Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Z9fvmHepQC.exe

Overview

General Information

Sample name:Z9fvmHepQC.exe
renamed because original name is a hash value
Original sample name:aab7bbb7b70a920a79c2c32126bf96fc7fb967938e49f70eb316379203452f1a.exe
Analysis ID:1582290
MD5:1e53f1eafb546110a915ac383181aaa6
SHA1:78b5bb994fb9e60883c01cd62375557686be3205
SHA256:aab7bbb7b70a920a79c2c32126bf96fc7fb967938e49f70eb316379203452f1a
Tags:exeuser-zhuzhu0009
Infos:

Detection

CobaltStrike
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected CobaltStrike
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Z9fvmHepQC.exe (PID: 1720 cmdline: "C:\Users\user\Desktop\Z9fvmHepQC.exe" MD5: 1E53F1EAFB546110A915AC383181AAA6)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • Earth Baxia
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"BeaconType": ["HTTP"], "Port": 80, "SleepTime": 5000, "MaxGetSize": 1048576, "Jitter": 0, "MaxDNS": "Not Found", "C2Server": "p0.ssl.qhimg.com.cdn.dnsv1.com,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books", "UserAgent": "Not Found", "HttpPostUri": "Not Found", "Malleable_C2_Instructions": "Not Found", "HttpGet_Metadata": "Not Found", "HttpPost_Metadata": "Not Found", "PipeName": "Not Found", "DNS_Idle": "Not Found", "DNS_Sleep": "Not Found", "SSH_Host": "Not Found", "SSH_Port": "Not Found", "SSH_Username": "Not Found", "SSH_Password_Plaintext": "Not Found", "SSH_Password_Pubkey": "Not Found", "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\rundll32.exe", "Spawnto_x64": "%windir%\\sysnative\\rundll32.exe", "CryptoScheme": 0, "Proxy_Config": "Not Found", "Proxy_User": "Not Found", "Proxy_Password": "Not Found", "Proxy_Behavior": "Not Found", "Watermark": 391144938, "bStageCleanup": "False", "bCFGCaution": "False", "KillDate": "Not Found", "bProcInject_StartRWX": "Not Found", "bProcInject_UseRWX": "Not Found", "bProcInject_MinAllocSize": "Not Found", "ProcInject_PrependAppend_x86": "Not Found", "ProcInject_PrependAppend_x64": "Not Found", "ProcInject_Execute": "Not Found", "ProcInject_AllocationMethod": "Not Found", "bUsesCookies": "Not Found", "HostHeader": "Not Found"}
SourceRuleDescriptionAuthorStrings
00000000.00000003.2009341237.00000215D77EE000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_b54b94acRule for beacon sleep obfuscation routineunknown
  • 0x4769:$a_x64: 4C 8B 53 08 45 8B 0A 45 8B 5A 04 4D 8D 52 08 45 85 C9 75 05 45 85 DB 74 33 45 3B CB 73 E6 49 8B F9 4C 8B 03
00000000.00000003.2009488257.00000215D77EE000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_b54b94acRule for beacon sleep obfuscation routineunknown
  • 0x4769:$a_x64: 4C 8B 53 08 45 8B 0A 45 8B 5A 04 4D 8D 52 08 45 85 C9 75 05 45 85 DB 74 33 45 3B CB 73 E6 49 8B F9 4C 8B 03
00000000.00000003.2009224813.00000215D77E5000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
    00000000.00000003.2009224813.00000215D77E5000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_CobaltStrike_b54b94acRule for beacon sleep obfuscation routineunknown
    • 0xd769:$a_x64: 4C 8B 53 08 45 8B 0A 45 8B 5A 04 4D 8D 52 08 45 85 C9 75 05 45 85 DB 74 33 45 3B CB 73 E6 49 8B F9 4C 8B 03
    00000000.00000003.2009341237.00000215D77FC000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
      Click to see the 248 entries
      SourceRuleDescriptionAuthorStrings
      0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpackJoeSecurity_CobaltStrikeYara detected CobaltStrikeJoe Security
        0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpackJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
          0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpackWindows_Trojan_CobaltStrike_ee756db7Attempts to detect Cobalt Strike based on strings found in BEACONunknown
          • 0x2cd60:$a39: %s as %s\%s: %d
          • 0x3c012:$a41: beacon.x64.dll
          • 0x2df70:$a46: %s (admin)
          • 0x2cec0:$a48: %s%s: %s
          • 0x2cd8c:$a50: %02d/%02d/%02d %02d:%02d:%02d
          • 0x2cdb8:$a50: %02d/%02d/%02d %02d:%02d:%02d
          • 0x2dfb9:$a51: Content-Length: %d
          0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpackWindows_Trojan_CobaltStrike_663fc95dIdentifies CobaltStrike via unidentified function codeunknown
          • 0x195f8:$a: 48 89 5C 24 08 57 48 83 EC 20 48 8B 59 10 48 8B F9 48 8B 49 08 FF 17 33 D2 41 B8 00 80 00 00
          0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpackWindows_Trojan_CobaltStrike_b54b94acRule for beacon sleep obfuscation routineunknown
          • 0x3c37b:$a_x64: 4C 8B 53 08 45 8B 0A 45 8B 5A 04 4D 8D 52 08 45 85 C9 75 05 45 85 DB 74 33 45 3B CB 73 E6 49 8B F9 4C 8B 03
          Click to see the 31 entries
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-30T09:15:03.189163+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:08.957855+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:20.538352+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:26.104437+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:32.041417+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:37.604834+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:43.173422+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:48.765587+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:54.381770+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:59.987682+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:05.624457+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:11.223521+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:17.157487+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:22.809343+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:28.367420+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:33.941682+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:39.970265+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:45.552738+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:51.118357+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:57.150055+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:17:02.805519+010020553561A Network Trojan was detected192.168.2.54970442.177.83.10780TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-12-30T09:15:03.189163+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:08.957855+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:20.538352+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:26.104437+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:32.041417+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:37.604834+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:43.173422+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:48.765587+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:54.381770+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:15:59.987682+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:05.624457+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:11.223521+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:17.157487+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:22.809343+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:28.367420+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:33.941682+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:39.970265+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:45.552738+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:51.118357+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:16:57.150055+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP
          2024-12-30T09:17:02.805519+010020327491Malware Command and Control Activity Detected192.168.2.54970442.177.83.10780TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookssAvira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksAvira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books2Avira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books~Avira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookswsAvira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksFAvira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookstAvira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/N4215/adj/amzn.us.sr.aps?sz=160x600&oe=oe=ISO-8859-1;&sn=17170Avira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksMAvira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookscooAvira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books?Avira URL Cloud: Label: malware
          Source: p0.ssl.qhimg.com.cdn.dnsv1.comAvira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksflAvira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksyyyAvira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books.tAvira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksPAvira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksU6Avira URL Cloud: Label: malware
          Source: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksxyyAvira URL Cloud: Label: malware
          Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"BeaconType": ["HTTP"], "Port": 80, "SleepTime": 5000, "MaxGetSize": 1048576, "Jitter": 0, "MaxDNS": "Not Found", "C2Server": "p0.ssl.qhimg.com.cdn.dnsv1.com,/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books", "UserAgent": "Not Found", "HttpPostUri": "Not Found", "Malleable_C2_Instructions": "Not Found", "HttpGet_Metadata": "Not Found", "HttpPost_Metadata": "Not Found", "PipeName": "Not Found", "DNS_Idle": "Not Found", "DNS_Sleep": "Not Found", "SSH_Host": "Not Found", "SSH_Port": "Not Found", "SSH_Username": "Not Found", "SSH_Password_Plaintext": "Not Found", "SSH_Password_Pubkey": "Not Found", "HttpGet_Verb": "GET", "HttpPost_Verb": "POST", "HttpPostChunk": 0, "Spawnto_x86": "%windir%\\syswow64\\rundll32.exe", "Spawnto_x64": "%windir%\\sysnative\\rundll32.exe", "CryptoScheme": 0, "Proxy_Config": "Not Found", "Proxy_User": "Not Found", "Proxy_Password": "Not Found", "Proxy_Behavior": "Not Found", "Watermark": 391144938, "bStageCleanup": "False", "bCFGCaution": "False", "KillDate": "Not Found", "bProcInject_StartRWX": "Not Found", "bProcInject_UseRWX": "Not Found", "bProcInject_MinAllocSize": "Not Found", "ProcInject_PrependAppend_x86": "Not Found", "ProcInject_PrependAppend_x64": "Not Found", "ProcInject_Execute": "Not Found", "ProcInject_AllocationMethod": "Not Found", "bUsesCookies": "Not Found", "HostHeader": "Not Found"}
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: Z9fvmHepQC.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2032749 - Severity 1 - ET MALWARE Cobalt Strike Malleable C2 Amazon Profile : 192.168.2.5:49704 -> 42.177.83.107:80
          Source: Network trafficSuricata IDS: 2055356 - Severity 1 - ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile) : 192.168.2.5:49704 -> 42.177.83.107:80
          Source: Malware configuration extractorURLs: p0.ssl.qhimg.com.cdn.dnsv1.com
          Source: Joe Sandbox ViewASN Name: CHINA169-BACKBONECHINAUNICOMChina169BackboneCN CHINA169-BACKBONECHINAUNICOMChina169BackboneCN
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: POST /N4215/adj/amzn.us.sr.aps?sz=160x600&oe=oe=ISO-8859-1;&sn=1717084268&s=3717&dc_ref=http%3A%2F%2Fupdate.firefox.com.cn HTTP/1.1Accept: */*Content-Type: text/xmlX-Requested-With: XMLHttpRequestHost: p0.ssl.qhimg.comUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoContent-Length: 229272Connection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1Accept: */*Host: p0.ssl.qhimg.comCookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoConnection: Keep-AliveCache-Control: no-cache
          Source: global trafficDNS traffic detected: DNS query: p0.ssl.qhimg.com.cdn.dnsv1.com
          Source: unknownHTTP traffic detected: POST /N4215/adj/amzn.us.sr.aps?sz=160x600&oe=oe=ISO-8859-1;&sn=1717084268&s=3717&dc_ref=http%3A%2F%2Fupdate.firefox.com.cn HTTP/1.1Accept: */*Content-Type: text/xmlX-Requested-With: XMLHttpRequestHost: p0.ssl.qhimg.comUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like GeckoContent-Length: 229272Connection: Keep-AliveCache-Control: no-cache
          Source: Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B6A000.00000004.00000020.00020000.00000000.sdmp, Z9fvmHepQC.exe, 00000000.00000002.3255702876.00000215D7D7B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/N4215/adj/amzn.us.sr.aps?sz=160x600&oe=oe=ISO-8859-1;&sn=17170
          Source: Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books
          Source: Z9fvmHepQC.exe, 00000000.00000002.3254837540.00000215D7915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books.t
          Source: Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books2
          Source: Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books?
          Source: Z9fvmHepQC.exe, 00000000.00000002.3254282764.00000215D7799000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksF
          Source: Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksM
          Source: Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksP
          Source: Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksU6
          Source: Z9fvmHepQC.exe, 00000000.00000002.3254837540.00000215D7915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookscoo
          Source: Z9fvmHepQC.exe, 00000000.00000002.3254837540.00000215D7915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksf
          Source: Z9fvmHepQC.exe, 00000000.00000002.3255579911.00000215D7CF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksfl
          Source: Z9fvmHepQC.exe, 00000000.00000002.3254837540.00000215D7915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookss
          Source: Z9fvmHepQC.exe, 00000000.00000002.3254837540.00000215D7915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookst
          Source: Z9fvmHepQC.exe, 00000000.00000002.3254837540.00000215D7915000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksws
          Source: Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksxyy
          Source: Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksyyy
          Source: Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books~
          Source: Z9fvmHepQC.exeString found in binary or memory: https://bytecodealliance.org/security.
          Source: Z9fvmHepQC.exeString found in binary or memory: https://github.com/bytecodealliance/wasmtime/issues/1271
          Source: Z9fvmHepQC.exeString found in binary or memory: https://github.com/bytecodealliance/wasmtime/issues/6530
          Source: Z9fvmHepQC.exe, 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: https://github.com/bytecodealliance/wasmtime/issues/6530znCn
          Source: Z9fvmHepQC.exeString found in binary or memory: https://github.com/bytecodealliance/wasmtime/issues/6530znI
          Source: Z9fvmHepQC.exeString found in binary or memory: https://github.com/bytecodealliance/wasmtime/issues/677

          System Summary

          barindex
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.raw.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.raw.unpack, type: UNPACKEDPEMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.raw.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.raw.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.raw.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.unpack, type: UNPACKEDPEMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.unpack, type: UNPACKEDPEMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.unpack, type: UNPACKEDPEMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.unpack, type: UNPACKEDPEMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.unpack, type: UNPACKEDPEMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2009341237.00000215D77EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2009488257.00000215D77EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2009224813.00000215D77E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2008238134.00000215D7841000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2008238134.00000215D7841000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2008238134.00000215D7841000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2009315322.00000215D77ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
          Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
          Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2008352809.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2009609332.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2009609332.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2009609332.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000002.3255937250.00000217D9E50000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2008825010.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2008952668.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
          Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2009609332.00000215D78F4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2008238134.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2008238134.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2008238134.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2008238134.00000215D78F4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2009131449.00000215D77E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2009082132.00000215D77DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies CobaltStrike via unidentified function code Author: unknown
          Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon sleep obfuscation routine Author: unknown
          Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Rule for beacon reflective loader Author: unknown
          Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 Author: unknown
          Source: Process Memory Space: Z9fvmHepQC.exe PID: 1720, type: MEMORYSTRMatched rule: Attempts to detect Cobalt Strike based on strings found in BEACON Author: unknown
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D7708EF00_2_00000215D7708EF0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D77076B00_2_00000215D77076B0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D77016B40_2_00000215D77016B4
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D76E96800_2_00000215D76E9680
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D76FCF5C0_2_00000215D76FCF5C
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D76EF5E80_2_00000215D76EF5E8
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D76F55A80_2_00000215D76F55A8
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D77085800_2_00000215D7708580
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D76FB5480_2_00000215D76FB548
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D770A5000_2_00000215D770A500
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D76ECB800_2_00000215D76ECB80
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D77082970_2_00000215D7708297
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D76FC3140_2_00000215D76FC314
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D76F60980_2_00000215D76F6098
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D76E916C0_2_00000215D76E916C
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D76FE13C0_2_00000215D76FE13C
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D770685C0_2_00000215D770685C
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D76FD8400_2_00000215D76FD840
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E05ADEF0_2_00007FF66E05ADEF
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0226260_2_00007FF66E022626
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E01BD8C0_2_00007FF66E01BD8C
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E273C990_2_00007FF66E273C99
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFA33920_2_00007FF66DFA3392
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E05F1AE0_2_00007FF66E05F1AE
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFA50800_2_00007FF66DFA5080
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0C8F000_2_00007FF66E0C8F00
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0887FC0_2_00007FF66E0887FC
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFA491A0_2_00007FF66DFA491A
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFA1BD90_2_00007FF66DFA1BD9
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0119630_2_00007FF66E011963
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E035AA50_2_00007FF66E035AA5
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E055AFA0_2_00007FF66E055AFA
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0EAFA00_2_00007FF66E0EAFA0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFE700A0_2_00007FF66DFE700A
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFB70700_2_00007FF66DFB7070
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0E2E000_2_00007FF66E0E2E00
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0E6F200_2_00007FF66E0E6F20
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFA6B890_2_00007FF66DFA6B89
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E016BF00_2_00007FF66E016BF0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0B6D260_2_00007FF66E0B6D26
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E06A9360_2_00007FF66E06A936
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E02E9740_2_00007FF66E02E974
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E272A500_2_00007FF66E272A50
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0CEA8E0_2_00007FF66E0CEA8E
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFE6ACF0_2_00007FF66DFE6ACF
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0D6AF30_2_00007FF66E0D6AF3
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0EEAE00_2_00007FF66E0EEAE0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0FEB000_2_00007FF66E0FEB00
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFDA78B0_2_00007FF66DFDA78B
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFD679C0_2_00007FF66DFD679C
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0E28300_2_00007FF66E0E2830
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFB28500_2_00007FF66DFB2850
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E1068400_2_00007FF66E106840
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0C68F70_2_00007FF66E0C68F7
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E2725DD0_2_00007FF66E2725DD
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E07A6310_2_00007FF66E07A631
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0EE6800_2_00007FF66E0EE680
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0E63A00_2_00007FF66E0E63A0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFBA4B00_2_00007FF66DFBA4B0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E05A5130_2_00007FF66E05A513
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E06E14F0_2_00007FF66E06E14F
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E1621AC0_2_00007FF66E1621AC
