                                                                  • Opcode ID: 3058a19b97277a4887a3c3b335366e21a18f31c2296a733d91f9bbf3818d986d
                                                                                  • Instruction ID: 08ab9294233f26354b0f96cbdfb3b3b5201ea0ddf56ea3bb33e2f796d39d7b48
                                                                                  • Opcode Fuzzy Hash: 3058a19b97277a4887a3c3b335366e21a18f31c2296a733d91f9bbf3818d986d
                                                                                  • Instruction Fuzzy Hash: 9B525853B1E7E141EB168B3950645B97F52EB92BA0B0AC365DEBA237C9DB3CC205C710
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: assertion failed: end >= start && end <= len
                                                                                  • API String ID: 0-206846142
                                                                                  • Opcode ID: 52bae061de8d486421e5cdd105c45893e92115456fa6b35b77be34391d5e5c99
                                                                                  • Instruction ID: f5aab7c9f19af5fd3e91d1707da24579d31ec03f3b99d365ae8f9ca4758be8a5
                                                                                  • Opcode Fuzzy Hash: 52bae061de8d486421e5cdd105c45893e92115456fa6b35b77be34391d5e5c99
                                                                                  • Instruction Fuzzy Hash: B8626B73F08AC586E7648F25D864BED27A0F708B84F548236DA6D57B88CF78E695C340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID: cmd.exe /e:ON /v:OFF /d /c "
                                                                                  • API String ID: 3298025750-533445247
                                                                                  • Opcode ID: 540c56050219d6ae0ed16984cde3de223801cc26468ce916b5c854f92d5a89b9
                                                                                  • Instruction ID: 758ecc05084032f8238f1fd7304ea536589894bc52aececb9dfa9dfa781c3578
                                                                                  • Opcode Fuzzy Hash: 540c56050219d6ae0ed16984cde3de223801cc26468ce916b5c854f92d5a89b9
                                                                                  • Instruction Fuzzy Hash: 1242F363F185A684FB258B65D820ABE2B61BB94798F444735CE3E22BDDDF3CA541D300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                  • String ID:
                                                                                  • API String ID: 2933794660-0
                                                                                  • Opcode ID: e85c398f83cda05d48f02c07b33ae7a056136c201d5e620368e1909d556533f3
                                                                                  • Instruction ID: de5ed3ad842cc59879f76efc7eefc37dc4418c118e198a0a5992dedba8bc42f6
                                                                                  • Opcode Fuzzy Hash: e85c398f83cda05d48f02c07b33ae7a056136c201d5e620368e1909d556533f3
                                                                                  • Instruction Fuzzy Hash: 3C112A26B14F018AEB00CF60E8552B833A4FB59758F541E31EAAE867A4DF7CD5558380
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Authenti$GenuineI$HygonGen
                                                                                  • API String ID: 0-696657513
                                                                                  • Opcode ID: 553b47b91acfb713ec3f34dba4622d48770d4086a30021621cc9d0c063c31db3
                                                                                  • Instruction ID: 2a7846f3279d3e1aff9b2b8b8dd4256c61f3eda67e189caeb203e3e28b1cb844
                                                                                  • Opcode Fuzzy Hash: 553b47b91acfb713ec3f34dba4622d48770d4086a30021621cc9d0c063c31db3
                                                                                  • Instruction Fuzzy Hash: 4B9146A3B2595102FB5C8595AC36BFA4982B3987C8F08A13DEE6FD7BC5DC7CC9118200
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: Authenti$GenuineI$HygonGen
                                                                                  • API String ID: 0-696657513
                                                                                  • Opcode ID: 3cf1cd8363fab52de2c43edf8c9fc48a8d980115ddd4384e0326ab3b8f27850b
                                                                                  • Instruction ID: cf11e8b37b230b4d62cfcf067573b1398043e50b3519fd078777fa4efeefea0f
                                                                                  • Opcode Fuzzy Hash: 3cf1cd8363fab52de2c43edf8c9fc48a8d980115ddd4384e0326ab3b8f27850b
                                                                                  • Instruction Fuzzy Hash: 3B915AA3B2595106FB5C85A5AC36BFA0992B3587C8F08A13DEE6FD7BC4DC7CC9118200
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memset
                                                                                  • String ID: punycode{-0
                                                                                  • API String ID: 2221118986-3751456247
                                                                                  • Opcode ID: c5ed4f09c13a652098ff349d5c13cca4fae09cf5ef5f41673a26ee16a7983347
                                                                                  • Instruction ID: 8f8d234ec287ed036c2d5c9a4d39979af9d6c757c462f8a4e4ab7d896f2269fa
                                                                                  • Opcode Fuzzy Hash: c5ed4f09c13a652098ff349d5c13cca4fae09cf5ef5f41673a26ee16a7983347
                                                                                  • Instruction Fuzzy Hash: D2F1D163F1868586EB658B65D464BF82793BB49B98F008232DE3D07BC8DF7DE5458300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeapmemcpy
                                                                                  • String ID:
                                                                                  • API String ID: 673829100-0
                                                                                  • Opcode ID: 948636d1f188f2fe7ce2279cb59ec3b41c1c3eb05543006880b7322ce74c44b5
                                                                                  • Instruction ID: 7ffa2b511c70b4043eac5315cf50c2cc5e9f82854c13ccb85ee9fc6204cae02e
                                                                                  • Opcode Fuzzy Hash: 948636d1f188f2fe7ce2279cb59ec3b41c1c3eb05543006880b7322ce74c44b5
                                                                                  • Instruction Fuzzy Hash: 2361FF53F09B9189FB108A6584617FE2B61EB147A8F048A35DE3E4B7CACF3C9184D354
                                                                                  Strings
                                                                                  • .debug_abbrev.debug_addr.debug_aranges.debug_cu_index.debug_info.debug_line.debug_line_str.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_str.debug_str_offsets.debug_tu_index.debug_types.debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo., xrefs: 00007FFDFF1DBAE9
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: .debug_abbrev.debug_addr.debug_aranges.debug_cu_index.debug_info.debug_line.debug_line_str.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_str.debug_str_offsets.debug_tu_index.debug_types.debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo.
                                                                                  • API String ID: 0-210007371
                                                                                  • Opcode ID: 9846ced626f50b3349dd3ae563d72c799e51d8242283a9c8810a824c5f302a78
                                                                                  • Instruction ID: 3d8032ac572e89fe3dc41a4349342064b53cb2fbd411b96a6b35972f1ec4f651
                                                                                  • Opcode Fuzzy Hash: 9846ced626f50b3349dd3ae563d72c799e51d8242283a9c8810a824c5f302a78
                                                                                  • Instruction Fuzzy Hash: EC62CF62F08AD585EB21CF259514BFD2760FB15B98F458331CE7A276DAEF38A185C300
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: assertion failed: offset != 0 && offset <= len
                                                                                  • API String ID: 0-3868694986
                                                                                  • Opcode ID: 897817f8e4e227d16181da55621cfbacf12c0909c2f848d25216e07fdd527998
                                                                                  • Instruction ID: fa9974b5a06d0305a38f1ec9a6e139683f6740ff6b8778f85f174a0efa47ecb3
                                                                                  • Opcode Fuzzy Hash: 897817f8e4e227d16181da55621cfbacf12c0909c2f848d25216e07fdd527998
                                                                                  • Instruction Fuzzy Hash: BB825873A08BC589D770CF25D854BE937A4F718B98F548226DA6D4BB98DF38E691C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: AcquireExclusiveLock
                                                                                  • String ID:
                                                                                  • API String ID: 4021432409-0
                                                                                  • Opcode ID: 52404d676935fd51f2e6cd92444088826ad68504fdd2481b9765e1fc6d428024
                                                                                  • Instruction ID: 1d0d23a3a324490c67ccd7c6ea01da8893a5658d4b08fe1bc1c4c7b6017a1621
                                                                                  • Opcode Fuzzy Hash: 52404d676935fd51f2e6cd92444088826ad68504fdd2481b9765e1fc6d428024
                                                                                  • Instruction Fuzzy Hash: 12E125B3B14B8652EB188B28D4517F823A1EB44B90F644631DE6E977E8DF3CE592D340
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: assertion failed: offset != 0 && offset <= len
                                                                                  • API String ID: 0-3868694986
                                                                                  • Opcode ID: 2582dd782aa42888d8c20b2b0d8c375f1318bbd7082a1813ee6e15c984e30bfe
                                                                                  • Instruction ID: 739f0979ccafaef25b3d076b09c01fc4a47e6244444ea1cd69be8cd924fa8cc9
                                                                                  • Opcode Fuzzy Hash: 2582dd782aa42888d8c20b2b0d8c375f1318bbd7082a1813ee6e15c984e30bfe
                                                                                  • Instruction Fuzzy Hash: 7E02E362F08AD582FB258B55D5259F86321AB65BC8F449731CF7E137D9EFACA281C300
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: called `Result::unwrap()` on an `Err` value
                                                                                  • API String ID: 0-2333694755
                                                                                  • Opcode ID: 9873a4fe1d6996a01699aea28591c59a8a23eb888f81d31cb769a44d9d398626
                                                                                  • Instruction ID: 8be81f91242c4f39ded51d49ddf6ec3c2b212af2d9dbed6ce6894dbcac61c2b1
                                                                                  • Opcode Fuzzy Hash: 9873a4fe1d6996a01699aea28591c59a8a23eb888f81d31cb769a44d9d398626
                                                                                  • Instruction Fuzzy Hash: FBF10663E18F8552E7124B3890116BAB758BFEB784F41D327EEF532A84EF68D551C200
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcmp
                                                                                  • String ID:
                                                                                  • API String ID: 1475443563-0
                                                                                  • Opcode ID: bfca64ee5dd66cb40102bfd37af9eecec96e75ccafb59875afc1c03c10ce4ad7
                                                                                  • Instruction ID: 943f7817e94f21d8e9e85394fb4d258a1a10158915727af940eb15ca86f81f13
                                                                                  • Opcode Fuzzy Hash: bfca64ee5dd66cb40102bfd37af9eecec96e75ccafb59875afc1c03c10ce4ad7
                                                                                  • Instruction Fuzzy Hash: 4CC1EF23F286A5C2FB55CA259824EBA6B55B715B90F808731DE3E47BC8DF3CE6519300
                                                                                  Strings
                                                                                  • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs, xrefs: 00007FFDFF1BDD66, 00007FFDFF1BDFA1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs
                                                                                  • API String ID: 0-4235933832
                                                                                  • Opcode ID: dafc0b0b2fa81a23a36a368731a6854d0ed45247f493ba2807bdc1613f2a39f3
                                                                                  • Instruction ID: b1dcf429d55c276a594fc8670a7ea1f847d5406610d45dc6f35da23e9f7a4e24
                                                                                  • Opcode Fuzzy Hash: dafc0b0b2fa81a23a36a368731a6854d0ed45247f493ba2807bdc1613f2a39f3
                                                                                  • Instruction Fuzzy Hash: 1FD12573B1C69182EB288B19E010BA97B61EB95B94F905336DBBE53BD8DB3CD541C700
                                                                                  Strings
                                                                                  • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs, xrefs: 00007FFDFF1D4F39, 00007FFDFF1D5045, 00007FFDFF1D50E0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs
                                                                                  • API String ID: 0-4235933832
                                                                                  • Opcode ID: 7b120234c183ec421d9c761d4ad554baac27753d8922162ea11eab789e31fe8f
                                                                                  • Instruction ID: de2adfde9b55a8804f3adc9ce049a181a31c1b57fbad34dc75d28585704c4aa4
                                                                                  • Opcode Fuzzy Hash: 7b120234c183ec421d9c761d4ad554baac27753d8922162ea11eab789e31fe8f
                                                                                  • Instruction Fuzzy Hash: BEA12763F1879186E7208B28D010BBC2B70EB65BA4F805332DBBE57BD9DB2D9605C350
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 855c6a3017c68afa2fb5e017c893873fa85ac130e394efc422fbe9ffc4808bcd
                                                                                  • Instruction ID: 3dc0bec38355340890ca19193b91719c759d3c8b17f0003a03240e0333900b23
                                                                                  • Opcode Fuzzy Hash: 855c6a3017c68afa2fb5e017c893873fa85ac130e394efc422fbe9ffc4808bcd
                                                                                  • Instruction Fuzzy Hash: BB81B463F18A9585FB598B60C424AF967A2BB04F94F954732DE7D03BC8CF78E586C201
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 0123456789abcdef
                                                                                  • API String ID: 0-1757737011
                                                                                  • Opcode ID: 2ae8c82d58e40611926e99e3b991d634f9eb78cd0a42da415c386cfafe3228bc
                                                                                  • Instruction ID: 1fe8b7c32e8bff590818aea63f01a9e941e1dcd1325bab69aa8a83dbb471f83a
                                                                                  • Opcode Fuzzy Hash: 2ae8c82d58e40611926e99e3b991d634f9eb78cd0a42da415c386cfafe3228bc
                                                                                  • Instruction Fuzzy Hash: E3613493F186D149F3188A68C9B06BD2BE1A759354F048A39DABB177DECB3CD116C310
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 0123456789abcdef
                                                                                  • API String ID: 0-1757737011
                                                                                  • Opcode ID: 41fe9f70e1f881c9ff2dcb0a197f8a38f7cab797b2b7be2c4445955718cc02c6
                                                                                  • Instruction ID: 0f515ff1cd75a34ac2167f75ef9af8c0d68c26c5194f88877e9ee226f254813c
                                                                                  • Opcode Fuzzy Hash: 41fe9f70e1f881c9ff2dcb0a197f8a38f7cab797b2b7be2c4445955718cc02c6
                                                                                  • Instruction Fuzzy Hash: AA512A13F29AE0DAE321C739841066C3F629B96748F48C1A5CBA84BFDECA6D9105D711
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: cb1e13c95d6cd2d8f2921b9e83b013f5092bfbbb21e7cc2c2ef6f15e67356004
                                                                                  • Instruction ID: 14f3182065c49de2a93186512f1b3b3912b0ef7478e5bc00e90811baaf8fecc3
                                                                                  • Opcode Fuzzy Hash: cb1e13c95d6cd2d8f2921b9e83b013f5092bfbbb21e7cc2c2ef6f15e67356004
                                                                                  • Instruction Fuzzy Hash: 33A2A4776286448F9358DF25A44405BBBA2F798248F869519FB83D3688EB7CEE01CF44
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 44b6302aede2dd13ff882eb9c1be377701c721944b08f923b62188f15a2c4496
                                                                                  • Instruction ID: 65cbcd93d882846703bb96a715466eae9591aa425655463deb6b314685dd9ea1
                                                                                  • Opcode Fuzzy Hash: 44b6302aede2dd13ff882eb9c1be377701c721944b08f923b62188f15a2c4496
                                                                                  • Instruction Fuzzy Hash: 2D324C770B46004BD31FCE2ED99158AB292F784AA2709F238FE57C7B54E67CEE158604
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 61459ae49209b8aa77289af15049f597d175e6278f781adac225be77cbf64d55
