Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PfOHmro.exe

Overview

General Information

Sample name:PfOHmro.exe
Analysis ID:1632656
MD5:74c5934b5ec8a8907aff69552dbaeaf7
SHA1:24c6d4aa5f5b229340aba780320efc02058c059c
SHA256:95930b643e2d7d09d9cdfb2776534744ebb101347bbfe8be84f376fa15d8033a
Tags:exeRedLineStealeruser-aachum
Infos:

Detection

MicroClip, RedLine
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected MicroClip
Yara detected RedLine Stealer
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to inject code into remote processes
Drops PE files to the user root directory
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Uses taskkill to terminate processes
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PfOHmro.exe (PID: 7520 cmdline: "C:\Users\user\Desktop\PfOHmro.exe" MD5: 74C5934B5EC8A8907AFF69552DBAEAF7)
    • PfOHmro.exe (PID: 7552 cmdline: "C:\Users\user\Desktop\PfOHmro.exe" MD5: 74C5934B5EC8A8907AFF69552DBAEAF7)
    • PfOHmro.exe (PID: 7560 cmdline: "C:\Users\user\Desktop\PfOHmro.exe" MD5: 74C5934B5EC8A8907AFF69552DBAEAF7)
    • PfOHmro.exe (PID: 7568 cmdline: "C:\Users\user\Desktop\PfOHmro.exe" MD5: 74C5934B5EC8A8907AFF69552DBAEAF7)
      • conhost.exe (PID: 7584 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • EdgeBHO.exe (PID: 1752 cmdline: "C:\Users\user\AppData\Local\Temp\EdgeBHO.exe" MD5: 2DA66AC5ADC5CE1419C03DCB4100AA0A)
        • EdgeBHO.exe (PID: 1424 cmdline: "C:\Users\user\AppData\Local\Temp\EdgeBHO.exe" MD5: 2DA66AC5ADC5CE1419C03DCB4100AA0A)
          • cmd.exe (PID: 2296 cmdline: C:\Windows\system32\cmd.exe /c C:\Users\user\activate.bat MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 7916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • taskkill.exe (PID: 7744 cmdline: taskkill /f /im "EdgeBHO.exe" MD5: A599D3B2FAFBDE4C1A6D7D0F839451C7)
            • EdgeBHO.exe (PID: 7532 cmdline: "EdgeBHO.exe" MD5: 2DA66AC5ADC5CE1419C03DCB4100AA0A)
              • EdgeBHO.exe (PID: 7564 cmdline: "EdgeBHO.exe" MD5: 2DA66AC5ADC5CE1419C03DCB4100AA0A)
    • WerFault.exe (PID: 7724 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7520 -s 816 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • EdgeBHO.exe (PID: 1252 cmdline: "C:\Users\user\EdgeBHO.exe" MD5: 2DA66AC5ADC5CE1419C03DCB4100AA0A)
    • EdgeBHO.exe (PID: 3032 cmdline: "C:\Users\user\EdgeBHO.exe" MD5: 2DA66AC5ADC5CE1419C03DCB4100AA0A)
  • EdgeBHO.exe (PID: 4000 cmdline: "C:\Users\user\EdgeBHO.exe" MD5: 2DA66AC5ADC5CE1419C03DCB4100AA0A)
    • EdgeBHO.exe (PID: 5416 cmdline: "C:\Users\user\EdgeBHO.exe" MD5: 2DA66AC5ADC5CE1419C03DCB4100AA0A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["101.99.92.190:40919"], "Bot Id": "Build 7"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0000001B.00000002.2187512345.000001CDA0134000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MicroClipYara detected MicroClipJoe Security
        00000003.00000002.1857380388.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000003.00000002.1857380388.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            00000003.00000002.1857380388.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
            • 0x133ca:$a4: get_ScannedWallets
            • 0x12228:$a5: get_ScanTelegram
            • 0x1304e:$a6: get_ScanGeckoBrowsersPaths
            • 0x10e6a:$a7: <Processes>k__BackingField
            • 0xed7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
            • 0x1079e:$a9: <ScanFTP>k__BackingField
            00000010.00000002.1870552492.0000025A1E614000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MicroClipYara detected MicroClipJoe Security
              Click to see the 15 entries
              SourceRuleDescriptionAuthorStrings
              0.2.PfOHmro.exe.40c4170.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.PfOHmro.exe.40c4170.1.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0.2.PfOHmro.exe.40c4170.1.raw.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                  • 0x135ca:$a4: get_ScannedWallets
                  • 0x12428:$a5: get_ScanTelegram
                  • 0x1324e:$a6: get_ScanGeckoBrowsersPaths
                  • 0x1106a:$a7: <Processes>k__BackingField
                  • 0xef7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                  • 0x1099e:$a9: <ScanFTP>k__BackingField
                  0.2.PfOHmro.exe.40c4170.1.raw.unpackinfostealer_win_redline_stringsFinds Redline samples based on characteristic stringsSekoia.io
                  • 0x119cb:$gen01: ChromeGetRoamingName
                  • 0x119ff:$gen02: ChromeGetLocalName
                  • 0x11a28:$gen03: get_UserDomainName
                  • 0x13c67:$gen04: get_encrypted_key
                  • 0x131e3:$gen05: browserPaths
                  • 0x1352b:$gen06: GetBrowsers
                  • 0x12e61:$gen07: get_InstalledInputLanguages
                  • 0x1064f:$gen08: BCRYPT_INIT_AUTH_MODE_INFO_VERSION
                  • 0x8738:$spe1: [AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}
                  • 0x9118:$spe6: windows-1251, CommandLine:
                  • 0x143c1:$spe9: *wallet*
                  • 0xee0c:$typ01: 359A00EF6C789FD4C18644F56C5D3F97453FFF20
                  • 0xef07:$typ02: F413CEA9BAA458730567FE47F57CC3C94DDF63C0
                  • 0xf264:$typ03: A937C899247696B6565665BE3BD09607F49A2042
                  • 0xf371:$typ04: D67333042BFFC20116BF01BC556566EC76C6F7E2
                  • 0xf4f0:$typ05: 4E3D7F188A5F5102BEC5B820632BBAEC26839E63
                  • 0xee98:$typ07: 77A9683FAF2EC9EC3DABC09D33C3BD04E8897D60
                  • 0xeec1:$typ08: A8F9B62160DF085B926D5ED70E2B0F6C95A25280
                  • 0xf05f:$typ10: 2FBDC611D3D91C142C969071EA8A7D3D10FF6301
                  • 0xf39a:$typ12: EB7EF1973CDC295B7B08FE6D82B9ECDAD1106AF2
                  • 0xf439:$typ13: 04EC68A0FC7D9B6A255684F330C28A4DCAB91F13
                  0.2.PfOHmro.exe.40c4170.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                  • 0x1048a:$u7: RunPE
                  • 0x13b41:$u8: DownloadAndEx
                  • 0x9130:$pat14: , CommandLine:
                  • 0x13079:$v2_1: ListOfProcesses
                  • 0x1068b:$v2_2: get_ScanVPN
                  • 0x1072e:$v2_2: get_ScanFTP
                  • 0x1141e:$v2_2: get_ScanDiscord
                  • 0x1240c:$v2_2: get_ScanSteam
                  • 0x12428:$v2_2: get_ScanTelegram
                  • 0x124ce:$v2_2: get_ScanScreen
                  • 0x13216:$v2_2: get_ScanChromeBrowsersPaths
                  • 0x1324e:$v2_2: get_ScanGeckoBrowsersPaths
                  • 0x13509:$v2_2: get_ScanBrowsers
                  • 0x135ca:$v2_2: get_ScannedWallets
                  • 0x135f0:$v2_2: get_ScanWallets
                  • 0x13610:$v2_3: GetArguments
                  • 0x11cd9:$v2_4: VerifyUpdate
                  • 0x165ee:$v2_4: VerifyUpdate
                  • 0x139ca:$v2_5: VerifyScanRequest
                  • 0x130c6:$v2_6: GetUpdates
                  • 0x165cf:$v2_6: GetUpdates
                  Click to see the 15 entries

                  System Summary

                  barindex
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\EdgeBHO.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\EdgeBHO.exe, ProcessId: 7564, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Update64
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T16:05:32.324556+010020205001Exploit Kit Activity Detected101.99.92.1904449192.168.2.449730TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T16:05:21.934965+010020450001Malware Command and Control Activity Detected101.99.92.19040919192.168.2.449717TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T16:05:27.103360+010020460561A Network Trojan was detected101.99.92.19040919192.168.2.449717TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T16:05:27.103360+010020450011Malware Command and Control Activity Detected101.99.92.19040919192.168.2.449717TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T16:05:16.900291+010028496621Malware Command and Control Activity Detected192.168.2.449717101.99.92.19040919TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T16:05:22.165954+010028493511Malware Command and Control Activity Detected192.168.2.449717101.99.92.19040919TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T16:05:29.343108+010028482001Malware Command and Control Activity Detected192.168.2.449728101.99.92.19040919TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T16:05:27.514908+010028493521Malware Command and Control Activity Detected192.168.2.449726101.99.92.19040919TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T16:06:19.782593+010028497381Malware Command and Control Activity Detected192.168.2.457483101.99.92.19040919TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-03-08T16:05:16.900291+010018000001Malware Command and Control Activity Detected192.168.2.449717101.99.92.19040919TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: PfOHmro.exeAvira: detected
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeAvira: detection malicious, Label: TR/ClipBanker.nbegj
                  Source: 3.2.PfOHmro.exe.400000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["101.99.92.190:40919"], "Bot Id": "Build 7"}
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeReversingLabs: Detection: 28%
                  Source: PfOHmro.exeVirustotal: Detection: 62%Perma Link
                  Source: PfOHmro.exeReversingLabs: Detection: 73%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                  Source: unknownHTTPS traffic detected: 104.26.12.31:443 -> 192.168.2.4:49724 version: TLS 1.0
                  Source: PfOHmro.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1846777523.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1881631808.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019536998.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100346764.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1847383477.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1883141435.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019895484.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100631142.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1841022436.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1873487738.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016393921.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097338826.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ucrtbase.pdb source: EdgeBHO.exe, 00000010.00000002.1873662230.00007FFCA168C000.00000002.00000001.01000000.0000000C.sdmp, EdgeBHO.exe, 00000015.00000002.2440299564.00007FFCA168C000.00000002.00000001.01000000.00000016.sdmp, EdgeBHO.exe, 00000019.00000002.2054904950.00007FFC9C65C000.00000002.00000001.01000000.0000001F.sdmp
                  Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1842189370.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1875345385.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017250591.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098287991.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1840667454.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872625223.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016020890.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2096990057.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1844292763.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877909726.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018534751.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099505061.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1845961180.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1879668224.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019318045.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100136236.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-memory-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1842189370.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1875345385.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017250591.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098287991.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1847541834.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1883395222.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2020008126.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100786546.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1838528308.0000025AF4FA0000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000002.1875774155.00007FFCBB3E4000.00000002.00000001.01000000.0000000E.sdmp, EdgeBHO.exe, 00000014.00000003.1869750221.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2442069207.00007FFCBB3E4000.00000002.00000001.01000000.00000018.sdmp, EdgeBHO.exe, 00000018.00000003.2013678723.000001BAA3CFF000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2056569719.00007FFCB4704000.00000002.00000001.01000000.00000021.sdmp, EdgeBHO.exe, 0000001A.00000003.2095304862.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1841640202.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1874269759.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016740382.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097781458.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\Hand1\source\repos\Portals\Portals\obj\Release\Portals.pdb source: PfOHmro.exe, 00000000.00000000.1174105120.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, PfOHmro.exe, 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1844717900.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1878527857.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018778560.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099713680.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: EdgeBHO.exe, 0000000F.00000003.1838854004.0000025AF4FA0000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000002.1873956487.00007FFCBB2F5000.00000002.00000001.01000000.00000014.sdmp, EdgeBHO.exe, 00000014.00000003.1870065890.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2440565210.00007FFCBB2F5000.00000002.00000001.01000000.0000001E.sdmp, EdgeBHO.exe, 00000018.00000003.2013943553.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2055363994.00007FFCAD6A5000.00000002.00000001.01000000.00000027.sdmp, EdgeBHO.exe, 0000001A.00000003.2095507172.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1843973437.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877455979.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018323407.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099294626.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-heap-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1841640202.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1874269759.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016740382.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097781458.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1845394223.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1879307879.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019208738.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100033216.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-handle-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1841388876.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1873990925.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016610374.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097651612.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: EdgeBHO.exe, EdgeBHO.exe, 00000019.00000002.2055936402.00007FFCB42D1000.00000040.00000001.01000000.00000022.sdmp
                  Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1842674359.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876322759.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017630964.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098673279.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1840799142.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872892606.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016152642.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097106915.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1842674359.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876322759.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017630964.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098673279.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1840444280.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872173040.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2015729848.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2096743379.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1840903774.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1873242498.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016285040.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097235679.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1842488383.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876066587.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017499898.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098543068.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1845070058.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1879085603.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019091727.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099930115.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-process-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1847214203.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1882917745.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019761162.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100527933.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-util-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1844717900.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1878527857.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018778560.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099713680.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1840554181.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872385641.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2015879685.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2096868575.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: EdgeBHO.exe, 00000010.00000002.1874194924.00007FFCBB31B000.00000040.00000001.01000000.00000012.sdmp, EdgeBHO.exe, 00000015.00000002.2440948631.00007FFCBB31B000.00000040.00000001.01000000.0000001C.sdmp, EdgeBHO.exe, 00000019.00000002.2055093814.00007FFCABB0B000.00000040.00000001.01000000.00000025.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: EdgeBHO.exe, EdgeBHO.exe, 00000019.00000002.2055719822.00007FFCAFBA1000.00000040.00000001.01000000.00000024.sdmp
                  Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1840799142.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872892606.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016152642.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097106915.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1843473939.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876830773.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017864453.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098928872.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ucrtbase.pdbUGP source: EdgeBHO.exe, 00000010.00000002.1873662230.00007FFCA168C000.00000002.00000001.01000000.0000000C.sdmp, EdgeBHO.exe, 00000015.00000002.2440299564.00007FFCA168C000.00000002.00000001.01000000.00000016.sdmp, EdgeBHO.exe, 00000019.00000002.2054904950.00007FFC9C65C000.00000002.00000001.01000000.0000001F.sdmp
                  Source: Binary string: api-ms-win-core-file-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1840903774.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1873242498.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016285040.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097235679.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\python313.pdb source: EdgeBHO.exe, 00000010.00000002.1871702839.00007FFC9CAB9000.00000040.00000001.01000000.0000000D.sdmp, EdgeBHO.exe, 00000015.00000002.2438702214.00007FFC9CAB9000.00000040.00000001.01000000.00000017.sdmp, EdgeBHO.exe, 00000019.00000002.2053349770.00007FFC9C349000.00000040.00000001.01000000.00000020.sdmp