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E08E2470_2_00007FF66E08E247
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFAFFB00_2_00007FF66DFAFFB0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFAC0000_2_00007FF66DFAC000
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0C801B0_2_00007FF66E0C801B
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0F80C00_2_00007FF66E0F80C0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E017D850_2_00007FF66E017D85
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E153EA90_2_00007FF66E153EA9
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFB3EA00_2_00007FF66DFB3EA0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E16BBA00_2_00007FF66E16BBA0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E1DBBD60_2_00007FF66E1DBBD6
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFCBBB90_2_00007FF66DFCBBB9
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E1EFCB50_2_00007FF66E1EFCB5
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFDBCED0_2_00007FF66DFDBCED
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0179410_2_00007FF66E017941
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E01F9930_2_00007FF66E01F993
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E1039D00_2_00007FF66E1039D0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E07BB310_2_00007FF66E07BB31
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E07B74A0_2_00007FF66E07B74A
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFAF8D00_2_00007FF66DFAF8D0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E08B55F0_2_00007FF66E08B55F
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFB36A00_2_00007FF66DFB36A0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E10F4D60_2_00007FF66E10F4D6
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFD71A00_2_00007FF66DFD71A0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFDB1B50_2_00007FF66DFDB1B5
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E00F22F0_2_00007FF66E00F22F
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0FB2400_2_00007FF66E0FB240
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFB90B00_2_00007FF66DFB90B0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E084DEB0_2_00007FF66E084DEB
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFB8F000_2_00007FF66DFB8F00
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFACF220_2_00007FF66DFACF22
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFB8A300_2_00007FF66DFB8A30
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E2647420_2_00007FF66E264742
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0D08500_2_00007FF66E0D0850
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0D49300_2_00007FF66E0D4930
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E06863C0_2_00007FF66E06863C
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFDC68F0_2_00007FF66DFDC68F
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFB03900_2_00007FF66DFB0390
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFD84D40_2_00007FF66DFD84D4
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0A05210_2_00007FF66E0A0521
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFB81800_2_00007FF66DFB8180
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFBC2100_2_00007FF66DFBC210
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0301FB0_2_00007FF66E0301FB
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0182000_2_00007FF66E018200
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFC02770_2_00007FF66DFC0277
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0E42A00_2_00007FF66E0E42A0
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E0D9F6C0_2_00007FF66E0D9F6C
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFDDE4B0_2_00007FF66DFDDE4B
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: String function: 00007FF66DFB5980 appears 131 times
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: String function: 00007FF66E21E9A6 appears 187 times
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: String function: 00007FF66DFB68F0 appears 47 times
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: String function: 00007FF66E02B329 appears 46 times
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: String function: 00007FF66DFFBB07 appears 48 times
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: String function: 00007FF66DFB5720 appears 68 times
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: String function: 00007FF66DFB0B10 appears 250 times
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: String function: 00007FF66E21EFC0 appears 70 times
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: String function: 00007FF66E1756F3 appears 169 times
          Source: Z9fvmHepQC.exeStatic PE information: Number of sections : 13 > 10
          Source: Z9fvmHepQC.exe, 00000000.00000000.2007291800.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameihome.exeZ vs Z9fvmHepQC.exe
          Source: Z9fvmHepQC.exeBinary or memory string: OriginalFilenameihome.exeZ vs Z9fvmHepQC.exe
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 0.2.Z9fvmHepQC.exe.21658210000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 0.2.Z9fvmHepQC.exe.215d7691000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2009341237.00000215D77EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2009488257.00000215D77EE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2009224813.00000215D77E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2008238134.00000215D7841000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2008238134.00000215D7841000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2008238134.00000215D7841000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2009315322.00000215D77ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
          Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
          Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2008352809.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2009609332.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2009609332.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2009609332.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000002.3255937250.00000217D9E50000.00000020.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2008825010.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2008952668.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
          Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2009609332.00000215D78F4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2008238134.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2008238134.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2008238134.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2008238134.00000215D78F4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2009131449.00000215D77E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2009082132.00000215D77DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_663fc95d os = windows, severity = x86, description = Identifies CobaltStrike via unidentified function code, creation_date = 2021-04-01, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = d0f781d7e485a7ecfbbfd068601e72430d57ef80fc92a993033deb1ddcee5c48, id = 663fc95d-2472-4d52-ad75-c5d86cfc885f, last_modified = 2021-12-17
          Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_b54b94ac reference_sample = 36d32b1ed967f07a4bd19f5e671294d5359009c04835601f2cc40fb8b54f6a2a, os = windows, severity = x86, description = Rule for beacon sleep obfuscation routine, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = 2344dd7820656f18cfb774a89d89f5ab65d46cc7761c1f16b7e768df66aa41c8, id = b54b94ac-6ef8-4ee9-a8a6-f7324c1974ca, last_modified = 2022-01-13
          Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_CobaltStrike_f0b627fc reference_sample = b362951abd9d96d5ec15d281682fa1c8fe8f8e4e2f264ca86f6b061af607f79b, os = windows, severity = x86, description = Rule for beacon reflective loader, creation_date = 2021-10-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = fbc94bedd50b5b943553dd438a183a1e763c098a385ac3a4fc9ff24ee30f91e1, id = f0b627fc-97cd-42cb-9eae-1efb0672762d, last_modified = 2022-01-13
          Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Trojan_Raw_Generic_4 date_created = 2020-12-02, rev = FireEye, date_modified = 2020-12-02, md5 = f41074be5b423afb02a74bc74222e35d
          Source: Process Memory Space: Z9fvmHepQC.exe PID: 1720, type: MEMORYSTRMatched rule: Windows_Trojan_CobaltStrike_ee756db7 os = windows, severity = x86, description = Attempts to detect Cobalt Strike based on strings found in BEACON, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.CobaltStrike, fingerprint = e589cc259644bc75d6c4db02a624c978e855201cf851c0d87f0d54685ce68f71, id = ee756db7-e177-41f0-af99-c44646d334f7, last_modified = 2021-08-23
          Source: classification engineClassification label: mal96.troj.winEXE@1/0@1/1
          Source: Z9fvmHepQC.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Z9fvmHepQC.exeString found in binary or memory: assertion failed: pos != u32::MAX/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-environ-17.0.3/src/address_map.rs
          Source: Z9fvmHepQC.exeString found in binary or memory: /user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-cranelift-17.0.3/src/debug/transform/address_transform.rs
          Source: Z9fvmHepQC.exeString found in binary or memory: or re-adding support for interface types you can see this issue: https://github.com/bytecodealliance/wasmtime/issues/677 unimplemented section in wasm file
          Source: Z9fvmHepQC.exeString found in binary or memory: /user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/addr2line-0.21.0/src/lib.rsNon UTF-8 ELF section nameInvalid ELF program header size or alignmentInvalid ELF program header entry sizeInvalid ELF section header offset/size/alignmentInvalid ELF se
          Source: Z9fvmHepQC.exeString found in binary or memory: /user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/addr2line-0.21.0/src/function.rs
          Source: Z9fvmHepQC.exeString found in binary or memory: $/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/addr2line-0.21.0/src/function.rs
          Source: Z9fvmHepQC.exeString found in binary or memory: /user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-cranelift-17.0.3/src/debug/transform/address_transform.rs
          Source: Z9fvmHepQC.exeString found in binary or memory: and for re-adding support for interface types you can see this issue:
          Source: Z9fvmHepQC.exeString found in binary or memory: assertion failed: pos != u32::MAX/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-environ-17.0.3/src/address_map.rs
          Source: Z9fvmHepQC.exeString found in binary or memory: ^;#assertion failed: pos != u32::MAX/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-environ-17.0.3/src/address_map.rs
          Source: Z9fvmHepQC.exeString found in binary or memory: /user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/addr2line-0.21.0/src/lib.rsNon UTF-8 ELF section nameInvalid ELF program header size or alignmentInvalid ELF program header entry sizeInvalid ELF section header offset/size/alignmentInvalid ELF section header entry sizeInvalid ELF e_shstrndxInvalid ELF shstrtab sizeInvalid ELF header size or alignmentUnsupported ELF headerMissing ELF section headers for e_phnum overflowMissing ELF section headers for e_shstrndx overflowMissing ELF e_shstrndxInvalid ELF section header offset or sizeInvalid ELF symbol name offsetInvalid ELF section size or offsetInvalid ELF section name offsetInvalid ELF string section offset or sizeInvalid ELF section indexInvalid COFF/PE section headersInvalid COFF section offset or sizeInvalid XCOFF auxiliary header sizeInvalid XCOFF header size or alignmentUnsupported XCOFF header/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/object-0.32.2/src/read/xcoff/symbol.rsInvalid XCOFF symbol name offsetb
          Source: Z9fvmHepQC.exeString found in binary or memory: //user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/addr2line-0.21.0/src/lib.rsNon UTF-8 ELF section nameInvalid ELF program header size or alignmentInvalid ELF program header entry sizeInvalid ELF section header offset/size/alignmentInvalid ELF section header entry sizeInvalid ELF e_shstrndxInvalid ELF shstrtab sizeInvalid ELF header size or alignmentUnsupported ELF headerMissing ELF section headers for e_phnum overflowMissing ELF section headers for e_shstrndx overflowMissing ELF e_shstrndxInvalid ELF section header offset or sizeInvalid ELF symbol name offsetInvalid ELF section size or offsetInvalid ELF section name offsetInvalid ELF string section offset or sizeInvalid ELF section indexInvalid COFF/PE section headersInvalid COFF section offset or sizeInvalid XCOFF auxiliary header sizeInvalid XCOFF header size or alignmentUnsupported XCOFF header/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/object-0.32.2/src/read/xcoff/symbol.rsInvalid XCOFF symbol name offsetb
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
          Source: Z9fvmHepQC.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: Z9fvmHepQC.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: Z9fvmHepQC.exeStatic file information: File size 5258240 > 1048576
          Source: Z9fvmHepQC.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x335400
          Source: Z9fvmHepQC.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x185400
          Source: Z9fvmHepQC.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
          Source: Z9fvmHepQC.exeStatic PE information: section name: .eh_fram
          Source: Z9fvmHepQC.exeStatic PE information: section name: .xdata
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00000215D771375C push 0000006Ah; retf 0_2_00000215D7713774
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFD73DA push rcx; iretd 0_2_00007FF66DFD73DB
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeAPI coverage: 6.6 %
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exe TID: 3936Thread sleep time: -75000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E205718 GetSystemInfo,0_2_00007FF66E205718
          Source: Z9fvmHepQC.exe, 00000000.00000002.3254800570.00000215D78D8000.00000004.00000020.00020000.00000000.sdmp, Z9fvmHepQC.exe, 00000000.00000002.3254282764.00000215D77B2000.00000004.00000020.00020000.00000000.sdmp, Z9fvmHepQC.exe, 00000000.00000002.3254282764.00000215D7779000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66DFA1180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,0_2_00007FF66DFA1180
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeCode function: 0_2_00007FF66E492748 SetUnhandledExceptionFilter,SwitchToThread,Sleep,0_2_00007FF66E492748
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\Z9fvmHepQC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Z9fvmHepQC.exe.215d7691000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Z9fvmHepQC.exe.21658210000.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Z9fvmHepQC.exe.215d76e0000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Z9fvmHepQC.exe.21658210000.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Z9fvmHepQC.exe.215d7691000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2009609332.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3255937250.00000217D9E50000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2009609332.00000215D78F4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2008238134.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2008238134.00000215D78F4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Z9fvmHepQC.exe PID: 1720, type: MEMORYSTR
          Source: Yara matchFile source: 00000000.00000003.2009224813.00000215D77E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2009341237.00000215D77FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2008352809.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2009592329.00000215D7805000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2009574337.00000215D77FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2008825010.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2009488257.00000215D77FC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2008952668.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3255064017.00000215D7A0E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2009284243.00000215D77F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2007898810.00000215D7757000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2009131449.00000215D77E5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.2009082132.00000215D77DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Command and Scripting Interpreter
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory1
          Virtualization/Sandbox Evasion
          Remote Desktop ProtocolData from Removable Media1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account Manager3
          System Information Discovery
          SMB/Windows Admin SharesData from Network Shared Drive3
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
          Obfuscated Files or Information
          NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture113
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Z9fvmHepQC.exe6%VirustotalBrowse
          Z9fvmHepQC.exe0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookss100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books2100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books~100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksws100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksF100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookst100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/N4215/adj/amzn.us.sr.aps?sz=160x600&oe=oe=ISO-8859-1;&sn=17170100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksM100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookscoo100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books?100%Avira URL Cloudmalware
          p0.ssl.qhimg.com.cdn.dnsv1.com100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksfl100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksyyy100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books.t100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksP100%Avira URL Cloudmalware
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksU6100%Avira URL Cloudmalware
          https://bytecodealliance.org/security.0%Avira URL Cloudsafe
          http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksxyy100%Avira URL Cloudmalware
          NameIPActiveMaliciousAntivirus DetectionReputation
          itn6qp3m.slt.sched.tdnsv8.com
          42.177.83.107
          truetrue
            unknown
            p0.ssl.qhimg.com.cdn.dnsv1.com
            unknown
            unknowntrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              p0.ssl.qhimg.com.cdn.dnsv1.comtrue
              • Avira URL Cloud: malware
              unknown
              http://p0.ssl.qhimg.com/N4215/adj/amzn.us.sr.aps?sz=160x600&oe=oe=ISO-8859-1;&sn=1717084268&s=3717&dc_ref=http%3A%2F%2Fupdate.firefox.com.cnfalse
                high
                http://p0.ssl.qhimg.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookswsZ9fvmHepQC.exe, 00000000.00000002.3254837540.00000215D7915000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksZ9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookscooZ9fvmHepQC.exe, 00000000.00000002.3254837540.00000215D7915000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  https://github.com/bytecodealliance/wasmtime/issues/1271Z9fvmHepQC.exefalse
                    high
                    http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books2Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://p0.ssl.qhimg.com.cdn.dnsv1.com/N4215/adj/amzn.us.sr.aps?sz=160x600&oe=oe=ISO-8859-1;&sn=17170Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B6A000.00000004.00000020.00020000.00000000.sdmp, Z9fvmHepQC.exe, 00000000.00000002.3255702876.00000215D7D7B000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookssZ9fvmHepQC.exe, 00000000.00000002.3254837540.00000215D7915000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=bookstZ9fvmHepQC.exe, 00000000.00000002.3254837540.00000215D7915000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksFZ9fvmHepQC.exe, 00000000.00000002.3254282764.00000215D7799000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: malware
                    unknown
                    https://github.com/bytecodealliance/wasmtime/issues/6530znIZ9fvmHepQC.exefalse
                      high
                      http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksMZ9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books~Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books?Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://github.com/bytecodealliance/wasmtime/issues/6530znCnZ9fvmHepQC.exe, 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpfalse
                        high
                        https://github.com/bytecodealliance/wasmtime/issues/677Z9fvmHepQC.exefalse
                          high
                          https://github.com/bytecodealliance/wasmtime/issues/6530Z9fvmHepQC.exefalse
                            high
                            http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksU6Z9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksPZ9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B8A000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: malware
                            unknown
                            http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksfZ9fvmHepQC.exe, 00000000.00000002.3254837540.00000215D7915000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              https://bytecodealliance.org/security.Z9fvmHepQC.exefalse
                              • Avira URL Cloud: safe
                              unknown
                              http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books.tZ9fvmHepQC.exe, 00000000.00000002.3254837540.00000215D7915000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksflZ9fvmHepQC.exe, 00000000.00000002.3255579911.00000215D7CF2000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksxyyZ9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B6A000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://p0.ssl.qhimg.com.cdn.dnsv1.com/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=booksyyyZ9fvmHepQC.exe, 00000000.00000002.3255217619.00000215D7B6A000.00000004.00000020.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: malware
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              42.177.83.107
                              itn6qp3m.slt.sched.tdnsv8.comChina