                                                                                  • Instruction ID: 0c52bceb1823adec7cd0d91558d994e46f2c70fe98c5e9a1fc769fadec35aeb6
                                                                                  • Opcode Fuzzy Hash: 61459ae49209b8aa77289af15049f597d175e6278f781adac225be77cbf64d55
                                                                                  • Instruction Fuzzy Hash: 713269B6F90A65A6DB048F16E94138D7B64F319BC9F998526DF8C83B54EB38E471C300
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 621dddc85820b6b9669c90c1ac098aea83f3a6e1c9f60fd3a8c13654824637f4
                                                                                  • Instruction ID: 9c8db6dfbaab611f7fb7ef8f296d3a6f92b08b2798452e37c3364e5d0807847b
                                                                                  • Opcode Fuzzy Hash: 621dddc85820b6b9669c90c1ac098aea83f3a6e1c9f60fd3a8c13654824637f4
                                                                                  • Instruction Fuzzy Hash: F422A316D08FA962E6234739D5031B66710EFB7B88F10E707FED8B1592EF75A9C99200
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c0d8db660dafa7654a1594341d234b86c4b903bc484b0369b76a9fc2ccc5b30d
                                                                                  • Instruction ID: 58ec9bc2b3b333e283f34ffd1ee01bf8e9ac60bde8c14845539be5bc599ef1b5
                                                                                  • Opcode Fuzzy Hash: c0d8db660dafa7654a1594341d234b86c4b903bc484b0369b76a9fc2ccc5b30d
                                                                                  • Instruction Fuzzy Hash: C722C822D0CFCA61E6234B39D0065B56720BFB7294B10D32BFFC971572EB66B681A711
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: bdc7f1e8d38be1dce1e658158e93024426cecbeb35098d748da9d2820df1e0ca
                                                                                  • Instruction ID: 31291abb577d8ccb11533cefdda8203a4c07d61eadd989bbdbe71ba33ee7c58b
                                                                                  • Opcode Fuzzy Hash: bdc7f1e8d38be1dce1e658158e93024426cecbeb35098d748da9d2820df1e0ca
                                                                                  • Instruction Fuzzy Hash: 3ED18D9BC28FD945F313633D54436A2E610AFFB5D9A20E303FDF475A52EB50B2956220
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2f7380352a85895adf8fab7e696124b6531631a79e70cbfd8537b4f909af3c6f
                                                                                  • Instruction ID: e641ec7f39a950a3964d010eed4fa11eaf95dda1523f5c4e622228497aedd7a7
                                                                                  • Opcode Fuzzy Hash: 2f7380352a85895adf8fab7e696124b6531631a79e70cbfd8537b4f909af3c6f
                                                                                  • Instruction Fuzzy Hash: 76E18966E29FC556F323573860032B5E718AFFB2C9E40E31AFDD4B0D23EB6482529644
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4b03ffa947e19b5bdbebc1974038c104e1affe12c7df01e0c7fa0e18cd5219a8
                                                                                  • Instruction ID: ae64361679b4363e6030730e2a9256823591e60839c87218c34554e5f3e4ff46
                                                                                  • Opcode Fuzzy Hash: 4b03ffa947e19b5bdbebc1974038c104e1affe12c7df01e0c7fa0e18cd5219a8
                                                                                  • Instruction Fuzzy Hash: 32B12652F04E854AE7578B39A805365A246EBE87D4F24C733DD8FA2BA5DF3CD8578100
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: daf0e0dfe6573bd52038698bb5992c6f245c2f2e0251e08476892236e289c43a
                                                                                  • Instruction ID: 5ca2f3bdc914dc6ce4e7f913c579d51994c06c4bafa4644b5460f25bbf793962
                                                                                  • Opcode Fuzzy Hash: daf0e0dfe6573bd52038698bb5992c6f245c2f2e0251e08476892236e289c43a
                                                                                  • Instruction Fuzzy Hash: 31F15D16D1CFC593E6254B3996003BA6720FFB9348F11E715EFD922A66DF28F2E49210
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ea1dc13081ad5558e55ea4c603ee039ea872212a762f14636ae902722c0eedc8
                                                                                  • Instruction ID: 9b9ea38b46c44b1c8380ad96c52f7329cb3bd00c88358c297e72c58fbdd0bb81
                                                                                  • Opcode Fuzzy Hash: ea1dc13081ad5558e55ea4c603ee039ea872212a762f14636ae902722c0eedc8
                                                                                  • Instruction Fuzzy Hash: A9B1FF23F0979645FB648F659660AFD6BB2AB41788F844232DA7D066DDDF2CA186C300
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a51e10f5c83b60a1e670c582175ac48264940eadba18cf56fed112fa514e8ec7
                                                                                  • Instruction ID: 220027fe1aacf12e8d6dcbb4847947433f94088a162a0bd04752d108dbd95d9c
                                                                                  • Opcode Fuzzy Hash: a51e10f5c83b60a1e670c582175ac48264940eadba18cf56fed112fa514e8ec7
                                                                                  • Instruction Fuzzy Hash: 58918B93F29BA642E72347396901FB597005F937E4E84D322FE7D31BE8D729A6438200
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a55bedb8bff48838494dfd3dcb2e8a61b4416bba5e6cf71af93d87c01b1bc494
                                                                                  • Instruction ID: e3c22edc7439e4d9ae2e73188a706e3c529552e3637b070e2a111c080dffa9ad
                                                                                  • Opcode Fuzzy Hash: a55bedb8bff48838494dfd3dcb2e8a61b4416bba5e6cf71af93d87c01b1bc494
                                                                                  • Instruction Fuzzy Hash: 28A10463F1879681F7208B249910BADBFA0F701B89F255222CE79277C4EBB5E952D340
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 945e785c8056ed0a905e30907c44b417fc330ac3cfabb06acc6c313a67cced6d
                                                                                  • Instruction ID: cfb10edf787bfb14bdc32624c474d21e12f9c1edf2af3df32905339e55246978
                                                                                  • Opcode Fuzzy Hash: 945e785c8056ed0a905e30907c44b417fc330ac3cfabb06acc6c313a67cced6d
                                                                                  • Instruction Fuzzy Hash: 008102B3F006A187D6149F06B840A99AB64F795BE4F485325EFB917FE9DB38E5018B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 943d49a28179acb6b17e54598dc5f3c7297a0172a48014cdfa5047513f315c58
                                                                                  • Instruction ID: 42858ce704e87d82e7337dbb5c1b4504bf1351e8323591d66745dc42e29d66d4
                                                                                  • Opcode Fuzzy Hash: 943d49a28179acb6b17e54598dc5f3c7297a0172a48014cdfa5047513f315c58
                                                                                  • Instruction Fuzzy Hash: A86107E6F50F9883DB548B9EA402B886760F719FC5F55511AEE2C67301EA3DE9A3C340
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: bf33cdc69c3299d472383f200f441af98b7fe15a7d2d0e9731f929016fc6b732
                                                                                  • Instruction ID: aa39d43f46a004ae0d0f52f5945e408190e2ece373673d1c148930ec10ed9bd4
                                                                                  • Opcode Fuzzy Hash: bf33cdc69c3299d472383f200f441af98b7fe15a7d2d0e9731f929016fc6b732
                                                                                  • Instruction Fuzzy Hash: DD514862BA816272F6258D1185182BD5E51B714BE0F689435CD6FB37D8CEBCFC439306
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0d6523ba8e4505282c919c1d35e15f27044c6a44fab965eb172d8ea98f7d2704
                                                                                  • Instruction ID: da7cff74ec7fdd3f23c44029e7e5cb4f6e3f0f44d058c844f84f206ffc1f1dbc
                                                                                  • Opcode Fuzzy Hash: 0d6523ba8e4505282c919c1d35e15f27044c6a44fab965eb172d8ea98f7d2704
                                                                                  • Instruction Fuzzy Hash: BA51BAF3B62B9485D7918FA9E444BC837A8F329F95F215115EB4C6B351DB328A62C301
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fa6adafdb106660c0d321112be448ade1fbd3db098cd3a8aeba4c6045d9caf54
                                                                                  • Instruction ID: ce0946072f44b6fcabb2d6275f7f165c60306e00a52ddb3bf64de7b37030062e
                                                                                  • Opcode Fuzzy Hash: fa6adafdb106660c0d321112be448ade1fbd3db098cd3a8aeba4c6045d9caf54
                                                                                  • Instruction Fuzzy Hash: 2E51C269C1DF5552F713273A5803265D600EFE3368F60D722EDF936BE8EB19B684A210
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: b4330e56959ee462ed1205fda9ac7683176cd5f26063ffa8ef68a2c8a5f0f074
                                                                                  • Instruction ID: bbcdfeaba6f303869daa57e48cb6fd07a7524944c91fc44f1a9e12cee9065b37
                                                                                  • Opcode Fuzzy Hash: b4330e56959ee462ed1205fda9ac7683176cd5f26063ffa8ef68a2c8a5f0f074
                                                                                  • Instruction Fuzzy Hash: 4841CF63F4476582FB54CB51A674E7D6765E790BD0F01A222CD2A23BC8CE29D996C380
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fd4a65e5fc425792a793ac68988cba2243953124910f05dff7bce0a5145c7a1f
                                                                                  • Instruction ID: 0170317dbb6d31d77014a7bc07e0f4fbd25c586ce79d6100a1036fe20b7352e5
                                                                                  • Opcode Fuzzy Hash: fd4a65e5fc425792a793ac68988cba2243953124910f05dff7bce0a5145c7a1f
                                                                                  • Instruction Fuzzy Hash: C641E5DAC29FB945E723A33A6D43286D9009EF7589550E307FCB439E65F701B4D13224
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f591b5af9a1ef7e941aac8fc2b0d6d4d4530c66ee7874c897e3acd264b08f5f5
                                                                                  • Instruction ID: f2a19fb3f685d9e3f09aca433a685dfc8dc3ea505ca07501c78200f6c5e3079f
                                                                                  • Opcode Fuzzy Hash: f591b5af9a1ef7e941aac8fc2b0d6d4d4530c66ee7874c897e3acd264b08f5f5
                                                                                  • Instruction Fuzzy Hash: 9A4162A9D19F9A12FB136739680332392009FF3658E51D71BFDF439ED9D706B1006214
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 68618b32ec539653f6afb2048c4418c23db15ed9a1a153799c11dc67db87b1ac
                                                                                  • Instruction ID: 617d66eb562c02f008d5b6cea3c29dbaf07604a0f231146326ad6ef7ccede570
                                                                                  • Opcode Fuzzy Hash: 68618b32ec539653f6afb2048c4418c23db15ed9a1a153799c11dc67db87b1ac
                                                                                  • Instruction Fuzzy Hash: F441252AE2CFD761F30383392407632E2045FF7185A91EB2FFCE4B1962EB6553416218
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ccaa971847919f2726b5e6a0ac4f02ce63b2c962ad82b6cb0fc390d8f1c18703
                                                                                  • Instruction ID: 915cabef30cfc65095b3990ed185d41fb34cf74b0cb12af9a95adfbf869fee5b
                                                                                  • Opcode Fuzzy Hash: ccaa971847919f2726b5e6a0ac4f02ce63b2c962ad82b6cb0fc390d8f1c18703
                                                                                  • Instruction Fuzzy Hash: 10412FA9D1EFA912EB13673A680332796109FF3648E42D71BFDB439EA9D706B5006214
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: eb9993b2b2d933a5bfc7a2219cf6c256d202eb4f3db8034e8362e2e7bca22a43
                                                                                  • Instruction ID: d30f3891446c094dc1ff7a90cedb1092b0d84fcd9b05a14e95529962a32dd353
                                                                                  • Opcode Fuzzy Hash: eb9993b2b2d933a5bfc7a2219cf6c256d202eb4f3db8034e8362e2e7bca22a43
                                                                                  • Instruction Fuzzy Hash: 0B31B5E6F08B8042FE40E7A8747737B9321A7853C0F40E236DE999A64ADF2ED1428644
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e17be1081393184b343b8fa1a71279b3cb8314d435527c2839a7d2183fc68784
                                                                                  • Instruction ID: 7e0572205aef93a9364a57010d27be6479321c09c95d5b000d5ab5739b48ec6c
                                                                                  • Opcode Fuzzy Hash: e17be1081393184b343b8fa1a71279b3cb8314d435527c2839a7d2183fc68784
                                                                                  • Instruction Fuzzy Hash: 9231282AC2DFD7A1F713873E6407525D614AFF3285A90E71FF9A835822FB519741A304
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 4f59619f2fc84a76977a484b6fbf48e2977ca4adec30f5e107804e2571b71ec7
                                                                                  • Instruction ID: 2849c916de16e4722bdc47ac1a5828c5119798167068cfc2706935aa28c6ca30
                                                                                  • Opcode Fuzzy Hash: 4f59619f2fc84a76977a484b6fbf48e2977ca4adec30f5e107804e2571b71ec7
                                                                                  • Instruction Fuzzy Hash: 19316D19C1DF43A1F6036738A0222B99300AF91366FA0D332FD9DB66DEEF0C3541A961
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d721332e5020621eb378f129f93154b2c7573ae697d87e421f431961e9557234
                                                                                  • Instruction ID: 8a70c4059bb8f577f2b7a35cb47b8b7280c8210beed025a9f2b3790727afe8ef
                                                                                  • Opcode Fuzzy Hash: d721332e5020621eb378f129f93154b2c7573ae697d87e421f431961e9557234
                                                                                  • Instruction Fuzzy Hash: 7121552AC2DFD761F713833E2507516C600AFF3285AA0E72FFDA834D62EB1157806218
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 67873bb694e39b0da57e3b684ed25785b9ac1d435853c2fd3d9a8a96bf8bc1a6
                                                                                  • Instruction ID: f39935334cf07e1555a60577868f0a27429845e72acee24f7d9026c04abcd13b
                                                                                  • Opcode Fuzzy Hash: 67873bb694e39b0da57e3b684ed25785b9ac1d435853c2fd3d9a8a96bf8bc1a6
                                                                                  • Instruction Fuzzy Hash: 3B0146EAC25FBA42E723A3396943282D910AEF3588120E307FDF834E15F301B5E07220
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorFreeHeapLast$EnvironmentVariable
                                                                                  • String ID: at :$<unknown>
                                                                                  • API String ID: 3632352037-3657909574
                                                                                  • Opcode ID: 04428a9d78c532e1f0cf110db2d458ed5a58efb03c349683df5bc48a5f3d9d9c
                                                                                  • Instruction ID: ef522784541848859e8e0d546a0ee729225381c55b3fce6a6bbaec9df2f6cdf6
                                                                                  • Opcode Fuzzy Hash: 04428a9d78c532e1f0cf110db2d458ed5a58efb03c349683df5bc48a5f3d9d9c
                                                                                  • Instruction Fuzzy Hash: 0F423872A04B8189E721CF64E8647EC37A0FB4478CF544225DEAC9BB99DF79D689C340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionRaiseUnwindabort
                                                                                  • String ID: CCG $CCG $CCG!$CCG!$CCG"
                                                                                  • API String ID: 4140830120-3297834124
                                                                                  • Opcode ID: 5bc34f7d40157eba8501d59ce3945ad9d64287e2136d5953a0acd2ec2cd73646
                                                                                  • Instruction ID: a0f521e5d8548aebb2f75295e680b3d8aaa9a0ed5030224cca77a8bcc0dded2b
                                                                                  • Opcode Fuzzy Hash: 5bc34f7d40157eba8501d59ce3945ad9d64287e2136d5953a0acd2ec2cd73646
                                                                                  • Instruction Fuzzy Hash: E651B123A18B8182E7608B15E454BAD7360F799B88F149336EE9E937A8DF3CD5C1C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$ErrorLast
                                                                                  • String ID:
                                                                                  • API String ID: 2506987500-0
                                                                                  • Opcode ID: 679ebdd6012efd4f2184cab96f22550e9729fe9a57b12a49abf0e9019d89b45b
                                                                                  • Instruction ID: 910435965ec584f49e3cb3f4ab14641375e20b6b26a69ebb16e24f66b35b9d3d
                                                                                  • Opcode Fuzzy Hash: 679ebdd6012efd4f2184cab96f22550e9729fe9a57b12a49abf0e9019d89b45b
                                                                                  • Instruction Fuzzy Hash: 0341B020F0C24766FA58A3319A5297D25425F447B0F741B35EDBEE67DEDE2EB4038600
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFileHandleSleep$ErrorLastReadWritememset
                                                                                  • String ID:
                                                                                  • API String ID: 78123985-0