                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1838854004.0000025AF4FA0000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000002.1873956487.00007FFCBB2F5000.00000002.00000001.01000000.00000014.sdmp, EdgeBHO.exe, 00000014.00000003.1870065890.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2440565210.00007FFCBB2F5000.00000002.00000001.01000000.0000001E.sdmp, EdgeBHO.exe, 00000018.00000003.2013943553.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2055363994.00007FFCAD6A5000.00000002.00000001.01000000.00000027.sdmp, EdgeBHO.exe, 0000001A.00000003.2095507172.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1848154049.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1883754430.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2020233504.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101102837.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1841388876.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1873990925.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016610374.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097651612.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1844292763.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877909726.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018534751.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099505061.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1844159682.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877708898.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018431971.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099398521.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_wmi.pdb(('GCTL source: EdgeBHO.exe, 00000010.00000002.1874771647.00007FFCBB391000.00000040.00000001.01000000.00000013.sdmp, EdgeBHO.exe, 00000015.00000002.2441419137.00007FFCBB391000.00000040.00000001.01000000.0000001D.sdmp, EdgeBHO.exe, 00000019.00000002.2055498902.00007FFCAF5E1000.00000040.00000001.01000000.00000026.sdmp
                  Source: Binary string: api-ms-win-core-profile-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1843473939.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876830773.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017864453.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098928872.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1842488383.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876066587.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017499898.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098543068.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\Hand1\source\repos\Portals\Portals\obj\Release\Portals.pdb<;V; H;_CorExeMainmscoree.dll source: PfOHmro.exe, 00000000.00000000.1174105120.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, PfOHmro.exe, 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1840554181.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872385641.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2015879685.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2096868575.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1844899504.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1878874442.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018917388.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099824827.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: EdgeBHO.exe, 0000000F.00000003.1838528308.0000025AF4FA0000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000002.1875774155.00007FFCBB3E4000.00000002.00000001.01000000.0000000E.sdmp, EdgeBHO.exe, 00000014.00000003.1869750221.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2442069207.00007FFCBB3E4000.00000002.00000001.01000000.00000018.sdmp, EdgeBHO.exe, 00000018.00000003.2013678723.000001BAA3CFF000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2056569719.00007FFCB4704000.00000002.00000001.01000000.00000021.sdmp, EdgeBHO.exe, 0000001A.00000003.2095304862.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1846946271.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1882472597.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019644449.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100446698.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1842045762.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1875042633.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017137169.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098161682.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1841738441.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1874518425.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016870009.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097910012.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-string-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1843847302.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877251431.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018182031.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099196398.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: EdgeBHO.exe, 0000000F.00000003.1842994259.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876585682.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017739876.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098810697.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-debug-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1840667454.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872625223.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016020890.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2096990057.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1841905883.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1874768746.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017004149.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098037187.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1842352547.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1875802095.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017371983.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098415607.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1848640080.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1883914289.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2020354386.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101211287.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1843707805.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877034168.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018002633.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099071239.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1844446204.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1878154496.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018669769.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099608160.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1843847302.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877251431.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018182031.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099196398.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1841155329.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1873736321.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016505020.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097524068.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-console-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1840444280.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872173040.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2015729848.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2096743379.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: EdgeBHO.exe, 00000010.00000002.1874194924.00007FFCBB31B000.00000040.00000001.01000000.00000012.sdmp, EdgeBHO.exe, 00000015.00000002.2440948631.00007FFCBB31B000.00000040.00000001.01000000.0000001C.sdmp, EdgeBHO.exe, 00000019.00000002.2055093814.00007FFCABB0B000.00000040.00000001.01000000.00000025.sdmp
                  Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1847214203.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1882917745.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019761162.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100527933.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1841905883.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1874768746.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017004149.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098037187.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1842352547.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1875802095.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017371983.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098415607.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-synch-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1843973437.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877455979.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018323407.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099294626.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1841738441.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1874518425.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016870009.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097910012.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_wmi.pdb source: EdgeBHO.exe, EdgeBHO.exe, 00000019.00000002.2055498902.00007FFCAF5E1000.00000040.00000001.01000000.00000026.sdmp
                  Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1843707805.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877034168.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018002633.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099071239.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1846646974.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1880638314.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019428022.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100241717.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1847742380.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1883582433.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2020118947.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100991668.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1844899504.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1878874442.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018917388.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099824827.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84992F0 FindFirstFileExW,FindClose,15_2_00007FF6F84992F0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84983B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,15_2_00007FF6F84983B0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B1BD4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_00007FF6F84B1BD4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84992F0 FindFirstFileExW,FindClose,16_2_00007FF6F84992F0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84983B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,16_2_00007FF6F84983B0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84B1BD4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,16_2_00007FF6F84B1BD4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA164F118 FindFirstFileExA,FindClose,FindNextFileA,16_2_00007FFCA164F118
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA164F2C8 FindFirstFileExW,FindClose,FindNextFileW,16_2_00007FFCA164F2C8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE3592F0 FindFirstFileExW,FindClose,20_2_00007FF6AE3592F0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE3583B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,20_2_00007FF6AE3583B0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE371BD4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_00007FF6AE371BD4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE3592F0 FindFirstFileExW,FindClose,21_2_00007FF6AE3592F0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE3583B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,21_2_00007FF6AE3583B0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE371BD4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_00007FF6AE371BD4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C61F118 FindFirstFileExA,FindClose,FindNextFileA,25_2_00007FFC9C61F118
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C61F2C8 FindFirstFileExW,FindClose,FindNextFileW,25_2_00007FFC9C61F2C8

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 1800000 - Severity 1 - Joe Security MALWARE RedLine - Initial C&C Contact - SOAP CheckConnect : 192.168.2.4:49717 -> 101.99.92.190:40919
                  Source: Network trafficSuricata IDS: 2849662 - Severity 1 - ETPRO MALWARE RedLine - CheckConnect Request : 192.168.2.4:49717 -> 101.99.92.190:40919
                  Source: Network trafficSuricata IDS: 2849352 - Severity 1 - ETPRO MALWARE RedLine - SetEnvironment Request : 192.168.2.4:49726 -> 101.99.92.190:40919
                  Source: Network trafficSuricata IDS: 2848200 - Severity 1 - ETPRO MALWARE RedLine - GetUpdates Request : 192.168.2.4:49728 -> 101.99.92.190:40919
                  Source: Network trafficSuricata IDS: 2045000 - Severity 1 - ET MALWARE RedLine Stealer - CheckConnect Response : 101.99.92.190:40919 -> 192.168.2.4:49717
                  Source: Network trafficSuricata IDS: 2849351 - Severity 1 - ETPRO MALWARE RedLine - EnvironmentSettings Request : 192.168.2.4:49717 -> 101.99.92.190:40919
                  Source: Network trafficSuricata IDS: 2020500 - Severity 1 - ET EXPLOIT_KIT DRIVEBY Likely Evil EXE with no referer from HFS webserver (used by Unknown EK) : 101.99.92.190:4449 -> 192.168.2.4:49730
                  Source: Network trafficSuricata IDS: 2045001 - Severity 1 - ET MALWARE Win32/LeftHook Stealer Browser Extension Config Inbound : 101.99.92.190:40919 -> 192.168.2.4:49717
                  Source: Network trafficSuricata IDS: 2046056 - Severity 1 - ET MALWARE Redline Stealer/MetaStealer Family Activity (Response) : 101.99.92.190:40919 -> 192.168.2.4:49717
                  Source: Network trafficSuricata IDS: 2849738 - Severity 1 - ETPRO MALWARE RedLine - VerifyUpdate Request : 192.168.2.4:57483 -> 101.99.92.190:40919
                  Source: Malware configuration extractorURLs: 101.99.92.190:40919
                  Source: global trafficTCP traffic: 101.99.92.190 ports 0,1,4,40919,9,4449
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 40919
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40919 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 40919
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40919 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40919 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 40919
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40919 -> 49726
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 40919
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40919 -> 49728
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 4449
                  Source: unknownNetwork traffic detected: HTTP traffic on port 4449 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57483 -> 40919
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40919 -> 57483
                  Source: global trafficTCP traffic: 192.168.2.4:49717 -> 101.99.92.190:40919
                  Source: global trafficTCP traffic: 192.168.2.4:57479 -> 162.159.36.2:53
                  Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1Host: api.ip.sbConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 101.99.92.190:40919Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 101.99.92.190:40919Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 101.99.92.190:40919Content-Length: 949742Expect: 100-continueAccept-Encoding: gzip, deflate
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 101.99.92.190:40919Content-Length: 949734Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /EdgeBHO.exe HTTP/1.1Host: 101.99.92.190:4449Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/VerifyUpdate"Host: 101.99.92.190:40919Content-Length: 949760Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 104.26.12.31 104.26.12.31
                  Source: Joe Sandbox ViewASN Name: SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: unknownHTTPS traffic detected: 104.26.12.31:443 -> 192.168.2.4:49724 version: TLS 1.0
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: unknownTCP traffic detected without corresponding DNS query: 101.99.92.190
                  Source: global trafficHTTP traffic detected: GET /geoip HTTP/1.1Host: api.ip.sbConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /EdgeBHO.exe HTTP/1.1Host: 101.99.92.190:4449Connection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: api.ip.sb
                  Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 101.99.92.190:40919Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmp, PfOHmro.exe, 00000003.00000002.1859182871.0000000003440000.00000004.00000800.00020000.00000000.sdmp, PfOHmro.exe, 00000003.00000002.1859182871.0000000003374000.00000004.00000800.00020000.00000000.sdmp, PfOHmro.exe, 00000003.00000002.1859182871.0000000003458000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://101.99.92.190:40919
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://101.99.92.190:40919/
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003458000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://101.99.92.190:40919t-
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.00000000032F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://101.99.92.190:4449
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.00000000032F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://101.99.92.190:4449/EdgeBHO.exe
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.00000000032F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://101.99.92.190:4449t-
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digi
                  Source: EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digiY
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003374000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.00000000032B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.00000000032B0000.00000004.00000800.00020000.00000000.sdmp, PfOHmro.exe, 00000003.00000002.1859182871.00000000032F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003440000.00000004.00000800.00020000.00000000.sdmp, PfOHmro.exe, 00000003.00000002.1859182871.00000000032B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003374000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003458000.00000004.00000800.00020000.00000000.sdmp, PfOHmro.exe, 00000003.00000002.1859182871.00000000032B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003261000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                  Source: EdgeBHO.exe, 0000000F.00000003.1851074463.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000000F.00000003.1850514054.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1884723569.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1885366703.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021437101.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2021039069.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101865238.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2102289563.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                  Source: PfOHmro.exe, 00000003.00000002.1861820428.0000000004396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org?q=
                  Source: PfOHmro.exe, PfOHmro.exe, 00000003.00000002.1857380388.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                  Source: PfOHmro.exe, PfOHmro.exe, 00000003.00000002.1857380388.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                  Source: PfOHmro.exe, 00000003.00000002.1861820428.0000000004396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: PfOHmro.exe, 00000003.00000002.1861820428.0000000004396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: PfOHmro.exe, 00000003.00000002.1861820428.0000000004396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: EdgeBHO.exe, 0000001B.00000003.2168680322.000001CD9FB95000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001B.00000003.2170827937.000001CD9FB97000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001B.00000003.2166877294.000001CD9FB71000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001B.00000003.2167630173.000001CD9FB88000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.pyth
                  Source: EdgeBHO.exe, 00000010.00000002.1869638291.0000025A1E3C3000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2434606489.0000019362C1D000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2043555269.00000286B9C63000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2040689177.00000286B9C16000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2043381394.00000286B9C45000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2041365193.00000286B9C19000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2041472853.00000286B9C3E000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001B.00000003.2168018169.000001CD9F77B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
                  Source: EdgeBHO.exe, 00000010.00000002.1868036860.0000025A1DCD0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2433304462.00000193629B0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2049937002.00000286B9920000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/howto/mro.html.