                              4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNtrue
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1582290
                              Start date and time:2024-12-30 09:14:10 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 33s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:4
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:Z9fvmHepQC.exe
                              renamed because original name is a hash value
                              Original Sample Name:aab7bbb7b70a920a79c2c32126bf96fc7fb967938e49f70eb316379203452f1a.exe
                              Detection:MAL
                              Classification:mal96.troj.winEXE@1/0@1/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 58%
                              • Number of executed functions: 30
                              • Number of non-executed functions: 51
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                              • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              No simulations
                              No context
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CHINA169-BACKBONECHINAUNICOMChina169BackboneCNbotx.mips.elfGet hashmaliciousMiraiBrowse
                              • 42.59.176.77
                              botx.sh4.elfGet hashmaliciousMiraiBrowse
                              • 113.204.27.53
                              botx.x86.elfGet hashmaliciousMiraiBrowse
                              • 153.6.5.145
                              botx.ppc.elfGet hashmaliciousMiraiBrowse
                              • 39.79.186.23
                              botx.arm7.elfGet hashmaliciousMiraiBrowse
                              • 221.198.151.168
                              botx.mpsl.elfGet hashmaliciousMiraiBrowse
                              • 110.251.74.242
                              loligang.ppc.elfGet hashmaliciousMiraiBrowse
                              • 113.58.178.67
                              loligang.spc.elfGet hashmaliciousMiraiBrowse
                              • 101.29.237.45
                              loligang.sh4.elfGet hashmaliciousMiraiBrowse
                              • 221.211.142.255
                              loligang.mips.elfGet hashmaliciousMiraiBrowse
                              • 123.9.242.148
                              No context
                              No context
                              No created / dropped files found
                              File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                              Entropy (8bit):6.712181218459073
                              TrID:
                              • Win64 Executable (generic) (12005/4) 74.95%
                              • Generic Win/DOS Executable (2004/3) 12.51%
                              • DOS Executable Generic (2002/1) 12.50%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                              File name:Z9fvmHepQC.exe
                              File size:5'258'240 bytes
                              MD5:1e53f1eafb546110a915ac383181aaa6
                              SHA1:78b5bb994fb9e60883c01cd62375557686be3205
                              SHA256:aab7bbb7b70a920a79c2c32126bf96fc7fb967938e49f70eb316379203452f1a
                              SHA512:2db23316740ea49878cbe577582643302fb9cf117950880b86bcbdd3fd4d9c611b004da6d15e3aa9c1a6b6b93a30692d6c1872ebef6d638c2e86049bc7eb2f21
                              SSDEEP:49152:0GAyjU5rHMr7y8ZfC3AlLsgEGcIgXo46Vqy0b4gyaBKf8RfpqLGHRQWbE4LPy1QO:myj9xM80RrFzxSKb6AE0d
                              TLSH:49367D47E2A480E9C06EC1B5835BA733FA32BC484524B69F5BD46B222F35F506F0E759
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......g...............).T3..8P................@..............................P...... Q...`... ............................
                              Icon Hash:6d8e176d712bce6d
                              Entrypoint:0x1400013d0
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x140000000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
                              Time Stamp:0x6715D9A8 [Mon Oct 21 04:33:44 2024 UTC]
                              TLS Callbacks:0x4013f970, 0x1, 0x402e11e0, 0x1, 0x402e11b0, 0x1
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:ff4a479ffc7eaa169c7e35063db6034b
                              Instruction
                              dec eax
                              sub esp, 28h
                              dec eax
                              mov eax, dword ptr [004B9055h]
                              mov dword ptr [eax], 00000001h
                              call 00007F2B192FE0EFh
                              nop
                              nop
                              dec eax
                              add esp, 28h
                              ret
                              nop dword ptr [eax]
                              dec eax
                              sub esp, 28h
                              dec eax
                              mov eax, dword ptr [004B9035h]
                              mov dword ptr [eax], 00000000h
                              call 00007F2B192FE0CFh
                              nop
                              nop
                              dec eax
                              add esp, 28h
                              ret
                              nop dword ptr [eax]
                              dec eax
                              sub esp, 28h
                              call 00007F2B195DD974h
                              dec eax
                              cmp eax, 01h
                              sbb eax, eax
                              dec eax
                              add esp, 28h
                              ret
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              dec eax
                              lea ecx, dword ptr [00000009h]
                              jmp 00007F2B192FE329h
                              nop dword ptr [eax+00h]
                              ret
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              nop
                              dec esp
                              mov edx, dword ptr [ecx+08h]
                              dec ecx
                              mov dword ptr [edx+18h], ebp
                              dec esp
                              mov ebx, dword ptr [esp]
                              dec ebp
                              mov dword ptr [edx+20h], ebx
                              jmp 00007F2B19560869h
                              nop word ptr [eax+eax+00000000h]
                              nop
                              dec esp
                              mov edx, dword ptr [ecx+08h]
                              dec ecx
                              mov dword ptr [edx+18h], ebp
                              dec esp
                              mov ebx, dword ptr [esp]
                              dec ebp
                              mov dword ptr [edx+20h], ebx
                              jmp 00007F2B19560849h
                              nop word ptr [eax+eax+00000000h]
                              nop
                              dec esp
                              mov edx, dword ptr [ecx+08h]
                              dec ecx
                              mov dword ptr [edx+18h], ebp
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x4f10000x8e.edata
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x4f20000x11fc.idata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x4f60000x10d28.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4bf0000x15dec.pdata
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5070000x58e0.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x4ba0800x28.rdata
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x4f24680x3c8.idata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x3353b80x3354009ca39f66a72f23dffd12989a4959a5e8unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .data0x3370000x2f00x400b18cc1571716d301778abaa5bed2e0aeFalse0.130859375data1.0965833449619233IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rdata0x3380000x1852900x185400dc1d08b194d0a48da4b183185824aa4aFalse0.6050271957289659data6.404834576120108IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .eh_fram0x4be0000x3f00x400e8c8aeeee68029ffc471d7c12093ebf8False0.1826171875Sony PlayStation PSX image, 4-Bit, Pixel at (31745,272) Size=0x01.9521024093572519IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .pdata0x4bf0000x15dec0x15e00a5f0d69274704f9dbc5f3418bacf55bbFalse0.4614732142857143data6.399795629980994IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .xdata0x4d50000x1a9f80x1aa0028e6a9d1199ef4f4092ffe9075748445False0.1682713468309859data4.772952445077927IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .bss0x4f00000x4000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .edata0x4f10000x8e0x20061fc4a4820d008ba6e76900b49be74e6False0.244140625data1.8156966126718577IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .idata0x4f20000x11fc0x1200272a1a0b4a2d759178573716e671e9d5False0.3155381944444444data4.365994715992988IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .CRT0x4f40000x680x2005f2039b6a3d1dd807380a2bae0a05135False0.076171875data0.40517793218226683IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .tls0x4f50000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x4f60000x10d280x10d287b53bcdbab56d397017dfa66a7d28638False0.3604725415070243data4.221037485357578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x5070000x58e00x5a00dc5780eb2bb01c0c023713aee7a1782dFalse0.39618055555555554data5.449513647436446IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x4f60f80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.35917721518987344
                              RT_GROUP_ICON0x5069200x14dataEnglishUnited States1.15
                              RT_VERSION0x5069380x3dcdataEnglishUnited States0.4058704453441296
                              DLLImport
                              KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, InitializeCriticalSection, LeaveCriticalSection, RaiseException, RtlUnwindEx, VirtualQuery, __C_specific_handler
                              msvcrt.dll__getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _fmode, _fpreset, _initterm, _onexit, _setjmp, abort, calloc, ceil, ceilf, exit, floor, floorf, fprintf, free, fwrite, longjmp, malloc, memcmp, memcpy, memmove, memset, signal, strlen, strncmp, vfprintf
                              kernel32.dllAddVectoredExceptionHandler, CloseHandle, CreateDirectoryW, CreateFileMappingA, CreateFileW, CreateThread, CreateToolhelp32Snapshot, DuplicateHandle, FindClose, FindFirstFileW, FlushInstructionCache, FormatMessageW, FreeLibrary, GetConsoleMode, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentThread, GetEnvironmentVariableW, GetFileInformationByHandle, GetFileInformationByHandleEx, GetFullPathNameW, GetLastError, GetModuleHandleA, GetModuleHandleW, GetProcAddress, GetProcessHeap, GetStdHandle, GetSystemInfo, HeapAlloc, HeapFree, HeapReAlloc, InitOnceBeginInitialize, InitOnceComplete, LoadLibraryExA, MapViewOfFile, Module32FirstW, Module32NextW, MoveFileExW, MultiByteToWideChar, QueryPerformanceCounter, QueryPerformanceFrequency, RtlAddFunctionTable, RtlCaptureContext, RtlDeleteFunctionTable, RtlLookupFunctionEntry, RtlVirtualUnwind, SetFileInformationByHandle, SetLastError, SetThreadStackGuarantee, SetUnhandledExceptionFilter, Sleep, SwitchToFiber, SwitchToThread, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnmapViewOfFile, VirtualAlloc, VirtualFree, VirtualProtect, WaitForSingleObject, WriteConsoleW
                              ntdll.dllNtReadFile, NtWriteFile, RtlNtStatusToDosError
                              oleaut32.dllGetErrorInfo, SysFreeString, SysStringLen
                              api-ms-win-core-synch-l1-2-0.dllWaitOnAddress, WakeByAddressAll, WakeByAddressSingle
                              bcryptprimitives.dllProcessPrng
                              NameOrdinalAddress
                              __jit_debug_descriptor10x1403372d0
                              __jit_debug_register_code20x1403362c0
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2024-12-30T09:15:03.189163+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:03.189163+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:08.957855+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:08.957855+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:20.538352+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:20.538352+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:26.104437+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:26.104437+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:32.041417+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:32.041417+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:37.604834+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:37.604834+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:43.173422+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:43.173422+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:48.765587+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:48.765587+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:54.381770+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:54.381770+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:59.987682+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:15:59.987682+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:05.624457+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:05.624457+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:11.223521+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:11.223521+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:17.157487+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:17.157487+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:22.809343+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:22.809343+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:28.367420+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:28.367420+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:33.941682+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:33.941682+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:39.970265+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:39.970265+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:45.552738+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:45.552738+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:51.118357+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:51.118357+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:57.150055+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:16:57.150055+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:17:02.805519+01002032749ET MALWARE Cobalt Strike Malleable C2 Amazon Profile1192.168.2.54970442.177.83.10780TCP
                              2024-12-30T09:17:02.805519+01002055356ET MALWARE Cobalt Strike Malleable C2 (Amazon Profile)1192.168.2.54970442.177.83.10780TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 30, 2024 09:15:01.185926914 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:01.190871954 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:01.190975904 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:01.191097975 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:01.195935965 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:03.189079046 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:03.189162970 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:08.392365932 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:08.397270918 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.957767010 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.957792997 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.957803011 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.957854986 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:08.957912922 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:08.957945108 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.957957029 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.957967997 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.957981110 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.957990885 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.958000898 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:08.958002090 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.958023071 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:08.958053112 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:08.958245039 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.958256006 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.958303928 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:08.962790012 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.962810993 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.962857008 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:08.962913990 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:08.963004112 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.963016033 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.963063002 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:08.994626045 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.994642019 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:08.994713068 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.633779049 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.633888960 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.638767958 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.638782978 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.638799906 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.638809919 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.638856888 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.638906002 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.638919115 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.638930082 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.638983011 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.639014959 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.639024019 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.639096022 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.639098883 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.639108896 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.639168024 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.643381119 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.643457890 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.643683910 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.643692970 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.643743038 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.643757105 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.643759012 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.643802881 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.643830061 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.643893003 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.643896103 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.643937111 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.643958092 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.644001007 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.644001961 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.644058943 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.644112110 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.644120932 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.644129038 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.644162893 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.644197941 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.644262075 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.648371935 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.648441076 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.648608923 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.648658037 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.648689032 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.648691893 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.648736000 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.648746967 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.648768902 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.648801088 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.648832083 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.648868084 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.648886919 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.648937941 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.648984909 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.648996115 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649003029 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649017096 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649051905 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.649087906 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.649108887 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649118900 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649185896 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.649215937 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649225950 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649281979 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.649321079 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649331093 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649369001 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649379015 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649384022 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.649429083 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.649436951 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649450064 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649481058 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649487972 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.649490118 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649516106 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.649529934 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649539948 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649565935 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.649596930 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649600029 