                                                                                  • Opcode ID: d058cd0a179d3d6460f1a9839e8550a17ca57885168eb3e9a344e1bb7442838e
                                                                                  • Instruction ID: 0640073abb9024965d30e722e91ce4fd53b0ac10646957428622638a63b8f10e
                                                                                  • Opcode Fuzzy Hash: d058cd0a179d3d6460f1a9839e8550a17ca57885168eb3e9a344e1bb7442838e
                                                                                  • Instruction Fuzzy Hash: 05615B23B096C285E731DB259861BF927A0EF44799F084235EE7DCBBDDCE7892859240
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeLibraryProc
                                                                                  • String ID: MZx$api-ms-$ext-ms-
                                                                                  • API String ID: 3013587201-2431898299
                                                                                  • Opcode ID: 9012bdd7212366aca56ebc41b45c61d2762b06a06ef125b279c2271da8952638
                                                                                  • Instruction ID: 9a3547dbea3d1765f4d3bcf60b9223f82d89c8deab8e13413f56391ef1964ce5
                                                                                  • Opcode Fuzzy Hash: 9012bdd7212366aca56ebc41b45c61d2762b06a06ef125b279c2271da8952638
                                                                                  • Instruction Fuzzy Hash: 57413522B09A0261FB19DB169A04A752B90BF44BE0FE84935DD1DE7B88EF3DE442C310
                                                                                  APIs
                                                                                  Strings
                                                                                  • assertion failed: match track_edge_idx { LeftOrRight::Left(idx) => idx <= old_left_len, LeftOrRight::Right(idx) => idx <= right_len,}, xrefs: 00007FFDFF1FD5AB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy
                                                                                  • String ID: assertion failed: match track_edge_idx { LeftOrRight::Left(idx) => idx <= old_left_len, LeftOrRight::Right(idx) => idx <= right_len,}
                                                                                  • API String ID: 3510742995-2944714439
                                                                                  • Opcode ID: 89f531cca56aa7116139f907f0da929c2f2cd043399ca1d2ec962858fae046c4
                                                                                  • Instruction ID: c36ca5263cf8036e0413559aa63ac0c411c3e492645be335acb36e8cf01360f3
                                                                                  • Opcode Fuzzy Hash: 89f531cca56aa7116139f907f0da929c2f2cd043399ca1d2ec962858fae046c4
                                                                                  • Instruction Fuzzy Hash: 31329C32A04BC585E721CF24E8507E933A8FB58788F548326DEAD5BB99EF759295C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 8561a6216a9ae4a2ec0d22806185ea6deb2f7180165c8590b54d4cece6da2468
                                                                                  • Instruction ID: 0a0cae084323baf62e32b97706ee232cd1e65f633a65d5a77b8f58dc9405aa7d
                                                                                  • Opcode Fuzzy Hash: 8561a6216a9ae4a2ec0d22806185ea6deb2f7180165c8590b54d4cece6da2468
                                                                                  • Instruction Fuzzy Hash: CE41CA22E0C58281E775E716D464BFA9391EF84B84F884236E67DC66EEDF3CE4858740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 3c87eadd060c749213746bdf93b8bd6a02bbe638b6040960788d01f8d44c691e
                                                                                  • Instruction ID: 00bcc727a0907e7ece687e2d3bbb9f21b4e41c4efa5ce5cebcd995f2c8dba0d9
                                                                                  • Opcode Fuzzy Hash: 3c87eadd060c749213746bdf93b8bd6a02bbe638b6040960788d01f8d44c691e
                                                                                  • Instruction Fuzzy Hash: 4341CA22E0C98281E774E716D464BFA5391EF84B84F884236E67DC66EEDF3DE4858700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 57e27cc4d0819dc5799461deb8f50d1f69b201bc8b2409ed42f05f1be8cba751
                                                                                  • Instruction ID: acb8f048fa6429d51d61f567c6721e00b42baf704f1a9332b021aade9f3f8c99
                                                                                  • Opcode Fuzzy Hash: 57e27cc4d0819dc5799461deb8f50d1f69b201bc8b2409ed42f05f1be8cba751
                                                                                  • Instruction Fuzzy Hash: 1641BC22E0C58281E774E716D465BFA5391EF84784F884236D67DC66EEDF3CE4858740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 261a229b8e1394eda717e18d3c2c803599d58609ec2cc152b0a46f7ad4648e9c
                                                                                  • Instruction ID: 154f66197a925fd93cf7d441e1ae60780541d75cf225f9f704c5a20e2628af91
                                                                                  • Opcode Fuzzy Hash: 261a229b8e1394eda717e18d3c2c803599d58609ec2cc152b0a46f7ad4648e9c
                                                                                  • Instruction Fuzzy Hash: 4441EC22F0C58281E724E716D464BFA5391EF84B84F884236E67EC66EEDF3DE4858700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$FreeHeap
                                                                                  • String ID: assertion failed: new_left_len <= CAPACITY
                                                                                  • API String ID: 4250714341-3316943531
                                                                                  • Opcode ID: 0815340ef1731f07483ec4c874e919c53205e22530a9fb0d17b850f78d7d7749
                                                                                  • Instruction ID: 52187084fc6478bf8ae9eefdb500ddfc5d2e30843fa02f5ba0a4f9108b9bb355
                                                                                  • Opcode Fuzzy Hash: 0815340ef1731f07483ec4c874e919c53205e22530a9fb0d17b850f78d7d7749
                                                                                  • Instruction Fuzzy Hash: AFB17022A14B8492DB158F18E4507EA77B8FB58B88F499332DF5D937A5DF38E265C300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy
                                                                                  • String ID: assertion failed: old_left_len >= count$assertion failed: old_right_len + count <= CAPACITY
                                                                                  • API String ID: 3510742995-1889375005
                                                                                  • Opcode ID: 5f28f55d4d53a3fb4c4159c48140d0e5593e219bc1ba93657ad7eb557a64445d
                                                                                  • Instruction ID: 8842cae4ac226b42eafee060bb5072c1cfccbfb1fd2b1709e520d6942225970f
                                                                                  • Opcode Fuzzy Hash: 5f28f55d4d53a3fb4c4159c48140d0e5593e219bc1ba93657ad7eb557a64445d
                                                                                  • Instruction Fuzzy Hash: 75A11663E04B8582EB419F18E8117F96368FF54788F489322DF6D536A5EF39E286C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 4250714341-0
                                                                                  • Opcode ID: f595f81670e5eafe5a398fea8c5e546e874d365134dae0907874cb4d3c3da873
                                                                                  • Instruction ID: 7412ca9cadc72833afb07bb9431e7f900ce370a47974830df5805b5a56111784
                                                                                  • Opcode Fuzzy Hash: f595f81670e5eafe5a398fea8c5e546e874d365134dae0907874cb4d3c3da873
                                                                                  • Instruction Fuzzy Hash: 41F1B162A08BC495E7019F29E8117E963B4FF58B88F449235DF6C537A9EF38E295C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 10b1a13ee8a33fcd3c8a22acce54fb6c156ea7d84399997b180ef384dd64cf6f
                                                                                  • Instruction ID: 42eb55a6e6bfff4f145278d59accc1b517bedd116ae8db263ebd9c8e66076b97
                                                                                  • Opcode Fuzzy Hash: 10b1a13ee8a33fcd3c8a22acce54fb6c156ea7d84399997b180ef384dd64cf6f
                                                                                  • Instruction Fuzzy Hash: A731DB12F0C98281E724E716D475BBA5351EF84784F884236E67EC66EEDF3CE4458700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 8dbbc4ac059df1bec0b843cea38818466f16e1ede087bad11e8082fa2c75cef3
                                                                                  • Instruction ID: 56e7d52adbcfcabe932295e4e8bab6a93eb9e10dcc7d4bb820f707c48c1574bf
                                                                                  • Opcode Fuzzy Hash: 8dbbc4ac059df1bec0b843cea38818466f16e1ede087bad11e8082fa2c75cef3
                                                                                  • Instruction Fuzzy Hash: 8C31BB22F0C98281E764E716D465BFA5391EF84B84F884236E67EC66EEDF3CE4458700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FreeHeap$FileModuleName
                                                                                  • String ID:
                                                                                  • API String ID: 526635459-0
                                                                                  • Opcode ID: a0651dde3e88f96297784a8a7650e1338b07eb8bfa1f450acd1c6636bd51b719
                                                                                  • Instruction ID: 2eb8ea3fead2b05dc4b83834d0f485f73b58e2308fafdc56cc06bcaf44321246
                                                                                  • Opcode Fuzzy Hash: a0651dde3e88f96297784a8a7650e1338b07eb8bfa1f450acd1c6636bd51b719
                                                                                  • Instruction Fuzzy Hash: FD518C23F087C189E7359A25E864BE92354BB05BA8F444235ED3D9B7DDDF7DA2818300
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ee3642c33017c4efd684ab942de05cbcc5d9702edbdc9b8b41c86c71921b5fd9
                                                                                  • Instruction ID: e36dddbcbe6316d5651a4d6cd5df245808dfcc2ffe86c3470ebc5955ace74c3b
                                                                                  • Opcode Fuzzy Hash: ee3642c33017c4efd684ab942de05cbcc5d9702edbdc9b8b41c86c71921b5fd9
                                                                                  • Instruction Fuzzy Hash: 26516A23E08B8189E721DF65E465BAD27B0EB44798F148235EEAD46BCADF3C91858340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: abort$CaptureContextExceptionRaiseUnwind
                                                                                  • String ID: CCG
                                                                                  • API String ID: 4122134289-1584390748
                                                                                  • Opcode ID: 08dfc625460027e4dc3f1e91b091f1f0002f64ee4f4f23cf7402fbec38152bbb
                                                                                  • Instruction ID: 7325011e4a8bdb14261db52d0ae148c75d7705bce61b4d99f29e312f275098b8
                                                                                  • Opcode Fuzzy Hash: 08dfc625460027e4dc3f1e91b091f1f0002f64ee4f4f23cf7402fbec38152bbb
                                                                                  • Instruction Fuzzy Hash: F031BF73A08BC586E7208F28E4403AA7771FBD9788F505322DA9C93768DF79C191CB00
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 4250714341-0
                                                                                  • Opcode ID: c55a4e5bb68020af28e249f56a40bbc2f62e591f6d169ff66686ff56121460bb
                                                                                  • Instruction ID: e813ef22d492e1b223e8e155b3d4e31f43fa5969991416f073a6703d7de8eba3
                                                                                  • Opcode Fuzzy Hash: c55a4e5bb68020af28e249f56a40bbc2f62e591f6d169ff66686ff56121460bb
                                                                                  • Instruction Fuzzy Hash: 8A910523E08BC481EB119F28A8117F96365FF547C8F499322DE6D576A5DF39E286C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 4250714341-0
                                                                                  • Opcode ID: 75eba5dee96d198cbf8f50639a0191d34156a513ce214b86d9ecda7407933842
                                                                                  • Instruction ID: 9c02caf6c4a22965dba0527634f7ebcb69f43959ed7cbd26cf11ef16e31862c4
                                                                                  • Opcode Fuzzy Hash: 75eba5dee96d198cbf8f50639a0191d34156a513ce214b86d9ecda7407933842
                                                                                  • Instruction Fuzzy Hash: 7B81F523E04BC481EB119F28A9117F96365FF547C8F499322DE6D576A5DF39A286C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: e15290c3a3c6b49585e86641f13fc43bc01caf9bc5813c4a0b938877b82554fd
                                                                                  • Instruction ID: 3fdba14abeda94b62f71de8a44d88f1b9a4b88966515cc0e7eefc5763dc146b5
                                                                                  • Opcode Fuzzy Hash: e15290c3a3c6b49585e86641f13fc43bc01caf9bc5813c4a0b938877b82554fd
                                                                                  • Instruction Fuzzy Hash: 9A518862E08BC585F761DF2AD8617E82361FF98798F448232DE6D87799DF389195C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 83515c7d39ee7eb7ed8ecc8af2090f4f3005d2330fa7cb51c9bf8bf13eb74f9a
                                                                                  • Instruction ID: 9546cd61a23bc0ae2e1ac8f0dfd5a5a2364d0925628379a2b211e1751ab33563
                                                                                  • Opcode Fuzzy Hash: 83515c7d39ee7eb7ed8ecc8af2090f4f3005d2330fa7cb51c9bf8bf13eb74f9a
                                                                                  • Instruction Fuzzy Hash: 1231EA22F0C68181E724E71694647FA5391EF85B84F884236EA7DC66EEDF3CE485C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 3fd73ba2423a818efbc5733cb8091903cd5ff2fdcb34c9587334f1194e35a5fa
                                                                                  • Instruction ID: 27dee84791bb83f156f071ae80f4ab3af10b8cac50c31e4b73bd3746993cdd6f
                                                                                  • Opcode Fuzzy Hash: 3fd73ba2423a818efbc5733cb8091903cd5ff2fdcb34c9587334f1194e35a5fa
                                                                                  • Instruction Fuzzy Hash: 4B31AA22F1C58281E725E716D465BBA5351EF84B84F884236E67EC66EEDF3CE4458700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: b87c8a249b356e605a869656e7c32de3ef77988de8c14335fe5ce27b6d0c8675
                                                                                  • Instruction ID: 73cf534e64259f5a8e7b7f15b99828a4e6e7e6fe867ad05d33d6b1c9baca723a
                                                                                  • Opcode Fuzzy Hash: b87c8a249b356e605a869656e7c32de3ef77988de8c14335fe5ce27b6d0c8675
                                                                                  • Instruction Fuzzy Hash: 3531CC22F0C58281E724E716D465BBE5391EF84B84F884236E67EC66EEDF3CE4458600
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 3b1b52626daede615cde2e829f5f9c8f3d07f3723f182ac1d4d0aa618008667d
                                                                                  • Instruction ID: 9a241433a5cfb6151c5138e5890072334997d8508824d99f4a71948ac1186eea
                                                                                  • Opcode Fuzzy Hash: 3b1b52626daede615cde2e829f5f9c8f3d07f3723f182ac1d4d0aa618008667d
                                                                                  • Instruction Fuzzy Hash: CE31CB22F0C98281E724A7169464BBA5391EF84B84F484236E67EC66EEDF3CE4458600
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID: cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs$main
                                                                                  • API String ID: 3298025750-3821718884
                                                                                  • Opcode ID: bb67c991c9ffcd16aad204d31aed2df4e4bca4dadbca21e6275df8169d64fa26
                                                                                  • Instruction ID: d6833b220ffb1551bfd1d8834ecd167c6afbc62cb053271c7da8fae78ecf2e2b
                                                                                  • Opcode Fuzzy Hash: bb67c991c9ffcd16aad204d31aed2df4e4bca4dadbca21e6275df8169d64fa26
                                                                                  • Instruction Fuzzy Hash: 19916823B09A4285FB10DB61A864BAD2761FB44748F894636EA3CC67DDDF3CE485C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FreeHeap$FullNamePath
                                                                                  • String ID:
                                                                                  • API String ID: 554372815-0
                                                                                  • Opcode ID: add5975aaafc1cf7c704bcaff5a89812681b38a32ed5c548fc2392545f1d6386
                                                                                  • Instruction ID: d638afb906e009c75657ce096fb55e939e3da18a9ff69edaef0e05774d5ac317
                                                                                  • Opcode Fuzzy Hash: add5975aaafc1cf7c704bcaff5a89812681b38a32ed5c548fc2392545f1d6386
                                                                                  • Instruction Fuzzy Hash: CC417126B04BC289E7349F619864BE92795FB45B98F580235ED3DDBBD9CE7C92448300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseFileHandleUnmapView
                                                                                  • String ID: s [... omitted frame ...]