                  Source: EdgeBHO.exe, 00000010.00000002.1868036860.0000025A1DCD0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2433304462.00000193629B0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2049937002.00000286B9920000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.ExecutionLoader.get_filename
                  Source: EdgeBHO.exe, 00000010.00000002.1868036860.0000025A1DCD0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2433304462.00000193629B0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2049937002.00000286B9920000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_code
                  Source: EdgeBHO.exe, 00000010.00000002.1868036860.0000025A1DD54000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2433304462.0000019362A34000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2049937002.00000286B99A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.get_source
                  Source: EdgeBHO.exe, 00000010.00000002.1868036860.0000025A1DCD0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2433304462.00000193629B0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2049937002.00000286B9920000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.InspectLoader.is_package
                  Source: EdgeBHO.exe, 00000010.00000002.1868036860.0000025A1DD54000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2433304462.0000019362A34000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2049937002.00000286B99A4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.create_module
                  Source: EdgeBHO.exe, 00000010.00000002.1868036860.0000025A1DCD0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2433304462.00000193629B0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2049937002.00000286B9920000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
                  Source: EdgeBHO.exe, 00000010.00000002.1868036860.0000025A1DCD0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2433304462.00000193629B0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2049937002.00000286B9920000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.MetaPathFinder.invalidate_caches
                  Source: EdgeBHO.exe, 00000010.00000002.1868036860.0000025A1DCD0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2433304462.00000193629B0000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2049937002.00000286B9920000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
                  Source: EdgeBHO.exe, 00000010.00000002.1869157894.0000025A1DF90000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1892757641.0000019362BE2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1892047968.0000019362BE9000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2434606489.0000019362BB0000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1891539681.0000019362BE9000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1892987645.0000019362BE7000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2049796744.00000286B8058000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2043997505.00000286B8057000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
                  Source: PfOHmro.exe, 00000003.00000002.1861820428.0000000004396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: PfOHmro.exe, 00000003.00000002.1861820428.0000000004396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabv20
                  Source: PfOHmro.exe, 00000003.00000002.1861820428.0000000004396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: PfOHmro.exe, 00000003.00000002.1861820428.0000000004396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gemini.google.com/app?q=
                  Source: EdgeBHO.exe, 00000010.00000002.1869157894.0000025A1DF90000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1892757641.0000019362BE2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1892047968.0000019362BE9000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2434606489.0000019362BB0000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1891539681.0000019362BE9000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1892987645.0000019362BE7000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2028271325.00000286B9BA2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2045514176.00000286B9BA2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2041189277.00000286B9BA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2050301109.00000286B9B85000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2045959527.00000286B9B85000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2029510790.00000286B9BA2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2046603943.00000286B9B85000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2050354652.00000286B9BA2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2044269212.00000286B9B84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
                  Source: EdgeBHO.exe, 00000015.00000002.2436368256.0000019363144000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2051907220.00000286BA104000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/asweigart/pyperclip/issues/55
                  Source: EdgeBHO.exe, 00000019.00000002.2051907220.00000286BA104000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/asweigart/pyperclip/issues/55po
                  Source: EdgeBHO.exe, 00000010.00000002.1868036860.0000025A1DD54000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2433304462.0000019362A34000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2049937002.00000286B99A4000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 0000001B.00000002.2182758834.000001CD9F6EC000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001B.00000003.2166967541.000001CD9F6DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
                  Source: EdgeBHO.exe, 00000019.00000003.2044269212.00000286B9B84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
                  Source: EdgeBHO.exe, 00000010.00000002.1869157894.0000025A1DF90000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1892757641.0000019362BE2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1892047968.0000019362BE9000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2434606489.0000019362BB0000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1891539681.0000019362BE9000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1892987645.0000019362BE7000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2028271325.00000286B9BA2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2045514176.00000286B9BA2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2041189277.00000286B9BA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2050301109.00000286B9B85000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2045959527.00000286B9B85000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2029510790.00000286B9BA2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2046603943.00000286B9B85000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2050354652.00000286B9BA2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2044269212.00000286B9B84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
                  Source: EdgeBHO.exe, 00000010.00000002.1869638291.0000025A1E48C000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000002.1869638291.0000025A1E3C3000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000003.1863149520.0000025A1E48C000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000003.1862893983.0000025A1E47B000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000003.1862823991.0000025A1E472000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1893596956.0000019363058000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2435437723.0000019362FA4000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2044460362.00000286BA065000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2031243370.00000286BA31F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2039794073.00000286BA31F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2039930478.00000286BA055000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2030953933.00000286BA31F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2051643701.00000286BA055000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2031381064.00000286BA058000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2051643701.00000286BA074000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2041777990.00000286BA055000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2040751400.00000286BA055000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001B.00000003.2113090596.000001CD9FBB7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/issues/86361.
                  Source: EdgeBHO.exe, 00000010.00000002.1870335387.0000025A1E524000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2436368256.0000019363144000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2051907220.00000286BA104000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/importlib_metadata/wiki/Development-Methodology
                  Source: EdgeBHO.exe, 00000010.00000002.1869157894.0000025A1DF90000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1892757641.0000019362BE2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1892047968.0000019362BE9000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2434606489.0000019362BB0000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1891539681.0000019362BE9000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000003.1892987645.0000019362BE7000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2028271325.00000286B9BA2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2045514176.00000286B9BA2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2041189277.00000286B9BA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2050301109.00000286B9B85000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2045959527.00000286B9B85000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2029510790.00000286B9BA2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2046603943.00000286B9B85000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2050354652.00000286B9BA2000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2044269212.00000286B9B84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
                  Source: PfOHmro.exe, PfOHmro.exe, 00000003.00000002.1857380388.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                  Source: EdgeBHO.exe, 00000010.00000002.1870335387.0000025A1E524000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000003.1860536177.0000025A1E3D1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2436368256.0000019363144000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2051907220.00000286BA104000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://peps.python.org/pep-0205/
                  Source: EdgeBHO.exe, 00000010.00000002.1871702839.00007FFC9CAB9000.00000040.00000001.01000000.0000000D.sdmp, EdgeBHO.exe, 00000015.00000002.2438702214.00007FFC9CAB9000.00000040.00000001.01000000.00000017.sdmp, EdgeBHO.exe, 00000019.00000002.2053349770.00007FFC9C349000.00000040.00000001.01000000.00000020.sdmpString found in binary or memory: https://peps.python.org/pep-0263/
                  Source: EdgeBHO.exe, 0000001B.00000002.2187512345.000001CDA0134000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://pyperclip.readthedocs.io/en/latest/index.html#not-implemented-error
                  Source: PfOHmro.exe, 00000003.00000002.1861820428.0000000004396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/v20
                  Source: PfOHmro.exe, 00000003.00000002.1861820428.0000000004396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_alldp.ico
                  Source: EdgeBHO.exe, 00000010.00000002.1871702839.00007FFC9CAB9000.00000040.00000001.01000000.0000000D.sdmp, EdgeBHO.exe, 00000015.00000002.2438702214.00007FFC9CAB9000.00000040.00000001.01000000.00000017.sdmp, EdgeBHO.exe, 00000019.00000002.2053349770.00007FFC9C349000.00000040.00000001.01000000.00000020.sdmpString found in binary or memory: https://www.python.org/psf/license/)
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724

                  System Summary

                  barindex
                  Source: 0.2.PfOHmro.exe.40c4170.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.PfOHmro.exe.40c4170.1.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 0.2.PfOHmro.exe.40c4170.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.2.PfOHmro.exe.40a9550.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.PfOHmro.exe.40a9550.0.raw.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 0.2.PfOHmro.exe.40a9550.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 3.2.PfOHmro.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 3.2.PfOHmro.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 3.2.PfOHmro.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.2.PfOHmro.exe.40c4170.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 0.2.PfOHmro.exe.40c4170.1.unpack, type: UNPACKEDPEMatched rule: Finds Redline samples based on characteristic strings Author: Sekoia.io
                  Source: 0.2.PfOHmro.exe.40c4170.1.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000003.00000002.1857380388.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: Process Memory Space: PfOHmro.exe PID: 7520, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: Process Memory Space: PfOHmro.exe PID: 7568, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 0_2_02F225480_2_02F22548
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 3_2_0304E7B03_2_0304E7B0
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 3_2_0304DC903_2_0304DC90
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 3_2_06B896283_2_06B89628
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 3_2_06B844683_2_06B84468
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 3_2_06B834603_2_06B83460
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 3_2_06B812103_2_06B81210
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 3_2_06B8DD003_2_06B8DD00
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 3_2_06B8D1083_2_06B8D108
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B0C3015_2_00007FF6F84B0C30
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F8498BD015_2_00007FF6F8498BD0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B6DAC15_2_00007FF6F84B6DAC
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F849100015_2_00007FF6F8491000
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84A19C815_2_00007FF6F84A19C8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84A21E815_2_00007FF6F84A21E8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B9A8015_2_00007FF6F84B9A80
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B62B015_2_00007FF6F84B62B0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84A3A7015_2_00007FF6F84A3A70
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84ADAB815_2_00007FF6F84ADAB8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F849A34B15_2_00007FF6F849A34B
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B1BD415_2_00007FF6F84B1BD4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84A1BD415_2_00007FF6F84A1BD4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84BACA015_2_00007FF6F84BACA0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F849AD1D15_2_00007FF6F849AD1D
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B44BC15_2_00007FF6F84B44BC
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F849A4E415_2_00007FF6F849A4E4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84A360015_2_00007FF6F84A3600
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84AE5C815_2_00007FF6F84AE5C8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84A1DD815_2_00007FF6F84A1DD8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84A9E6C15_2_00007FF6F84A9E6C
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B0C3015_2_00007FF6F84B0C30
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84A87B415_2_00007FF6F84A87B4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84ADF5015_2_00007FF6F84ADF50
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B403015_2_00007FF6F84B4030
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B603015_2_00007FF6F84B6030
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84A17C415_2_00007FF6F84A17C4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84A1FE415_2_00007FF6F84A1FE4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B685415_2_00007FF6F84B6854
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F849987015_2_00007FF6F8499870
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84A810415_2_00007FF6F84A8104
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84B6DAC16_2_00007FF6F84B6DAC
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F849100016_2_00007FF6F8491000
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84B603016_2_00007FF6F84B6030
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84A19C816_2_00007FF6F84A19C8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84A21E816_2_00007FF6F84A21E8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84B9A8016_2_00007FF6F84B9A80
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84B62B016_2_00007FF6F84B62B0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84A3A7016_2_00007FF6F84A3A70
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84ADAB816_2_00007FF6F84ADAB8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F849A34B16_2_00007FF6F849A34B
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84B0C3016_2_00007FF6F84B0C30