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.649606943 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649622917 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.649655104 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.649698019 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.653283119 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653354883 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.653426886 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653435946 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653443098 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653501987 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.653559923 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653568983 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653620005 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.653657913 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653666973 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653686047 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653693914 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653737068 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.653762102 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653772116 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653800964 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653809071 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653831005 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.653866053 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.653889894 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653898954 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653938055 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653945923 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.653965950 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.654015064 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.654082060 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654092073 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654098988 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654105902 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654114008 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654118061 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654154062 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.654156923 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654169083 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654201984 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:09.654215097 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654223919 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654306889 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654314995 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654361963 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654370070 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654414892 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654422998 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654468060 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654475927 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654540062 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654547930 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654577017 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654584885 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654602051 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654609919 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654737949 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654746056 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654753923 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654766083 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654776096 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654783010 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654799938 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654808044 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654845953 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654854059 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654896021 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.654903889 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655003071 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655010939 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655018091 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655028105 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655035973 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655044079 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655050039 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655056953 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655095100 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655102968 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655112028 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655119896 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655133963 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655142069 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.655148983 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658144951 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658153057 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658262014 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658401966 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658410072 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658420086 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658452988 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658540964 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658549070 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658593893 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658601999 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658643007 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658691883 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658771038 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658780098 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658797979 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658835888 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658896923 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.658904076 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659004927 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659013033 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659069061 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659075975 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659092903 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659116030 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659152985 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659159899 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659207106 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659214973 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659262896 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659271002 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659328938 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659338951 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659385920 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659394026 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659485102 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659492970 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659528017 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659537077 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659550905 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659559011 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659568071 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659611940 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659619093 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659626961 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659668922 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659677982 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:09.659687996 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:14.940677881 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:14.940757036 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:19.980071068 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:19.984951973 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:20.538280010 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:20.538352013 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:25.548466921 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:25.553255081 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:26.102740049 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:26.104437113 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:31.138855934 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:31.143753052 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:32.041342020 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:32.041416883 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:37.048958063 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:37.054081917 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:37.604639053 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:37.604834080 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:42.611259937 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:42.616203070 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:43.173157930 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:43.173422098 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:48.208436966 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:48.213284016 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:48.761815071 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:48.765587091 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:53.815128088 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:53.820205927 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:54.381702900 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:54.381769896 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:59.407846928 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:15:59.413360119 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:59.987550020 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:15:59.987682104 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:05.049479008 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:05.054527044 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:05.624389887 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:05.624456882 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:10.642472982 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:10.647392988 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:11.222099066 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:11.223520994 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:16.235898018 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:16.240761995 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:17.157418966 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:17.157486916 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:22.173614025 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:22.178497076 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:22.809137106 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:22.809343100 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:27.814014912 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:27.818943977 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:28.367325068 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:28.367419958 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:33.376581907 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:33.381486893 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:33.941281080 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:33.941682100 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:38.954734087 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:38.959645033 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:39.970186949 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:39.970264912 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:44.986553907 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:44.991509914 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:45.552669048 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:45.552737951 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:50.564080954 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:50.568970919 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:51.118261099 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:51.118356943 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:56.142126083 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:16:56.146970987 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:57.149977922 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:16:57.150054932 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:17:02.157802105 CET4970480192.168.2.542.177.83.107
                              Dec 30, 2024 09:17:02.162695885 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:17:02.804416895 CET804970442.177.83.107192.168.2.5
                              Dec 30, 2024 09:17:02.805519104 CET4970480192.168.2.542.177.83.107
                              TimestampSource PortDest PortSource IPDest IP
                              Dec 30, 2024 09:15:00.932629108 CET5831653192.168.2.51.1.1.1
                              Dec 30, 2024 09:15:01.179286003 CET53583161.1.1.1192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Dec 30, 2024 09:15:00.932629108 CET192.168.2.51.1.1.10xa828Standard query (0)p0.ssl.qhimg.com.cdn.dnsv1.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)p0.ssl.qhimg.com.cdn.dnsv1.comitn6qp3m.slt.sched.tdnsv8.comCNAME (Canonical name)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com42.177.83.107A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com61.240.220.214A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com123.6.40.224A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com14.205.47.78A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com116.142.249.59A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com119.167.229.212A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com123.6.40.242A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com221.204.72.204A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com36.248.54.85A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com116.142.249.98A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com123.6.37.241A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com60.220.179.43A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com119.36.226.137A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com218.29.50.234A (IP address)IN (0x0001)false
                              Dec 30, 2024 09:15:01.179286003 CET1.1.1.1192.168.2.50xa828No error (0)itn6qp3m.slt.sched.tdnsv8.com42.56.81.104A (IP address)IN (0x0001)false
                              • p0.ssl.qhimg.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.54970442.177.83.107801720C:\Users\user\Desktop\Z9fvmHepQC.exe
                              TimestampBytes transferredDirectionData
                              Dec 30, 2024 09:15:01.191097975 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:15:03.189079046 CET373INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:15:02 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 4508641493690390892
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:15:08.392365932 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:15:08.957767010 CET399INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:15:08 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 14480
                              Accept-Ranges: bytes
                              X-NWS-LOG-UUID: 4020878911823298965
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:15:08.957792997 CET1236INData Raw: fc 0c 05 79 39 a2 16 77 05 43 26 ec 4c df 70 9c 1e d4 9a 65 d3 22 49 d7 03 51 9f 0f 47 8e 4c ce f6 a3 c7 ea 21 2a e2 60 77 44 1d 20 79 db fc c0 f8 ed a3 6b 9d 57 9d d3 19 0d 08 20 6b 32 a9 28 2e 39 ba 96 2c 81 35 f4 c5 73 ce ea 1a b4 81 27 05 9b
                              Data Ascii: y9wC&Lpe"IQGL!*`wD ykW k2(.9,5s'!dgBMoX8oz?Tn@.7#M"<gZAIJ7/eBaz}g7'cs8 '^6pq{Y/W6LH\ZL
                              Dec 30, 2024 09:15:08.957803011 CET224INData Raw: 84 d9 a7 b6 1c bc 25 65 58 00 13 22 f0 ad b1 cd d2 17 38 aa 2f f3 d3 57 32 c1 cd 14 6f ef 6c 77 e3 ea 26 29 a1 f0 f0 39 a0 02 0c c6 bc f4 6e 8c 58 45 5b b7 ef cc 24 c9 18 42 75 68 5c 0d 16 02 9b cb 08 bc 1e 87 28 8d 25 a2 8f eb 22 ee 17 f7 35 5e
                              Data Ascii: %eX"8/W2olw&)9nXE[$Buh\(%"5^C"u)4zJ^hS]43_J4aGGLQId][BK#Yp(^DNr(+Aw>vnA>2^b"U2fTCij<i
                              Dec 30, 2024 09:15:08.957945108 CET1236INData Raw: 6f 1f 7a aa 4b 82 ef a9 d2 bf 5b 94 81 1c b8 ef ac b4 d3 21 08 57 6a c0 3f 55 10 5d 3e dc 7e 26 2b b2 96 f3 a3 02 97 7c 02 02 85 28 34 4d 00 22 bd d3 bb fa 86 bc 4e b1 03 c8 5d 28 28 f8 e5 90 1c 7b 80 4e 3e b1 f1 a2 90 dd f9 c1 68 8f 29 03 8f 03
                              Data Ascii: ozK[!Wj?U]>~&+|(4M"N](({N>h)91F}%&<"5L5"(w8OXy]HP`l8UR7,Pi`:0xtz#up5k*D"#q.Bu>59R
                              Dec 30, 2024 09:15:08.957957029 CET1236INData Raw: 3d 7c de 4a c2 db 00 05 2d d3 e6 8d 8f d9 0a 97 fa b8 99 81 58 f9 3f e4 f7 42 58 9d 2c 71 af 89 d7 48 44 33 59 53 82 1a 23 f1 9e f4 0f 84 a9 ed e5 52 15 07 ba f9 06 6a fd b0 20 11 57 28 70 dc 85 4f f0 12 e1 47 9a e1 19 47 ef 74 37 39 ff 43 28 57
                              Data Ascii: =|J-X?BX,qHD3YS#Rj W(pOGGt79C(W+SnT6,jE%+HZ[5w?puWQQby{#a"YeBE(1UhW\us{"[}`r?a;^G+HElSXbl9$A@%x
                              Dec 30, 2024 09:15:08.957967997 CET448INData Raw: d1 6b 25 18 6c a5 d4 11 c4 d7 28 0e b8 16 a9 31 ff fe 12 ce 15 53 20 c1 e7 0c ca 5e 42 8b 60 be 8e 54 8a 14 f7 08 f0 28 a4 75 e0 59 1c f3 06 5c 7e 28 0c 61 c3 26 5b ea 10 76 f1 f6 92 83 5c d4 ea e5 41 d8 3c dd 7a 56 59 b7 5f ed 96 91 32 b9 34 f1
                              Data Ascii: k%l(1S ^B`T(uY\~(a&[v\A<zVY_24'XNK]4,yw fq(R_hwZ*p77i,2p^y_#b@&cb@(5y%X'nc|*\eZ\=h+1'$GuID-xwZ[+-L1j^
                              Dec 30, 2024 09:15:08.957981110 CET1236INData Raw: 52 b8 ed 3b 82 8b 8a cf 21 4b 68 07 2e 29 42 a1 2a a0 ed 3f c2 f0 59 12 cf 7b dc cb ec 73 02 3e 5c d5 7f ee 8c c4 ec 97 54 8c 8f c3 fd 7f 22 58 d3 dd c2 d7 cb 0a 18 87 14 cb a8 bb 2d b3 bc 04 42 45 7b a3 b0 77 3f 68 43 8b 67 92 67 5b 92 6d 13 d9
                              Data Ascii: R;!Kh.)B*?Y{s>\T"X-BE{w?hCgg[mpGu(&*Jro=h5YeGu.<rIN1sIrQEU3?8d(lmYu\Nv=[~|T,.TGgYOk`d<V,FBB9pz
                              Dec 30, 2024 09:15:08.957990885 CET1236INData Raw: 26 0f 65 35 47 7e 1d b8 8b 73 89 0a 95 fb 9b bc 43 53 19 4c f1 82 67 a8 36 26 20 ef b8 14 e5 70 b1 b3 d2 8a 74 44 b6 d3 8a 40 ab 32 1b 06 f6 e1 49 30 a4 b3 bd 59 ce 26 84 e9 50 87 63 a3 34 85 e4 b4 5b 52 0f 95 e9 34 12 66 8f 69 de 88 f8 47 eb a2
                              Data Ascii: &e5G~sCSLg6& ptD@2I0Y&Pc4[R4fiGkG(Be_iFtmEeHX,:opCh}dnb5u|pJ8fxK3^0FHvsk2>)enoi5GfgnK+20hPA&H?
                              Dec 30, 2024 09:15:08.958002090 CET448INData Raw: cc 50 1f ff e4 6b 38 f5 01 b4 46 a1 5e 13 44 7d 75 06 fc 13 10 48 b2 f9 73 e0 9e 54 7f cc 1e 6b 37 fc 55 43 56 f9 02 d0 59 75 6c f9 81 eb 94 2f 72 b4 cc 7a b1 5e d3 01 4a cd bb 37 4c 5b 69 e6 1f 37 16 fe 4b 96 df 3e 86 f0 f8 cd 77 ec af 9a 94 da
                              Data Ascii: Pk8F^D}uHsTk7UCVYul/rz^J7L[i7K>w@PTD 3?ZNVVp=+rSaw^M[njGC-TtkSuw$'7#}~b698S:W Kz\EF;{6EF
                              Dec 30, 2024 09:15:08.958245039 CET1236INData Raw: 26 6f c2 dd f2 b1 4f a4 47 bc 90 42 e4 42 bb 06 3c b3 a8 f0 ab c7 8e 65 e2 b7 61 13 41 20 c7 be 29 5b fd 81 5b 00 0d 64 86 46 c8 7c 92 a8 fe 0b 8a 79 a6 aa d9 c4 9a 29 72 17 c7 7e 9e b1 bc 5d 2f 69 4c d0 26 a7 87 dd 17 af 7e 0d 56 1f 0e 05 b4 1b
                              Data Ascii: &oOGBB<eaA )[[dF|y)r~]/iL&~V=VeDwafXSkL%Twbk\pWgx-aRh:`]Kn0wUJNB=G{Wx)z;.A0H'9mkt];-Hm+PH5
                              Dec 30, 2024 09:15:08.958256006 CET224INData Raw: f9 ab 98 bc 98 9d e2 10 31 a8 9d db 34 15 b7 eb d1 ca 1f 53 ed 85 46 28 47 a2 57 68 55 28 9e 28 b3 a9 e5 68 ae 14 d2 ea c6 55 b1 d1 57 d5 ed 04 9e 7b f3 cc c4 ec 78 7a 4d 86 78 19 fb 46 ab 9f 53 09 3a cc 63 f1 aa 36 f8 58 b8 83 97 41 27 9b e1 06
                              Data Ascii: 14SF(GWhU((hUW{xzMxFS:c6XA'00en*p){&VD90`R3l+ ` ZVI{7L&Jp\}L"8X.xKyOihaCAn3#]q|N.xN
                              Dec 30, 2024 09:15:09.633779049 CET385OUTPOST /N4215/adj/amzn.us.sr.aps?sz=160x600&oe=oe=ISO-8859-1;&sn=1717084268&s=3717&dc_ref=http%3A%2F%2Fupdate.firefox.com.cn HTTP/1.1
                              Accept: */*
                              Content-Type: text/xml
                              X-Requested-With: XMLHttpRequest
                              Host: p0.ssl.qhimg.com
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Content-Length: 229272
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:15:14.940677881 CET374INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:15:14 GMT
                              Server: Server
                              x-amz-id-1: THK9YEZJCKPGY5T42OZT
                              x-amz-id-2: a21JZ1xrNDNtdGRsa219bGV3YW85amZuZW9zdG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              x-ua-compatible: IE=edge
                              X-Cache-Lookup: Cache Miss
                              Content-Length: 0
                              X-NWS-LOG-UUID: 236564566704692171
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:15:19.980071068 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:15:20.538280010 CET372INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:15:20 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 372704133384497164
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:15:25.548466921 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:15:26.102740049 CET374INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:15:25 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 16409261600853154037
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:15:31.138855934 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:15:32.041342020 CET374INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:15:31 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 16569825597267463146