                                                                                  • API String ID: 238406573-3732609013
                                                                                  • Opcode ID: d28fbf8e32a916bb5f5f9b548799d7f9454f25eeb76f5a2ebb97e068833c1f99
                                                                                  • Instruction ID: cc53acc588faa276a899ac3c7ddce7026a815bcb32125d5aa0a758de23e86ce1
                                                                                  • Opcode Fuzzy Hash: d28fbf8e32a916bb5f5f9b548799d7f9454f25eeb76f5a2ebb97e068833c1f99
                                                                                  • Instruction Fuzzy Hash: ED516173B05B8589EB21CF25D4917AD37A0FB44B88F484236DA6E87B99DF38D594C340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseFileHandleUnmapView
                                                                                  • String ID: s [... omitted frame ...]
                                                                                  • API String ID: 238406573-3732609013
                                                                                  • Opcode ID: 234675bfcce436fed44dfe154107cb3bacbaa412422a1148ee189f855ecd01d8
                                                                                  • Instruction ID: 1d5f582f46b0c37fc76ed98338589047fba8ec1930fba5d6961fdbc5667e7922
                                                                                  • Opcode Fuzzy Hash: 234675bfcce436fed44dfe154107cb3bacbaa412422a1148ee189f855ecd01d8
                                                                                  • Instruction Fuzzy Hash: 4C516133B05B8589EB24CF25D4917AD37A0FB44B88F484236DA6E87B99DF38D094C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 489845e03afb98c4090425f8c6251e203cf8a037b3b8927327c1bd347c4ed4a9
                                                                                  • Instruction ID: 76684177dd6e23ca328d1ff5ff4ce79c373273c93e3919f5c2e02e3d8de317aa
                                                                                  • Opcode Fuzzy Hash: 489845e03afb98c4090425f8c6251e203cf8a037b3b8927327c1bd347c4ed4a9
                                                                                  • Instruction Fuzzy Hash: 20612F36F08A8284E7708B21C8A4BED27A1FB45B48F444236DA7D9BADCDF39A555D340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CaptureContextExceptionRaiseUnwindabortmemcpy
                                                                                  • String ID:
                                                                                  • API String ID: 2542667021-0
                                                                                  • Opcode ID: 5fc51d1ebdd88091b81caa2cd0b9062daedb01c5e3652c18e38a26a7469e139f
                                                                                  • Instruction ID: ee0744fcb60847d85b1335d771b50c36d0161695a06a981e8d6760dd1568d27d
                                                                                  • Opcode Fuzzy Hash: 5fc51d1ebdd88091b81caa2cd0b9062daedb01c5e3652c18e38a26a7469e139f
                                                                                  • Instruction Fuzzy Hash: EE516562E08AC585E7219F2AD8617EC2360FF98788F448231DE6D87799DF389296C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 3ffb236f535855adf34124bfa4af6b624816a2f8cbb8fef7e87e2e33191baae1
                                                                                  • Instruction ID: 04717d77400071adad7bc968dad6c2f3984cac7b01c7a98e6c586d2f9078df5d
                                                                                  • Opcode Fuzzy Hash: 3ffb236f535855adf34124bfa4af6b624816a2f8cbb8fef7e87e2e33191baae1
                                                                                  • Instruction Fuzzy Hash: 4A512E36F08A8284E7348B21C4A47FD27A1FB49B88F444236DA7D97ADDCF39A595C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: f8e9ff72d2b10f8e5550b4d9e62c789666abc753acc552a9996634e3e99383e5
                                                                                  • Instruction ID: dbd010a6794e2ced693b59f971096d4ae4d2155f15019f1588bbdd10e36f567d
                                                                                  • Opcode Fuzzy Hash: f8e9ff72d2b10f8e5550b4d9e62c789666abc753acc552a9996634e3e99383e5
                                                                                  • Instruction Fuzzy Hash: BC512E36F08A8284E7348B21C4A47FD27A1FB49B88F444236DA7D97ADDDF39A595C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 83a0f0f4cb5db5319ffe598177c77cd9d728ab489563a82a6f72eeb3e851a94e
                                                                                  • Instruction ID: 308cdc327ce102dcc7e7553992a7f199a6252ca8e6ff28a0a669a91058f75831
                                                                                  • Opcode Fuzzy Hash: 83a0f0f4cb5db5319ffe598177c77cd9d728ab489563a82a6f72eeb3e851a94e
                                                                                  • Instruction Fuzzy Hash: 31512F36F0868284E7348B21C4A47FD27A1FB45B48F444236DA7D97ADDCF39A555C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Heap$Free$Alloc
                                                                                  • String ID:
                                                                                  • API String ID: 3901518246-0
                                                                                  • Opcode ID: a28e2469a1086507f963d4a02e7423ec9da993cb7dcdf754f3cb40e64e8d99f0
                                                                                  • Instruction ID: 71d7b6d5c5d0618744fab792a361c1363aa9dbc4f48134f78a99d79e68d5cb2c
                                                                                  • Opcode Fuzzy Hash: a28e2469a1086507f963d4a02e7423ec9da993cb7dcdf754f3cb40e64e8d99f0
                                                                                  • Instruction Fuzzy Hash: 2E512E36F08AC284E7708B21C4A47F927A1FB49748F484236DA7D9A6DDCF79A595C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: c9ff0e854f76592ba2f966b1517ea8719470b024589185620eb48dfa989bddbd
                                                                                  • Instruction ID: da6989203bce9c9df232e657ecfff2dfc7e9802202e7b00ef1790593307c5a4a
                                                                                  • Opcode Fuzzy Hash: c9ff0e854f76592ba2f966b1517ea8719470b024589185620eb48dfa989bddbd
                                                                                  • Instruction Fuzzy Hash: 11518623E08BC585F7219F2AD8617E82360FF98758F448232DE6D87799DF389295C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseFileHandlePointer
                                                                                  • String ID:
                                                                                  • API String ID: 1704820636-0
                                                                                  • Opcode ID: 683f471ecae524daddba303215965c41c5eeb5eb68a1e05db357fd5047f55771
                                                                                  • Instruction ID: 273d5b4030009f4d4789f2471e6bb212a77ac0b6316f44709fc7b27fe91fc758
                                                                                  • Opcode Fuzzy Hash: 683f471ecae524daddba303215965c41c5eeb5eb68a1e05db357fd5047f55771
                                                                                  • Instruction Fuzzy Hash: 94413D62F0CBC180E7249B16A4647EAA3A1EF85784F484236DBAD977EDDF3DE0458740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseFileHandlePointer$ObjectSingleWait
                                                                                  • String ID:
                                                                                  • API String ID: 3998891674-0
                                                                                  • Opcode ID: 1eff7c243977d48493124ba029a573040a936019609b2282d8b64a1a4220b9d6
                                                                                  • Instruction ID: 547103a4e99d6515271f1d8b244bac8f3889b7f3a3e6bbef64b0e32667a5b782
                                                                                  • Opcode Fuzzy Hash: 1eff7c243977d48493124ba029a573040a936019609b2282d8b64a1a4220b9d6
                                                                                  • Instruction Fuzzy Hash: 38413D62F0CAC180E7349B12A4647EAA391EF85784F484236DBAD977EEDF7DE0458740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle$FilePointer
                                                                                  • String ID:
                                                                                  • API String ID: 3729840729-0
                                                                                  • Opcode ID: 2f470c464f670b293869539d2a59d827c6f3b789b41c3703fc2447eef19ec4f5
                                                                                  • Instruction ID: 91f09eb141b4516e06137f3e026e0bbbd663b289727a95a67f1fbdd6c286d852
                                                                                  • Opcode Fuzzy Hash: 2f470c464f670b293869539d2a59d827c6f3b789b41c3703fc2447eef19ec4f5
                                                                                  • Instruction Fuzzy Hash: EA413D62F0CAC180E7359B16A4647EAA391EF84784F484236DBAD977EDDF3DE0458740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: dfa1284bc944867e7561965f19c9dcdca01bf570fcab73a2e81406f181e401f5
                                                                                  • Instruction ID: c6edfb0143e725e25982eb68c480ad9e4db63c0b88d91efdb98124f9784dbf51
                                                                                  • Opcode Fuzzy Hash: dfa1284bc944867e7561965f19c9dcdca01bf570fcab73a2e81406f181e401f5
                                                                                  • Instruction Fuzzy Hash: A8314A23F1864282FB34972794A4BBD1352EB84748F594632DB7ED76E9CE2CF4818340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 90be09df39cd437478b2506726d66e5d011696e4b736ae54a69079537084e471
                                                                                  • Instruction ID: 99b4b69a5f57c97120ee470ebb5a93356160f3d52f6a70d2fe7a639dc15fb945
                                                                                  • Opcode Fuzzy Hash: 90be09df39cd437478b2506726d66e5d011696e4b736ae54a69079537084e471
                                                                                  • Instruction Fuzzy Hash: EC31C822F0C98281E725EB12D465BFA5391EF85784F884236E67EC66EEDF3CE445C640
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 731c998e6d922bfb57b6749f5f98103dff0bdd1ab0ac403100a52b877ab64ecb
                                                                                  • Instruction ID: 99b4b69a5f57c97120ee470ebb5a93356160f3d52f6a70d2fe7a639dc15fb945
                                                                                  • Opcode Fuzzy Hash: 731c998e6d922bfb57b6749f5f98103dff0bdd1ab0ac403100a52b877ab64ecb
                                                                                  • Instruction Fuzzy Hash: EC31C822F0C98281E725EB12D465BFA5391EF85784F884236E67EC66EEDF3CE445C640
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 9e0524eda01755049f13f3f504d9c8dd9d62d95135fec3dd851297a2ce3b672d
                                                                                  • Instruction ID: 99b4b69a5f57c97120ee470ebb5a93356160f3d52f6a70d2fe7a639dc15fb945
                                                                                  • Opcode Fuzzy Hash: 9e0524eda01755049f13f3f504d9c8dd9d62d95135fec3dd851297a2ce3b672d
                                                                                  • Instruction Fuzzy Hash: EC31C822F0C98281E725EB12D465BFA5391EF85784F884236E67EC66EEDF3CE445C640
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 5eff6a55d9828a513b4c970e1a21620796b69d969cad4c308f0db246b5496ea3
                                                                                  • Instruction ID: 99b4b69a5f57c97120ee470ebb5a93356160f3d52f6a70d2fe7a639dc15fb945
                                                                                  • Opcode Fuzzy Hash: 5eff6a55d9828a513b4c970e1a21620796b69d969cad4c308f0db246b5496ea3
                                                                                  • Instruction Fuzzy Hash: EC31C822F0C98281E725EB12D465BFA5391EF85784F884236E67EC66EEDF3CE445C640
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 9b27e6b75524f38e42bfb0c88f277100b64cd8d0d774f256052e2f505c888584
                                                                                  • Instruction ID: 5f7b7e2c8894345a0e4d1ef2af66880596ec03065fdaa990bc997afbdc1c2a00
                                                                                  • Opcode Fuzzy Hash: 9b27e6b75524f38e42bfb0c88f277100b64cd8d0d774f256052e2f505c888584
                                                                                  • Instruction Fuzzy Hash: 8431DA22F0C68181E724E71694657BA5391EF85B84F884236E67DC66EEDF3CE445C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 4eb8aa26603fa8ab5348b0d081e9fd9e682ab30f5a08b26c387968f8cc10d8f6
                                                                                  • Instruction ID: dc0494190a89a0cf8dc40c044794f4d275d1a4a1defe584a58b1479d0799dd84
                                                                                  • Opcode Fuzzy Hash: 4eb8aa26603fa8ab5348b0d081e9fd9e682ab30f5a08b26c387968f8cc10d8f6
                                                                                  • Instruction Fuzzy Hash: 3631D822F0C68181E724E71694657BA9391EF85B84F884236E67DC66EEDF3CE485C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 50d6b114c8c7573a04633daa721445bb2470851cdf7ef7d36e189d501671819e
                                                                                  • Instruction ID: be0fbab6efdec0a263039c110dcf909c44021f8a0932a0f99782636ab2a69266
                                                                                  • Opcode Fuzzy Hash: 50d6b114c8c7573a04633daa721445bb2470851cdf7ef7d36e189d501671819e
                                                                                  • Instruction Fuzzy Hash: 8221CA22F0C58181E724A7169465BBA5791EF84B84F884236E67EC66EEDF3CE4458600
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleHeapModuleProc
                                                                                  • String ID: GetTempPath2W$kernel32
                                                                                  • API String ID: 2247350619-407914046
                                                                                  • Opcode ID: b081a45a60ed80a7388da0ddb173ae443c57b4b72a7a5ef97f1b0dbc135a56c4
                                                                                  • Instruction ID: 5822d29ba8188a569d8cf24520682fadc7d2676b9137a0541c2e2c7cb1ea35ec
                                                                                  • Opcode Fuzzy Hash: b081a45a60ed80a7388da0ddb173ae443c57b4b72a7a5ef97f1b0dbc135a56c4
                                                                                  • Instruction Fuzzy Hash: 4D015E52F0968685FB24D751A460BF82361AF88784F884636DD3EC3BDEDF3CA551D200
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                  • API String ID: 4061214504-1276376045
                                                                                  • Opcode ID: 4c69cba3254830e0d3a980ef48b8611d2ef689da3e86788930c60b852a344f9c
                                                                                  • Instruction ID: 48e2e040730378fd034d2dbe8b10d9d9d6847882c44ac7ae346f09fb9a62978f
                                                                                  • Opcode Fuzzy Hash: 4c69cba3254830e0d3a980ef48b8611d2ef689da3e86788930c60b852a344f9c
                                                                                  • Instruction Fuzzy Hash: E0F0F661B0DB0291EB208B64E44533A6360FF48BA0FB00635CAAE866F8CF3CD544C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