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F8498BD016_2_00007FF6F8498BD0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84B1BD416_2_00007FF6F84B1BD4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84A1BD416_2_00007FF6F84A1BD4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84BACA016_2_00007FF6F84BACA0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F849AD1D16_2_00007FF6F849AD1D
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84B44BC16_2_00007FF6F84B44BC
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F849A4E416_2_00007FF6F849A4E4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84A360016_2_00007FF6F84A3600
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84AE5C816_2_00007FF6F84AE5C8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84A1DD816_2_00007FF6F84A1DD8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84A9E6C16_2_00007FF6F84A9E6C
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84B0C3016_2_00007FF6F84B0C30
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84A87B416_2_00007FF6F84A87B4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84ADF5016_2_00007FF6F84ADF50
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84B403016_2_00007FF6F84B4030
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84A17C416_2_00007FF6F84A17C4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84A1FE416_2_00007FF6F84A1FE4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84B685416_2_00007FF6F84B6854
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F849987016_2_00007FF6F8499870
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84A810416_2_00007FF6F84A8104
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFC9CD051D016_2_00007FFC9CD051D0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15F41C016_2_00007FFCA15F41C0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA164E0A016_2_00007FFCA164E0A0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA160E0A016_2_00007FFCA160E0A0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15EA09016_2_00007FFCA15EA090
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA160913516_2_00007FFCA1609135
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA164F11816_2_00007FFCA164F118
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15FF47016_2_00007FFCA15FF470
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA160A43016_2_00007FFCA160A430
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA160F43816_2_00007FFCA160F438
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA164D40016_2_00007FFCA164D400
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA160732016_2_00007FFCA1607320
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15E553016_2_00007FFCA15E5530
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15FA81016_2_00007FFCA15FA810
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15F867016_2_00007FFCA15F8670
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15F974416_2_00007FFCA15F9744
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15E473416_2_00007FFCA15E4734
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15FA97016_2_00007FFCA15FA970
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15F993016_2_00007FFCA15F9930
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA161592816_2_00007FFCA1615928
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA161991016_2_00007FFCA1619910
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA160AB9016_2_00007FFCA160AB90
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15F9C7016_2_00007FFCA15F9C70
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15E3C3016_2_00007FFCA15E3C30
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15EDC0016_2_00007FFCA15EDC00
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA1604AFA16_2_00007FFCA1604AFA
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15F2AC416_2_00007FFCA15F2AC4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15E2ABC16_2_00007FFCA15E2ABC
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15F7AB816_2_00007FFCA15F7AB8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA164EB2816_2_00007FFCA164EB28
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15F5E4016_2_00007FFCA15F5E40
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15F9E1C16_2_00007FFCA15F9E1C
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15FAE0016_2_00007FFCA15FAE00
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15F6CC016_2_00007FFCA15F6CC0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA166FC9016_2_00007FFCA166FC90
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA160BD4016_2_00007FFCA160BD40
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA164ED0416_2_00007FFCA164ED04
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15FAF9016_2_00007FFCA15FAF90
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA166407016_2_00007FFCA1664070
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA163F07416_2_00007FFCA163F074
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA161205016_2_00007FFCA1612050
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15F4EB016_2_00007FFCA15F4EB0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA15ECF3016_2_00007FFCA15ECF30
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB3023B016_2_00007FFCBB3023B0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB3073FC16_2_00007FFCBB3073FC
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB3012B016_2_00007FFCBB3012B0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB308F5016_2_00007FFCBB308F50
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB305F0016_2_00007FFCBB305F00
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB302F7016_2_00007FFCBB302F70
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB3055D016_2_00007FFCBB3055D0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB301A0016_2_00007FFCBB301A00
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB30465016_2_00007FFCBB304650
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB30192016_2_00007FFCBB301920
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB30F52416_2_00007FFCBB30F524
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB333DC016_2_00007FFCBB333DC0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB3377E816_2_00007FFCBB3377E8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB33C89016_2_00007FFCBB33C890
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB332DA016_2_00007FFCBB332DA0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB33606016_2_00007FFCBB336060
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB333B2016_2_00007FFCBB333B20
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB39C49016_2_00007FFCBB39C490
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB3910C016_2_00007FFCBB3910C0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB3916A016_2_00007FFCBB3916A0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB3C4BE016_2_00007FFCBB3C4BE0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB3A626416_2_00007FFCBB3A6264
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB3A363016_2_00007FFCBB3A3630
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE35100020_2_00007FF6AE351000
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE376DAC20_2_00007FF6AE376DAC
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE358BD020_2_00007FF6AE358BD0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE370C3020_2_00007FF6AE370C30
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE3687B420_2_00007FF6AE3687B4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE36DF5020_2_00007FF6AE36DF50
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE37403020_2_00007FF6AE374030
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE37603020_2_00007FF6AE376030
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE3617C420_2_00007FF6AE3617C4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE361FE420_2_00007FF6AE361FE4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE37685420_2_00007FF6AE376854
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE35987020_2_00007FF6AE359870
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE36810420_2_00007FF6AE368104
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE36360020_2_00007FF6AE363600
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE36E5C820_2_00007FF6AE36E5C8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE361DD820_2_00007FF6AE361DD8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE369E6C20_2_00007FF6AE369E6C
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE35A34B20_2_00007FF6AE35A34B
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE370C3020_2_00007FF6AE370C30
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE371BD420_2_00007FF6AE371BD4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE361BD420_2_00007FF6AE361BD4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE37ACA020_2_00007FF6AE37ACA0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE35AD1D20_2_00007FF6AE35AD1D
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE3744BC20_2_00007FF6AE3744BC
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE35A4E420_2_00007FF6AE35A4E4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE3619C820_2_00007FF6AE3619C8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE3621E820_2_00007FF6AE3621E8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE379A8020_2_00007FF6AE379A80
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE3762B020_2_00007FF6AE3762B0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE363A7020_2_00007FF6AE363A70
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE36DAB820_2_00007FF6AE36DAB8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE35100021_2_00007FF6AE351000
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE37603021_2_00007FF6AE376030
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE376DAC21_2_00007FF6AE376DAC
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE370C3021_2_00007FF6AE370C30
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE3687B421_2_00007FF6AE3687B4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE36DF5021_2_00007FF6AE36DF50
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE37403021_2_00007FF6AE374030
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE3617C421_2_00007FF6AE3617C4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE361FE421_2_00007FF6AE361FE4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE37685421_2_00007FF6AE376854
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE35987021_2_00007FF6AE359870
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE36810421_2_00007FF6AE368104
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE36360021_2_00007FF6AE363600
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE36E5C821_2_00007FF6AE36E5C8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE361DD821_2_00007FF6AE361DD8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE369E6C21_2_00007FF6AE369E6C
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE35A34B21_2_00007FF6AE35A34B
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE370C3021_2_00007FF6AE370C30
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE371BD421_2_00007FF6AE371BD4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE361BD421_2_00007FF6AE361BD4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE358BD021_2_00007FF6AE358BD0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE37ACA021_2_00007FF6AE37ACA0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE35AD1D21_2_00007FF6AE35AD1D
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE3744BC21_2_00007FF6AE3744BC
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE35A4E421_2_00007FF6AE35A4E4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE3619C821_2_00007FF6AE3619C8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE3621E821_2_00007FF6AE3621E8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE379A8021_2_00007FF6AE379A80
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE3762B021_2_00007FF6AE3762B0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE363A7021_2_00007FF6AE363A70
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE36DAB821_2_00007FF6AE36DAB8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB333B2021_2_00007FFCBB333B20
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB33C89021_2_00007FFCBB33C890
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB3377E821_2_00007FFCBB3377E8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB33606021_2_00007FFCBB336060
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB333DC021_2_00007FFCBB333DC0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB332DA021_2_00007FFCBB332DA0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB39C49021_2_00007FFCBB39C490
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB3916A021_2_00007FFCBB3916A0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB3910C021_2_00007FFCBB3910C0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB3D63A021_2_00007FFCBB3D63A0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB3D830021_2_00007FFCBB3D8300
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBBBD3F5021_2_00007FFCBBBD3F50
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBBBD1F5021_2_00007FFCBBBD1F50
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBBBD2ED021_2_00007FFCBBBD2ED0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBBBD32E021_2_00007FFCBBBD32E0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBBBD39F021_2_00007FFCBBBD39F0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBBBD27A021_2_00007FFCBBBD27A0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5951D025_2_00007FFC9C5951D0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5C6CC025_2_00007FFC9C5C6CC0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C63FC9025_2_00007FFC9C63FC90
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5DBD4025_2_00007FFC9C5DBD40
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C61ED0425_2_00007FFC9C61ED04
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5C5E4025_2_00007FFC9C5C5E40
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5C9E1C25_2_00007FFC9C5C9E1C
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5CAE0025_2_00007FFC9C5CAE00
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5C4EB025_2_00007FFC9C5C4EB0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5BCF3025_2_00007FFC9C5BCF30
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5CAF9025_2_00007FFC9C5CAF90
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C63407025_2_00007FFC9C634070
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C60F07425_2_00007FFC9C60F074
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5E205025_2_00007FFC9C5E2050
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5CA97025_2_00007FFC9C5CA970
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5E592825_2_00007FFC9C5E5928
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5C993025_2_00007FFC9C5C9930
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5E991025_2_00007FFC9C5E9910
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5D4AFA25_2_00007FFC9C5D4AFA
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5C2AC425_2_00007FFC9C5C2AC4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5B2ABC25_2_00007FFC9C5B2ABC
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5C7AB825_2_00007FFC9C5C7AB8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C61EB2825_2_00007FFC9C61EB28
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5DAB9025_2_00007FFC9C5DAB90
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5C9C7025_2_00007FFC9C5C9C70
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5B3C3025_2_00007FFC9C5B3C30
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5BDC0025_2_00007FFC9C5BDC00
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5B553025_2_00007FFC9C5B5530
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5C867025_2_00007FFC9C5C8670
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5C974425_2_00007FFC9C5C9744
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5B473425_2_00007FFC9C5B4734
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5CA81025_2_00007FFC9C5CA810
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5DE0A025_2_00007FFC9C5DE0A0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C61E0A025_2_00007FFC9C61E0A0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5BA09025_2_00007FFC9C5BA090
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5D913525_2_00007FFC9C5D9135
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C61F11825_2_00007FFC9C61F118
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5C41C025_2_00007FFC9C5C41C0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5D732025_2_00007FFC9C5D7320
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5CF47025_2_00007FFC9C5CF470
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5DF43825_2_00007FFC9C5DF438
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5DA43025_2_00007FFC9C5DA430
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C61D40025_2_00007FFC9C61D400
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCABAF73FC25_2_00007FFCABAF73FC
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCABAF23B025_2_00007FFCABAF23B0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCABAF12B025_2_00007FFCABAF12B0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCABAF1A0025_2_00007FFCABAF1A00
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCABAF192025_2_00007FFCABAF1920
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCABAF5F0025_2_00007FFCABAF5F00
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCABAF2F7025_2_00007FFCABAF2F70
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCABAF8F5025_2_00007FFCABAF8F50
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCABAF465025_2_00007FFCABAF4650