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:15:37.048958063 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:15:37.604639053 CET373INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:15:37 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 9532017179937350846
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:15:42.611259937 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:15:43.173157930 CET374INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:15:42 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 12144214722080533776
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:15:48.208436966 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:15:48.761815071 CET373INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:15:48 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 1185776602895432611
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:15:53.815128088 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:15:54.381702900 CET374INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:15:54 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 18218361616984302266
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:15:59.407846928 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:15:59.987550020 CET374INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:15:59 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 11596198596446030139
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:16:05.049479008 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:16:05.624389887 CET373INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:16:05 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 8936876408843510098
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:16:10.642472982 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:16:11.222099066 CET374INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:16:10 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 17373823909372390286
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:16:16.235898018 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:16:17.157418966 CET374INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:16:16 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 15353977179188824405
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:16:22.173614025 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:16:22.809137106 CET373INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:16:22 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 8291988072787550614
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:16:27.814014912 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:16:28.367325068 CET374INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:16:28 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 13610971792911640949
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:16:33.376581907 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:16:33.941281080 CET373INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:16:33 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 5212236710473726559
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:16:38.954734087 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:16:39.970186949 CET373INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:16:39 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 3602315999117876902
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:16:44.986553907 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:16:45.552669048 CET374INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:16:45 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 13106395476993098023
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:16:50.564080954 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:16:51.118261099 CET373INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:16:50 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 6417270450554782058
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:16:56.142126083 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:16:57.149977922 CET373INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:16:56 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 1806853183501537024
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss
                              Dec 30, 2024 09:17:02.157802105 CET497OUTGET /s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books HTTP/1.1
                              Accept: */*
                              Host: p0.ssl.qhimg.com
                              Cookie: skin=noskin;session-token=PdRgfX4+deu1k/mOzpK5nGIZPyQ6pY8uGpAG+N16OWbD5a+DiDF6abaXcFBw3fvEg9igEdJW5ZJWSiZaCD7qbDsZI74S6ob72tOZ3Mdp/sYYB4a3NA1ktpGm9VNXrGcvNuq7oq89Gmf7JhHJIYQLjwXeMIgpUVoTtb++Q8QFYmk=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996
                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
                              Connection: Keep-Alive
                              Cache-Control: no-cache
                              Dec 30, 2024 09:17:02.804416895 CET374INHTTP/1.1 200 OK
                              Date: Mon, 30 Dec 2024 08:17:02 GMT
                              Server: Server
                              x-amz-id-1: THKUYEZKCKPGY5T42PZT
                              x-amz-id-2: a21yZ2xrNDNtdGRsa212bGV3YW85amZuZW9ydG5rZmRuZ2tmZGl4aHRvNDVpbgo=
                              X-Frame-Options: SAMEORIGIN
                              X-Cache-Lookup: Cache Miss
                              Content-Encoding: gzip
                              Content-Length: 0
                              X-NWS-LOG-UUID: 13051291916191873205
                              Connection: keep-alive
                              X-Cache-Lookup: Cache Miss


                              Click to jump to process

                              Click to jump to process

                              Target ID:0
                              Start time:03:14:56
                              Start date:30/12/2024
                              Path:C:\Users\user\Desktop\Z9fvmHepQC.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\Z9fvmHepQC.exe"
                              Imagebase:0x7ff66dfa0000
                              File size:5'258'240 bytes
                              MD5 hash:1E53F1EAFB546110A915AC383181AAA6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2009341237.00000215D77EE000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2009488257.00000215D77EE000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009224813.00000215D77E5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2009224813.00000215D77E5000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009341237.00000215D77FC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2008238134.00000215D7841000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2008238134.00000215D7841000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2008238134.00000215D7841000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2026273543.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2037126514.00000215D7E1A000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2009315322.00000215D77ED000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000000.00000002.3255811510.0000021658210000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000000.00000002.3254159034.00000215D7691000.00000002.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2008178877.00000215D7B11000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2027416947.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2008352809.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2008352809.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2017276190.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000002.3254928165.00000215D7940000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2033734612.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2034996552.00000215D7DD7000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2035286946.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2029066908.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009609332.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2009609332.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2009609332.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2009609332.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009592329.00000215D7805000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2012673442.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2034996552.00000215D7E15000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009574337.00000215D77FC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3255937250.00000217D9E50000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000002.3255937250.00000217D9E50000.00000020.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2013941314.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2008825010.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2008825010.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009488257.00000215D77FC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2008952668.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2008952668.00000215D77DA000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                              • Rule: INDICATOR_SUSPICIOUS_ReflectiveLoader, Description: detects Reflective DLL injection artifacts, Source: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, Author: ditekSHen
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2037561994.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3255064017.00000215D7A0E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000002.3255217619.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009609332.00000215D78F4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009609332.00000215D78F4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2009609332.00000215D78F4000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2023164219.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2035766145.00000215D7B92000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2011785249.00000215D7B7B000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2022082585.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2018881215.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009284243.00000215D77F3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2008238134.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2008238134.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2008238134.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2007898810.00000215D7757000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2008238134.00000215D7880000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2008238134.00000215D78F4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2008238134.00000215D78F4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2008238134.00000215D78F4000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009131449.00000215D77E5000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2009131449.00000215D77E5000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2008178877.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009082132.00000215D77DB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2009082132.00000215D77DB000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2016857846.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2035560435.00000215D7B91000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2014311961.00000215D7B94000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2013432042.00000215D7B93000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2034925752.00000215D7C30000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: JoeSecurity_CobaltStrike, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_CobaltStrike_ee756db7, Description: Attempts to detect Cobalt Strike based on strings found in BEACON, Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_663fc95d, Description: Identifies CobaltStrike via unidentified function code, Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_b54b94ac, Description: Rule for beacon sleep obfuscation routine, Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Windows_Trojan_CobaltStrike_f0b627fc, Description: Rule for beacon reflective loader, Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              • Rule: Trojan_Raw_Generic_4, Description: unknown, Source: 00000000.00000003.2009899163.00000215D7B90000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                              Reputation:low
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:3.6%
                                Dynamic/Decrypted Code Coverage:0.6%
                                Signature Coverage:19.8%
                                Total number of Nodes:2000
                                Total number of Limit Nodes:66
                                execution_graph 185235 7ff66dfe6cff 185236 7ff66dfe6d16 185235->185236 185238 7ff66dfe7c8f 185235->185238 185240 7ff66dfe6daf 185236->185240 185264 7ff66e0934aa 17 API calls 185236->185264 185238->185240 185241 7ff66e0887fc 185238->185241 185242 7ff66e08884f 185241->185242 185246 7ff66e088964 185242->185246 185250 7ff66e088feb 185242->185250 185265 7ff66e010b0f HeapAlloc 185242->185265 185244 7ff66e088a2c memcpy 185244->185246 185246->185244 185258 7ff66e088a89 185246->185258 185266 7ff66e08e247 12 API calls 185246->185266 185267 7ff66e05504b HeapAlloc 185246->185267 185248 7ff66e088ee7 memcpy 185251 7ff66e088f57 185248->185251 185254 7ff66e088f7a 185251->185254 185274 7ff66e05504b HeapAlloc 185251->185274 185254->185240 185256 7ff66e089120 7 API calls 185256->185258 185258->185250 185258->185256 185259 7ff66e088d47 memcpy 185258->185259 185261 7ff66e088ebe 185258->185261 185263 7ff66e088ec8 185258->185263 185268 7ff66e00ba51 memcpy memcpy 185258->185268 185269 7ff66e08ea4f memcpy memcpy memcpy memcpy memcpy 185258->185269 185271 7ff66e00b9fb memcpy memcpy 185258->185271 185270 7ff66e00b6b8 memcpy memcpy memcpy memcpy 185259->185270 185272 7ff66e00e142 memcpy memcpy 185261->185272 185273 7ff66e08ecf1 16 API calls 185263->185273 185264->185240 185265->185242 185266->185246 185267->185246 185268->185258 185269->185258 185270->185258 185273->185248 185274->185251 185275 7ff66e01380c 185276 7ff66e013822 185275->185276 185352 7ff66e05325b 185276->185352 185278 7ff66e013aae 185355 7ff66e011963 185278->185355 185280 7ff66e013ace 185349 7ff66e013e3a 185280->185349 185473 7ff66e069ed6 185280->185473 185288 7ff66e052e9a memcpy memcpy memcpy memcpy HeapAlloc 185325 7ff66e012960 185288->185325 185300 7ff66e052a15 memcpy memcpy memcpy memcpy HeapAlloc 185300->185325 185308 7ff66e015443 185493 7ff66e052cb7 memcpy memcpy memcpy memcpy HeapAlloc 185308->185493 185311 7ff66e053402 185312 7ff66e052b05 memcpy memcpy memcpy memcpy HeapAlloc 185312->185325 185320 7ff66e052a3f memcpy memcpy memcpy memcpy HeapAlloc 185320->185325 185322 7ff66e014e1c 185492 7ff66e052f30 memcpy memcpy memcpy memcpy HeapAlloc 185322->185492 185325->185278 185325->185288 185325->185300 185325->185312 185325->185320 185325->185322 185483 7ff66e052e0e memcpy memcpy memcpy memcpy HeapAlloc 185325->185483 185484 7ff66e052a98 memcpy memcpy memcpy memcpy HeapAlloc 185325->185484 185485 7ff66e052ae6 memcpy memcpy memcpy memcpy HeapAlloc 185325->185485 185486 7ff66e052e32 memcpy memcpy memcpy memcpy HeapAlloc 185325->185486 185487 7ff66e053209 memcpy memcpy memcpy memcpy HeapAlloc 185325->185487 185488 7ff66e052c04 memcpy memcpy memcpy memcpy HeapAlloc 185325->185488 185489 7ff66e052b5a memcpy memcpy memcpy memcpy HeapAlloc 185325->185489 185490 7ff66e052ba8 memcpy memcpy memcpy memcpy HeapAlloc 185325->185490 185491 7ff66e02b960 HeapAlloc 185325->185491 185494 7ff66e0521d7 185352->185494 185356 7ff66e011991 185355->185356 185377 7ff66e0122a8 185356->185377 185499 7ff66e078712 185356->185499 185358 7ff66e0119b7 185502 7ff66e01103b 185358->185502 185377->185280 185474 7ff66e078712 2 API calls 185473->185474 185475 7ff66e069ef6 185474->185475 185476 7ff66e06d524 HeapAlloc 185475->185476 185477 7ff66e069f26 185476->185477 185481 7ff66e06a0ab 185477->185481 185541 7ff66e06a20d HeapAlloc 185477->185541 185480 7ff66e06a20d HeapAlloc 185482 7ff66e069f52 185480->185482 185482->185480 185482->185481 185542 7ff66e029ded HeapAlloc 185482->185542 185484->185325 185486->185325 185488->185325 185491->185325 185492->185308 185493->185311 185495 7ff66e052202 185494->185495 185496 7ff66e052235 185495->185496 185498 7ff66e09a216 memcpy memcpy memcpy memcpy HeapAlloc 185495->185498 185496->185325 185498->185496 185509 7ff66e0772c0 TlsAlloc InitOnceComplete 185499->185509 185501 7ff66e078721 185501->185358 185503 7ff66e078712 2 API calls 185502->185503 185504 7ff66e011053 185503->185504 185510 7ff66e06d524 185504->185510 185506 7ff66e011088 185507 7ff66e0110be 185506->185507 185514 7ff66e0110d8 HeapAlloc 185506->185514 185509->185501 185511 7ff66e06d546 185510->185511 185512 7ff66e06d5ae 185510->185512 185511->185512 185515 7ff66e0c5f89 185511->185515 185512->185506 185514->185506 185516 7ff66e0c5fa0 185515->185516 185517 7ff66e0c5fb6 185515->185517 185518 7ff66e0c5fd2 185516->185518 185519 7ff66e0c5fad 185516->185519 185517->185512 185522 7ff66e0b4962 185518->185522 185519->185517 185529 7ff66e0b4926 HeapAlloc 185519->185529 185523 7ff66e0b4926 185522->185523 185524 7ff66e0b4946 185523->185524 185525 7ff66e0b4948 185523->185525 185526 7ff66e0b493b 185523->185526 185524->185517 185530 7ff66dfab050 185525->185530 185534 7ff66dfab160 HeapAlloc 185526->185534 185529->185517 185531 7ff66dfab062 185530->185531 185535 7ff66e103c40 185531->185535 185534->185524 185536 7ff66e103c5b 185535->185536 185539 7ff66e103c55 HeapAlloc 185535->185539 185536->185539 185540 7ff66dfab07b 185536->185540 185538 7ff66e4926a0 185539->185538 185540->185524 185541->185482 185542->185482 185543 7ff66e06cb54 185544 7ff66e06cb78 185543->185544 185547 7ff66e06cd08 185544->185547 185546 7ff66e06cb86 185548 7ff66e06cd26 185547->185548 185550 7ff66e06cd93 185547->185550 185549 7ff66e0c5f89 HeapAlloc 185548->185549 185548->185550 185549->185550 185550->185546 185551 215d76f6e3c 185552 215d76f6ec9 185551->185552 185557 215d76f780c 185552->185557 185554 215d76f6f69 185561 215d76f7b9c 185554->185561 185556 215d76f6ffa 185560 215d76f7846 185557->185560 185558 215d76f7961 185558->185554 185559 215d76f793d VirtualAlloc 185559->185558 185560->185558 185560->185559 185564 215d76f7c0b 185561->185564 185562 215d76f7e39 185562->185556 185563 215d76f7c57 LoadLibraryA 185563->185564 185564->185562 185564->185563 185565 7ff66dfab036 185570 7ff66e0c8f00 185565->185570 185567 7ff66dfab03b 185568 7ff66e0c8f00 4 API calls 185567->185568 185569 7ff66dfab040 185568->185569 185571 7ff66e0c8f22 185570->185571 185576 7ff66e0cb97d 185571->185576 185573 7ff66e0c9141 memcpy 185574 7ff66e0c91c7 185573->185574 185574->185567 185575 7ff66e0c8f74 185575->185573 185581 7ff66e0cb31a 185576->185581 185578 7ff66e0cb997 185584 7ff66e089348 185578->185584 185580 7ff66e0cb9a6 memcpy 185580->185575 185582 7ff66e0cb326 memcpy 185581->185582 185582->185578 185585 7ff66dfab050 HeapAlloc 185584->185585 185586 7ff66e08935f 185585->185586 185586->185580 185587 7ff66e05796e 185588 7ff66e055c84 memcpy 185587->185588 185589 7ff66e057965 185587->185589 185608 7ff66e055caf 185588->185608 185589->185587 185589->185588 185605 7ff66e057769 185589->185605 185591 7ff66e055099 memcpy HeapAlloc 185591->185608 185593 7ff66e00a138 memcpy memcpy 185593->185608 185595 7ff66e057249 memcpy 185595->185608 185596 7ff66e054b5d memcpy memcpy memset HeapAlloc 185596->185608 185597 7ff66e08cd1c 10 API calls 185597->185608 185598 7ff66e057363 memcpy 185598->185608 185600 7ff66e05504b HeapAlloc 185600->185608 185604 7ff66e029ded HeapAlloc 185604->185608 185607 7ff66dffbc10 7 API calls 185607->185608 185608->185591 185608->185593 185608->185595 185608->185596 185608->185597 185608->185598 185608->185600 185608->185604 185608->185605 185608->185607 185612 7ff66e05435f 185608->185612 185620 7ff66e002be5 7 API calls 185608->185620 185621 7ff66dffe47a 7 API calls 185608->185621 185622 7ff66dffe23f 11 API calls 185608->185622 185623 7ff66e000986 7 API calls 185608->185623 185624 7ff66e008826 memcpy HeapAlloc 185608->185624 185625 7ff66e05a513 memcpy memcpy TlsAlloc InitOnceComplete HeapAlloc 185608->185625 185626 7ff66e0544ce memcpy memcpy TlsAlloc InitOnceComplete HeapAlloc 185608->185626 185627 7ff66dfe62ec 185608->185627 185631 7ff66e05452a HeapAlloc 185608->185631 185632 7ff66e0105d7 HeapAlloc 185608->185632 185613 7ff66e054375 185612->185613 185616 7ff66e0543a5 185612->185616 185614 7ff66dfe62ec 7 API calls 185613->185614 185615 7ff66e05438f 185614->185615 185615->185616 185617 7ff66e054462 185615->185617 185633 7ff66e05452a HeapAlloc 185615->185633 185616->185608 185618 7ff66e06cd08 HeapAlloc 185617->185618 185618->185616 185620->185608 185621->185608 185622->185608 185623->185608 185624->185608 185625->185608 185626->185608 185628 7ff66dfe630f 185627->185628 185630 7ff66dfe6423 185628->185630 185634 7ff66dfabc60 7 API calls 185628->185634 185630->185608 185631->185608 185632->185608 185633->185615 185634->185630 185635 7ff66e05f1ae 185643 7ff66e05f1c4 185635->185643 185637 7ff66e05f96f 185648 7ff66e05fced 185637->185648 185788 7ff66e06089c 185637->185788 185931 7ff66e0103af HeapAlloc 185637->185931 185639 7ff66e076bf2 4 API calls 185640 7ff66e05f85d 185639->185640 185640->185637 185640->185639 185641 7ff66e05f67b 185930 7ff66e06cea9 HeapAlloc 185641->185930 185643->185641 185644 7ff66e05f68b 185643->185644 185645 7ff66e0c5f89 HeapAlloc 185643->185645 185647 7ff66e0632f0 185643->185647 185655 7ff66e09ffbb memcpy memcpy HeapAlloc 185643->185655 185643->185788 185644->185788 185798 7ff66e076bf2 185644->185798 185645->185643 185650 7ff66e06332a memcpy 185647->185650 185653 7ff66e05fe6a 185648->185653 185648->185788 185934 7ff66e0103af HeapAlloc 185648->185934 185686 7ff66e0633d6 185650->185686 185653->185788 185806 7ff66e209d49 185653->185806 185654 7ff66e05fea8 185809 7ff66e072057 185654->185809 185655->185643 185658 7ff66e209d49 7 API calls 185660 7ff66e05fefb 185658->185660 185659 7ff66e05fa05 185659->185648 185659->185788 185932 7ff66e029ded HeapAlloc 185659->185932 185933 7ff66e06c230 HeapAlloc 185659->185933 185661 7ff66e209d49 7 API calls 185660->185661 185662 7ff66e05ff1d 185661->185662 185665 7ff66e05ff64 185662->185665 185662->185788 185935 7ff66e0103af HeapAlloc 185662->185935 185665->185788 185816 7ff66e0103f5 185665->185816 185668 7ff66e05ffd3 185670 7ff66e05ffe9 185668->185670 185936 7ff66e0103af HeapAlloc 185668->185936 185674 7ff66e06004d 185670->185674 185670->185788 185937 7ff66e0103af HeapAlloc 185670->185937 185672 7ff66e054aae HeapAlloc 185673 7ff66e06009f 185672->185673 185675 7ff66e0103f5 HeapAlloc 185673->185675 185674->185672 185674->185788 185676 7ff66e0600b8 185675->185676 185677 7ff66e054aae