                                                                                  • String ID:
                                                                                  • API String ID: 1956605914-0
                                                                                  • Opcode ID: 64ca358332984b66bee882b73d39c0a3e8e0597bd67fc2b936da312716404949
                                                                                  • Instruction ID: ee5481ab42a6440b6bb5fe900187e2a04b5903d9df902eb2872a29917f984dcb
                                                                                  • Opcode Fuzzy Hash: 64ca358332984b66bee882b73d39c0a3e8e0597bd67fc2b936da312716404949
                                                                                  • Instruction Fuzzy Hash: 9851BF63F0879245EB348B6198A4BFD6361EF44398F484335DABD87ADDDF2C96918340
                                                                                  APIs
                                                                                  • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(?,?,?,?,?,?,?,?,00000000,?,?,00007FFDFF1D6571), ref: 00007FFDFF1D65F4
                                                                                  • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00007FFDFF1D6659
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: AddressSingleValueWake
                                                                                  • String ID:
                                                                                  • API String ID: 741412973-0
                                                                                  • Opcode ID: e224da9b11933408c96e3e1203a7cfe5e053282d44fe7d69c8e67e755a0f930d
                                                                                  • Instruction ID: f63a7783890b7628d1a46548955b0fc599cee5abc5ed78c9cc7a29bf537eb4d1
                                                                                  • Opcode Fuzzy Hash: e224da9b11933408c96e3e1203a7cfe5e053282d44fe7d69c8e67e755a0f930d
                                                                                  • Instruction Fuzzy Hash: 0D418E23F0960685FB259B21D870BBD6371AF44794F584335DA7D866DDEF2CA8868700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 018e24e97acf25053f4ff6b8b447ab253433e717b4b67bd3f77397b7b89c9cbd
                                                                                  • Instruction ID: 740e38dcf1d0b2af12d910753b5e6d209870c387741393b99846573ed51683d7
                                                                                  • Opcode Fuzzy Hash: 018e24e97acf25053f4ff6b8b447ab253433e717b4b67bd3f77397b7b89c9cbd
                                                                                  • Instruction Fuzzy Hash: A7515463E08BC585F7619F2AD8617E823A0FF98758F449232DE6D87699DF389295C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 615b6bc0470214188588a2d01fe18b6e00251015df3519477c1fd14d926b36d5
                                                                                  • Instruction ID: 048f9863a11c56ad2af4dc65603211db1606beb09ffcd6206e7ab88390fcdfc3
                                                                                  • Opcode Fuzzy Hash: 615b6bc0470214188588a2d01fe18b6e00251015df3519477c1fd14d926b36d5
                                                                                  • Instruction Fuzzy Hash: 49515663E08BC585F7619F2A98617E823A0FF98758F449231DE6D87799DF389295C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 1b80cc4edbfc19ba362e0ae68058afa0b0959abf5f74af2f5b7f27f660db8034
                                                                                  • Instruction ID: 048f9863a11c56ad2af4dc65603211db1606beb09ffcd6206e7ab88390fcdfc3
                                                                                  • Opcode Fuzzy Hash: 1b80cc4edbfc19ba362e0ae68058afa0b0959abf5f74af2f5b7f27f660db8034
                                                                                  • Instruction Fuzzy Hash: 49515663E08BC585F7619F2A98617E823A0FF98758F449231DE6D87799DF389295C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: cd39e22c407f865b54224c9ba4c1cda457d3b64844c9e2beba43f49b92b01f6b
                                                                                  • Instruction ID: 193d91e53a94c513f18d4749783202a654458f625b620a8dd5faaeba7d335ac0
                                                                                  • Opcode Fuzzy Hash: cd39e22c407f865b54224c9ba4c1cda457d3b64844c9e2beba43f49b92b01f6b
                                                                                  • Instruction Fuzzy Hash: 08410B16F08A8588FB20DB65D8617FC2361EF84748F884236DA7D96BE9DF3CA641C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 4e8e63c802991ca37476f4a08790f10f3f712d771a486c672b0fada353905c5c
                                                                                  • Instruction ID: 6b81d892d55d3f63df57d82f77ef44c5468217f3c21d2e9ad8b404191d4ae55f
                                                                                  • Opcode Fuzzy Hash: 4e8e63c802991ca37476f4a08790f10f3f712d771a486c672b0fada353905c5c
                                                                                  • Instruction Fuzzy Hash: B941FB16F08A8584FB24DB65D8617FC2361EF88748F884236D97D867E9DF3CA541C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: e421189457731f8469c786c6cc5690f8cb513ab31b929df96de85d38aedc7e5e
                                                                                  • Instruction ID: 7ae11940d9e56b0523445221429358161bb2c80738d8f602c72385bb1abc7365
                                                                                  • Opcode Fuzzy Hash: e421189457731f8469c786c6cc5690f8cb513ab31b929df96de85d38aedc7e5e
                                                                                  • Instruction Fuzzy Hash: 2441FA16F09B8584FB24DB66D8617B82361EF88B44F884236DA7D977E9DF3C9541C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 82f8239812ef13a5ab77ed4f4006f2a8862964b8ac7c2ee90b04806fae2f552d
                                                                                  • Instruction ID: 2e425428e76b6e259baeb5caa09b3059cfe941fbd158d7c859f937408fc3cc6f
                                                                                  • Opcode Fuzzy Hash: 82f8239812ef13a5ab77ed4f4006f2a8862964b8ac7c2ee90b04806fae2f552d
                                                                                  • Instruction Fuzzy Hash: 1841F916F09B8584FB24DB66D8617B92361EF88B84F884236DA6D977E9DF3C9541C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorLast$FreeFullHeapNamePath
                                                                                  • String ID:
                                                                                  • API String ID: 526175943-0
                                                                                  • Opcode ID: d2e7441096d1d4c443a168f80f84ad59918335a3ef1acd8e76c73ca9fe5aab4a
                                                                                  • Instruction ID: 7bc310e88a8449770a4c31b594f6bd75ddcfb9b8351b88fb8bb2bd5d2ee9ca08
                                                                                  • Opcode Fuzzy Hash: d2e7441096d1d4c443a168f80f84ad59918335a3ef1acd8e76c73ca9fe5aab4a
                                                                                  • Instruction Fuzzy Hash: 32317E22B08BC14AF771DF219868BAD27A4FB45B98F580235DE7DD77CECE7892448201
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CaptureCloseContextExceptionHandleRaiseUnwindabort
                                                                                  • String ID:
                                                                                  • API String ID: 245745995-0
                                                                                  • Opcode ID: 96126d6c02fbbf8e782e58c2a3d80acb49b0ff1150806085a0b3a49e367393b1
                                                                                  • Instruction ID: 01c8e830314fb3429f8656a95c439f5939d87cded16a14a0411606c6c22731ae
                                                                                  • Opcode Fuzzy Hash: 96126d6c02fbbf8e782e58c2a3d80acb49b0ff1150806085a0b3a49e367393b1
                                                                                  • Instruction Fuzzy Hash: 3831EC22F0C58181E724E71694757EA5391FF85B84F884236EA7DC66EEDF2CE4458640
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CaptureCloseContextExceptionHandleRaiseUnwindabort
                                                                                  • String ID:
                                                                                  • API String ID: 245745995-0
                                                                                  • Opcode ID: 9b2101f2c0b34afee534a08863a95abeab72c783c6af0a658a0effa2343cbafb
                                                                                  • Instruction ID: 79cf013823ffe068f5709d4dc3503ea6b14a583d6e061d776bd7e88f901c9513
                                                                                  • Opcode Fuzzy Hash: 9b2101f2c0b34afee534a08863a95abeab72c783c6af0a658a0effa2343cbafb
                                                                                  • Instruction Fuzzy Hash: 72211812F0C58281EB24E7129475BBE5791EF85B84F880236EA7EC66EEDF3CE4458700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 6d8e65684b45a88600395803eb29ed45d2a3983aade4a925e5d91a5df0034843
                                                                                  • Instruction ID: 051325a56ac97ca9c5644d0f4092265c6736cc2f83b3f7f673a9ca391e93563b
                                                                                  • Opcode Fuzzy Hash: 6d8e65684b45a88600395803eb29ed45d2a3983aade4a925e5d91a5df0034843
                                                                                  • Instruction Fuzzy Hash: E621CB22F0C58281E724EB1294657FE9391EF85784F884236E67EC66EEDF3CE4458600
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 959184bec4a91f8b15299a3477b17e7a467e69ac5ce00708e390efaf71274746
                                                                                  • Instruction ID: 03503d7501dc178868a89969e86211b98947e1c7c8f4c417a9c6bb0d4ba444fd
                                                                                  • Opcode Fuzzy Hash: 959184bec4a91f8b15299a3477b17e7a467e69ac5ce00708e390efaf71274746
                                                                                  • Instruction Fuzzy Hash: B721EA22F0C58181E724E71694757BA9391EF85B84F884236E67EC66EEDF3CE445C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: d001ec50cc023509c53ac4d4128adba0a2bbf7c238277bdf7c154bdcc35d4d85
                                                                                  • Instruction ID: c6044d8981150a88b5d97304b364cd7b196efe217e27fca1b9d8dda1b38304eb
                                                                                  • Opcode Fuzzy Hash: d001ec50cc023509c53ac4d4128adba0a2bbf7c238277bdf7c154bdcc35d4d85
                                                                                  • Instruction Fuzzy Hash: 7021C922F0C58281E725EB16D4657FA9391EF88784F884236E67EC66EEDF3CE445C600
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: d001ec50cc023509c53ac4d4128adba0a2bbf7c238277bdf7c154bdcc35d4d85
                                                                                  • Instruction ID: c6044d8981150a88b5d97304b364cd7b196efe217e27fca1b9d8dda1b38304eb
                                                                                  • Opcode Fuzzy Hash: d001ec50cc023509c53ac4d4128adba0a2bbf7c238277bdf7c154bdcc35d4d85
                                                                                  • Instruction Fuzzy Hash: 7021C922F0C58281E725EB16D4657FA9391EF88784F884236E67EC66EEDF3CE445C600
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: d001ec50cc023509c53ac4d4128adba0a2bbf7c238277bdf7c154bdcc35d4d85
                                                                                  • Instruction ID: c6044d8981150a88b5d97304b364cd7b196efe217e27fca1b9d8dda1b38304eb
                                                                                  • Opcode Fuzzy Hash: d001ec50cc023509c53ac4d4128adba0a2bbf7c238277bdf7c154bdcc35d4d85
                                                                                  • Instruction Fuzzy Hash: 7021C922F0C58281E725EB16D4657FA9391EF88784F884236E67EC66EEDF3CE445C600
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 94dd05ed3e7cbc88eeb597d48c06e2e252d4658633ee448895aa461142424feb
                                                                                  • Instruction ID: 86f9b80b426747142c98d2195d94abc14cd6fe9b93d6c6ca66cd710949d455b0
                                                                                  • Opcode Fuzzy Hash: 94dd05ed3e7cbc88eeb597d48c06e2e252d4658633ee448895aa461142424feb
                                                                                  • Instruction Fuzzy Hash: 5A21EC22F0C58181E725E71694747BA5391EF84B84F884236E67EC66EEDF3CE445C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 914a0a6bef2835900175439e1b19609a14eef3506211583a17c443d105c37651
                                                                                  • Instruction ID: 7ac4b0fef43c988c32cbb07db7b7a50e4eaf3339f2bd34a74f87b803c1314c57
                                                                                  • Opcode Fuzzy Hash: 914a0a6bef2835900175439e1b19609a14eef3506211583a17c443d105c37651
                                                                                  • Instruction Fuzzy Hash: D021EC22F0C58181E724E71694657BA5391EF84B84F884236E67EC66EEDF3CE445C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ErrorHandleLast$CurrentDuplicateProcess
                                                                                  • String ID:
                                                                                  • API String ID: 3697983210-0
                                                                                  • Opcode ID: a2846c33b80589a9331e861803d4bb719fa938c2d183521538b211f41f45dd27
                                                                                  • Instruction ID: 76aa467ce65d35b6f9fba20ef5ea476ce6ddc81a92e055992c9713bfab8686f4
                                                                                  • Opcode Fuzzy Hash: a2846c33b80589a9331e861803d4bb719fa938c2d183521538b211f41f45dd27
                                                                                  • Instruction Fuzzy Hash: 6A115163F1829145FB609A61B4257AE2791EB843A8F044331EE7E877CECFBCD0819340
                                                                                  APIs
                                                                                  Strings
                                                                                  • cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs, xrefs: 00007FFDFF1D6AE3
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$AddressSingleWake
                                                                                  • String ID: cannot access a Thread Local Storage value during or after destructionlibrary\std\src\thread\local.rs
                                                                                  • API String ID: 2995119335-1168434340
                                                                                  • Opcode ID: 64aae8602360610d860c797d911c6c94a8d6c86d8d8a88f1b801de3dd4796441
                                                                                  • Instruction ID: 7c1667c3061f54f61a6c6caa539d0c6ce8ec16fa5366ef87244a31882597532e
                                                                                  • Opcode Fuzzy Hash: 64aae8602360610d860c797d911c6c94a8d6c86d8d8a88f1b801de3dd4796441
                                                                                  • Instruction Fuzzy Hash: CD710C22F0CB4688F7119B60A871BBD2770AB5431CF885735D97CC66EAEF2CA589C311
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseFileHandleUnmapView
                                                                                  • String ID: s [... omitted frame ...]