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCABAF55D025_2_00007FFCABAF55D0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCABAFF52425_2_00007FFCABAFF524
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCAF5EC49025_2_00007FFCAF5EC490
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCAF5E10C025_2_00007FFCAF5E10C0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCAF5E16A025_2_00007FFCAF5E16A0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCAFBA606025_2_00007FFCAFBA6060
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCAFBA3B2025_2_00007FFCAFBA3B20
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCAFBA3DC025_2_00007FFCAFBA3DC0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCAFBA77E825_2_00007FFCAFBA77E8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCAFBAC89025_2_00007FFCAFBAC890
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCAFBA2DA025_2_00007FFCAFBA2DA0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB42D363025_2_00007FFCB42D3630
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB42D626425_2_00007FFCB42D6264
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB42F4BE025_2_00007FFCB42F4BE0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB46E39F025_2_00007FFCB46E39F0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB46E32E025_2_00007FFCB46E32E0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB46E2ED025_2_00007FFCB46E2ED0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB46E27A025_2_00007FFCB46E27A0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB46E3F5025_2_00007FFCB46E3F50
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB46E1F5025_2_00007FFCB46E1F50
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB46F830025_2_00007FFCB46F8300
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB46F63A025_2_00007FFCB46F63A0
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe F76FDE632A80C0C487FA71AC27699BDAF5D3B840ED3F1DD82448C80F4CD03FAC
                  Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\_MEI12522\VCRUNTIME140.dll 36585912E5EAF83BA9FEA0631534F690CCDC2D7BA91537166FE53E56C221E153
                  Source: C:\Users\user\EdgeBHO.exeCode function: String function: 00007FFCB42E34D8 appears 78 times
                  Source: C:\Users\user\EdgeBHO.exeCode function: String function: 00007FFCB42E3278 appears 45 times
                  Source: C:\Users\user\EdgeBHO.exeCode function: String function: 00007FF6AE352910 appears 34 times
                  Source: C:\Users\user\EdgeBHO.exeCode function: String function: 00007FFC9C5C2FA0 appears 44 times
                  Source: C:\Users\user\EdgeBHO.exeCode function: String function: 00007FF6AE352710 appears 104 times
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: String function: 00007FF6F8492910 appears 34 times
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: String function: 00007FFCBB3B3278 appears 45 times
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: String function: 00007FFCA15F2FA0 appears 44 times
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: String function: 00007FFCBB3B34D8 appears 78 times
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: String function: 00007FF6F8492710 appears 104 times
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7520 -s 816
                  Source: ucrtbase.dll.15.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                  Source: unicodedata.pyd.15.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                  Source: ucrtbase.dll.20.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                  Source: unicodedata.pyd.20.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                  Source: api-ms-win-core-console-l1-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-localization-l1-2-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-conio-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-time-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-timezone-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-stdio-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-locale-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-synch-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-synch-l1-2-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-convert-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-util-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-math-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-process-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-localization-l1-2-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-file-l2-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-console-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-environment-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-heap-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-processthreads-l1-1-1.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-processthreads-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-file-l1-2-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-rtlsupport-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-file-l1-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-libraryloader-l1-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-heap-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-debug-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-sysinfo-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-profile-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-memory-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-errorhandling-l1-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-string-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-profile-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-processthreads-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-heap-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-namedpipe-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-time-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-stdio-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-filesystem-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-environment-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-handle-l1-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-file-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-sysinfo-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-timezone-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-file-l1-2-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-processenvironment-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-memory-l1-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-datetime-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-runtime-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-rtlsupport-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-file-l2-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-interlocked-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-namedpipe-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-util-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-datetime-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-console-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-localization-l1-2-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-string-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-file-l2-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-locale-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-convert-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-handle-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-errorhandling-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-filesystem-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-debug-l1-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-string-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-file-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-libraryloader-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-file-l1-2-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-utility-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-errorhandling-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-runtime-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-processthreads-l1-1-1.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-heap-l1-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-interlocked-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-conio-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-processenvironment-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-handle-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-libraryloader-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-synch-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-datetime-l1-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-synch-l1-2-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-namedpipe-l1-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-utility-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-string-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-interlocked-l1-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-math-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-processenvironment-l1-1-0.dll.24.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-memory-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-core-debug-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-heap-l1-1-0.dll.15.drStatic PE information: No import functions for PE file found
                  Source: api-ms-win-crt-process-l1-1-0.dll.20.drStatic PE information: No import functions for PE file found
                  Source: PfOHmro.exe, 00000000.00000002.1279114071.000000000151E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePortals.exe0 vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000000.00000000.1174120676.0000000000DC6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePortals.exe0 vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003634000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefirefox.exe0 vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003634000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003634000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\000004B0\\OriginalFilename vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003634000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamechrome.exe< vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003634000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\040904B0\\OriginalFilename vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003634000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXE.MUID vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003634000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameIEXPLORE.EXED vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003634000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: q,\\StringFileInfo\\080904B0\\OriginalFilename vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.0000000003634000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemsedge.exe> vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000003.00000002.1857380388.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameImplosions.exe4 vs PfOHmro.exe
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.00000000032F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs PfOHmro.exe
                  Source: 0.2.PfOHmro.exe.40c4170.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.PfOHmro.exe.40c4170.1.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 0.2.PfOHmro.exe.40c4170.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.2.PfOHmro.exe.40a9550.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.PfOHmro.exe.40a9550.0.raw.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 0.2.PfOHmro.exe.40a9550.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 3.2.PfOHmro.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 3.2.PfOHmro.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 3.2.PfOHmro.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.2.PfOHmro.exe.40c4170.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 0.2.PfOHmro.exe.40c4170.1.unpack, type: UNPACKEDPEMatched rule: infostealer_win_redline_strings author = Sekoia.io, description = Finds Redline samples based on characteristic strings, creation_date = 2022-09-07, classification = TLP:CLEAR, version = 1.0, id = 0c9fcb0e-ce8f-44f4-90b2-abafcdd6c02e
                  Source: 0.2.PfOHmro.exe.40c4170.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000003.00000002.1857380388.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: Process Memory Space: PfOHmro.exe PID: 7520, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: Process Memory Space: PfOHmro.exe PID: 7568, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                  Source: PfOHmro.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: PfOHmro.exeStatic PE information: Section: .CSS ZLIB complexity 1.0003681282722514
                  Source: python313.dll.15.drStatic PE information: Section: UPX1 ZLIB complexity 0.9994185524425288
                  Source: libcrypto-3.dll.15.drStatic PE information: Section: UPX1 ZLIB complexity 0.9991990186771459
                  Source: unicodedata.pyd.15.drStatic PE information: Section: UPX1 ZLIB complexity 0.9925549591002045
                  Source: libcrypto-3.dll.20.drStatic PE information: Section: UPX1 ZLIB complexity 0.9991990186771459
                  Source: python313.dll.20.drStatic PE information: Section: UPX1 ZLIB complexity 0.9994185524425288
                  Source: unicodedata.pyd.20.drStatic PE information: Section: UPX1 ZLIB complexity 0.9925549591002045
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@29/270@1/2
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile created: C:\Users\user\AppData\Local\YandexJump to behavior
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7584:120:WilError_03
                  Source: C:\Users\user\Desktop\PfOHmro.exeMutant created: NULL
                  Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7520
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7916:120:WilError_03
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile created: C:\Users\user\AppData\Local\Temp\tmp18C0.tmpJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\activate.bat
                  Source: PfOHmro.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: PfOHmro.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\PfOHmro.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Users\user\Desktop\PfOHmro.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\PfOHmro.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                  Source: C:\Windows\System32\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = &quot;EdgeBHO.exe&quot;)
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: PfOHmro.exeVirustotal: Detection: 62%
                  Source: PfOHmro.exeReversingLabs: Detection: 73%
                  Source: EdgeBHO.exeString found in binary or memory: can't send non-None value to a just-started coroutine
                  Source: EdgeBHO.exeString found in binary or memory: various kinds of output. Setting it to 0 deactivates this behavior. PYTHON_HISTORY : the location of a .python_history file. These variables have equivalent command-line options (see --help for details): PYTHON_CPU_COUNT: override the retu
                  Source: EdgeBHO.exeString found in binary or memory: various kinds of output. Setting it to 0 deactivates this behavior. PYTHON_HISTORY : the location of a .python_history file. These variables have equivalent command-line options (see --help for details): PYTHON_CPU_COUNT: override the retu
                  Source: EdgeBHO.exeString found in binary or memory: can't send non-None value to a just-started async generator
                  Source: EdgeBHO.exeString found in binary or memory: can't send non-None value to a just-started generator
                  Source: EdgeBHO.exeString found in binary or memory: --help
                  Source: EdgeBHO.exeString found in binary or memory: --help
                  Source: EdgeBHO.exeString found in binary or memory: fma($module, x, y, z, /) -- Fused multiply-add operation. Compute (x * y) + z with a single round.
                  Source: EdgeBHO.exeString found in binary or memory: can't send non-None value to a just-started coroutine
                  Source: EdgeBHO.exeString found in binary or memory: various kinds of output. Setting it to 0 deactivates this behavior. PYTHON_HISTORY : the location of a .python_history file. These variables have equivalent command-line options (see --help for details): PYTHON_CPU_COUNT: override the retu
                  Source: EdgeBHO.exeString found in binary or memory: various kinds of output. Setting it to 0 deactivates this behavior. PYTHON_HISTORY : the location of a .python_history file. These variables have equivalent command-line options (see --help for details): PYTHON_CPU_COUNT: override the retu
                  Source: EdgeBHO.exeString found in binary or memory: can't send non-None value to a just-started async generator
                  Source: EdgeBHO.exeString found in binary or memory: can't send non-None value to a just-started generator
                  Source: EdgeBHO.exeString found in binary or memory: --help
                  Source: EdgeBHO.exeString found in binary or memory: --help
                  Source: EdgeBHO.exeString found in binary or memory: fma($module, x, y, z, /) -- Fused multiply-add operation. Compute (x * y) + z with a single round.