HeapAlloc 185676->185677 185676->185788 185678 7ff66e060109 185677->185678 185679 7ff66e054aae HeapAlloc 185678->185679 185680 7ff66e06011c 185679->185680 185824 7ff66e19f057 185680->185824 185682 7ff66e060130 185683 7ff66e19f057 7 API calls 185682->185683 185684 7ff66e060140 185683->185684 185685 7ff66e054aae HeapAlloc 185684->185685 185687 7ff66e060150 185685->185687 185688 7ff66e0634f0 memcpy 185686->185688 185689 7ff66e054aae HeapAlloc 185687->185689 185690 7ff66e063598 185688->185690 185691 7ff66e060163 185689->185691 185693 7ff66e065661 memcpy memcpy memcpy 185690->185693 185695 7ff66e078712 2 API calls 185690->185695 185692 7ff66e072057 2 API calls 185691->185692 185694 7ff66e060173 memcpy 185692->185694 185693->185788 185715 7ff66e0635b1 185695->185715 185696 7ff66e0639e7 185713 7ff66e063a1d 185696->185713 185967 7ff66e06657d memset 185696->185967 185700 7ff66e06444d memcpy 185705 7ff66e0644b2 185700->185705 185701 7ff66e0643c4 185701->185700 185702 7ff66e010756 HeapAlloc 185702->185713 185782 7ff66e0644ce 185705->185782 185970 7ff66e029ded HeapAlloc 185705->185970 185713->185702 185756 7ff66e063ca0 185713->185756 185968 7ff66e073a2e memset 185713->185968 185715->185696 185965 7ff66e0766a4 memset 185715->185965 185966 7ff66e076943 memset 185715->185966 185724 7ff66e0103f5 HeapAlloc 185724->185756 185734 7ff66e068fb3 memcpy memcpy 185775 7ff66e064f21 185734->185775 185737 7ff66e069049 HeapAlloc 185738 7ff66e064d73 185737->185738 185738->185737 185738->185775 185738->185788 185974 7ff66e068fb3 memcpy memcpy 185738->185974 185739 7ff66e065431 185739->185693 185739->185788 185744 7ff66e0103af HeapAlloc 185744->185756 185747 7ff66e010093 HeapAlloc 185747->185756 185756->185701 185756->185724 185756->185744 185756->185747 185763 7ff66e0690db HeapAlloc 185756->185763 185756->185788 185969 7ff66e01029a HeapAlloc 185756->185969 185763->185756 185765 7ff66e0cfaa8 memcpy memcpy 185765->185782 185775->185734 185775->185739 185775->185788 185975 7ff66e01033a HeapAlloc 185775->185975 185976 7ff66e06bcdf HeapAlloc 185775->185976 185977 7ff66e0505ff memcpy HeapAlloc 185775->185977 185782->185738 185782->185765 185782->185788 185971 7ff66e068fb3 memcpy memcpy 185782->185971 185972 7ff66e0cebc8 memcpy 185782->185972 185973 7ff66e029ded HeapAlloc 185782->185973 185799 7ff66e076bfc 185798->185799 185800 7ff66e0733cd 185798->185800 185799->185640 185800->185798 185801 7ff66e07353c 185800->185801 185802 7ff66e073421 185800->185802 185979 7ff66e071ea1 memcpy memcpy 185801->185979 185978 7ff66e071dee memset HeapAlloc 185802->185978 185805 7ff66e073445 185805->185640 185980 7ff66e106720 185806->185980 185810 7ff66e05fed2 185809->185810 185812 7ff66e072071 185809->185812 185810->185658 185811 7ff66e07216a 185812->185811 186001 7ff66e0103af HeapAlloc 185812->186001 185814 7ff66e07211a 185814->185811 185815 7ff66e07211f memset 185814->185815 185815->185810 185817 7ff66e010404 185816->185817 185819 7ff66e010410 185816->185819 185817->185819 186002 7ff66e0103af HeapAlloc 185817->186002 185819->185788 185820 7ff66e054aae 185819->185820 185821 7ff66e054abf 185820->185821 185823 7ff66e054ae9 185820->185823 185821->185823 186003 7ff66e0103af HeapAlloc 185821->186003 185823->185668 185825 7ff66e0103f5 HeapAlloc 185824->185825 185827 7ff66e19f06d 185825->185827 185826 7ff66e19f077 185826->185682 185827->185826 186004 7ff66e097df5 memcpy memcpy HeapAlloc 185827->186004 185829 7ff66e19f10f 186005 7ff66e097fa6 memcpy memcpy HeapAlloc 185829->186005 185831 7ff66e19f121 186006 7ff66e0af25d 7 API calls 185831->186006 185833 7ff66e19f13f 185833->185682 185930->185644 185931->185659 185932->185659 185933->185659 185934->185653 185935->185665 185936->185670 185937->185674 185965->185715 185966->185715 185967->185696 185968->185713 185969->185756 185970->185705 185971->185782 185972->185782 185973->185782 185974->185738 185975->185775 185976->185775 185977->185775 185978->185805 185979->185805 185981 7ff66e1067f0 185980->185981 185982 7ff66e106739 TlsGetValue 185980->185982 185998 7ff66e0df6e0 TlsAlloc InitOnceComplete 185981->185998 185985 7ff66e106746 185982->185985 185986 7ff66e1067e1 185985->185986 185987 7ff66e10675f TlsGetValue 185985->185987 185999 7ff66e0df6e0 TlsAlloc InitOnceComplete 185985->185999 185986->185654 185987->185986 185990 7ff66e10676c 185987->185990 185991 7ff66e1067b9 ProcessPrng 185990->185991 185992 7ff66e103c40 HeapAlloc 185990->185992 185991->185986 185993 7ff66e106787 185992->185993 185994 7ff66e10682c 185993->185994 185995 7ff66e1067ac TlsSetValue 185993->185995 186000 7ff66e0df6e0 TlsAlloc InitOnceComplete 185993->186000 185995->185991 185998->185982 185999->185987 186000->185995 186001->185814 186002->185819 186003->185823 186004->185829 186005->185831 186006->185833 186062 7ff66dfa13d0 186065 7ff66dfa1180 186062->186065 186064 7ff66dfa13e6 186066 7ff66dfa11b0 186065->186066 186067 7ff66dfa11b9 Sleep 186066->186067 186068 7ff66dfa11cd 186066->186068 186067->186066 186069 7ff66dfa134c _initterm 186068->186069 186070 7ff66dfa1200 186068->186070 186078 7ff66dfa12ee 186068->186078 186069->186070 186071 7ff66dfa1228 SetUnhandledExceptionFilter 186070->186071 186072 7ff66dfa124b 186071->186072 186073 7ff66dfa1250 malloc 186072->186073 186074 7ff66dfa127a 186073->186074 186073->186078 186075 7ff66dfa1280 strlen malloc memcpy 186074->186075 186075->186075 186076 7ff66dfa12b2 186075->186076 186079 7ff66dfaaee0 186076->186079 186078->186064 186080 7ff66dfaaef6 186079->186080 186081 7ff66dfaaf19 SetThreadDescription 186080->186081 186094 7ff66e0de360 186081->186094 186085 7ff66dfaaf46 186118 7ff66e0b2ff8 186085->186118 186089 7ff66dfab02a 186089->186078 186090 7ff66dfaafa6 186092 7ff66dfaafc9 186090->186092 186141 7ff66e102750 15 API calls 186090->186141 186092->186089 186142 7ff66e0de4f0 186092->186142 186095 7ff66e103c40 HeapAlloc 186094->186095 186097 7ff66e0de383 186095->186097 186096 7ff66dfaaf3e 186102 7ff66e0de420 186096->186102 186097->186096 186154 7ff66e280730 RtlCaptureContext RtlUnwindEx abort 186097->186154 186162 7ff66e0df430 186102->186162 186104 7ff66e0de443 186104->186085 186105 7ff66e0de438 186105->186104 186106 7ff66e280730 6 API calls 186105->186106 186107 7ff66e0de4e2 186106->186107 186108 7ff66e0de6c8 186107->186108 186109 7ff66e0de607 186107->186109 186110 7ff66e0de56f 186107->186110 186111 7ff66e0df430 12 API calls 186107->186111 186114 7ff66e0df590 7 API calls 186107->186114 186117 7ff66e0de660 WaitOnAddress 186107->186117 186182 7ff66e0df380 WakeByAddressSingle 186108->186182 186109->186085 186183 7ff66e0df380 WakeByAddressSingle 186110->186183 186111->186107 186114->186107 186115 7ff66e0de78b 186116 7ff66e280730 6 API calls 186115->186116 186116->186109 186117->186107 186117->186117 186187 7ff66dfa5080 186118->186187 186394 7ff66dfa6247 186118->186394 186513 7ff66dfa4227 186118->186513 186637 7ff66dfa652d 186118->186637 186718 7ff66dfa6b89 186118->186718 186850 7ff66dfa6250 186118->186850 186969 7ff66dfa6fb1 186118->186969 187082 7ff66dfa4235 186118->187082 187206 7ff66dfa3392 186118->187206 187386 7ff66dfa289d 186118->187386 187425 7ff66dfa491a 186118->187425 187518 7ff66dfa422e 186118->187518 187642 7ff66dfa215d 186118->187642 187772 7ff66dfa1bd9 186118->187772 187900 7ff66dfa2139 186118->187900 188029 7ff66dfa475b 186118->188029 188153 7ff66dfa1e98 186118->188153 188283 7ff66dfa623e 186118->188283 188402 7ff66dfa205e 186118->188402 188532 7ff66dfa57a2 186118->188532 186119 7ff66dfaaf52 186119->186092 186140 7ff66e102db0 18 API calls 186119->186140 186140->186090 186141->186092 186149 7ff66e0de530 186142->186149 186143 7ff66e0de6c8 189452 7ff66e0df380 WakeByAddressSingle 186143->189452 186145 7ff66e0de56f 189453 7ff66e0df380 WakeByAddressSingle 186145->189453 186147 7ff66e0df590 7 API calls 186147->186149 186148 7ff66e0de78b 186150 7ff66e280730 6 API calls 186148->186150 186149->186143 186149->186145 186149->186147 186151 7ff66e0de607 186149->186151 186152 7ff66e0df430 12 API calls 186149->186152 186153 7ff66e0de660 WaitOnAddress 186149->186153 186150->186151 186151->186089 186152->186149 186153->186149 186153->186153 186155 7ff66e2807eb 186154->186155 186156 7ff66e2807f5 186154->186156 186160 7ff66e2806f0 RaiseException 186155->186160 186159 7ff66e2807f0 abort 186156->186159 186161 7ff66e280380 RaiseException 186156->186161 186159->186156 186160->186159 186161->186156 186163 7ff66e0df525 186162->186163 186166 7ff66e0df449 TlsGetValue 186162->186166 186184 7ff66e0df6e0 TlsAlloc InitOnceComplete 186163->186184 186167 7ff66e0df456 186166->186167 186168 7ff66e0df474 TlsGetValue 186167->186168 186175 7ff66e0df45d 186167->186175 186185 7ff66e0df6e0 TlsAlloc InitOnceComplete 186167->186185 186171 7ff66e0df485 186168->186171 186168->186175 186172 7ff66e103c40 HeapAlloc 186171->186172 186171->186175 186173 7ff66e0df4b0 186172->186173 186174 7ff66e0df4b9 186173->186174 186179 7ff66e0df564 186173->186179 186176 7ff66e0df4d2 TlsSetValue 186174->186176 186186 7ff66e0df6e0 TlsAlloc InitOnceComplete 186174->186186 186175->186105 186176->186175 186180 7ff66e280730 6 API calls 186179->186180 186181 7ff66e0df589 186180->186181 186182->186109 186183->186115 186184->186166 186185->186168 186186->186176 186188 7ff66dfad9b0 186187->186188 186189 7ff66dfa5092 memcpy 186188->186189 186190 7ff66dfa5124 186189->186190 186226 7ff66dfa5e02 186190->186226 188644 7ff66dfaedbd 186190->188644 186192 7ff66dfa5179 186195 7ff66dfaab4f 186192->186195 188648 7ff66e1e29b6 186192->188648 186194 7ff66dfa538a 186196 7ff66dfa5478 memcpy 186194->186196 186195->186119 186197 7ff66dfa54b1 186196->186197 188651 7ff66e158bd7 186197->188651 186199 7ff66dfa5574 186199->186195 186201 7ff66dfa58e3 186199->186201 186202 7ff66dfa570b 186199->186202 186337 7ff66dfa5627 186199->186337 186200 7ff66dfa5697 186204 7ff66e106720 7 API calls 186201->186204 186207 7ff66dfa572e 186202->186207 186221 7ff66dfa89b6 186202->186221 186226->186119 186337->186200 186339 7ff66dfa7cac 186337->186339 188704 7ff66e0c8ce6 13 API calls 186337->188704 186339->186339 186395 7ff66dfa6257 186394->186395 186418 7ff66dfa6707 186395->186418 188836 7ff66e2562b4 HeapAlloc memcpy 186395->188836 186397 7ff66dfa66f8 186397->186418 188840 7ff66e23e8de 16 API calls 186397->188840 186399 7ff66dfa6e73 186400 7ff66e27ef51 HeapAlloc 186399->186400 186416 7ff66dfa5e02 186399->186416 186403 7ff66dfa7c1d 186400->186403 186402 7ff66dfaa830 188857 7ff66e20bae9 memcpy 186402->188857 188858 7ff66e20df96 HeapAlloc memcpy memcpy 186402->188858 188859 7ff66e1cd00a HeapAlloc 186402->188859 186405 7ff66dfa562d 186403->186405 186406 7ff66dfa61f2 186403->186406 186409 7ff66dfa7cac 186405->186409 186411 7ff66dfa5697 186405->186411 188832 7ff66e0c8ce6 13 API calls 186405->188832 188834 7ff66e0feb00 121 API calls 186406->188834 186408 7ff66e10cce6 HeapAlloc 186408->186418 186409->186409 186410 7ff66dfa6202 188835 7ff66e176a38 121 API calls 186410->188835 186417 7ff66dfa56bd 186411->186417 188833 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 186411->188833 186416->186119 186417->186416 186419 7ff66dfa5b82 186417->186419 186422 7ff66dfa68d2 186417->186422 186418->186399 186418->186402 186418->186408 186420 7ff66e0b19c1 HeapAlloc 186419->186420 186421 7ff66dfa5be3 186419->186421 186420->186421 186423 7ff66e0b19c1 HeapAlloc 186421->186423 186425 7ff66dfa5cee 186421->186425 186451 7ff66dfa89b6 186421->186451 188837 7ff66dfabc60 7 API calls 186422->188837 186423->186425 186426 7ff66e0b19c1 HeapAlloc 186425->186426 186427 7ff66dfa5d6b 186425->186427 186425->186451 186426->186427 186428 7ff66e0b19c1 HeapAlloc 186427->186428 186429 7ff66dfa5de2 186427->186429 186427->186451 186428->186429 186429->186416 186430 7ff66dfa5e46 186429->186430 186431 7ff66dfa6cdc 186429->186431 186429->186451 186432 7ff66e168d5c 7 API calls 186430->186432 188838 7ff66e158b34 7 API calls 186431->188838 186434 7ff66dfa5e9f 186432->186434 186435 7ff66e168d5c 7 API calls 186434->186435 186443 7ff66dfa6d0c 186434->186443 186436 7ff66dfa5ed4 186435->186436 186437 7ff66e168d5c 7 API calls 186436->186437 186436->186443 186438 7ff66dfa5f06 186437->186438 186439 7ff66dfa6fd8 186438->186439 186441 7ff66dfa5f41 186438->186441 186438->186443 186439->186416 186469 7ff66dfa6ff7 186439->186469 188839 7ff66e17fa96 HeapAlloc 186439->188839 186442 7ff66dfa8443 186441->186442 186454 7ff66dfa5f89 186441->186454 186446 7ff66e1846b6 2 API calls 186442->186446 186442->186451 186443->186416 186444 7ff66e1682fc 2 API calls 186443->186444 186445 7ff66dfa91fd 186444->186445 186447 7ff66e0b2b1a 122 API calls 186445->186447 186446->186469 186448 7ff66dfa920d 186447->186448 186448->186416 186449 7ff66e0b2b1a 122 API calls 186448->186449 186453 7ff66dfa9243 186449->186453 186450 7ff66e1846b6 2 API calls 186452 7ff66e1031b0 12 API calls 186451->186452 186452->186451 186453->186416 186455 7ff66e1682fc 2 API calls 186453->186455 186454->186416 186454->186450 186454->186451 186467 7ff66e2080d1 7 API calls 186467->186469 186469->186402 186469->186416 186469->186443 186469->186451 186469->186467 186471 7ff66dfa9a8d 186469->186471 186472 7ff66e1510fd memcpy memcpy memcpy 186469->186472 186473 7ff66dfa9731 186469->186473 186478 7ff66e207d0f 121 API calls 186469->186478 186489 7ff66dfaa6d7 memcpy memcpy 186469->186489 186490 7ff66dfaa93d memcpy 186469->186490 186493 7ff66dfaa623 memcpy 186469->186493 186500 7ff66dfaa79f memcpy 186469->186500 186502 7ff66e21e9a6 HeapAlloc memcpy memcpy 186469->186502 186512 7ff66e158bd7 5 API calls 186469->186512 188842 7ff66e15040d memcpy memcpy 186469->188842 188843 7ff66e1ebb3a HeapAlloc 186469->188843 188844 7ff66e17f2d8 HeapAlloc 186469->188844 188846 7ff66e20819e HeapAlloc 186469->188846 188847 7ff66e208410 memcpy 186469->188847 188851 7ff66e20ebb8 HeapAlloc memcpy memcpy 186469->188851 186471->186416 186471->186451 186472->186469 186473->186471 186478->186469 186490->186469 186500->186402 186500->186469 186502->186469 186512->186469 186524 7ff66dfa423a 186513->186524 186514 7ff66dfa2493 188863 7ff66e1ebff9 186514->188863 186516 7ff66dfa24bd memset 186517 7ff66dfa24d4 186516->186517 186518 7ff66dfa6651 186541 7ff66dfa6707 186518->186541 188871 7ff66e2562b4 HeapAlloc memcpy 186518->188871 186520 7ff66dfa66f8 186520->186541 188875 7ff66e23e8de 16 API calls 186520->188875 186522 7ff66dfa6e73 186523 7ff66e27ef51 HeapAlloc 186522->186523 186635 7ff66dfa5e02 186522->186635 186525 7ff66dfa7c1d 186523->186525 186524->186514 186524->186518 186529 7ff66dfa562d 186525->186529 186530 7ff66dfa61f2 186525->186530 186527 7ff66dfaa830 188892 7ff66e20bae9 memcpy 186527->188892 188893 7ff66e20df96 HeapAlloc memcpy memcpy 186527->188893 188894 7ff66e1cd00a HeapAlloc 186527->188894 186533 7ff66dfa7cac 186529->186533 186535 7ff66dfa5697 186529->186535 188867 7ff66e0c8ce6 13 API calls 186529->188867 188869 7ff66e0feb00 121 API calls 186530->188869 186532 7ff66e10cce6 HeapAlloc 186532->186541 186533->186533 186534 7ff66dfa6202 188870 7ff66e176a38 121 API calls 186534->188870 186540 7ff66dfa56bd 186535->186540 188868 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 186535->188868 186542 7ff66dfa5b82 186540->186542 186545 7ff66dfa68d2 186540->186545 186540->186635 186541->186522 186541->186527 186541->186532 186543 7ff66e0b19c1 HeapAlloc 186542->186543 186544 7ff66dfa5be3 186542->186544 186543->186544 186546 7ff66e0b19c1 HeapAlloc 186544->186546 186548 7ff66dfa5cee 186544->186548 186575 7ff66dfa89b6 186544->186575 188872 7ff66dfabc60 7 API calls 186545->188872 186546->186548 186549 7ff66e0b19c1 HeapAlloc 186548->186549 186550 7ff66dfa5d6b 186548->186550 186548->186575 186549->186550 186551 7ff66e0b19c1 HeapAlloc 186550->186551 186552 7ff66dfa5de2 186550->186552 186550->186575 186551->186552 186553 7ff66dfa5e46 186552->186553 186554 7ff66dfa6cdc 186552->186554 186552->186575 186552->186635 186555 7ff66e168d5c 7 API calls 186553->186555 188873 7ff66e158b34 7 API calls 186554->188873 186557 7ff66dfa5e9f 186555->186557 186558 7ff66e168d5c 7 API calls 186557->186558 186565 7ff66dfa6d0c 186557->186565 186559 7ff66dfa5ed4 186558->186559 186560 7ff66e168d5c 7 API calls 186559->186560 186559->186565 186561 7ff66dfa5f06 186560->186561 186562 7ff66dfa6fd8 186561->186562 186564 7ff66dfa5f41 186561->186564 186561->186565 186626 7ff66dfa6ff7 186562->186626 186562->186635 188874 7ff66e17fa96 HeapAlloc 186562->188874 186566 7ff66dfa8443 186564->186566 186577 7ff66dfa5f89 186564->186577 186567 7ff66e1682fc 2 API calls 186565->186567 186565->186635 186566->186575 186568 7ff66dfa91fd 186567->186568 186570 7ff66e0b2b1a 122 API calls 186568->186570 186572 7ff66dfa920d 186570->186572 186571 7ff66e1031b0 12 API calls 186571->186575 186573 7ff66e0b2b1a 122 API calls 186572->186573 186572->186635 186576 7ff66dfa9243 186573->186576 186575->186571 186576->186635 186577->186575 186577->186635 186626->186527 186626->186565 186626->186575 186626->186635 186635->186119 186638 7ff66dfa653f 186637->186638 186639 7ff66dfa24a8 186638->186639 186645 7ff66dfa8767 186638->186645 186640 7ff66dfa6931 186639->186640 186642 7ff66e1ebff9 memcpy 186639->186642 186641 7ff66dfa24bd memset 186640->186641 186643 7ff66dfa24d4 186641->186643 186642->186641 186644 7ff66e1846b6 2 API calls 186646 7ff66dfa8846 186644->186646 186645->186644 186649 7ff66dfa89b6 186645->186649 186670 7ff66dfa9260 186645->186670 186667 7ff66dfa88fd 186646->186667 188898 7ff66e15040d memcpy memcpy 186646->188898 186650 7ff66e1031b0 12 API calls 186649->186650 186650->186649 186651 7ff66e1510fd memcpy memcpy memcpy 186651->186667 186654 7ff66dfa90b9 186655 7ff66e1682fc 2 API calls 186654->186655 186654->186670 186656 7ff66dfa91fd 186655->186656 186657 7ff66e0b2b1a 122 API calls 186656->186657 186660 7ff66dfa920d 186657->186660 186658 7ff66e2080d1 7 API calls 186658->186667 186659 7ff66dfa9a8d 186659->186649 186665 7ff66dfa9ad6 186659->186665 186659->186670 186664 7ff66e0b2b1a 122 API calls 186660->186664 186660->186670 186661 7ff66dfa9731 186661->186659 188902 7ff66e208410 memcpy 186661->188902 186669 7ff66dfa9243 186664->186669 186665->186670 186691 7ff66e204df5 2 API calls 186665->186691 186667->186649 186667->186651 186667->186654 186667->186658 186667->186659 186667->186661 186668 7ff66e207d0f 121 API calls 186667->186668 186667->186670 186683 7ff66dfaa6d7 memcpy memcpy 186667->186683 186684 7ff66dfaa93d memcpy 186667->186684 186687 7ff66dfaa623 memcpy 186667->186687 186690 7ff66dfaa83d 186667->186690 186693 7ff66dfaa79f memcpy 186667->186693 186695 7ff66e21e9a6 HeapAlloc memcpy memcpy 186667->186695 186717 7ff66e158bd7 5 API calls 186667->186717 188899 7ff66e15040d memcpy memcpy 186667->188899 188900 7ff66e1ebb3a HeapAlloc 186667->188900 188901 7ff66e17f2d8 HeapAlloc 186667->188901 188903 7ff66e20819e HeapAlloc 186667->188903 188904 7ff66e208410 memcpy 186667->188904 188908 7ff66e20ebb8 HeapAlloc memcpy memcpy 186667->188908 188909 7ff66e20bae9 memcpy 186667->188909 188910 7ff66e21e94b memcpy 186667->188910 188911 7ff66e258f2f 69 API calls 186667->188911 188917 7ff66e208140 7 API calls 186667->188917 186668->186667 186669->186670 186672 7ff66e1682fc 2 API calls 186669->186672 186670->186119 186674 7ff66dfa92ff 186672->186674 186676 7ff66dfa97fc 186674->186676 186681 7ff66dfa9326 186674->186681 186679 7ff66e1801f7 122 API calls 186676->186679 186694 7ff66dfa935b 186679->186694 186681->186670 186685 7ff66e0b2b1a 122 API calls 186681->186685 188913 7ff66e257512 HeapAlloc memcpy 186683->188913 186684->186667 186685->186694 188912 7ff66e21ee21 memcpy 186687->188912 188914 7ff66e20bae9 memcpy 186690->188914 188915 7ff66e20df96 HeapAlloc memcpy memcpy 186690->188915 188916 7ff66e1cd00a HeapAlloc 186690->188916 186692 7ff66dfaa1d2 186691->186692 186696 7ff66e204e32 2 API calls 186692->186696 186693->186667 186693->186690 186694->186649 186694->186670 186697 7ff66e204df5 2 API calls 186694->186697 186695->186667 186698 7ff66dfaa1f6 186696->186698 186699 7ff66dfa9be9 186697->186699 186698->186670 186700 7ff66dfaa29d 186698->186700 186701 7ff66dfaae5f 186698->186701 186703 7ff66e204e32 2 API calls 186699->186703 188907 7ff66e0b2fc8 HeapAlloc 186700->188907 188919 7ff66e1031b0 12 API calls 186701->188919 186706 7ff66dfa9c0d 186703->186706 186706->186649 186708 7ff66dfa9c11 186706->186708 188905 7ff66e0b2fc8 HeapAlloc 186706->188905 186708->186670 186709 7ff66e0daa69 HeapAlloc 186708->186709 186717->186667 188920 7ff66e273c4b 186718->188920 186720 7ff66dfa6b93 186721 7ff66e273c4b 7 API calls 186720->186721 186722 7ff66dfa6ba2 186721->186722 186723 7ff66e273c4b 7 API calls 186722->186723 186724 7ff66dfa6bb1 186723->186724 186725 7ff66e273c4b 7 API calls 186724->186725 186726 7ff66dfa6bc6 186725->186726 186727 7ff66e273c4b 7 API calls 186726->186727 186728 7ff66dfa6bd8 186727->186728 186729 7ff66e273c4b 7 API calls 186728->186729 186730 7ff66dfa6bed 186729->186730 186731 7ff66e273c4b 7 API calls 186730->186731 186732 7ff66dfa6bfd 186731->186732 186733 7ff66e273c4b 7 API calls 186732->186733 186734 7ff66dfa6c12 186733->186734 186735 7ff66e273c4b 7 API calls 186734->186735 186738 7ff66dfa6c27 186735->186738 186736 7ff66dfa7b61 186737 7ff66e27ef51 HeapAlloc 186736->186737 186738->186736 186741 7ff66dfaa830 186738->186741 186745 7ff66e10cce6 HeapAlloc 186738->186745 188946 7ff66e20bae9 memcpy 186741->188946 188947 7ff66e20df96 HeapAlloc memcpy memcpy 186741->188947 188948 7ff66e1cd00a HeapAlloc 186741->188948 186745->186738 186851 7ff66dfa6257 186850->186851 186872 7ff66dfa6707 186851->186872 188956 7ff66e2562b4 HeapAlloc memcpy 186851->188956 186853 7ff66dfa66f8 186853->186872 188960 7ff66e23e8de 16 API calls 186853->188960 186855 7ff66dfa6e73 186856 7ff66e27ef51 HeapAlloc 186855->186856 186874 7ff66dfa5e02 186855->186874 186857 7ff66dfa7c1d 186856->186857 186861 7ff66dfa562d 186857->186861 186862 7ff66dfa61f2 186857->186862 186859 7ff66dfaa830 188977 7ff66e20bae9 memcpy 186859->188977 188978 7ff66e20df96 HeapAlloc memcpy memcpy 186859->188978 188979 7ff66e1cd00a HeapAlloc 186859->188979 186865 7ff66dfa7cac 186861->186865 186867 7ff66dfa5697 186861->186867 188952 7ff66e0c8ce6 13 API calls 186861->188952 188954 7ff66e0feb00 121 API calls 186862->188954 186864 7ff66e10cce6 HeapAlloc 186864->186872 186865->186865 186866 7ff66dfa6202 188955 7ff66e176a38 121 API calls 186866->188955 186873 7ff66dfa56bd 186867->186873 188953 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 186867->188953 186872->186855 186872->186859 186872->186864 186873->186874 186875 7ff66dfa5b82 186873->186875 186878 7ff66dfa68d2 186873->186878 186874->186119 186876 7ff66e0b19c1 HeapAlloc 186875->186876 186877 7ff66dfa5be3 186875->186877 186876->186877 186879 7ff66e0b19c1 HeapAlloc 186877->186879 186881 7ff66dfa5cee 186877->186881 186906 7ff66dfa89b6 186877->186906 188957 7ff66dfabc60 7 API calls 186878->188957 186879->186881 186882 7ff66e0b19c1 HeapAlloc 186881->186882 186883 7ff66dfa5d6b 186881->186883 186881->186906 186882->186883 186884 7ff66e0b19c1 HeapAlloc 186883->186884 186885 