                                                                                  • API String ID: 238406573-3732609013
                                                                                  • Opcode ID: d0a656f1095f46913aafe9a0ec105c611fbe03b47028f47e86df0d274d496bb2
                                                                                  • Instruction ID: d04ba4df181e705e49acf85ea0fe285a2aa8415b32fab70f80e6d218d07eb6a2
                                                                                  • Opcode Fuzzy Hash: d0a656f1095f46913aafe9a0ec105c611fbe03b47028f47e86df0d274d496bb2
                                                                                  • Instruction Fuzzy Hash: B8516F33A05B8589EB20CF25D4917AD37A0FB48B88F484236DA6E87B99DF38D094C340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFileFreeHandleHeapUnmapView
                                                                                  • String ID: assertion failed: end >= start && end <= len
                                                                                  • API String ID: 2029649301-206846142
                                                                                  • Opcode ID: cc07d0baf98cc2c21bfab83bb81f6587acc31c4e6d9239d8fc6b82601fbd105b
                                                                                  • Instruction ID: 98e8fca222986aef913dd1830fc0788d6ff22852e9fbc5a3b4066e1c80aa0f3d
                                                                                  • Opcode Fuzzy Hash: cc07d0baf98cc2c21bfab83bb81f6587acc31c4e6d9239d8fc6b82601fbd105b
                                                                                  • Instruction Fuzzy Hash: 10F01526F0868242E728AB2294747FD5720EF85B80F484232DE7EC77EBCE2CA0418200
                                                                                  Strings
                                                                                  • {size limit reached}`fmt::Error` from `SizeLimitedFmtAdapter` was discarded, xrefs: 00007FFDFF1D8458
                                                                                  • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs, xrefs: 00007FFDFF1D804A
                                                                                  • <unknown>, xrefs: 00007FFDFF1D856E
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs$<unknown>${size limit reached}`fmt::Error` from `SizeLimitedFmtAdapter` was discarded
                                                                                  • API String ID: 0-1737120873
                                                                                  • Opcode ID: 139fbd7fd0065e9446f04bb1c7d6771a4feb4527c133a6b113dbc105a9ff76d0
                                                                                  • Instruction ID: 6c830ccd3787091433a94ac68a5c896b4ca01a31dca04dcf122d630f396d1bd2
                                                                                  • Opcode Fuzzy Hash: 139fbd7fd0065e9446f04bb1c7d6771a4feb4527c133a6b113dbc105a9ff76d0
                                                                                  • Instruction Fuzzy Hash: 08F18663F08B9289EB208B21E860BED2760FB55BA8F444236DE6D47BD9DF38D145C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 2be3e3c36506147d5380a14d6b86b91e398f8fb32940a3fe3899d9cc2e9d81f1
                                                                                  • Instruction ID: 99fdf99f09d20570cfdb7095f09678aa174bf8fa31a4529fa0b7b3fc920ad140
                                                                                  • Opcode Fuzzy Hash: 2be3e3c36506147d5380a14d6b86b91e398f8fb32940a3fe3899d9cc2e9d81f1
                                                                                  • Instruction Fuzzy Hash: 05410D16F09B8584FB249B25D8647FC2361EF94B48F884236C97D867D9DF7C9645C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 14ca36cfc3f5f768d3efff822d12e70a49b249a37526e1ddfe6aed361d7acb69
                                                                                  • Instruction ID: c5b64c3151ac699c301ec4c5802a373dcd61cb4f2979bf33780b2302dbb0fcd7
                                                                                  • Opcode Fuzzy Hash: 14ca36cfc3f5f768d3efff822d12e70a49b249a37526e1ddfe6aed361d7acb69
                                                                                  • Instruction Fuzzy Hash: 24410C16F09B8584FB249B65D8617FC2361EF84748F884236CA7D867E9DF7CA641C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 14b18590f53ecf8803b5db270a917b17736928481ca0a51a87bbfcec2dee7029
                                                                                  • Instruction ID: e030a638a6ceb302f494fa217c0c59724986a0896d7e6bd90289caf4a86ba115
                                                                                  • Opcode Fuzzy Hash: 14b18590f53ecf8803b5db270a917b17736928481ca0a51a87bbfcec2dee7029
                                                                                  • Instruction Fuzzy Hash: A8417463E08BC585E7219F2AD8517E823B0FB98798F449222DFAC87795EF349295C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 76840de9d188bfec8944c4b56978a3b0a9c47d0891725c63c35cb23727952999
                                                                                  • Instruction ID: 241ab2718d27e8d94ba10daea49a3ef4bad2ceaf8720922c6d9973353c0e8d29
                                                                                  • Opcode Fuzzy Hash: 76840de9d188bfec8944c4b56978a3b0a9c47d0891725c63c35cb23727952999
                                                                                  • Instruction Fuzzy Hash: 77410C16F09B8584FB249B66D8617FD2361EB88B48F884236CA6D877E9DF3C9651C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 911738859-0
                                                                                  • Opcode ID: 5eba0e87723cc33a9d57a20c5ca8c8ea6536750146c3255c0c928d0beb7e84b5
                                                                                  • Instruction ID: e0888955ba2dbf202d89c56c23b96f9913e7342336b12ba5a132901c1678549a
                                                                                  • Opcode Fuzzy Hash: 5eba0e87723cc33a9d57a20c5ca8c8ea6536750146c3255c0c928d0beb7e84b5
                                                                                  • Instruction Fuzzy Hash: 8131AF26F0968341FB296B219870FBD2351AF44750F484635CD3EC27E9EF2CE84A9200
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 911738859-0
                                                                                  • Opcode ID: 26942761a0965110d81714b1389a9b5f6261cccf0107593a6df524b88d149246
                                                                                  • Instruction ID: 2f3b3a5946d4361b1cb9ca5c32f104b0d46aba55e83aed5cb68d9685409f046a
                                                                                  • Opcode Fuzzy Hash: 26942761a0965110d81714b1389a9b5f6261cccf0107593a6df524b88d149246
                                                                                  • Instruction Fuzzy Hash: 80318122F0C68341FB64AB229431ABD63A1AF98344F484334ED7ED27EEDF2DA5419200
                                                                                  APIs
                                                                                  • TlsGetValue.KERNEL32(?,?,?,?,00007FFDFF1D69AC,?,?,?,?,?,?,?,?,?,?,00007FFDFF1D694A), ref: 00007FFDFF1D6C09
                                                                                  • TlsGetValue.KERNEL32(?,?,?,?,00007FFDFF1D69AC,?,?,?,?,?,?,?,?,?,?,00007FFDFF1D694A), ref: 00007FFDFF1D6C2B
                                                                                  • TlsGetValue.KERNEL32(?,?,?,?,00007FFDFF1D69AC,?,?,?,?,?,?,?,?,?,?,00007FFDFF1D694A), ref: 00007FFDFF1D6C74
                                                                                  • TlsSetValue.KERNEL32(?,?,?,?,00007FFDFF1D69AC,?,?,?,?,?,?,?,?,?,?,00007FFDFF1D694A), ref: 00007FFDFF1D6C8F
                                                                                  • HeapFree.KERNEL32(?,?,?,?,00007FFDFF1D69AC,?,?,?,?,?,?,?,?,?,?,00007FFDFF1D694A), ref: 00007FFDFF1D6CA5
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 911738859-0
                                                                                  • Opcode ID: 748ec38de08cf74347156b979be811061d1f0e9ce42157d1a6afbf02d28d7dc0
                                                                                  • Instruction ID: ac3cad008785449c828cb0e479d449fb8dbb82bf5052310bb431bd90babc67c2
                                                                                  • Opcode Fuzzy Hash: 748ec38de08cf74347156b979be811061d1f0e9ce42157d1a6afbf02d28d7dc0
                                                                                  • Instruction Fuzzy Hash: 31215C22F0D24645FB686B219870ABD2361EF44790F884638DD7EC77EEDE2CE9459200
                                                                                  APIs
                                                                                  • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00007FFDFF1D6659
                                                                                  • TlsGetValue.KERNEL32(00000000,?,?,?,00007FFDFF207546), ref: 00007FFDFF1D667B
                                                                                  • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00007FFDFF1D66CC
                                                                                  • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00007FFDFF1D66E7
                                                                                  • HeapFree.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00007FFDFF1D6715
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Value$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 911738859-0
                                                                                  • Opcode ID: 647371fa815f160e084380a3322170dba1639890cc026436209bcda58d68c0b0
                                                                                  • Instruction ID: f222cd035862dbc3b442cb8edb0ad3bacd3f9f55e3c9a15dd523a5c030fcc2c0
                                                                                  • Opcode Fuzzy Hash: 647371fa815f160e084380a3322170dba1639890cc026436209bcda58d68c0b0
                                                                                  • Instruction Fuzzy Hash: AD218127F0974641FB696B229871BBD23A1EF48784F484639C93DC37E9DF2CE8418200
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 8f2e022b5a13b178997417444c556ffc790e6e4c1c02ec9b1f1ec5ba35d00e55
                                                                                  • Instruction ID: 4107df6adc13ec3c6c19752e3a02f713d5d4607c477c4c8ae1a0dd5531eff79c
                                                                                  • Opcode Fuzzy Hash: 8f2e022b5a13b178997417444c556ffc790e6e4c1c02ec9b1f1ec5ba35d00e55
                                                                                  • Instruction Fuzzy Hash: 7521CC22F0C68181E724EB16E4757EA6391EF95784F880236EA7DC66EEDF2CE445C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 5dcb8b1b1b055337957f60ec3d89fa83330e4122e760f0e77dc5f47e5136adb2
                                                                                  • Instruction ID: caa4c90b3333bd30f4441ff5c2ae3903eeb0b576e96e3c290fc844cd768b33bf
                                                                                  • Opcode Fuzzy Hash: 5dcb8b1b1b055337957f60ec3d89fa83330e4122e760f0e77dc5f47e5136adb2
                                                                                  • Instruction Fuzzy Hash: B621C922E0C58281E724E71294657AA5391EF84B84F894236EA7EC66EE9F3CE445C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 2735614835-0
                                                                                  • Opcode ID: f075cbb6e37bf0b4f8a528bf882ea4d362e89f41f0dbbfeac2edd3197c0d22f0
                                                                                  • Instruction ID: d2c5fd206c6c81b983673af4208669b6584fd97cfc91f82ef12a1c3a37b37602
                                                                                  • Opcode Fuzzy Hash: f075cbb6e37bf0b4f8a528bf882ea4d362e89f41f0dbbfeac2edd3197c0d22f0
                                                                                  • Instruction Fuzzy Hash: 2801AC12F0C68284EB34EB218875BFD1761EF85788F484632E53ECA6EE8F6CA5458341
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 2735614835-0
                                                                                  • Opcode ID: 523487da440fef8eff58d454bffd27798c91b43593e3f0a030bdd4b2f116fe82
                                                                                  • Instruction ID: a445ac0160de6c27c290e319c2566d24dab2f809e59248fc330aa409f8771506
                                                                                  • Opcode Fuzzy Hash: 523487da440fef8eff58d454bffd27798c91b43593e3f0a030bdd4b2f116fe82
                                                                                  • Instruction Fuzzy Hash: 51019A12F0868284EB34EB218875BFD1761EF85784F884632E53ECA6EECF6CA5458341
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 2735614835-0
                                                                                  • Opcode ID: bd85eee10e6b2b5acff7177fd9023e8838213d09a081b573d04e12af7397c435
                                                                                  • Instruction ID: 1e7b3516b8de3ad23c1de677134ec1e8fb84ae23e83653df96d77f555f35801b
                                                                                  • Opcode Fuzzy Hash: bd85eee10e6b2b5acff7177fd9023e8838213d09a081b573d04e12af7397c435
                                                                                  • Instruction Fuzzy Hash: BBF0BB12F0868284EB34EB218875BFD1751EF85788F484632E53ECA6EE8F6CA5858341
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 2735614835-0
                                                                                  • Opcode ID: 03a047a88813e1780a580047c99208fa107029d63280c70ddd0ed40ba63df692
                                                                                  • Instruction ID: d8f66b172528295ae26d198247dafc00ed3c85b0f3340b07759797c2d1bc6758
                                                                                  • Opcode Fuzzy Hash: 03a047a88813e1780a580047c99208fa107029d63280c70ddd0ed40ba63df692
                                                                                  • Instruction Fuzzy Hash: 63F0CD12F0868244EB34EB218875BFC1761EF85784F884632E53ECA6EECF6CA585C341
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 2735614835-0
                                                                                  • Opcode ID: 3d311f52a470369b030e31f32c5d74bd1b63e64cf6a834aaf081ac354adfeaba
                                                                                  • Instruction ID: f06639e3f8f6026456766b793613b5d369856654c9237025f60e61e63689c232
                                                                                  • Opcode Fuzzy Hash: 3d311f52a470369b030e31f32c5d74bd1b63e64cf6a834aaf081ac354adfeaba
                                                                                  • Instruction Fuzzy Hash: ADF0BB12F0868244EB34EB218875BFD1751EF85784F484632E53ECA6EE8F6CA5858341
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep_amsg_exit
                                                                                  • String ID:
                                                                                  • API String ID: 1015461914-0
                                                                                  • Opcode ID: 7a6858b4a111024a6cc5377d0223c21af8fa8804fcf8e0753f5f945e2038adf5
                                                                                  • Instruction ID: e82574c2b0791977c51a316931e9bbc7725b648bfdb7040cc322989417b7bec0
                                                                                  • Opcode Fuzzy Hash: 7a6858b4a111024a6cc5377d0223c21af8fa8804fcf8e0753f5f945e2038adf5
                                                                                  • Instruction Fuzzy Hash: 15414832F0D64685F7219B66E8A0B7923A2AF44788F594235DE3CE73D8DF2DE8419340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseFileHandleUnmapView
                                                                                  • String ID:
                                                                                  • API String ID: 238406573-0
                                                                                  • Opcode ID: 6e9d08601aada3ebda142bf5451b6c79b2a3b1d46f3cf5d7e8f41b57147b1daa
                                                                                  • Instruction ID: ec66b4218cc638e0a6dcf9321b9fac381672a0ee909ac89abd497cb889f11e14
                                                                                  • Opcode Fuzzy Hash: 6e9d08601aada3ebda142bf5451b6c79b2a3b1d46f3cf5d7e8f41b57147b1daa
                                                                                  • Instruction Fuzzy Hash: B0212F13F0964191E729DA169564BBD6760EB48794F4D4372DE7D862DADF3CE4C38300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$CreateErrorEventLast
                                                                                  • String ID:
                                                                                  • API String ID: 3743700123-0
                                                                                  • Opcode ID: 09aafb2f2a13753dac2855e7ee686a30df7e55715b2e5e4ad83259d5d6819a2e
                                                                                  • Instruction ID: d55540a99065c5f68596268ef2bd0beacb5630cbe6e405a40862dcae530ded85
                                                                                  • Opcode Fuzzy Hash: 09aafb2f2a13753dac2855e7ee686a30df7e55715b2e5e4ad83259d5d6819a2e
                                                                                  • Instruction Fuzzy Hash: 0B116023B0974146F7299B22A5617792650EB88790F184234DE7DC7BDAEF3CA5E28300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID: RUST_BACKTRACElibrary\std\src\env.rs$lluf$mluf
                                                                                  • API String ID: 3298025750-2275200021
                                                                                  • Opcode ID: 99de367703d15cd714de64103d7c739dd0f4992637ccbe406c41fe0e699d4e92
                                                                                  • Instruction ID: cfdd89d01d048897c7e1869f6180f723447558b2bafcc2e326eb4a9dff1251df
                                                                                  • Opcode Fuzzy Hash: 99de367703d15cd714de64103d7c739dd0f4992637ccbe406c41fe0e699d4e92
                                                                                  • Instruction Fuzzy Hash: AF01002BF0D28385FB14CB7584B0BB827119B40748F490636C93E977D8DF6DA2898311
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: Free$Heap$CloseEnvironmentHandleStrings
                                                                                  • String ID:
                                                                                  • API String ID: 2554599491-0
                                                                                  • Opcode ID: 9640f53210c7b52cd9f8d9e54cffecb3ac057683ed2e7fda180f5fc9af32cfe1
                                                                                  • Instruction ID: cf04741377c5807d12f560e664395a6cc3d77097c2ad57fe026bf8e29871bf03