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile read: C:\Users\user\Desktop\PfOHmro.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\PfOHmro.exe "C:\Users\user\Desktop\PfOHmro.exe"
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Users\user\Desktop\PfOHmro.exe "C:\Users\user\Desktop\PfOHmro.exe"
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Users\user\Desktop\PfOHmro.exe "C:\Users\user\Desktop\PfOHmro.exe"
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Users\user\Desktop\PfOHmro.exe "C:\Users\user\Desktop\PfOHmro.exe"
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7520 -s 816
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe "C:\Users\user\AppData\Local\Temp\EdgeBHO.exe"
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeProcess created: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe "C:\Users\user\AppData\Local\Temp\EdgeBHO.exe"
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\activate.bat
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im "EdgeBHO.exe"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\EdgeBHO.exe "EdgeBHO.exe"
                  Source: C:\Users\user\EdgeBHO.exeProcess created: C:\Users\user\EdgeBHO.exe "EdgeBHO.exe"
                  Source: unknownProcess created: C:\Users\user\EdgeBHO.exe "C:\Users\user\EdgeBHO.exe"
                  Source: C:\Users\user\EdgeBHO.exeProcess created: C:\Users\user\EdgeBHO.exe "C:\Users\user\EdgeBHO.exe"
                  Source: unknownProcess created: C:\Users\user\EdgeBHO.exe "C:\Users\user\EdgeBHO.exe"
                  Source: C:\Users\user\EdgeBHO.exeProcess created: C:\Users\user\EdgeBHO.exe "C:\Users\user\EdgeBHO.exe"
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Users\user\Desktop\PfOHmro.exe "C:\Users\user\Desktop\PfOHmro.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Users\user\Desktop\PfOHmro.exe "C:\Users\user\Desktop\PfOHmro.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Users\user\Desktop\PfOHmro.exe "C:\Users\user\Desktop\PfOHmro.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe "C:\Users\user\AppData\Local\Temp\EdgeBHO.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeProcess created: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe "C:\Users\user\AppData\Local\Temp\EdgeBHO.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c C:\Users\user\activate.batJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im "EdgeBHO.exe"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\EdgeBHO.exe "EdgeBHO.exe" Jump to behavior
                  Source: C:\Users\user\EdgeBHO.exeProcess created: C:\Users\user\EdgeBHO.exe "EdgeBHO.exe" Jump to behavior
                  Source: C:\Users\user\EdgeBHO.exeProcess created: C:\Users\user\EdgeBHO.exe "C:\Users\user\EdgeBHO.exe"
                  Source: C:\Users\user\EdgeBHO.exeProcess created: C:\Users\user\EdgeBHO.exe "C:\Users\user\EdgeBHO.exe"
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeSection loaded: python3.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeSection loaded: libffi-8.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                  Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: framedynos.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: dbghelp.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: winsta.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\taskkill.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: vcruntime140.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: python3.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: libffi-8.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: vcruntime140_1.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: vcruntime140.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: version.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: python3.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: libffi-8.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: propsys.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: textshaping.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: textinputframework.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: coreuicomponents.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: coremessaging.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: ntmarta.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: coremessaging.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: vcruntime140.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: version.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: python3.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: libffi-8.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: propsys.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: vcruntime140_1.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: uxtheme.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: textshaping.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: kernel.appcore.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: textinputframework.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: coreuicomponents.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: coremessaging.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: ntmarta.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: wintypes.dll
                  Source: C:\Users\user\EdgeBHO.exeSection loaded: wintypes.dll
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: PfOHmro.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: PfOHmro.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: PfOHmro.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1846777523.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1881631808.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019536998.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100346764.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1847383477.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1883141435.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019895484.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100631142.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1841022436.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1873487738.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016393921.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097338826.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ucrtbase.pdb source: EdgeBHO.exe, 00000010.00000002.1873662230.00007FFCA168C000.00000002.00000001.01000000.0000000C.sdmp, EdgeBHO.exe, 00000015.00000002.2440299564.00007FFCA168C000.00000002.00000001.01000000.00000016.sdmp, EdgeBHO.exe, 00000019.00000002.2054904950.00007FFC9C65C000.00000002.00000001.01000000.0000001F.sdmp
                  Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1842189370.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1875345385.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017250591.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098287991.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1840667454.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872625223.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016020890.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2096990057.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1844292763.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877909726.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018534751.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099505061.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1845961180.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1879668224.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019318045.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100136236.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-memory-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1842189370.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1875345385.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017250591.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098287991.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1847541834.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1883395222.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2020008126.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100786546.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1838528308.0000025AF4FA0000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000002.1875774155.00007FFCBB3E4000.00000002.00000001.01000000.0000000E.sdmp, EdgeBHO.exe, 00000014.00000003.1869750221.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2442069207.00007FFCBB3E4000.00000002.00000001.01000000.00000018.sdmp, EdgeBHO.exe, 00000018.00000003.2013678723.000001BAA3CFF000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2056569719.00007FFCB4704000.00000002.00000001.01000000.00000021.sdmp, EdgeBHO.exe, 0000001A.00000003.2095304862.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1841640202.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1874269759.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016740382.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097781458.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\Hand1\source\repos\Portals\Portals\obj\Release\Portals.pdb source: PfOHmro.exe, 00000000.00000000.1174105120.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, PfOHmro.exe, 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1844717900.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1878527857.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018778560.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099713680.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdb source: EdgeBHO.exe, 0000000F.00000003.1838854004.0000025AF4FA0000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000002.1873956487.00007FFCBB2F5000.00000002.00000001.01000000.00000014.sdmp, EdgeBHO.exe, 00000014.00000003.1870065890.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2440565210.00007FFCBB2F5000.00000002.00000001.01000000.0000001E.sdmp, EdgeBHO.exe, 00000018.00000003.2013943553.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2055363994.00007FFCAD6A5000.00000002.00000001.01000000.00000027.sdmp, EdgeBHO.exe, 0000001A.00000003.2095507172.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1843973437.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877455979.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018323407.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099294626.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-heap-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1841640202.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1874269759.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016740382.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097781458.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1845394223.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1879307879.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019208738.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100033216.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-handle-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1841388876.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1873990925.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016610374.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097651612.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: EdgeBHO.exe, EdgeBHO.exe, 00000019.00000002.2055936402.00007FFCB42D1000.00000040.00000001.01000000.00000022.sdmp
                  Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1842674359.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876322759.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017630964.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098673279.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1840799142.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872892606.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016152642.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097106915.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1842674359.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876322759.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017630964.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098673279.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1840444280.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872173040.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2015729848.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2096743379.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1840903774.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1873242498.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016285040.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097235679.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1842488383.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876066587.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017499898.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098543068.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1845070058.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1879085603.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019091727.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099930115.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-process-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1847214203.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1882917745.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019761162.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100527933.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-util-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1844717900.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1878527857.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018778560.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099713680.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1840554181.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872385641.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2015879685.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2096868575.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: EdgeBHO.exe, 00000010.00000002.1874194924.00007FFCBB31B000.00000040.00000001.01000000.00000012.sdmp, EdgeBHO.exe, 00000015.00000002.2440948631.00007FFCBB31B000.00000040.00000001.01000000.0000001C.sdmp, EdgeBHO.exe, 00000019.00000002.2055093814.00007FFCABB0B000.00000040.00000001.01000000.00000025.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: EdgeBHO.exe, EdgeBHO.exe, 00000019.00000002.2055719822.00007FFCAFBA1000.00000040.00000001.01000000.00000024.sdmp
                  Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1840799142.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872892606.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016152642.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097106915.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1843473939.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876830773.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017864453.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098928872.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: ucrtbase.pdbUGP source: EdgeBHO.exe, 00000010.00000002.1873662230.00007FFCA168C000.00000002.00000001.01000000.0000000C.sdmp, EdgeBHO.exe, 00000015.00000002.2440299564.00007FFCA168C000.00000002.00000001.01000000.00000016.sdmp, EdgeBHO.exe, 00000019.00000002.2054904950.00007FFC9C65C000.00000002.00000001.01000000.0000001F.sdmp
                  Source: Binary string: api-ms-win-core-file-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1840903774.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1873242498.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016285040.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097235679.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\python313.pdb source: EdgeBHO.exe, 00000010.00000002.1871702839.00007FFC9CAB9000.00000040.00000001.01000000.0000000D.sdmp, EdgeBHO.exe, 00000015.00000002.2438702214.00007FFC9CAB9000.00000040.00000001.01000000.00000017.sdmp, EdgeBHO.exe, 00000019.00000002.2053349770.00007FFC9C349000.00000040.00000001.01000000.00000020.sdmp
                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140_1.amd64.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1838854004.0000025AF4FA0000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000002.1873956487.00007FFCBB2F5000.00000002.00000001.01000000.00000014.sdmp, EdgeBHO.exe, 00000014.00000003.1870065890.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2440565210.00007FFCBB2F5000.00000002.00000001.01000000.0000001E.sdmp, EdgeBHO.exe, 00000018.00000003.2013943553.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2055363994.00007FFCAD6A5000.00000002.00000001.01000000.00000027.sdmp, EdgeBHO.exe, 0000001A.00000003.2095507172.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1848154049.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1883754430.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2020233504.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101102837.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1841388876.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1873990925.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016610374.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097651612.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1844292763.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877909726.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018534751.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099505061.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1844159682.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877708898.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018431971.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099398521.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_wmi.pdb(('GCTL source: EdgeBHO.exe, 00000010.00000002.1874771647.00007FFCBB391000.00000040.00000001.01000000.00000013.sdmp, EdgeBHO.exe, 00000015.00000002.2441419137.00007FFCBB391000.00000040.00000001.01000000.0000001D.sdmp, EdgeBHO.exe, 00000019.00000002.2055498902.00007FFCAF5E1000.00000040.00000001.01000000.00000026.sdmp
                  Source: Binary string: api-ms-win-core-profile-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1843473939.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876830773.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017864453.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098928872.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1842488383.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876066587.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017499898.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098543068.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: C:\Users\Hand1\source\repos\Portals\Portals\obj\Release\Portals.pdb<;V; H;_CorExeMainmscoree.dll source: PfOHmro.exe, 00000000.00000000.1174105120.0000000000DC2000.00000002.00000001.01000000.00000003.sdmp, PfOHmro.exe, 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1840554181.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872385641.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2015879685.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2096868575.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1844899504.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1878874442.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018917388.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099824827.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: EdgeBHO.exe, 0000000F.00000003.1838528308.0000025AF4FA0000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000010.00000002.1875774155.00007FFCBB3E4000.00000002.00000001.01000000.0000000E.sdmp, EdgeBHO.exe, 00000014.00000003.1869750221.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2442069207.00007FFCBB3E4000.00000002.00000001.01000000.00000018.sdmp, EdgeBHO.exe, 00000018.00000003.2013678723.000001BAA3CFF000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2056569719.00007FFCB4704000.00000002.00000001.01000000.00000021.sdmp, EdgeBHO.exe, 0000001A.00000003.2095304862.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1846946271.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1882472597.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019644449.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100446698.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1842045762.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1875042633.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017137169.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098161682.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1841738441.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1874518425.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016870009.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097910012.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-string-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1843847302.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877251431.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018182031.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099196398.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: EdgeBHO.exe, 0000000F.00000003.1842994259.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1876585682.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017739876.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098810697.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-debug-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1840667454.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872625223.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016020890.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2096990057.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1841905883.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1874768746.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017004149.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098037187.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1842352547.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1875802095.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017371983.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098415607.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1848640080.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1883914289.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2020354386.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2101211287.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1843707805.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877034168.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018002633.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099071239.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1844446204.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1878154496.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018669769.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099608160.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1843847302.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877251431.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018182031.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099196398.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1841155329.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1873736321.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016505020.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097524068.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-console-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1840444280.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1872173040.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2015729848.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2096743379.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: EdgeBHO.exe, 00000010.00000002.1874194924.00007FFCBB31B000.00000040.00000001.01000000.00000012.sdmp, EdgeBHO.exe, 00000015.00000002.2440948631.00007FFCBB31B000.00000040.00000001.01000000.0000001C.sdmp, EdgeBHO.exe, 00000019.00000002.2055093814.00007FFCABB0B000.00000040.00000001.01000000.00000025.sdmp