7ff66dfa5de2 186883->186885 186883->186906 186884->186885 186885->186874 186886 7ff66dfa5e46 186885->186886 186887 7ff66dfa6cdc 186885->186887 186885->186906 186888 7ff66e168d5c 7 API calls 186886->186888 188958 7ff66e158b34 7 API calls 186887->188958 186890 7ff66dfa5e9f 186888->186890 186891 7ff66e168d5c 7 API calls 186890->186891 186898 7ff66dfa6d0c 186890->186898 186892 7ff66dfa5ed4 186891->186892 186893 7ff66e168d5c 7 API calls 186892->186893 186892->186898 186894 7ff66dfa5f06 186893->186894 186895 7ff66dfa6fd8 186894->186895 186897 7ff66dfa5f41 186894->186897 186894->186898 186895->186874 186950 7ff66dfa6ff7 186895->186950 188959 7ff66e17fa96 HeapAlloc 186895->188959 186899 7ff66dfa8443 186897->186899 186907 7ff66dfa5f89 186897->186907 186898->186874 186900 7ff66e1682fc 2 API calls 186898->186900 186902 7ff66e1846b6 2 API calls 186899->186902 186899->186906 186901 7ff66dfa91fd 186900->186901 186903 7ff66e0b2b1a 122 API calls 186901->186903 186902->186950 186905 7ff66dfa920d 186903->186905 186904 7ff66e1031b0 12 API calls 186904->186906 186905->186874 186908 7ff66e0b2b1a 122 API calls 186905->186908 186906->186904 186907->186874 186907->186906 186910 7ff66e1846b6 2 API calls 186907->186910 186909 7ff66dfa9243 186908->186909 186909->186874 186912 7ff66e1682fc 2 API calls 186909->186912 186922 7ff66e1510fd memcpy memcpy memcpy 186922->186950 186925 7ff66e2080d1 7 API calls 186925->186950 186927 7ff66dfa9a8d 186927->186874 186927->186906 186928 7ff66dfa9731 186928->186927 186933 7ff66e207d0f 121 API calls 186933->186950 186944 7ff66dfaa6d7 memcpy memcpy 186945 7ff66dfaa93d memcpy 186945->186950 186949 7ff66dfaa623 memcpy 186950->186859 186950->186874 186950->186898 186950->186906 186950->186922 186950->186925 186950->186927 186950->186928 186950->186933 186950->186944 186950->186945 186950->186949 186956 7ff66dfaa79f memcpy 186950->186956 186958 7ff66e21e9a6 HeapAlloc memcpy memcpy 186950->186958 186968 7ff66e158bd7 5 API calls 186950->186968 188962 7ff66e15040d memcpy memcpy 186950->188962 188963 7ff66e1ebb3a HeapAlloc 186950->188963 188964 7ff66e17f2d8 HeapAlloc 186950->188964 188966 7ff66e20819e HeapAlloc 186950->188966 188967 7ff66e208410 memcpy 186950->188967 188971 7ff66e20ebb8 HeapAlloc memcpy memcpy 186950->188971 188972 7ff66e20bae9 memcpy 186950->188972 188973 7ff66e21e94b memcpy 186950->188973 188974 7ff66e258f2f 69 API calls 186950->188974 188980 7ff66e208140 7 API calls 186950->188980 186956->186859 186956->186950 186958->186950 186968->186950 186970 7ff66dfa7c0f 186969->186970 186971 7ff66e27ef51 HeapAlloc 186970->186971 186972 7ff66dfa7c1d 186971->186972 186973 7ff66dfa562d 186972->186973 186974 7ff66dfa61f2 186972->186974 186976 7ff66dfa7cac 186973->186976 186978 7ff66dfa5697 186973->186978 188983 7ff66e0c8ce6 13 API calls 186973->188983 188985 7ff66e0feb00 121 API calls 186974->188985 186976->186976 186977 7ff66dfa6202 188986 7ff66e176a38 121 API calls 186977->188986 186982 7ff66dfa56bd 186978->186982 188984 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 186978->188984 186983 7ff66dfa5b82 186982->186983 186986 7ff66dfa68d2 186982->186986 187080 7ff66dfa5e02 186982->187080 186984 7ff66e0b19c1 HeapAlloc 186983->186984 186985 7ff66dfa5be3 186983->186985 186984->186985 186987 7ff66e0b19c1 HeapAlloc 186985->186987 186989 7ff66dfa5cee 186985->186989 187016 7ff66dfa89b6 186985->187016 188987 7ff66dfabc60 7 API calls 186986->188987 186987->186989 186990 7ff66e0b19c1 HeapAlloc 186989->186990 186991 7ff66dfa5d6b 186989->186991 186989->187016 186990->186991 186992 7ff66e0b19c1 HeapAlloc 186991->186992 186993 7ff66dfa5de2 186991->186993 186991->187016 186992->186993 186994 7ff66dfa5e46 186993->186994 186995 7ff66dfa6cdc 186993->186995 186993->187016 186993->187080 186996 7ff66e168d5c 7 API calls 186994->186996 188988 7ff66e158b34 7 API calls 186995->188988 186998 7ff66dfa5e9f 186996->186998 186999 7ff66e168d5c 7 API calls 186998->186999 187006 7ff66dfa6d0c 186998->187006 187000 7ff66dfa5ed4 186999->187000 187001 7ff66e168d5c 7 API calls 187000->187001 187000->187006 187002 7ff66dfa5f06 187001->187002 187003 7ff66dfa6fd8 187002->187003 187005 7ff66dfa5f41 187002->187005 187002->187006 187071 7ff66dfa6ff7 187003->187071 187003->187080 188989 7ff66e17fa96 HeapAlloc 187003->188989 187007 7ff66dfa8443 187005->187007 187018 7ff66dfa5f89 187005->187018 187008 7ff66e1682fc 2 API calls 187006->187008 187006->187080 187010 7ff66e1846b6 2 API calls 187007->187010 187007->187016 187009 7ff66dfa91fd 187008->187009 187011 7ff66e0b2b1a 122 API calls 187009->187011 187010->187071 187013 7ff66dfa920d 187011->187013 187012 7ff66e1031b0 12 API calls 187012->187016 187014 7ff66e0b2b1a 122 API calls 187013->187014 187013->187080 187017 7ff66dfa9243 187014->187017 187015 7ff66e1846b6 2 API calls 187021 7ff66dfa8846 187015->187021 187016->187012 187019 7ff66e1682fc 2 API calls 187017->187019 187017->187080 187018->187015 187018->187016 187018->187080 187022 7ff66dfa92ff 187019->187022 187021->187071 188990 7ff66e15040d memcpy memcpy 187021->188990 187024 7ff66dfa97fc 187022->187024 187028 7ff66dfa9326 187022->187028 187028->187080 187031 7ff66e2080d1 7 API calls 187031->187071 187034 7ff66dfa9a8d 187034->187016 187058 7ff66dfa9ad6 187034->187058 187034->187080 187035 7ff66e1510fd memcpy memcpy memcpy 187035->187071 187036 7ff66dfa9731 187036->187034 188994 7ff66e208410 memcpy 187036->188994 187041 7ff66e207d0f 121 API calls 187041->187071 187053 7ff66e21e9a6 HeapAlloc memcpy memcpy 187053->187071 187055 7ff66dfaa6d7 memcpy memcpy 189005 7ff66e257512 HeapAlloc memcpy 187055->189005 187056 7ff66dfaa93d memcpy 187056->187071 187066 7ff66e204df5 2 API calls 187058->187066 187058->187080 187060 7ff66dfaa623 memcpy 189004 7ff66e21ee21 memcpy 187060->189004 187065 7ff66dfaa83d 189006 7ff66e20bae9 memcpy 187065->189006 189007 7ff66e20df96 HeapAlloc memcpy memcpy 187065->189007 189008 7ff66e1cd00a HeapAlloc 187065->189008 187068 7ff66dfaa79f memcpy 187068->187065 187068->187071 187071->187006 187071->187016 187071->187031 187071->187034 187071->187035 187071->187036 187071->187041 187071->187053 187071->187055 187071->187056 187071->187060 187071->187065 187071->187068 187071->187080 187081 7ff66e158bd7 5 API calls 187071->187081 188991 7ff66e15040d memcpy memcpy 187071->188991 188992 7ff66e1ebb3a HeapAlloc 187071->188992 188993 7ff66e17f2d8 HeapAlloc 187071->188993 188995 7ff66e20819e HeapAlloc 187071->188995 188996 7ff66e208410 memcpy 187071->188996 189000 7ff66e20ebb8 HeapAlloc memcpy memcpy 187071->189000 189001 7ff66e20bae9 memcpy 187071->189001 189002 7ff66e21e94b memcpy 187071->189002 189003 7ff66e258f2f 69 API calls 187071->189003 189009 7ff66e208140 7 API calls 187071->189009 187080->186119 187081->187071 187093 7ff66dfa423a 187082->187093 187083 7ff66dfa2493 187084 7ff66e1ebff9 memcpy 187083->187084 187085 7ff66dfa24bd memset 187084->187085 187086 7ff66dfa24d4 187085->187086 187087 7ff66dfa6651 187110 7ff66dfa6707 187087->187110 189016 7ff66e2562b4 HeapAlloc memcpy 187087->189016 187089 7ff66dfa66f8 187089->187110 189020 7ff66e23e8de 16 API calls 187089->189020 187091 7ff66dfa6e73 187092 7ff66e27ef51 HeapAlloc 187091->187092 187204 7ff66dfa5e02 187091->187204 187094 7ff66dfa7c1d 187092->187094 187093->187083 187093->187087 187098 7ff66dfa562d 187094->187098 187099 7ff66dfa61f2 187094->187099 187096 7ff66dfaa830 189037 7ff66e20bae9 memcpy 187096->189037 189038 7ff66e20df96 HeapAlloc memcpy memcpy 187096->189038 189039 7ff66e1cd00a HeapAlloc 187096->189039 187102 7ff66dfa7cac 187098->187102 187104 7ff66dfa5697 187098->187104 189012 7ff66e0c8ce6 13 API calls 187098->189012 189014 7ff66e0feb00 121 API calls 187099->189014 187101 7ff66e10cce6 HeapAlloc 187101->187110 187102->187102 187103 7ff66dfa6202 189015 7ff66e176a38 121 API calls 187103->189015 187109 7ff66dfa56bd 187104->187109 189013 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 187104->189013 187111 7ff66dfa5b82 187109->187111 187114 7ff66dfa68d2 187109->187114 187109->187204 187110->187091 187110->187096 187110->187101 187112 7ff66e0b19c1 HeapAlloc 187111->187112 187113 7ff66dfa5be3 187111->187113 187112->187113 187115 7ff66e0b19c1 HeapAlloc 187113->187115 187117 7ff66dfa5cee 187113->187117 187144 7ff66dfa89b6 187113->187144 189017 7ff66dfabc60 7 API calls 187114->189017 187115->187117 187118 7ff66e0b19c1 HeapAlloc 187117->187118 187119 7ff66dfa5d6b 187117->187119 187117->187144 187118->187119 187120 7ff66e0b19c1 HeapAlloc 187119->187120 187121 7ff66dfa5de2 187119->187121 187119->187144 187120->187121 187122 7ff66dfa5e46 187121->187122 187123 7ff66dfa6cdc 187121->187123 187121->187144 187121->187204 187124 7ff66e168d5c 7 API calls 187122->187124 189018 7ff66e158b34 7 API calls 187123->189018 187126 7ff66dfa5e9f 187124->187126 187127 7ff66e168d5c 7 API calls 187126->187127 187134 7ff66dfa6d0c 187126->187134 187128 7ff66dfa5ed4 187127->187128 187129 7ff66e168d5c 7 API calls 187128->187129 187128->187134 187130 7ff66dfa5f06 187129->187130 187131 7ff66dfa6fd8 187130->187131 187133 7ff66dfa5f41 187130->187133 187130->187134 187131->187204 187136 7ff66e1682fc 2 API calls 187134->187136 187134->187204 187137 7ff66dfa91fd 187136->187137 187139 7ff66e0b2b1a 122 API calls 187137->187139 187141 7ff66dfa920d 187139->187141 187140 7ff66e1031b0 12 API calls 187140->187144 187142 7ff66e0b2b1a 122 API calls 187141->187142 187141->187204 187145 7ff66dfa9243 187142->187145 187144->187140 187145->187204 187204->186119 187207 7ff66dfa3397 187206->187207 187208 7ff66dfa35e1 memcpy 187207->187208 187230 7ff66dfa89b6 187207->187230 187302 7ff66dfa5e02 187207->187302 189043 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 187207->189043 187212 7ff66dfa39a4 187208->187212 187211 7ff66dfa5a28 189062 7ff66e158b34 7 API calls 187211->189062 187212->187211 187214 7ff66dfa39f4 memcpy 187212->187214 187215 7ff66dfa3a1f 187214->187215 187216 7ff66dfa5a95 187214->187216 189044 7ff66e1a2469 122 API calls 187215->189044 189063 7ff66e158b34 7 API calls 187216->189063 187219 7ff66dfa3a2c 187220 7ff66e1ebff9 memcpy 187219->187220 187228 7ff66dfa3e4f 187219->187228 187221 7ff66dfa3ab5 187220->187221 187222 7ff66e1ebff9 memcpy 187221->187222 187224 7ff66dfa3ad2 187222->187224 189045 7ff66e17fead HeapAlloc memset memcpy 187224->189045 187225 7ff66dfa66f8 187232 7ff66dfa6707 187225->187232 189074 7ff66e23e8de 16 API calls 187225->189074 187228->187230 187228->187232 189070 7ff66e2562b4 HeapAlloc memcpy 187228->189070 187229 7ff66dfa6e73 187231 7ff66e27ef51 HeapAlloc 187229->187231 187229->187302 187234 7ff66e1031b0 12 API calls 187230->187234 187241 7ff66dfa7c1d 187231->187241 187232->187229 187233 7ff66dfaa830 187232->187233 187251 7ff66e10cce6 HeapAlloc 187232->187251 189091 7ff66e20bae9 memcpy 187233->189091 189092 7ff66e20df96 HeapAlloc memcpy memcpy 187233->189092 189093 7ff66e1cd00a HeapAlloc 187233->189093 187234->187230 187235 7ff66dfa3aeb 187236 7ff66dfa3b9b 187235->187236 187237 7ff66e1ebff9 memcpy 187235->187237 187238 7ff66e1ebff9 memcpy 187236->187238 187255 7ff66dfa3cb9 187236->187255 187257 7ff66dfa5acd 187236->187257 187243 7ff66dfa3b70 187237->187243 187238->187255 187240 7ff66e1ebff9 memcpy 187244 7ff66dfa3d49 187240->187244 187247 7ff66dfa562d 187241->187247 187248 7ff66dfa61f2 187241->187248 187243->187236 187249 7ff66dfa5ae5 187243->187249 187246 7ff66e1ebff9 memcpy 187244->187246 187252 7ff66dfa3d66 187246->187252 187254 7ff66dfa7cac 187247->187254 187259 7ff66dfa5697 187247->187259 189060 7ff66e0c8ce6 13 API calls 187247->189060 189065 7ff66e0feb00 121 API calls 187248->189065 189064 7ff66e182ab4 HeapAlloc memset memcpy 187249->189064 187251->187232 189046 7ff66e17fead HeapAlloc memset memcpy 187252->189046 187254->187254 187255->187240 187255->187257 187256 7ff66dfa6202 189066 7ff66e176a38 121 API calls 187256->189066 189067 7ff66e158b34 7 API calls 187257->189067 187265 7ff66dfa56bd 187259->187265 189061 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 187259->189061 187264 7ff66dfa3d7f 187264->187257 187276 7ff66dfa3ddb 187264->187276 187266 7ff66dfa5b82 187265->187266 187269 7ff66dfa68d2 187265->187269 187265->187302 187267 7ff66e0b19c1 HeapAlloc 187266->187267 187268 7ff66dfa5be3 187266->187268 187267->187268 187268->187230 187270 7ff66e0b19c1 HeapAlloc 187268->187270 187272 7ff66dfa5cee 187268->187272 189071 7ff66dfabc60 7 API calls 187269->189071 187270->187272 187272->187230 187273 7ff66e0b19c1 HeapAlloc 187272->187273 187274 7ff66dfa5d6b 187272->187274 187273->187274 187274->187230 187275 7ff66e0b19c1 HeapAlloc 187274->187275 187277 7ff66dfa5de2 187274->187277 187275->187277 187276->187228 187280 7ff66dfa3f4a memcpy 187276->187280 187276->187302 187277->187230 187278 7ff66dfa5e46 187277->187278 187279 7ff66dfa6cdc 187277->187279 187277->187302 187281 7ff66e168d5c 7 API calls 187278->187281 189072 7ff66e158b34 7 API calls 187279->189072 187283 7ff66dfa5e9f 187281->187283 187286 7ff66e168d5c 7 API calls 187283->187286 187295 7ff66dfa6d0c 187283->187295 187287 7ff66dfa5ed4 187286->187287 187287->187295 187299 7ff66e1682fc 2 API calls 187295->187299 187295->187302 187300 7ff66dfa91fd 187299->187300 187302->186119 187387 7ff66dfa28bc 187386->187387 187388 7ff66dfaa830 187387->187388 187389 7ff66dfa28f8 187387->187389 189109 7ff66e20bae9 memcpy 187388->189109 189110 7ff66e20df96 HeapAlloc memcpy memcpy 187388->189110 189111 7ff66e1cd00a HeapAlloc 187388->189111 187392 7ff66dfa29ef 187389->187392 189097 7ff66dfae88a 187389->189097 187394 7ff66e106720 7 API calls 187392->187394 187395 7ff66dfa2a4d 187394->187395 189102 7ff66e17fb2e 7 API calls 187395->189102 187398 7ff66dfa2a71 187399 7ff66e103c40 HeapAlloc 187398->187399 187400 7ff66dfa2aa7 187399->187400 187401 7ff66e1ebff9 memcpy 187400->187401 187402 7ff66dfa2c6c 187401->187402 187403 7ff66e1ebff9 memcpy 187402->187403 187404 7ff66dfa2c81 187403->187404 189103 7ff66e17fead HeapAlloc memset memcpy 187404->189103 187406 7ff66dfa2c9a 187407 7ff66e1ebff9 memcpy 187406->187407 187408 7ff66dfa2cc3 187407->187408 187409 7ff66e1ebff9 memcpy 187408->187409 187410 7ff66dfa2ce0 187409->187410 189104 7ff66e17fead HeapAlloc memset memcpy 187410->189104 187412 7ff66dfa2cf9 189105 7ff66e0cc661 115 API calls 187412->189105 187414 7ff66dfa2d2f 187426 7ff66dfa2493 187425->187426 187431 7ff66dfa4937 187425->187431 187427 7ff66e1ebff9 memcpy 187426->187427 187428 7ff66dfa24bd memset 187427->187428 187430 7ff66dfa24d4 187428->187430 187429 7ff66dfa8245 187429->186119 187431->187426 187431->187429 187437 7ff66dfa82c0 187431->187437 187440 7ff66dfa4a4f 187431->187440 187432 7ff66e22e1ef memcpy memcpy memset 187432->187440 187434 7ff66e1846b6 2 API calls 187441 7ff66dfa8846 187434->187441 187435 7ff66dfa8a22 189117 7ff66e247399 HeapAlloc memcpy memcpy memcpy 187435->189117 187437->187434 187455 7ff66dfa89b6 187437->187455 187472 7ff66dfa9260 187437->187472 187440->187432 187440->187435 187440->187437 187448 7ff66dfa86ed 187440->187448 189112 7ff66e20b34e HeapAlloc memcpy memcpy 187440->189112 189113 7ff66e246e53 HeapAlloc memcpy memcpy memcpy 187440->189113 189114 7ff66e21ee21 memcpy 187440->189114 187468 7ff66dfa88fd 187441->187468 189116 7ff66e15040d memcpy memcpy 187441->189116 187445 7ff66e1031b0 12 API calls 187445->187455 187451 7ff66dfa8a54 187448->187451 189115 7ff66e21e9a6 HeapAlloc memcpy memcpy 187448->189115 187451->187468 189118 7ff66e21dd61 memcpy 187451->189118 187454 7ff66dfa874d 187454->187437 187454->187451 187455->187445 187457 7ff66dfaa6d7 memcpy memcpy 189133 7ff66e257512 HeapAlloc memcpy 187457->189133 187458 7ff66dfaa93d memcpy 187458->187468 187460 7ff66dfaa623 memcpy 189132 7ff66e21ee21 memcpy 187460->189132 187461 7ff66e1510fd memcpy memcpy memcpy 187461->187468 187464 7ff66dfaa83d 189134 7ff66e20bae9 memcpy 187464->189134 189135 7ff66e20df96 HeapAlloc memcpy memcpy 187464->189135 189136 7ff66e1cd00a HeapAlloc 187464->189136 187465 7ff66dfaa79f memcpy 187465->187464 187465->187468 187467 7ff66e21e9a6 HeapAlloc memcpy memcpy 187467->187468 187468->187455 187468->187457 187468->187458 187468->187460 187468->187461 187468->187464 187468->187465 187468->187467 187470 7ff66dfa90b9 187468->187470 187468->187472 187475 7ff66e2080d1 7 API calls 187468->187475 187476 7ff66dfa9a8d 187468->187476 187478 7ff66dfa9731 187468->187478 187483 7ff66e207d0f 121 API calls 187468->187483 187517 7ff66e158bd7 5 API calls 187468->187517 189119 7ff66e15040d memcpy memcpy 187468->189119 189120 7ff66e1ebb3a HeapAlloc 187468->189120 189121 7ff66e17f2d8 HeapAlloc 187468->189121 189123 7ff66e20819e HeapAlloc 187468->189123 189124 7ff66e208410 memcpy 187468->189124 189128 7ff66e20ebb8 HeapAlloc memcpy memcpy 187468->189128 189129 7ff66e20bae9 memcpy 187468->189129 189130 7ff66e21e94b memcpy 187468->189130 189131 7ff66e258f2f 69 API calls 187468->189131 189137 7ff66e208140 7 API calls 187468->189137 187471 7ff66e1682fc 2 API calls 187470->187471 187470->187472 187473 7ff66dfa91fd 187471->187473 187472->186119 187474 7ff66e0b2b1a 122 API calls 187473->187474 187477 7ff66dfa920d 187474->187477 187475->187468 187476->187455 187476->187472 187492 7ff66dfa9ad6 187476->187492 187477->187472 187481 7ff66e0b2b1a 122 API calls 187477->187481 187478->187476 189122 7ff66e208410 memcpy 187478->189122 187484 7ff66dfa9243 187481->187484 187483->187468 187484->187472 187486 7ff66e1682fc 2 API calls 187484->187486 187487 7ff66dfa92ff 187486->187487 187488 7ff66dfa97fc 187487->187488 187490 7ff66dfa9326 187487->187490 187489 7ff66e1801f7 122 API calls 187488->187489 187495 7ff66dfa935b 187489->187495 187490->187472 187491 7ff66e0b2b1a 122 API calls 187490->187491 187491->187495 187492->187472 187493 7ff66e204df5 2 API calls 187492->187493 187494 7ff66dfaa1d2 187493->187494 187496 7ff66e204e32 2 API calls 187494->187496 187495->187455 187495->187472 187497 7ff66e204df5 2 API calls 187495->187497 187498 7ff66dfaa1f6 187496->187498 187499 7ff66dfa9be9 187497->187499 187498->187472 187500 7ff66dfaa29d 187498->187500 187501 7ff66dfaae5f 187498->187501 187503 7ff66e204e32 2 API calls 187499->187503 189127 7ff66e0b2fc8 HeapAlloc 187500->189127 189139 7ff66e1031b0 12 API calls 187501->189139 187506 7ff66dfa9c0d 187503->187506 187506->187455 187508 7ff66dfa9c11 187506->187508 189125 7ff66e0b2fc8 HeapAlloc 187506->189125 187508->187472 187517->187468 187529 7ff66dfa423a 187518->187529 187519 7ff66dfa2493 187520 7ff66e1ebff9 memcpy 187519->187520 187521 7ff66dfa24bd memset 187520->187521 187522 7ff66dfa24d4 187521->187522 187523 7ff66dfa6651 187545 7ff66dfa6707 187523->187545 189144 7ff66e2562b4 HeapAlloc memcpy 187523->189144 187525 7ff66dfa66f8 187525->187545 189148 7ff66e23e8de 16 API calls 187525->189148 187527 7ff66dfa6e73 187528 7ff66e27ef51 HeapAlloc 187527->187528 187576 7ff66dfa5e02 187527->187576 187530 7ff66dfa7c1d 187528->187530 187529->187519 187529->187523 187534 7ff66dfa562d 187530->187534 187535 7ff66dfa61f2 187530->187535 187532 7ff66dfaa830 189165 7ff66e20bae9 memcpy 187532->189165 189166 7ff66e20df96 HeapAlloc memcpy memcpy 187532->189166 189167 7ff66e1cd00a HeapAlloc 187532->189167 187538 7ff66dfa7cac 187534->187538 187540 7ff66dfa5697 187534->187540 189140 7ff66e0c8ce6 13 API calls 187534->189140 189142 7ff66e0feb00 121 API calls 187535->189142 187537 7ff66e10cce6 HeapAlloc 187537->187545 187538->187538 187539 7ff66dfa6202 189143 7ff66e176a38 121 API calls 187539->189143 187546 7ff66dfa56bd 187540->187546 189141 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 187540->189141 187545->187527 187545->187532 187545->187537 187547 7ff66dfa5b82 187546->187547 187550 7ff66dfa68d2 187546->187550 187546->187576 187548 7ff66e0b19c1 HeapAlloc 187547->187548 187549 7ff66dfa5be3 187547->187549 187548->187549 187551 7ff66e0b19c1 HeapAlloc 187549->187551 187553 7ff66dfa5cee 187549->187553 187583 7ff66dfa89b6 187549->187583 189145 7ff66dfabc60 7 API calls 187550->189145 187551->187553 187554 7ff66e0b19c1 HeapAlloc 187553->187554 187555 7ff66dfa5d6b 187553->187555 187553->187583 187554->187555 187556 7ff66e0b19c1 HeapAlloc 187555->187556 187557 7ff66dfa5de2 187555->187557 187555->187583 187556->187557 187558 7ff66dfa5e46 187557->187558 187559 7ff66dfa6cdc 187557->187559 187557->187576 187557->187583 187560 7ff66e168d5c 7 API calls 187558->187560 189146 7ff66e158b34 7 API calls 187559->189146 187562 7ff66dfa5e9f 187560->187562 187563 7ff66e168d5c 7 API calls 187562->187563 187571 7ff66dfa6d0c 187562->187571 187564 7ff66dfa5ed4 187563->187564 187565 7ff66e168d5c 7 API calls 187564->187565 187564->187571 187566 7ff66dfa5f06 187565->187566 187567 7ff66dfa6fd8 187566->187567 187569 7ff66dfa5f41 187566->187569 187566->187571 187567->187576 187596 7ff66dfa6ff7 187567->187596 189147 7ff66e17fa96 HeapAlloc 187567->189147 187570 7ff66dfa8443 187569->187570 187582 7ff66dfa5f89 187569->187582 187570->187583 187572 7ff66e1682fc 2 API calls 187571->187572 187571->187576 187573 7ff66dfa91fd 187572->187573 187575 7ff66e0b2b1a 122 API calls 187573->187575 187577 7ff66dfa920d 187575->187577 187576->186119 187577->187576 187578 7ff66e0b2b1a 122 API calls 187577->187578 187581 7ff66dfa9243 187578->187581 187580 7ff66e1031b0 12 API calls 187580->187583 187581->187576 187582->187576 187582->187583 187583->187580 187596->187532 187596->187571 187596->187576 187596->187583 187643 7ff66dfa216d 187642->187643 187645 7ff66dfa2179 187642->187645 189171 7ff66e22fc57 HeapAlloc 187643->189171 187646 7ff66e1ebff9 memcpy 187645->187646 187647 7ff66dfa222e 187645->187647 187663 7ff66dfa23c5 187646->187663 187647->186119 187649 7ff66dfaa830 189197 7ff66e20bae9 memcpy 187649->189197 189198 7ff66e20df96 HeapAlloc memcpy memcpy 187649->189198 189199 7ff66e1cd00a HeapAlloc 187649->189199 187650 7ff66dfa2483 187653 7ff66dfa2493 187654 7ff66e1ebff9 memcpy 187653->187654 187655 7ff66dfa24bd memset 187654->187655 187656 7ff66dfa24d4 187655->187656 187657 7ff66dfa6651 187676 7ff66dfa6707 187657->187676 189176 7ff66e2562b4 HeapAlloc memcpy 187657->189176 187659 7ff66dfa66f8 187659->187676 189180 7ff66e23e8de 16 API calls 187659->189180 187661 7ff66dfa6e73 187662 7ff66e27ef51 HeapAlloc 187661->187662 187770 7ff66dfa5e02 187661->187770 187664 7ff66dfa7c1d 187662->187664 187663->187649 187663->187650 187663->187653 187663->187657 187665 7ff66dfa562d 187664->187665 187666 7ff66dfa61f2 187664->187666 187669 7ff66dfa7cac 187665->187669 187671 7ff66dfa5697 187665->187671 189172 7ff66e0c8ce6 13 API calls 187665->189172 189174 7ff66e0feb00 121 API calls 187666->189174 187668 7ff66e10cce6 HeapAlloc 187668->187676 187669->187669 187670 7ff66dfa6202 189175 7ff66e176a38 121 API calls 187670->189175 187675 7ff66dfa56bd 187671->187675 189173 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 187671->189173 187677 7ff66dfa5b82 187675->187677 187680 7ff66dfa68d2 187675->187680 187675->187770 187676->187649 187676->187661 187676->187668 187678 7ff66e0b19c1 HeapAlloc 187677->187678 187679 7ff66dfa5be3 187677->187679 187678->187679 187681 