                                                                                  • Opcode Fuzzy Hash: 9640f53210c7b52cd9f8d9e54cffecb3ac057683ed2e7fda180f5fc9af32cfe1
                                                                                  • Instruction Fuzzy Hash: 7AF0FB16F0CAC784EB34EB128875ABE1351EF84B94F484231D93ECA6FEDF28A5418601
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: PerformanceQuery$CounterFrequency
                                                                                  • String ID: @
                                                                                  • API String ID: 774501991-2766056989
                                                                                  • Opcode ID: e099399b4bba6a206bd73a69b740a9bbcdb50347600655b0d4b5bd40480757c9
                                                                                  • Instruction ID: 0c2911e5826d38cef950ee8f66542a2d9d0e4130c3bf39dd542222983313d4f3
                                                                                  • Opcode Fuzzy Hash: e099399b4bba6a206bd73a69b740a9bbcdb50347600655b0d4b5bd40480757c9
                                                                                  • Instruction Fuzzy Hash: F741A471608B46A5EB14DB12E814BAAB7A5FB89BC0F618131EE8ED7758DF3CE445C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionRaise
                                                                                  • String ID: CCG $TSUR
                                                                                  • API String ID: 3997070919-2088351922
                                                                                  • Opcode ID: ce616d5934e710458d62c4a5e38894ff4846d75723d4c3057a09a05fa28419c4
                                                                                  • Instruction ID: 1f695a3a632e05b88b49aab4ef6e433b7b1ca9f4723604d6ebc0082dc72930b9
                                                                                  • Opcode Fuzzy Hash: ce616d5934e710458d62c4a5e38894ff4846d75723d4c3057a09a05fa28419c4
                                                                                  • Instruction Fuzzy Hash: 8821C323F18A8686E714AB5198207B82760FBD9B40F559335EE7D837D5EF2CD1958700
                                                                                  APIs
                                                                                  • RtlPcToFileHeader.KERNEL32(00007FF600EA355F,?,?,?,?,00007FF600EA0CDF), ref: 00007FF600EA43EC
                                                                                  • RaiseException.KERNEL32(00007FF600EA355F,?,?,?,?,00007FF600EA0CDF), ref: 00007FF600EA442D
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3096409227.00007FF600D51000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FF600D50000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3096365307.00007FF600D50000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FC9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FD3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3096881320.00007FF600FE3000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097148530.00007FF601035000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097240650.00007FF601036000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097274982.00007FF601037000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601044000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097363246.00007FF601049000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097489667.00007FF601054000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097568999.00007FF60106D000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097632343.00007FF60106F000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097701660.00007FF601070000.00000020.00000001.01000000.00000009.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3097759273.00007FF601071000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ff600d50000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: ExceptionFileHeaderRaise
                                                                                  • String ID: csm
                                                                                  • API String ID: 2573137834-1018135373
                                                                                  • Opcode ID: 0f6f5aab5b9c0bcbb602c08630281df54c19691ace711ec3f4508fe3375f2d53
                                                                                  • Instruction ID: 2ed48859d176712d8df8daf6cfeea654debfe16116f0532b733ac987d0a26658
                                                                                  • Opcode Fuzzy Hash: 0f6f5aab5b9c0bcbb602c08630281df54c19691ace711ec3f4508fe3375f2d53
                                                                                  • Instruction Fuzzy Hash: 2A115B32608B4182EB218B15F40026977E4FB8CB94F694231DBCD47B98DF7CD961CB00
                                                                                  APIs
                                                                                  • HeapFree.KERNEL32(?,?,?,00007FFDFF1D033B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFDFF1D04EC
                                                                                  • HeapFree.KERNEL32(?,?,?,00007FFDFF1D033B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFDFF1D05D4
                                                                                  • HeapFree.KERNEL32(?,?,?,00007FFDFF1D033B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFDFF1D069F
                                                                                  • HeapFree.KERNEL32(?,?,?,00007FFDFF1D033B,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FFDFF1D071C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: d3da0ccef5b28666f5925e49e8291ba41b0b372db1ee40d32c972a4e5e7034d4
                                                                                  • Instruction ID: c2f010e5d3537dbf074708e1003ba7469dec51be5eaaa93733dfd99960bd14b6
                                                                                  • Opcode Fuzzy Hash: d3da0ccef5b28666f5925e49e8291ba41b0b372db1ee40d32c972a4e5e7034d4
                                                                                  • Instruction Fuzzy Hash: A0716BA3F09B8581EB559B129460BBD67A0BFA5BE0F484336DE3D573D9DF38A5808300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: c56f213a2c46c99bad4175adfeaf617cf962afcb7cad8e3978e7a63cd4d1ef28
                                                                                  • Instruction ID: 6bea9f999c5c9d84612ceb03793f939fd52e94eaf0f09f17b6a74b1edcfcec27
                                                                                  • Opcode Fuzzy Hash: c56f213a2c46c99bad4175adfeaf617cf962afcb7cad8e3978e7a63cd4d1ef28
                                                                                  • Instruction Fuzzy Hash: 35716CA3F19B4581EB549B069860BB967A0FB55BE4F888332DE3D473D9DF38A591C300
                                                                                  APIs
                                                                                  • HeapFree.KERNEL32(?,?,00007FFDFF1DA935,?,00007FFDFF1E6336), ref: 00007FFDFF1E64AC
                                                                                  • HeapFree.KERNEL32(?,?,00007FFDFF1DA935,?,00007FFDFF1E6336), ref: 00007FFDFF1E6594
                                                                                  • HeapFree.KERNEL32(?,?,00007FFDFF1DA935,?,00007FFDFF1E6336), ref: 00007FFDFF1E66B2
                                                                                  • HeapFree.KERNEL32(?,?,00007FFDFF1DA935,?,00007FFDFF1E6336), ref: 00007FFDFF1E66DC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 64f3e2e7e1d29491e44c2c2d5edef822e9774029c70c08a2961a66ba1e57c605
                                                                                  • Instruction ID: ec7bad7cfbb42a7d67db2fce279e23482fd4059c52a975349eb29f947547cd84
                                                                                  • Opcode Fuzzy Hash: 64f3e2e7e1d29491e44c2c2d5edef822e9774029c70c08a2961a66ba1e57c605
                                                                                  • Instruction Fuzzy Hash: 93716EA3F19B4581DB549B02D460BF96791BB59BE4F888331DA3D473D9DF38E4948300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: memcpy$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 4250714341-0
                                                                                  • Opcode ID: 7408da389cc62de15cdbf28d03c6a1c343b2220792d7d54e617a01770f75db06
                                                                                  • Instruction ID: a50f5be6ac1992987dedd0fb052003818aec0c7fdc49384a9fd088f3ec7289b1
                                                                                  • Opcode Fuzzy Hash: 7408da389cc62de15cdbf28d03c6a1c343b2220792d7d54e617a01770f75db06
                                                                                  • Instruction Fuzzy Hash: E371D322B04BD582E7019F24E8157F963A4FF54788F485236EF6D936A9EF38E295C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 158bcffbfadd7facc714b648e70e716548a84815923cc62af2668e7051903eb0
                                                                                  • Instruction ID: eb0105f3511bb94837d87cae91764a8e1fcf6b94a09eb432bc65890f0f7b0c0b
                                                                                  • Opcode Fuzzy Hash: 158bcffbfadd7facc714b648e70e716548a84815923cc62af2668e7051903eb0
                                                                                  • Instruction Fuzzy Hash: 22411B23F08A8589FB649B62D860BF927A1EB94788F444236DA3D876DDCF3CA545C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 4f9ffcdbe65ced747dbbbabc06d50595e3e4280e7050ab5aa28799dea5bf2aca
                                                                                  • Instruction ID: abd87a0e6e006f05fae859796acf99ed402f0418bf02698581bd70d1ef5a55d3
                                                                                  • Opcode Fuzzy Hash: 4f9ffcdbe65ced747dbbbabc06d50595e3e4280e7050ab5aa28799dea5bf2aca
                                                                                  • Instruction Fuzzy Hash: 5A411D16F09B8584FB209B25D8607FC23A1EB98B48F884236CA7D877D9DF3CA645C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 0b1e4a3cd404bea86f781876e3da708f4f624fbfb3550a49b62d53791c1919dc
                                                                                  • Instruction ID: b12ae5850f5570bb5aea5117f0b9161f7ea4b1093a0352bd0d2a4895d766f120
                                                                                  • Opcode Fuzzy Hash: 0b1e4a3cd404bea86f781876e3da708f4f624fbfb3550a49b62d53791c1919dc
                                                                                  • Instruction Fuzzy Hash: 81410A17F09B8584FB249B65D861BFC2361EB84744F844236DA7D86BE9DF7CA641C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 9e0cd9e9151a0fd929f3df473d0dde1175908c3a452089df11cb28012acafeb0
                                                                                  • Instruction ID: be789bf812d85b22a2c9edf4b195041632015e6bdcb892fdcbe143d05996fe8e
                                                                                  • Opcode Fuzzy Hash: 9e0cd9e9151a0fd929f3df473d0dde1175908c3a452089df11cb28012acafeb0
                                                                                  • Instruction Fuzzy Hash: D5411C22E08B8585EBB49F25C8607ED37A0EB45B58F444636CA3D8B6DCDF3CE5429741
                                                                                  APIs
                                                                                    • Part of subcall function 00007FFDFF1E5630: HeapFree.KERNEL32(?,?,?,?,00007FFDFF1DA935,?,?,00007FFDFF1EC385,?,?,?,00007FFDFF1DF75C,?,?,?,?), ref: 00007FFDFF1E567C
                                                                                    • Part of subcall function 00007FFDFF1E5630: HeapFree.KERNEL32(?,?,?,?,00007FFDFF1DA935,?,?,00007FFDFF1EC385,?,?,?,00007FFDFF1DF75C,?,?,?,?), ref: 00007FFDFF1E568F
                                                                                    • Part of subcall function 00007FFDFF1E5630: HeapFree.KERNEL32(?,?,?,?,00007FFDFF1DA935,?,?,00007FFDFF1EC385,?,?,?,00007FFDFF1DF75C,?,?,?,?), ref: 00007FFDFF1E56CC
                                                                                  • HeapFree.KERNEL32 ref: 00007FFDFF1DF587
                                                                                  • HeapFree.KERNEL32 ref: 00007FFDFF1DF5D9
                                                                                  • HeapFree.KERNEL32 ref: 00007FFDFF1DF616
                                                                                  • HeapFree.KERNEL32 ref: 00007FFDFF1DF64A
                                                                                  • HeapFree.KERNEL32 ref: 00007FFDFF1DF662
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 6398b163fbff243dacce19293a57bdff1145a7ac6c975c3fe937d01e056e963f
                                                                                  • Instruction ID: aa9f4363e7d29aa3fd22c59d62ff226163d301ac7b99cd53e9cfa503ab5218f0
                                                                                  • Opcode Fuzzy Hash: 6398b163fbff243dacce19293a57bdff1145a7ac6c975c3fe937d01e056e963f
                                                                                  • Instruction Fuzzy Hash: 3D410B17F09B8588FB249B65D8617FC2361EB84744F844236CA7D86BE9DF7CA655C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: c2024bbb9709f1814c1c9a77e9f6afd4a8796ce2635cbde07b84155f171ea8db
                                                                                  • Instruction ID: 0f0a4afdff5e343ec8122190c4318505cf2d8cef956e848f4523cfc3223dd7e5
                                                                                  • Opcode Fuzzy Hash: c2024bbb9709f1814c1c9a77e9f6afd4a8796ce2635cbde07b84155f171ea8db
                                                                                  • Instruction Fuzzy Hash: DA410A17F09B8584FB249B65D861BFC2361EB88744F884236CA7D86BE9DF7CA641C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 067785e98ca60c08406f54bde3466dfe3a64ca6d71eafa823704a090f7fda234
                                                                                  • Instruction ID: ad5934dece2a903bc6789c468954e83cf67325feacb2f38b02cb60a7ad325ec0
                                                                                  • Opcode Fuzzy Hash: 067785e98ca60c08406f54bde3466dfe3a64ca6d71eafa823704a090f7fda234
                                                                                  • Instruction Fuzzy Hash: 7241FB17F09B8584FB249B65D8617FC2361EB94748F884236CA7D86BE9DF7CA645C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 03d2e09cb5ad5f42da9ba985daa5ece4e775708236b991982a193b578a920ee6
                                                                                  • Instruction ID: 1583d9adadc376120ae49670575d2f5954336596a26d8504b501b5e0b555c8fb
                                                                                  • Opcode Fuzzy Hash: 03d2e09cb5ad5f42da9ba985daa5ece4e775708236b991982a193b578a920ee6
                                                                                  • Instruction Fuzzy Hash: 7841EB17F09B8584FB249B65D8617FC2361EB84B44F884236CA7D86BE9DF7CA651C700
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 67ee343ecabcf816c14570db30fd487d7031c2c42f4856d3ceac0912aaa11ec8
                                                                                  • Instruction ID: 9ea07c620acd5e1047d53a4370658beb5c020a4383ec93a04a6d6a0f737b5c3b
                                                                                  • Opcode Fuzzy Hash: 67ee343ecabcf816c14570db30fd487d7031c2c42f4856d3ceac0912aaa11ec8
                                                                                  • Instruction Fuzzy Hash: 82418363A08BC495E7629F29D8517E823B0FB98798F149222DFAC47795EF34D2D6C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: a60d2ed675696a77582077a6b025a48e86fd7e984e53490c33931313f0ba4539
                                                                                  • Instruction ID: 38698e90df1ae6224c64827c9d16971f4814a51c7226fd5dc6acd9164aa34b46
                                                                                  • Opcode Fuzzy Hash: a60d2ed675696a77582077a6b025a48e86fd7e984e53490c33931313f0ba4539
                                                                                  • Instruction Fuzzy Hash: 7441FF26F08B8584EB64DB65D8617FC2365EB84B48F484236DA7D877E9DF3C9645C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: c3f6f91f2cfefc38d1dd9f41bea9a625a110087332fcf3cbba6f9faf75973dca
                                                                                  • Instruction ID: 3c0998a30e9234fe9ff10d6f499b61dce21c36630c9eab39291b5cffb272e94f
                                                                                  • Opcode Fuzzy Hash: c3f6f91f2cfefc38d1dd9f41bea9a625a110087332fcf3cbba6f9faf75973dca
                                                                                  • Instruction Fuzzy Hash: F0410C2AF09B8584FB249B65D8617FC2361EB88B44F884236CA6D977E9DF7C9651C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 05dfb6c6206b45a8594ffc8712356b135e58ccc07ede374e2e282b4b2303c70c
                                                                                  • Instruction ID: 1714372ffb56c66d9c95b40f4eeeac8b7482ae5898d202779d1b15006fee2612
                                                                                  • Opcode Fuzzy Hash: 05dfb6c6206b45a8594ffc8712356b135e58ccc07ede374e2e282b4b2303c70c
                                                                                  • Instruction Fuzzy Hash: E641F82AF09B8584FB249B65D8617FC2361EB88B44F884236CA6D977E9DF7C9651C300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 203dfa3da7f380c43157f7a49de0f6000d9bcbe515633572d8ecfb1985b28732
                                                                                  • Instruction ID: 5dd84da11e7f2ed281d74750e2d9abb9a859addcf416ad78762ebe6330bee49a
                                                                                  • Opcode Fuzzy Hash: 203dfa3da7f380c43157f7a49de0f6000d9bcbe515633572d8ecfb1985b28732
                                                                                  • Instruction Fuzzy Hash: F3319063F086C685EB759B2A8864BFC27A1EB85798F448332D93D466DDDF3C9442D340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 40f6f7db8463019ad53cc951d77d748c244ca87c8fed7663def7dff9cf4ccf73
                                                                                  • Instruction ID: 4a2b7a08e9f08643cd8fc7c51b93a7a7cc86b2c71e6b5ecb557a1f7c380f7429
                                                                                  • Opcode Fuzzy Hash: 40f6f7db8463019ad53cc951d77d748c244ca87c8fed7663def7dff9cf4ccf73
                                                                                  • Instruction Fuzzy Hash: 1F317063F08A8685EB749B268864BFC2761EB45788F448632D93D876DDDF3CE446D340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: c4afbb92dbedabcc1b83b4d9ce57f9e39efc2a60305a8a67e045839e0f8192d8
                                                                                  • Instruction ID: 548cadb5f0875bfcd53b08398d8b1918fda46b2435e114cf8205777e881eac9a
                                                                                  • Opcode Fuzzy Hash: c4afbb92dbedabcc1b83b4d9ce57f9e39efc2a60305a8a67e045839e0f8192d8