                  Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1847214203.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1882917745.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019761162.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100527933.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1841905883.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1874768746.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017004149.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098037187.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1842352547.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1875802095.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2017371983.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2098415607.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-synch-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1843973437.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877455979.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018323407.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099294626.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1841738441.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1874518425.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2016870009.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2097910012.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: D:\a\1\b\bin\amd64\_wmi.pdb source: EdgeBHO.exe, EdgeBHO.exe, 00000019.00000002.2055498902.00007FFCAF5E1000.00000040.00000001.01000000.00000026.sdmp
                  Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1843707805.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1877034168.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018002633.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099071239.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1846646974.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1880638314.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2019428022.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100241717.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: EdgeBHO.exe, 0000000F.00000003.1847742380.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1883582433.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2020118947.000001BAA3D01000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2100991668.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdbGCTL source: EdgeBHO.exe, 0000000F.00000003.1844899504.0000025AF4FA1000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000014.00000003.1878874442.000002782B06F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000018.00000003.2018917388.000001BAA3D08000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 0000001A.00000003.2099824827.000001F0F6F82000.00000004.00000020.00020000.00000000.sdmp
                  Source: PfOHmro.exeStatic PE information: 0xADFF511F [Mon Jul 3 22:20:15 2062 UTC]
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFC9CD051D0 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,16_2_00007FFC9CD051D0
                  Source: PfOHmro.exeStatic PE information: section name: .CSS
                  Source: EdgeBHO.exe.3.drStatic PE information: section name: .fptable
                  Source: libffi-8.dll.15.drStatic PE information: section name: UPX2
                  Source: VCRUNTIME140.dll.15.drStatic PE information: section name: fothk
                  Source: VCRUNTIME140.dll.15.drStatic PE information: section name: _RDATA
                  Source: EdgeBHO.exe.16.drStatic PE information: section name: .fptable
                  Source: VCRUNTIME140.dll.20.drStatic PE information: section name: fothk
                  Source: VCRUNTIME140.dll.20.drStatic PE information: section name: _RDATA
                  Source: libffi-8.dll.20.drStatic PE information: section name: UPX2
                  Source: VCRUNTIME140.dll.24.drStatic PE information: section name: fothk
                  Source: VCRUNTIME140.dll.24.drStatic PE information: section name: _RDATA
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 3_2_06B81810 push es; ret 3_2_06B81820
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA1608522 push rdi; ret 16_2_00007FFCA1608526
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA1602A46 push rdi; ret 16_2_00007FFCA1602A52
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA1607E0D push rdi; ret 16_2_00007FFCA1607E14
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA1602F65 push rdi; ret 16_2_00007FFCA1602F6B
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5D7E0D push rdi; ret 25_2_00007FFC9C5D7E14
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5D2F65 push rdi; ret 25_2_00007FFC9C5D2F6B
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5D2A46 push rdi; ret 25_2_00007FFC9C5D2A52
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5D8522 push rdi; ret 25_2_00007FFC9C5D8526
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\unicodedata.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-console-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-file-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\VCRUNTIME140.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\VCRUNTIME140_1.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\unicodedata.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-file-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\_socket.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\select.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\select.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\unicodedata.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\ucrtbase.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\_decimal.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\_ctypes.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\libffi-8.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\_hashlib.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\VCRUNTIME140_1.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\libcrypto-3.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\libffi-8.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-file-l2-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-util-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\VCRUNTIME140.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\_bz2.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\_socket.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\_bz2.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-console-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\VCRUNTIME140.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\ucrtbase.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-file-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\libffi-8.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\_wmi.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\_lzma.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\unicodedata.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-file-l2-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\_decimal.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\_socket.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\select.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\select.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-util-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-console-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\python313.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\_lzma.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\_lzma.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\_ctypes.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\python313.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-file-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\_hashlib.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-file-l2-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\VCRUNTIME140_1.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\_bz2.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-file-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\ucrtbase.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\_decimal.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-file-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\_ctypes.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\_bz2.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-console-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\libffi-8.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-file-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\libcrypto-3.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-util-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\libcrypto-3.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-file-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\_decimal.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\python313.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-util-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\VCRUNTIME140.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\_wmi.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile created: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\libcrypto-3.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-file-l2-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\_ctypes.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\python313.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\_hashlib.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\_wmi.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\_hashlib.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\ucrtbase.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\_socket.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\EdgeBHO.exeJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\_lzma.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\VCRUNTIME140_1.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI40002\_wmi.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\EdgeBHO.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeFile created: C:\Users\user\EdgeBHO.exeJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Update64Jump to behavior
                  Source: C:\Users\user\EdgeBHO.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Update64Jump to behavior

                  Hooking and other Techniques for Hiding and Protection

                  barindex
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 40919
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40919 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 40919
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40919 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40919 -> 49717
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 40919
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40919 -> 49726
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 40919
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40919 -> 49728
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 4449
                  Source: unknownNetwork traffic detected: HTTP traffic on port 4449 -> 49730
                  Source: unknownNetwork traffic detected: HTTP traffic on port 57483 -> 40919
                  Source: unknownNetwork traffic detected: HTTP traffic on port 40919 -> 57483
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84976B0 GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,GetProcAddress,GetLastError,15_2_00007FF6F84976B0
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\PfOHmro.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                  Source: C:\Users\user\Desktop\PfOHmro.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\PfOHmro.exeMemory allocated: 2F20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeMemory allocated: 30A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeMemory allocated: 50A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeMemory allocated: 3040000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeMemory allocated: 3260000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeMemory allocated: 31A0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeWindow / User API: threadDelayed 1776Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeWindow / User API: threadDelayed 8013Jump to behavior
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\unicodedata.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-console-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-file-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\unicodedata.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-file-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\_socket.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\select.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\select.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\unicodedata.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\_decimal.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\_ctypes.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\_hashlib.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\libcrypto-3.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-file-l2-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-util-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\_socket.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\_bz2.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\_bz2.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-console-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-file-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\_wmi.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\_lzma.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\unicodedata.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-file-l2-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\_decimal.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\_socket.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\select.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\select.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-util-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-console-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\python313.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\_lzma.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\_lzma.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\_ctypes.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\python313.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-file-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\_hashlib.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-string-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-file-l2-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\_bz2.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-file-l1-2-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\_decimal.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-file-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\_ctypes.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\_bz2.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-console-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-file-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\libcrypto-3.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-util-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\libcrypto-3.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-file-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\_decimal.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\python313.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-util-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\_wmi.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-core-file-l2-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\libcrypto-3.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\_ctypes.pydJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\python313.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\_hashlib.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\_wmi.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\_hashlib.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\_socket.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\_lzma.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI12522\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI75322\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17522\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI40002\_wmi.pydJump to dropped file
                  Source: C:\Users\user\EdgeBHO.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_15-18210
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeAPI coverage: 4.1 %
                  Source: C:\Users\user\EdgeBHO.exeAPI coverage: 6.2 %
                  Source: C:\Users\user\EdgeBHO.exeAPI coverage: 1.7 %
                  Source: C:\Users\user\Desktop\PfOHmro.exe TID: 7348Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84992F0 FindFirstFileExW,FindClose,15_2_00007FF6F84992F0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84983B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,15_2_00007FF6F84983B0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B1BD4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,15_2_00007FF6F84B1BD4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84992F0 FindFirstFileExW,FindClose,16_2_00007FF6F84992F0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84983B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,16_2_00007FF6F84983B0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84B1BD4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,16_2_00007FF6F84B1BD4
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA164F118 FindFirstFileExA,FindClose,FindNextFileA,16_2_00007FFCA164F118
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA164F2C8 FindFirstFileExW,FindClose,FindNextFileW,16_2_00007FFCA164F2C8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE3592F0 FindFirstFileExW,FindClose,20_2_00007FF6AE3592F0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE3583B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,20_2_00007FF6AE3583B0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE371BD4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,20_2_00007FF6AE371BD4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE3592F0 FindFirstFileExW,FindClose,21_2_00007FF6AE3592F0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE3583B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,21_2_00007FF6AE3583B0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE371BD4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,21_2_00007FF6AE371BD4
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C61F118 FindFirstFileExA,FindClose,FindNextFileA,25_2_00007FFC9C61F118
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C61F2C8 FindFirstFileExW,FindClose,FindNextFileW,25_2_00007FFC9C61F2C8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB391D1C VirtualQuery,GetSystemInfo,16_2_00007FFCBB391D1C
                  Source: C:\Users\user\Desktop\PfOHmro.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: PfOHmro.exe, 00000003.00000002.1857931341.000000000169C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllF
                  Source: EdgeBHO.exe, 00000010.00000002.1870552492.0000025A1E614000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2436678714.0000019363234000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2052012982.00000286BA1F4000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 0000001B.00000002.2187512345.000001CDA0134000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: ro.kernel.qemu
                  Source: EdgeBHO.exe, 00000015.00000002.2435437723.0000019362F0B000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2032306303.00000286BA07F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2031090128.00000286BA07F000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2040606777.00000286BA08D000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2039930478.00000286BA055000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2043273122.00000286BA097000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2041299813.00000286BA091000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2051807652.00000286BA097000.00000004.00000020.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000003.2031381064.00000286BA058000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ro.kernel.qemur
                  Source: EdgeBHO.exe, 00000010.00000002.1870552492.0000025A1E614000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000015.00000002.2436678714.0000019363234000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 00000019.00000002.2052012982.00000286BA1F4000.00000004.00001000.00020000.00000000.sdmp, EdgeBHO.exe, 0000001B.00000002.2187512345.000001CDA0134000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: dro.kernel.qemu
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F849D19C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_00007FF6F849D19C
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFC9CD051D0 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,16_2_00007FFC9CD051D0
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 0_2_030A2149 mov edi, dword ptr fs:[00000030h]0_2_030A2149
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 0_2_030A22C6 mov edi, dword ptr fs:[00000030h]0_2_030A22C6
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B3830 GetProcessHeap,15_2_00007FF6F84B3830
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\System32\taskkill.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F849D19C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_00007FF6F849D19C
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F849D37C SetUnhandledExceptionFilter,15_2_00007FF6F849D37C
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84AA5C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,15_2_00007FF6F84AA5C8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F849C910 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,15_2_00007FF6F849C910
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F849D19C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00007FF6F849D19C
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F849D37C SetUnhandledExceptionFilter,16_2_00007FF6F849D37C
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F84AA5C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00007FF6F84AA5C8
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FF6F849C910 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_00007FF6F849C910
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA164D170 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00007FFCA164D170
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA1615A60 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_00007FFCA1615A60
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCA1615A20 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_00007FFCA1615A20
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB2F4738 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_00007FFCBB2F4738
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB3137D0 IsProcessorFeaturePresent,00007FFCBB3E1A90,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFCBB3E1A90,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00007FFCBB3137D0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB33A96C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00007FFCBB33A96C
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB39335C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00007FFCBB39335C
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 16_2_00007FFCBB3A7184 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00007FFCBB3A7184
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE35C910 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_00007FF6AE35C910
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE36A5C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00007FF6AE36A5C8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE35D37C SetUnhandledExceptionFilter,20_2_00007FF6AE35D37C
                  Source: C:\Users\user\EdgeBHO.exeCode function: 20_2_00007FF6AE35D19C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00007FF6AE35D19C
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE35C910 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FF6AE35C910
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE36A5C8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF6AE36A5C8
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE35D37C SetUnhandledExceptionFilter,21_2_00007FF6AE35D37C
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FF6AE35D19C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FF6AE35D19C
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB33A96C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FFCBB33A96C
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB39335C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FFCBB39335C
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBB3E0E08 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,21_2_00007FFCBB3E0E08
                  Source: C:\Users\user\EdgeBHO.exeCode function: 21_2_00007FFCBBBD52F0 IsProcessorFeaturePresent,00007FFCBB3E1A90,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFCBB3E1A90,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,21_2_00007FFCBBBD52F0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5E5A60 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_00007FFC9C5E5A60
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C5E5A20 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_00007FFC9C5E5A20
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFC9C61D170 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_00007FFC9C61D170
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCABB037D0 IsProcessorFeaturePresent,00007FFCB4701A90,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFCB4701A90,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_00007FFCABB037D0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCAD6A4738 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_00007FFCAD6A4738
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCAF5E335C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_00007FFCAF5E335C
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCAFBAA96C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_00007FFCAFBAA96C
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB42D7184 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_00007FFCB42D7184
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB46E52F0 IsProcessorFeaturePresent,00007FFCB4701A90,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FFCB4701A90,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_00007FFCB46E52F0
                  Source: C:\Users\user\EdgeBHO.exeCode function: 25_2_00007FFCB4700E08 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,25_2_00007FFCB4700E08
                  Source: C:\Users\user\Desktop\PfOHmro.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\PfOHmro.exeCode function: 0_2_030A2149 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessW,CreateProcessW,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_030A2149
                  Source: C:\Users\user\Desktop\PfOHmro.exeMemory written: C:\Users\user\Desktop\PfOHmro.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Users\user\Desktop\PfOHmro.exe "C:\Users\user\Desktop\PfOHmro.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Users\user\Desktop\PfOHmro.exe "C:\Users\user\Desktop\PfOHmro.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Users\user\Desktop\PfOHmro.exe "C:\Users\user\Desktop\PfOHmro.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeProcess created: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe "C:\Users\user\AppData\Local\Temp\EdgeBHO.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeProcess created: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe "C:\Users\user\AppData\Local\Temp\EdgeBHO.exe" Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im "EdgeBHO.exe"Jump to behavior
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\EdgeBHO.exe "EdgeBHO.exe" Jump to behavior
                  Source: C:\Users\user\EdgeBHO.exeProcess created: C:\Users\user\EdgeBHO.exe "EdgeBHO.exe" Jump to behavior
                  Source: C:\Users\user\EdgeBHO.exeProcess created: C:\Users\user\EdgeBHO.exe "C:\Users\user\EdgeBHO.exe"
                  Source: C:\Users\user\EdgeBHO.exeProcess created: C:\Users\user\EdgeBHO.exe "C:\Users\user\EdgeBHO.exe"
                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\taskkill.exe taskkill /f /im "EdgeBHO.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B97F0 cpuid 15_2_00007FF6F84B97F0
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,16_2_00007FFCA1649288
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: GetLocaleInfoW,16_2_00007FFCA15F1674
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,16_2_00007FFCA1649490
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: GetPrimaryLen,EnumSystemLocalesW,16_2_00007FFCA1648D94
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: GetPrimaryLen,EnumSystemLocalesW,16_2_00007FFCA1648E48
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: EnterCriticalSection,EnumSystemLocalesW,LeaveCriticalSection,16_2_00007FFCA1647D40
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: EnumSystemLocalesW,16_2_00007FFCA1648D2C
                  Source: C:\Users\user\EdgeBHO.exeCode function: EnterCriticalSection,EnumSystemLocalesW,LeaveCriticalSection,25_2_00007FFC9C617D40
                  Source: C:\Users\user\EdgeBHO.exeCode function: EnumSystemLocalesW,25_2_00007FFC9C618D2C
                  Source: C:\Users\user\EdgeBHO.exeCode function: GetPrimaryLen,EnumSystemLocalesW,25_2_00007FFC9C618D94
                  Source: C:\Users\user\EdgeBHO.exeCode function: GetPrimaryLen,EnumSystemLocalesW,25_2_00007FFC9C618E48
                  Source: C:\Users\user\EdgeBHO.exeCode function: GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,25_2_00007FFC9C619490
                  Source: C:\Users\user\EdgeBHO.exeCode function: GetLocaleInfoW,25_2_00007FFC9C5C1674
                  Source: C:\Users\user\EdgeBHO.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,25_2_00007FFC9C619288
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Users\user\Desktop\PfOHmro.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Users\user\Desktop\PfOHmro.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\ucrtbase.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\_ctypes.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\_bz2.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\_lzma.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17522 VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeQueries volume information: C:\Users\user\activate.bat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\ucrtbase.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\_ctypes.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\_bz2.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\_lzma.pyd VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322\base_library.zip VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI75322 VolumeInformationJump to behavior
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\ucrtbase.dll VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\_ctypes.pyd VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\_bz2.pyd VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\_wmi.pyd VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI12522 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\ucrtbase.dll VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\_ctypes.pyd VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\_bz2.pyd VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\_lzma.pyd VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\_wmi.pyd VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002\base_library.zip VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\EdgeBHO.exe VolumeInformation
                  Source: C:\Users\user\EdgeBHO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI40002 VolumeInformation
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F849D080 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,15_2_00007FF6F849D080
                  Source: C:\Users\user\AppData\Local\Temp\EdgeBHO.exeCode function: 15_2_00007FF6F84B62B0 _get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,15_2_00007FF6F84B62B0
                  Source: C:\Users\user\Desktop\PfOHmro.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                  Source: C:\Users\user\Desktop\PfOHmro.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                  Source: C:\Users\user\Desktop\PfOHmro.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Users\user\Desktop\PfOHmro.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Users\user\Desktop\PfOHmro.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                  Source: C:\Users\user\Desktop\PfOHmro.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0000001B.00000002.2187512345.000001CDA0134000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.1870552492.0000025A1E614000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000015.00000002.2436678714.0000019363234000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.2052012982.00000286BA1F4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: EdgeBHO.exe PID: 1424, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: EdgeBHO.exe PID: 7564, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: EdgeBHO.exe PID: 3032, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: EdgeBHO.exe PID: 5416, type: MEMORYSTR
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 0.2.PfOHmro.exe.40c4170.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PfOHmro.exe.40a9550.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.PfOHmro.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PfOHmro.exe.40c4170.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.1857380388.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: PfOHmro.exe PID: 7520, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: PfOHmro.exe PID: 7568, type: MEMORYSTR
                  Source: PfOHmro.exe, 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: [^\u0020-\u007F]ProcessIdname_on_cardencrypted_valuehttps://ipinfo.io/ip%appdata%\logins{0}\FileZilla\recentservers.xml%appdata%\discord\Local Storage\leveldb\tdataAtomicWalletv10/C \EtFile.IOhereuFile.IOm\walFile.IOletsESystem.UItherSystem.UIeumElectrum[AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}profiles\Windows\valueexpiras21ation_moas21nth
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.000000000345E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q1C:\Users\user\AppData\Roaming\Electrum\wallets\*
                  Source: PfOHmro.exe, 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                  Source: PfOHmro.exe, 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.000000000345E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Ethereum\wallets
                  Source: PfOHmro.exe, 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.000000000345E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
                  Source: PfOHmro.exe, 00000003.00000002.1859182871.000000000345E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q5C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                  Source: C:\Users\user\Desktop\PfOHmro.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                  Source: Yara matchFile source: 0.2.PfOHmro.exe.40c4170.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PfOHmro.exe.40a9550.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.PfOHmro.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PfOHmro.exe.40c4170.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.1857380388.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: PfOHmro.exe PID: 7520, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: PfOHmro.exe PID: 7568, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0000001B.00000002.2187512345.000001CDA0134000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000010.00000002.1870552492.0000025A1E614000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000015.00000002.2436678714.0000019363234000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000019.00000002.2052012982.00000286BA1F4000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: EdgeBHO.exe PID: 1424, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: EdgeBHO.exe PID: 7564, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: EdgeBHO.exe PID: 3032, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: EdgeBHO.exe PID: 5416, type: MEMORYSTR
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 0.2.PfOHmro.exe.40c4170.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PfOHmro.exe.40a9550.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 3.2.PfOHmro.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.PfOHmro.exe.40c4170.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.1857380388.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1280380254.00000000040A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: PfOHmro.exe PID: 7520, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: PfOHmro.exe PID: 7568, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  Valid Accounts221
                  Windows Management Instrumentation
                  1
                  Scripting
                  1
                  DLL Side-Loading
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts2
                  Native API
                  1
                  DLL Side-Loading
                  211
                  Process Injection
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory2
                  File and Directory Discovery
                  Remote Desktop Protocol3
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts2
                  Command and Scripting Interpreter
                  1
                  Registry Run Keys / Startup Folder
                  1
                  Registry Run Keys / Startup Folder
                  21
                  Obfuscated Files or Information
                  Security Account Manager135
                  System Information Discovery
                  SMB/Windows Admin SharesData from Network Shared Drive11
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook21
                  Software Packing
                  NTDS351
                  Security Software Discovery
                  Distributed Component Object ModelInput Capture3
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets1
                  Process Discovery
                  SSHKeylogging14
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials251
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
                  Masquerading
                  DCSync1
                  Application Window Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job251
                  Virtualization/Sandbox Evasion
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt211
                  Process Injection
                  /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1632656 Sample: PfOHmro.exe Startdate: 08/03/2025 Architecture: WINDOWS Score: 100 95 api.ip.sb.cdn.cloudflare.net 2->95 97 api.ip.sb 2->97 103 Suricata IDS alerts for network traffic 2->103 105 Found malware configuration 2->105 107 Malicious sample detected (through community Yara rule) 2->107 109 8 other signatures 2->109 12 PfOHmro.exe 2->12         started        15 EdgeBHO.exe 2->15         started        18 EdgeBHO.exe 2->18         started        signatures3 process4 file5 123 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 12->123 125 Found many strings related to Crypto-Wallets (likely being stolen) 12->125 127 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 12->127 129 2 other signatures 12->129 20 PfOHmro.exe 15 52 12->20         started        25 WerFault.exe 21 16 12->25         started        27 PfOHmro.exe 12->27         started        29 PfOHmro.exe 12->29         started        79 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 15->79 dropped 81 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 15->81 dropped 83 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 15->83 dropped 91 50 other malicious files 15->91 dropped 31 EdgeBHO.exe 15->31         started        85 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 18->85 dropped 87 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 18->87 dropped 89 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 18->89 dropped 93 50 other malicious files 18->93 dropped 33 EdgeBHO.exe 18->33         started        signatures6 process7 dnsIp8 99 101.99.92.190, 40919, 4449, 49717 SHINJIRU-MY-AS-APShinjiruTechnologySdnBhdMY Malaysia 20->99 101 api.ip.sb.cdn.cloudflare.net 104.26.12.31, 443, 49724 CLOUDFLARENETUS United States 20->101 63 C:\Users\user\AppData\Local\...dgeBHO.exe, PE32+ 20->63 dropped 65 C:\Users\user\AppData\...\PfOHmro.exe.log, ASCII 20->65 dropped 117 Found many strings related to Crypto-Wallets (likely being stolen) 20->117 119 Tries to harvest and steal browser information (history, passwords, etc) 20->119 121 Tries to steal Crypto Currency Wallets 20->121 35 EdgeBHO.exe 55 20->35         started        39 conhost.exe 20->39         started        67 C:\ProgramData\Microsoft\...\Report.wer, Unicode 25->67 dropped file9 signatures10 process11 file12 55 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 35->55 dropped 57 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 35->57 dropped 59 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 35->59 dropped 61 50 other malicious files 35->61 dropped 111 Antivirus detection for dropped file 35->111 113 Multi AV Scanner detection for dropped file 35->113 115 Drops PE files to the user root directory 35->115 41 EdgeBHO.exe 2 35->41         started        signatures13 process14 file15 69 C:\Users\userdgeBHO.exe, PE32+ 41->69 dropped 44 cmd.exe 1 41->44         started        process16 process17 46 EdgeBHO.exe 55 44->46         started        49 taskkill.exe 1 44->49         started        51 conhost.exe 44->51         started        file18 71 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 46->71 dropped 73 C:\Users\user\AppData\Local\...\ucrtbase.dll, PE32+ 46->73 dropped 75 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 46->75 dropped 77 50 other malicious files 46->77 dropped 53 EdgeBHO.exe 1 46->53         started        process19

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.