                                                                                  • Instruction Fuzzy Hash: BC318F23F0878685EBB49B268864BFC27A1EB44748F544632D93D866D8DF3DA486D300
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 5557bbdf9161e23a7454bac459f8b31d38cf2f445c8708a97a76ae444007d92b
                                                                                  • Instruction ID: a9d3fe49bd2a9b3b26216b8d56e73ce3231a1f853ead9e557f1e2bf935c0b9fa
                                                                                  • Opcode Fuzzy Hash: 5557bbdf9161e23a7454bac459f8b31d38cf2f445c8708a97a76ae444007d92b
                                                                                  • Instruction Fuzzy Hash: 8B212F62F08A4685EB749B268464BFD2361EF45758F444732D93D866DCDF3CA486D340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: a8c13b65cea9d356ea16b8514db902aa4dcba5185f55f5f24989ed4d58ca6426
                                                                                  • Instruction ID: 2f0aded1c58e506bb89e01ee6fff78f5ff74405e3d1b961fc7da0e59581bd72a
                                                                                  • Opcode Fuzzy Hash: a8c13b65cea9d356ea16b8514db902aa4dcba5185f55f5f24989ed4d58ca6426
                                                                                  • Instruction Fuzzy Hash: 83215163F08A8684EB659B268874BFD2361EF45748F848632D93D866DDDF3CE446D340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 07c3f79239ddffe42480303ab468d0793f2cb290f724fc6465e7ba09de79d166
                                                                                  • Instruction ID: cfa7d3f5bca22b2645aa7a791f1062efde4c5748dc8b12689237c51aa0970545
                                                                                  • Opcode Fuzzy Hash: 07c3f79239ddffe42480303ab468d0793f2cb290f724fc6465e7ba09de79d166
                                                                                  • Instruction Fuzzy Hash: FE213062F08A4685EB749B268874BFD2361EF45758F444732D93D866DCDF3CE4469340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$memcpy
                                                                                  • String ID:
                                                                                  • API String ID: 1887603139-0
                                                                                  • Opcode ID: 4abee7d5d64f7d3a415186a1935c1990f1fc296d168f87e70dc8bc6e15aed684
                                                                                  • Instruction ID: 94628131a8eb5bd8d9fd3808ddc6a2a264da27b250adcee437f34ede8b6f4039
                                                                                  • Opcode Fuzzy Hash: 4abee7d5d64f7d3a415186a1935c1990f1fc296d168f87e70dc8bc6e15aed684
                                                                                  • Instruction Fuzzy Hash: D4215123F0868685EB749B268474BFC2361EB45768F444732D93E866DCDF3CE4869340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 2e61da2eb2248dc83792848431cd5ac26fcf5439949884c105f8ef1e77e62fd7
                                                                                  • Instruction ID: 79278eb6c930783372ddf52d09fc39ad01b9afe24aff5cdb472cf2b1f4076326
                                                                                  • Opcode Fuzzy Hash: 2e61da2eb2248dc83792848431cd5ac26fcf5439949884c105f8ef1e77e62fd7
                                                                                  • Instruction Fuzzy Hash: EB211022F08A8685EB649B268874BFD2361EF45748F944632D93D866DDDF3CE446D340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 6228adb6785208c8780ed4afb107c2628e135c0ea8acf4d1a3f0e252b296a178
                                                                                  • Instruction ID: 14c9807fb6e54fcf69a6f2a2127f08d1e6f943e2df0f4ebaba3516d154cda5eb
                                                                                  • Opcode Fuzzy Hash: 6228adb6785208c8780ed4afb107c2628e135c0ea8acf4d1a3f0e252b296a178
                                                                                  • Instruction Fuzzy Hash: 92212E22F08B8684EBB49F268874BFC23A1EB45748F544632D93D866DDDF3DA486D340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: cdaf69e7d2ef374fe4f6d13058f57039585728060fcc19a93959682507387012
                                                                                  • Instruction ID: 50f09a6c708bf4dde6381531f2dd35c9c4c2617c3db9899d04b037e5c9fc8d50
                                                                                  • Opcode Fuzzy Hash: cdaf69e7d2ef374fe4f6d13058f57039585728060fcc19a93959682507387012
                                                                                  • Instruction Fuzzy Hash: 91212123F08B8685EB749F26C864BFD23A1EB45748F444632D93D866DDDF3DA4869340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: 4be58199294a5fc3a0047ffa0208aa800a139b1e4565b298b80a31e54962b60d
                                                                                  • Instruction ID: ec9112b0e25e5157c7d86e4f90039e07486cefde7a2ab1fa0586d9041f801240
                                                                                  • Opcode Fuzzy Hash: 4be58199294a5fc3a0047ffa0208aa800a139b1e4565b298b80a31e54962b60d
                                                                                  • Instruction Fuzzy Hash: C4215E22F0868684EB759B268874BFD2761EB85758F484332D93D866DDDF3CA486D340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CaptureContextExceptionRaiseUnwindabort
                                                                                  • String ID:
                                                                                  • API String ID: 390735245-0
                                                                                  • Opcode ID: 974bb72df1af5c06c83b5b03a4570bd83dccb0df6c2662da9c167491d22d3cb2
                                                                                  • Instruction ID: 8d7cb98ec6d0c47f607af022ac32d7958af54e98271bc0c6f014aa5a7927e415
                                                                                  • Opcode Fuzzy Hash: 974bb72df1af5c06c83b5b03a4570bd83dccb0df6c2662da9c167491d22d3cb2
                                                                                  • Instruction Fuzzy Hash: 8F21A822B0C68181E724EB16E4657EA6391EF85784F880236EA7DC66EEDF2CE445C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CaptureContextExceptionRaiseUnwindabort
                                                                                  • String ID:
                                                                                  • API String ID: 390735245-0
                                                                                  • Opcode ID: 937b8beb80115c3275c675492ddf9a4748e13ef6cf30560cd51afa8d36bbbd60
                                                                                  • Instruction ID: 7e1adec405c7a7e662a80eaa4b3e6b6afcfadf1aa97e0cfeb4bcaae0be213635
                                                                                  • Opcode Fuzzy Hash: 937b8beb80115c3275c675492ddf9a4748e13ef6cf30560cd51afa8d36bbbd60
                                                                                  • Instruction Fuzzy Hash: 3011C922F0C58181E725E712D4757AAA791EF85B84F880236EA7EC66EEDF3CE445C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 3298025750-0
                                                                                  • Opcode ID: b92d28ae7846d3ae64757a80e9f499f1e1f864708ca56736c3f4856fbdc78461
                                                                                  • Instruction ID: 429c8702c79bf805f7f87c391584ee58b87c9cee74ff59d5a8bfe124c04c9c66
                                                                                  • Opcode Fuzzy Hash: b92d28ae7846d3ae64757a80e9f499f1e1f864708ca56736c3f4856fbdc78461
                                                                                  • Instruction Fuzzy Hash: 8C11EF22B0C68181E724E716E4657EA6391EFC9784F884236DA7DC66EDDF3CD445C740
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: FreeHeap$CloseHandle
                                                                                  • String ID:
                                                                                  • API String ID: 1910495013-0
                                                                                  • Opcode ID: 47beff361a7016510e6482b0399fa7114c6e678aca699df9604a878c8033f4fa
                                                                                  • Instruction ID: c79e73c68c8e5f70a08628781464cc4df8e1039790e9a4e30d828dea248d7488
                                                                                  • Opcode Fuzzy Hash: 47beff361a7016510e6482b0399fa7114c6e678aca699df9604a878c8033f4fa
                                                                                  • Instruction Fuzzy Hash: BD011B27F0868381FB249B279574BBD1351AB88788F594232DB7DA63D9DF3CE4968300
                                                                                  APIs
                                                                                    • Part of subcall function 00007FFDFF2030A0: CloseHandle.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF2031CA
                                                                                    • Part of subcall function 00007FFDFF2030A0: CloseHandle.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF2031D3
                                                                                    • Part of subcall function 00007FFDFF2030A0: HeapFree.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF203230
                                                                                    • Part of subcall function 00007FFDFF2030A0: CloseHandle.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF203241
                                                                                    • Part of subcall function 00007FFDFF2030A0: CloseHandle.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF20324A
                                                                                    • Part of subcall function 00007FFDFF2030A0: HeapFree.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF20325C
                                                                                  • HeapFree.KERNEL32 ref: 00007FFDFF202F73
                                                                                  • HeapFree.KERNEL32 ref: 00007FFDFF202F92
                                                                                  • CloseHandle.KERNEL32 ref: 00007FFDFF202FA3
                                                                                  • CloseHandle.KERNEL32 ref: 00007FFDFF202FAC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 2735614835-0
                                                                                  • Opcode ID: 5d323919b5580d38be7eed752043bd3eaf73db904c3a2a8baf6ce1d2a95ff6d0
                                                                                  • Instruction ID: 75e6823a4fc51184fbbb710968ff53eeefda571e781482849ce2ffea5ce5a516
                                                                                  • Opcode Fuzzy Hash: 5d323919b5580d38be7eed752043bd3eaf73db904c3a2a8baf6ce1d2a95ff6d0
                                                                                  • Instruction Fuzzy Hash: 7A01EC12B0858244EB24EB31C875BFC1761EF85788F880232E53EC66EE8F2CE585C341
                                                                                  APIs
                                                                                    • Part of subcall function 00007FFDFF2030A0: CloseHandle.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF2031CA
                                                                                    • Part of subcall function 00007FFDFF2030A0: CloseHandle.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF2031D3
                                                                                    • Part of subcall function 00007FFDFF2030A0: HeapFree.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF203230
                                                                                    • Part of subcall function 00007FFDFF2030A0: CloseHandle.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF203241
                                                                                    • Part of subcall function 00007FFDFF2030A0: CloseHandle.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF20324A
                                                                                    • Part of subcall function 00007FFDFF2030A0: HeapFree.KERNEL32(?,?,00000000,-8000000000000000,?,00000003,?,?,00007FFDFF202F50), ref: 00007FFDFF20325C
                                                                                  • HeapFree.KERNEL32 ref: 00007FFDFF202F73
                                                                                  • HeapFree.KERNEL32 ref: 00007FFDFF202F92
                                                                                  • CloseHandle.KERNEL32 ref: 00007FFDFF202FA3
                                                                                  • CloseHandle.KERNEL32 ref: 00007FFDFF202FAC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 2735614835-0
                                                                                  • Opcode ID: feda7e8ed015115c4593f38fe453994b2521cd6536051c130e2349f6982a6fda
                                                                                  • Instruction ID: 75e6823a4fc51184fbbb710968ff53eeefda571e781482849ce2ffea5ce5a516
                                                                                  • Opcode Fuzzy Hash: feda7e8ed015115c4593f38fe453994b2521cd6536051c130e2349f6982a6fda
                                                                                  • Instruction Fuzzy Hash: 7A01EC12B0858244EB24EB31C875BFC1761EF85788F880232E53EC66EE8F2CE585C341
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$FreeHeap
                                                                                  • String ID:
                                                                                  • API String ID: 2735614835-0
                                                                                  • Opcode ID: 0ed71ea0263eb08d1fab25b516dcf43d65ab0e26a2db2f59876ce61ce2ba9b63
                                                                                  • Instruction ID: 8d0f2c51834cd4a485c122b432e99fbddfa98f43291fd4130766c8a257fc4021
                                                                                  • Opcode Fuzzy Hash: 0ed71ea0263eb08d1fab25b516dcf43d65ab0e26a2db2f59876ce61ce2ba9b63
                                                                                  • Instruction Fuzzy Hash: C0F0CD12B0868244E774EB218875BFC1761EF85788F884632E53EC66EE8F2CE585C341
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFreeHandleHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1642312469-0
                                                                                  • Opcode ID: 80717a6d2849b242457c18e5807101e40b1cebb3273e8d5bcd1ff437358af1c4
                                                                                  • Instruction ID: 04f2ee848952496d7830b82d7b6ad508471ba1c36872a8d71708c529c9a5bb7d
                                                                                  • Opcode Fuzzy Hash: 80717a6d2849b242457c18e5807101e40b1cebb3273e8d5bcd1ff437358af1c4
                                                                                  • Instruction Fuzzy Hash: 6FF0CD12F0868284EB34EB218875BFD1761EF85788F484232E53ECA6EE8F6CE545C341
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseFreeHandleHeap
                                                                                  • String ID:
                                                                                  • API String ID: 1642312469-0
                                                                                  • Opcode ID: 6ded60c8fdec2acbce477e07da216e7172d79279870f0136a2d51ac420f81b80
                                                                                  • Instruction ID: 9c853304ea42bca074e5f3740aed55b8d83913e636f03b456e06d5aca8e361ac
                                                                                  • Opcode Fuzzy Hash: 6ded60c8fdec2acbce477e07da216e7172d79279870f0136a2d51ac420f81b80
                                                                                  • Instruction Fuzzy Hash: 48F09C16B0868244EB34EB218875BFD1761EF85788F484636E53ECA6EE8F6CA585C341
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$abort$CaptureContextExceptionRaiseUnwind
                                                                                  • String ID:
                                                                                  • API String ID: 2803952147-0
                                                                                  • Opcode ID: d1af9469663f994219c1971fafe49392163632d6e4bd47c20482c2d77ad918fc
                                                                                  • Instruction ID: caac82b35320e9cb63a8b2fbf99dce106fdce3e8eb4a8816efeab713f28d0e8c
                                                                                  • Opcode Fuzzy Hash: d1af9469663f994219c1971fafe49392163632d6e4bd47c20482c2d77ad918fc
                                                                                  • Instruction Fuzzy Hash: FEE07D12F0844649EB24FA6554717BC1B60BF85B81F481670ED3FC67EFCE2CA4458600
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.3097882960.00007FFDFF1B1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00007FFDFF1B0000, based on PE: true
                                                                                  • Associated: 00000004.00000002.3097840370.00007FFDFF1B0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098009317.00007FFDFF229000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098055942.00007FFDFF22A000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098131403.00007FFDFF25E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098204184.00007FFDFF25F000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098267761.00007FFDFF260000.00000008.00000001.01000000.0000000A.sdmpDownload File
                                                                                  • Associated: 00000004.00000002.3098338289.00007FFDFF263000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffdff1b0000_msedgewebview2.jbxd
                                                                                  Similarity
                                                                                  • API ID: CloseHandle$abort$CaptureContextExceptionRaiseUnwind
                                                                                  • String ID:
                                                                                  • API String ID: 2803952147-0
                                                                                  • Opcode ID: 2d1aee6d0d740ef199ad7ee89a18e86b782de8e99af04dcfe51f29699afc9d70
                                                                                  • Instruction ID: 8ab0af404ae7d60d608df9747d4730b8457ba0cdb677827ea1b898d8495ccade
                                                                                  • Opcode Fuzzy Hash: 2d1aee6d0d740ef199ad7ee89a18e86b782de8e99af04dcfe51f29699afc9d70
                                                                                  • Instruction Fuzzy Hash: 73E07D12F0844645EB24FA6554717BC1B60BF85B81F5816B0ED3FC67EFCE2CA0458600