7ff66e0b19c1 HeapAlloc 187679->187681 187683 7ff66dfa5cee 187679->187683 187710 7ff66dfa89b6 187679->187710 189177 7ff66dfabc60 7 API calls 187680->189177 187681->187683 187684 7ff66e0b19c1 HeapAlloc 187683->187684 187685 7ff66dfa5d6b 187683->187685 187683->187710 187684->187685 187686 7ff66e0b19c1 HeapAlloc 187685->187686 187687 7ff66dfa5de2 187685->187687 187685->187710 187686->187687 187688 7ff66dfa5e46 187687->187688 187689 7ff66dfa6cdc 187687->187689 187687->187710 187687->187770 187690 7ff66e168d5c 7 API calls 187688->187690 189178 7ff66e158b34 7 API calls 187689->189178 187692 7ff66dfa5e9f 187690->187692 187693 7ff66e168d5c 7 API calls 187692->187693 187700 7ff66dfa6d0c 187692->187700 187694 7ff66dfa5ed4 187693->187694 187695 7ff66e168d5c 7 API calls 187694->187695 187694->187700 187696 7ff66dfa5f06 187695->187696 187696->187700 187702 7ff66e1682fc 2 API calls 187700->187702 187700->187770 187703 7ff66dfa91fd 187702->187703 187705 7ff66e0b2b1a 122 API calls 187703->187705 187707 7ff66dfa920d 187705->187707 187706 7ff66e1031b0 12 API calls 187706->187710 187707->187770 187710->187706 187770->186119 187773 7ff66dfa1cab 187772->187773 187774 7ff66dfa1bec 187772->187774 187773->186119 187774->187773 187775 7ff66e1ebff9 memcpy 187774->187775 187791 7ff66dfa23c5 187775->187791 187777 7ff66dfa2483 187780 7ff66dfaa830 189228 7ff66e20bae9 memcpy 187780->189228 189229 7ff66e20df96 HeapAlloc memcpy memcpy 187780->189229 189230 7ff66e1cd00a HeapAlloc 187780->189230 187781 7ff66dfa2493 187782 7ff66e1ebff9 memcpy 187781->187782 187783 7ff66dfa24bd memset 187782->187783 187784 7ff66dfa24d4 187783->187784 187785 7ff66dfa6651 187804 7ff66dfa6707 187785->187804 189207 7ff66e2562b4 HeapAlloc memcpy 187785->189207 187787 7ff66dfa66f8 187787->187804 189211 7ff66e23e8de 16 API calls 187787->189211 187789 7ff66dfa6e73 187790 7ff66e27ef51 HeapAlloc 187789->187790 187898 7ff66dfa5e02 187789->187898 187792 7ff66dfa7c1d 187790->187792 187791->187777 187791->187780 187791->187781 187791->187785 187793 7ff66dfa562d 187792->187793 187794 7ff66dfa61f2 187792->187794 187797 7ff66dfa7cac 187793->187797 187799 7ff66dfa5697 187793->187799 189203 7ff66e0c8ce6 13 API calls 187793->189203 189205 7ff66e0feb00 121 API calls 187794->189205 187796 7ff66e10cce6 HeapAlloc 187796->187804 187797->187797 187798 7ff66dfa6202 189206 7ff66e176a38 121 API calls 187798->189206 187803 7ff66dfa56bd 187799->187803 189204 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 187799->189204 187805 7ff66dfa5b82 187803->187805 187808 7ff66dfa68d2 187803->187808 187803->187898 187804->187780 187804->187789 187804->187796 187806 7ff66e0b19c1 HeapAlloc 187805->187806 187807 7ff66dfa5be3 187805->187807 187806->187807 187809 7ff66e0b19c1 HeapAlloc 187807->187809 187811 7ff66dfa5cee 187807->187811 187838 7ff66dfa89b6 187807->187838 189208 7ff66dfabc60 7 API calls 187808->189208 187809->187811 187812 7ff66e0b19c1 HeapAlloc 187811->187812 187813 7ff66dfa5d6b 187811->187813 187811->187838 187812->187813 187814 7ff66e0b19c1 HeapAlloc 187813->187814 187815 7ff66dfa5de2 187813->187815 187813->187838 187814->187815 187816 7ff66dfa5e46 187815->187816 187817 7ff66dfa6cdc 187815->187817 187815->187838 187815->187898 187818 7ff66e168d5c 7 API calls 187816->187818 189209 7ff66e158b34 7 API calls 187817->189209 187820 7ff66dfa5e9f 187818->187820 187821 7ff66e168d5c 7 API calls 187820->187821 187829 7ff66dfa6d0c 187820->187829 187822 7ff66dfa5ed4 187821->187822 187823 7ff66e168d5c 7 API calls 187822->187823 187822->187829 187824 7ff66dfa5f06 187823->187824 187824->187829 187830 7ff66e1682fc 2 API calls 187829->187830 187829->187898 187831 7ff66dfa91fd 187830->187831 187833 7ff66e0b2b1a 122 API calls 187831->187833 187835 7ff66dfa920d 187833->187835 187834 7ff66e1031b0 12 API calls 187834->187838 187835->187898 187838->187834 187898->186119 189234 7ff66e16b9a3 187900->189234 187902 7ff66dfa2149 187903 7ff66e1ebff9 memcpy 187902->187903 187904 7ff66dfa222e 187902->187904 187920 7ff66dfa23c5 187903->187920 187904->186119 187906 7ff66dfaa830 189263 7ff66e20bae9 memcpy 187906->189263 189264 7ff66e20df96 HeapAlloc memcpy memcpy 187906->189264 189265 7ff66e1cd00a HeapAlloc 187906->189265 187907 7ff66dfa2483 187910 7ff66dfa2493 187911 7ff66e1ebff9 memcpy 187910->187911 187912 7ff66dfa24bd memset 187911->187912 187913 7ff66dfa24d4 187912->187913 187914 7ff66dfa6651 187933 7ff66dfa6707 187914->187933 189242 7ff66e2562b4 HeapAlloc memcpy 187914->189242 187916 7ff66dfa66f8 187916->187933 189246 7ff66e23e8de 16 API calls 187916->189246 187918 7ff66dfa6e73 187919 7ff66e27ef51 HeapAlloc 187918->187919 188027 7ff66dfa5e02 187918->188027 187921 7ff66dfa7c1d 187919->187921 187920->187906 187920->187907 187920->187910 187920->187914 187922 7ff66dfa562d 187921->187922 187923 7ff66dfa61f2 187921->187923 187926 7ff66dfa7cac 187922->187926 187928 7ff66dfa5697 187922->187928 189238 7ff66e0c8ce6 13 API calls 187922->189238 189240 7ff66e0feb00 121 API calls 187923->189240 187925 7ff66e10cce6 HeapAlloc 187925->187933 187926->187926 187927 7ff66dfa6202 189241 7ff66e176a38 121 API calls 187927->189241 187932 7ff66dfa56bd 187928->187932 189239 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 187928->189239 187934 7ff66dfa5b82 187932->187934 187937 7ff66dfa68d2 187932->187937 187932->188027 187933->187906 187933->187918 187933->187925 187935 7ff66e0b19c1 HeapAlloc 187934->187935 187936 7ff66dfa5be3 187934->187936 187935->187936 187938 7ff66e0b19c1 HeapAlloc 187936->187938 187940 7ff66dfa5cee 187936->187940 187967 7ff66dfa89b6 187936->187967 189243 7ff66dfabc60 7 API calls 187937->189243 187938->187940 187941 7ff66e0b19c1 HeapAlloc 187940->187941 187942 7ff66dfa5d6b 187940->187942 187940->187967 187941->187942 187943 7ff66e0b19c1 HeapAlloc 187942->187943 187944 7ff66dfa5de2 187942->187944 187942->187967 187943->187944 187945 7ff66dfa5e46 187944->187945 187946 7ff66dfa6cdc 187944->187946 187944->187967 187944->188027 187947 7ff66e168d5c 7 API calls 187945->187947 189244 7ff66e158b34 7 API calls 187946->189244 187949 7ff66dfa5e9f 187947->187949 187950 7ff66e168d5c 7 API calls 187949->187950 187957 7ff66dfa6d0c 187949->187957 187951 7ff66dfa5ed4 187950->187951 187951->187957 187959 7ff66e1682fc 2 API calls 187957->187959 187957->188027 187960 7ff66dfa91fd 187959->187960 187963 7ff66e1031b0 12 API calls 187963->187967 187967->187963 188027->186119 188030 7ff66dfa4764 188029->188030 188035 7ff66dfa4859 188029->188035 188031 7ff66dfa2493 188030->188031 188030->188035 188032 7ff66e1ebff9 memcpy 188031->188032 188033 7ff66dfa24bd memset 188032->188033 188034 7ff66dfa24d4 188033->188034 188056 7ff66dfa6707 188035->188056 189274 7ff66e2562b4 HeapAlloc memcpy 188035->189274 188037 7ff66dfa66f8 188037->188056 189278 7ff66e23e8de 16 API calls 188037->189278 188039 7ff66dfa6e73 188040 7ff66e27ef51 HeapAlloc 188039->188040 188058 7ff66dfa5e02 188039->188058 188041 7ff66dfa7c1d 188040->188041 188045 7ff66dfa562d 188041->188045 188046 7ff66dfa61f2 188041->188046 188043 7ff66dfaa830 189295 7ff66e20bae9 memcpy 188043->189295 189296 7ff66e20df96 HeapAlloc memcpy memcpy 188043->189296 189297 7ff66e1cd00a HeapAlloc 188043->189297 188049 7ff66dfa7cac 188045->188049 188051 7ff66dfa5697 188045->188051 189270 7ff66e0c8ce6 13 API calls 188045->189270 189272 7ff66e0feb00 121 API calls 188046->189272 188048 7ff66e10cce6 HeapAlloc 188048->188056 188049->188049 188050 7ff66dfa6202 189273 7ff66e176a38 121 API calls 188050->189273 188057 7ff66dfa56bd 188051->188057 189271 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 188051->189271 188056->188039 188056->188043 188056->188048 188057->188058 188059 7ff66dfa5b82 188057->188059 188062 7ff66dfa68d2 188057->188062 188058->186119 188060 7ff66e0b19c1 HeapAlloc 188059->188060 188061 7ff66dfa5be3 188059->188061 188060->188061 188063 7ff66e0b19c1 HeapAlloc 188061->188063 188065 7ff66dfa5cee 188061->188065 188093 7ff66dfa89b6 188061->188093 189275 7ff66dfabc60 7 API calls 188062->189275 188063->188065 188066 7ff66e0b19c1 HeapAlloc 188065->188066 188067 7ff66dfa5d6b 188065->188067 188065->188093 188066->188067 188068 7ff66e0b19c1 HeapAlloc 188067->188068 188069 7ff66dfa5de2 188067->188069 188067->188093 188068->188069 188069->188058 188070 7ff66dfa5e46 188069->188070 188071 7ff66dfa6cdc 188069->188071 188069->188093 188072 7ff66e168d5c 7 API calls 188070->188072 189276 7ff66e158b34 7 API calls 188071->189276 188074 7ff66dfa5e9f 188072->188074 188075 7ff66e168d5c 7 API calls 188074->188075 188082 7ff66dfa6d0c 188074->188082 188076 7ff66dfa5ed4 188075->188076 188077 7ff66e168d5c 7 API calls 188076->188077 188076->188082 188078 7ff66dfa5f06 188077->188078 188079 7ff66dfa6fd8 188078->188079 188081 7ff66dfa5f41 188078->188081 188078->188082 188079->188058 188102 7ff66dfa6ff7 188079->188102 189277 7ff66e17fa96 HeapAlloc 188079->189277 188083 7ff66dfa8443 188081->188083 188094 7ff66dfa5f89 188081->188094 188082->188058 188084 7ff66e1682fc 2 API calls 188082->188084 188086 7ff66e1846b6 2 API calls 188083->188086 188083->188093 188085 7ff66dfa91fd 188084->188085 188087 7ff66e0b2b1a 122 API calls 188085->188087 188086->188102 188089 7ff66dfa920d 188087->188089 188088 7ff66e1031b0 12 API calls 188088->188093 188089->188058 188090 7ff66e0b2b1a 122 API calls 188089->188090 188092 7ff66dfa9243 188090->188092 188091 7ff66e1846b6 2 API calls 188092->188058 188095 7ff66e1682fc 2 API calls 188092->188095 188093->188088 188094->188058 188094->188091 188094->188093 188102->188043 188102->188058 188102->188082 188102->188093 188108 7ff66e1510fd memcpy memcpy memcpy 188102->188108 188109 7ff66e2080d1 7 API calls 188102->188109 188112 7ff66dfa9a8d 188102->188112 188113 7ff66dfa9731 188102->188113 188118 7ff66e207d0f 121 API calls 188102->188118 188128 7ff66e21e9a6 HeapAlloc memcpy memcpy 188102->188128 188130 7ff66dfaa6d7 memcpy memcpy 188102->188130 188131 7ff66dfaa93d memcpy 188102->188131 188135 7ff66dfaa623 memcpy 188102->188135 188141 7ff66dfaa79f memcpy 188102->188141 188152 7ff66e158bd7 5 API calls 188102->188152 189280 7ff66e15040d memcpy memcpy 188102->189280 189281 7ff66e1ebb3a HeapAlloc 188102->189281 189282 7ff66e17f2d8 HeapAlloc 188102->189282 189284 7ff66e20819e HeapAlloc 188102->189284 189285 7ff66e208410 memcpy 188102->189285 189289 7ff66e20ebb8 HeapAlloc memcpy memcpy 188102->189289 189290 7ff66e20bae9 memcpy 188102->189290 189291 7ff66e21e94b memcpy 188102->189291 189292 7ff66e258f2f 69 API calls 188102->189292 189298 7ff66e208140 7 API calls 188102->189298 188108->188102 188109->188102 188112->188058 188112->188093 188113->188112 188118->188102 188128->188102 188131->188102 188141->188043 188141->188102 188152->188102 188154 7ff66dfa1eab 188153->188154 188156 7ff66dfa20d2 188154->188156 189301 7ff66e17f27b HeapAlloc 188154->189301 188157 7ff66e1ebff9 memcpy 188156->188157 188158 7ff66dfa222e 188156->188158 188164 7ff66dfa23c5 188157->188164 188158->186119 188160 7ff66dfa2483 188162 7ff66dfaa830 189327 7ff66e20bae9 memcpy 188162->189327 189328 7ff66e20df96 HeapAlloc memcpy memcpy 188162->189328 189329 7ff66e1cd00a HeapAlloc 188162->189329 188164->188160 188164->188162 188165 7ff66dfa2493 188164->188165 188169 7ff66dfa6651 188164->188169 188166 7ff66e1ebff9 memcpy 188165->188166 188167 7ff66dfa24bd memset 188166->188167 188168 7ff66dfa24d4 188167->188168 188186 7ff66dfa6707 188169->188186 189306 7ff66e2562b4 HeapAlloc memcpy 188169->189306 188171 7ff66dfa66f8 188171->188186 189310 7ff66e23e8de 16 API calls 188171->189310 188173 7ff66dfa6e73 188174 7ff66e27ef51 HeapAlloc 188173->188174 188190 7ff66dfa5e02 188173->188190 188175 7ff66dfa7c1d 188174->188175 188176 7ff66dfa562d 188175->188176 188177 7ff66dfa61f2 188175->188177 188180 7ff66dfa7cac 188176->188180 188182 7ff66dfa5697 188176->188182 189302 7ff66e0c8ce6 13 API calls 188176->189302 189304 7ff66e0feb00 121 API calls 188177->189304 188179 7ff66e10cce6 HeapAlloc 188179->188186 188180->188180 188181 7ff66dfa6202 189305 7ff66e176a38 121 API calls 188181->189305 188187 7ff66dfa56bd 188182->188187 189303 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 188182->189303 188186->188162 188186->188173 188186->188179 188188 7ff66dfa5b82 188187->188188 188189 7ff66dfa68d2 188187->188189 188187->188190 188191 7ff66e0b19c1 HeapAlloc 188188->188191 188192 7ff66dfa5be3 188188->188192 189307 7ff66dfabc60 7 API calls 188189->189307 188190->186119 188191->188192 188193 7ff66e0b19c1 HeapAlloc 188192->188193 188195 7ff66dfa5cee 188192->188195 188223 7ff66dfa89b6 188192->188223 188193->188195 188196 7ff66e0b19c1 HeapAlloc 188195->188196 188197 7ff66dfa5d6b 188195->188197 188195->188223 188196->188197 188198 7ff66e0b19c1 HeapAlloc 188197->188198 188199 7ff66dfa5de2 188197->188199 188197->188223 188198->188199 188199->188190 188200 7ff66dfa5e46 188199->188200 188201 7ff66dfa6cdc 188199->188201 188199->188223 188202 7ff66e168d5c 7 API calls 188200->188202 189308 7ff66e158b34 7 API calls 188201->189308 188204 7ff66dfa5e9f 188202->188204 188205 7ff66e168d5c 7 API calls 188204->188205 188212 7ff66dfa6d0c 188204->188212 188206 7ff66dfa5ed4 188205->188206 188207 7ff66e168d5c 7 API calls 188206->188207 188206->188212 188212->188190 188214 7ff66e1682fc 2 API calls 188212->188214 188215 7ff66dfa91fd 188214->188215 188217 7ff66e0b2b1a 122 API calls 188215->188217 188221 7ff66e1031b0 12 API calls 188221->188223 188223->188221 188284 7ff66dfa6257 188283->188284 188305 7ff66dfa6707 188284->188305 189337 7ff66e2562b4 HeapAlloc memcpy 188284->189337 188286 7ff66dfa66f8 188286->188305 189341 7ff66e23e8de 16 API calls 188286->189341 188288 7ff66dfa6e73 188289 7ff66e27ef51 HeapAlloc 188288->188289 188400 7ff66dfa5e02 188288->188400 188290 7ff66dfa7c1d 188289->188290 188294 7ff66dfa562d 188290->188294 188295 7ff66dfa61f2 188290->188295 188292 7ff66dfaa830 189358 7ff66e20bae9 memcpy 188292->189358 189359 7ff66e20df96 HeapAlloc memcpy memcpy 188292->189359 189360 7ff66e1cd00a HeapAlloc 188292->189360 188298 7ff66dfa7cac 188294->188298 188300 7ff66dfa5697 188294->188300 189333 7ff66e0c8ce6 13 API calls 188294->189333 189335 7ff66e0feb00 121 API calls 188295->189335 188297 7ff66e10cce6 HeapAlloc 188297->188305 188298->188298 188299 7ff66dfa6202 189336 7ff66e176a38 121 API calls 188299->189336 188306 7ff66dfa56bd 188300->188306 189334 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 188300->189334 188305->188288 188305->188292 188305->188297 188307 7ff66dfa5b82 188306->188307 188310 7ff66dfa68d2 188306->188310 188306->188400 188308 7ff66e0b19c1 HeapAlloc 188307->188308 188309 7ff66dfa5be3 188307->188309 188308->188309 188311 7ff66e0b19c1 HeapAlloc 188309->188311 188313 7ff66dfa5cee 188309->188313 188340 7ff66dfa89b6 188309->188340 189338 7ff66dfabc60 7 API calls 188310->189338 188311->188313 188314 7ff66e0b19c1 HeapAlloc 188313->188314 188315 7ff66dfa5d6b 188313->188315 188313->188340 188314->188315 188316 7ff66e0b19c1 HeapAlloc 188315->188316 188317 7ff66dfa5de2 188315->188317 188315->188340 188316->188317 188318 7ff66dfa5e46 188317->188318 188319 7ff66dfa6cdc 188317->188319 188317->188340 188317->188400 188320 7ff66e168d5c 7 API calls 188318->188320 189339 7ff66e158b34 7 API calls 188319->189339 188322 7ff66dfa5e9f 188320->188322 188323 7ff66e168d5c 7 API calls 188322->188323 188330 7ff66dfa6d0c 188322->188330 188324 7ff66dfa5ed4 188323->188324 188325 7ff66e168d5c 7 API calls 188324->188325 188324->188330 188326 7ff66dfa5f06 188325->188326 188327 7ff66dfa6fd8 188326->188327 188329 7ff66dfa5f41 188326->188329 188326->188330 188391 7ff66dfa6ff7 188327->188391 188327->188400 189340 7ff66e17fa96 HeapAlloc 188327->189340 188331 7ff66dfa8443 188329->188331 188342 7ff66dfa5f89 188329->188342 188332 7ff66e1682fc 2 API calls 188330->188332 188330->188400 188334 7ff66e1846b6 2 API calls 188331->188334 188331->188340 188333 7ff66dfa91fd 188332->188333 188335 7ff66e0b2b1a 122 API calls 188333->188335 188334->188391 188337 7ff66dfa920d 188335->188337 188336 7ff66e1031b0 12 API calls 188336->188340 188338 7ff66e0b2b1a 122 API calls 188337->188338 188337->188400 188341 7ff66dfa9243 188338->188341 188339 7ff66e1846b6 2 API calls 188340->188336 188343 7ff66e1682fc 2 API calls 188341->188343 188341->188400 188342->188339 188342->188340 188342->188400 188354 7ff66e1510fd memcpy memcpy memcpy 188354->188391 188357 7ff66e2080d1 7 API calls 188357->188391 188359 7ff66dfa9a8d 188359->188340 188359->188400 188360 7ff66dfa9731 188360->188359 188365 7ff66e207d0f 121 API calls 188365->188391 188376 7ff66dfaa6d7 memcpy memcpy 188377 7ff66dfaa93d memcpy 188377->188391 188381 7ff66dfaa623 memcpy 188387 7ff66dfaa79f memcpy 188387->188292 188387->188391 188389 7ff66e21e9a6 HeapAlloc memcpy memcpy 188389->188391 188391->188292 188391->188330 188391->188340 188391->188354 188391->188357 188391->188359 188391->188360 188391->188365 188391->188376 188391->188377 188391->188381 188391->188387 188391->188389 188391->188400 188401 7ff66e158bd7 5 API calls 188391->188401 189343 7ff66e15040d memcpy memcpy 188391->189343 189344 7ff66e1ebb3a HeapAlloc 188391->189344 189345 7ff66e17f2d8 HeapAlloc 188391->189345 189347 7ff66e20819e HeapAlloc 188391->189347 189348 7ff66e208410 memcpy 188391->189348 189352 7ff66e20ebb8 HeapAlloc memcpy memcpy 188391->189352 189353 7ff66e20bae9 memcpy 188391->189353 189354 7ff66e21e94b memcpy 188391->189354 189355 7ff66e258f2f 69 API calls 188391->189355 189361 7ff66e208140 7 API calls 188391->189361 188400->186119 188401->188391 188403 7ff66dfa2076 188402->188403 188405 7ff66dfa2082 188402->188405 189364 7ff66e22fc57 HeapAlloc 188403->189364 188406 7ff66dfa222e 188405->188406 188407 7ff66e1ebff9 memcpy 188405->188407 188406->186119 188423 7ff66dfa23c5 188407->188423 188409 7ff66dfaa830 189390 7ff66e20bae9 memcpy 188409->189390 189391 7ff66e20df96 HeapAlloc memcpy memcpy 188409->189391 189392 7ff66e1cd00a HeapAlloc 188409->189392 188410 7ff66dfa2483 188413 7ff66dfa2493 188414 7ff66e1ebff9 memcpy 188413->188414 188415 7ff66dfa24bd memset 188414->188415 188416 7ff66dfa24d4 188415->188416 188417 7ff66dfa6651 188435 7ff66dfa6707 188417->188435 189369 7ff66e2562b4 HeapAlloc memcpy 188417->189369 188419 7ff66dfa66f8 188419->188435 189373 7ff66e23e8de 16 API calls 188419->189373 188421 7ff66dfa6e73 188422 7ff66e27ef51 HeapAlloc 188421->188422 188524 7ff66dfa5e02 188421->188524 188424 7ff66dfa7c1d 188422->188424 188423->188409 188423->188410 188423->188413 188423->188417 188425 7ff66dfa562d 188424->188425 188426 7ff66dfa61f2 188424->188426 188429 7ff66dfa7cac 188425->188429 188431 7ff66dfa5697 188425->188431 189365 7ff66e0c8ce6 13 API calls 188425->189365 189367 7ff66e0feb00 121 API calls 188426->189367 188428 7ff66e10cce6 HeapAlloc 188428->188435 188429->188429 188430 7ff66dfa6202 189368 7ff66e176a38 121 API calls 188430->189368 188436 7ff66dfa56bd 188431->188436 189366 7ff66dfac850 HeapReAlloc memcpy memcpy HeapAlloc 188431->189366 188435->188409 188435->188421 188435->188428 188437 7ff66dfa5b82 188436->188437 188440 7ff66dfa68d2 188436->188440 188436->188524 188438 7ff66e0b19c1 HeapAlloc 188437->188438 188439 7ff66dfa5be3 188437->188439 188438->188439 188441 7ff66e0b19c1 HeapAlloc 188439->188441 188443 7ff66dfa5cee 188439->188443 188469 7ff66dfa89b6 188439->188469 189370 7ff66dfabc60 7 API calls 188440->189370 188441->188443 188444 7ff66e0b19c1 HeapAlloc 188443->188444 188445 7ff66dfa5d6b 188443->188445 188443->188469 188444->188445 188446 7ff66e0b19c1 HeapAlloc 188445->188446 188447 7ff66dfa5de2 188445->188447 188445->188469 188446->188447 188448 7ff66dfa5e46 188447->188448 188449 7ff66dfa6cdc 188447->188449 188447->188469 188447->188524 188450 7ff66e168d5c 7 API calls 188448->188450 189371 7ff66e158b34 7 API calls 188449->189371 188452 7ff66dfa5e9f 188450->188452 188453 7ff66e168d5c 7 API calls 188452->188453 188461 7ff66dfa6d0c 188452->188461 188454 7ff66dfa5ed4 188453->188454 188455 7ff66e168d5c 7 API calls 188454->188455 188454->188461 188456 7ff66dfa5f06 188455->188456 188456->188461 188462 7ff66e1682fc 2 API calls 188461->188462 188461->188524 188463 7ff66dfa91fd 188462->188463 188465 7ff66e0b2b1a 122 API calls 188463->188465 188466 7ff66dfa920d 188465->188466 188466->188524 188470 7ff66e1031b0 12 API calls 188469->188470 188470->188469 188524->186119 188533 7ff66e1801f7 122 API calls 188532->188533 188534 7ff66dfa5821 188533->188534 188566 7ff66dfa89b6 188534->188566 189396 7ff66e103740 188534->189396 188537 7ff66e103740 107 API calls 188538 7ff66dfa588a 188537->188538 188539 7ff66dfa5c01 memcpy 188538->188539 188540 7ff66dfa5b33 188538->188540 188541 7ff66dfa5c31 188539->188541 188545 7ff66dfa5b82 188540->188545 188548 7ff66dfa697a 188540->188548 188552 7ff66dfa5e02 188540->188552 188542 7ff66dfa5c6f 188541->188542 188543 7ff66dfa5c36 memcpy 188541->188543 189407 7ff66e16bba0 166 API calls 188542->189407 188543->188542 188546 7ff66e0b19c1 HeapAlloc 188545->188546 188547 7ff66dfa5be3 188545->188547 188546->188547 188549 7ff66e0b19c1 HeapAlloc 188547->188549 188551 7ff66dfa5cee 188547->188551 188547->188566 189408 7ff66dfabc60 7 API calls 188548->189408 188549->188551 188553 7ff66e0b19c1 HeapAlloc 188551->188553 188554 7ff66dfa5d6b 188551->188554 188551->188566 188552->186119 188553->188554 188555 7ff66e0b19c1 HeapAlloc 188554->188555 188556 7ff66dfa5de2 188554->188556 188554->188566 188555->188556 188556->188552 188557 7ff66dfa5e46 188556->188557 188558 7ff66dfa6cdc 188556->188558 188556->188566 188559 7ff66e168d5c 7 API calls 188557->188559 189409 7ff66e158b34 7 API calls 188558->189409 188561 7ff66dfa5e9f 188559->188561 188562 7ff66e168d5c 7 API calls 188561->188562 188569 7ff66dfa6d0c 188561->188569 188564 7ff66e1031b0 12 API calls 188564->188566 188566->188564 188569->188552 188573 7ff66e1682fc 2 API calls 188569->188573 188646 7ff66dfaedc4 188644->188646 188645 7ff66dfaee16 188645->186192 188646->188645 188786 7ff66dfaed37 HeapAlloc 188646->188786 188649 7ff66e106720 7 API calls 188648->188649 188650 7ff66e1e29c3 188649->188650 188650->186194 188652 7ff66e158c07 188651->188652 188787 7ff66e158cdb 188652->188787 188654 7ff66e158c51 188658 7ff66e158c71 188654->188658 188791 7ff66e158de9 HeapAlloc 188654->188791 188656 7ff66e158c69 188656->188658 188792 7ff66e1fee13 HeapAlloc memcpy memcpy memcpy memcpy 188656->188792 188658->186199 188704->186200 188786->188645 188788 7ff66e158d15 188787->188788 188789 7ff66e158dbb 188788->188789 188793 7ff66e17e378 HeapAlloc 188788->188793 188789->188654 188791->188656 188792->188658 188793->188788 188832->186411 188833->186417 188834->186410 188835->186416 188836->186397 188837->186416 188838->186443 188839->186469 188840->186418 188842->186469 188843->186469 188844->186469 188846->186469 188847->186469 188851->186469 188857->186402 188858->186402 188859->186402 188864 7ff66e1ec01d 188863->188864 188865 7ff66e1ec027 memcpy 188864->188865 188866 7ff66e1ec051 188864->188866 188865->186516 188867->186535 188868->186540 188869->186534 188870->186635 188871->186520 188872->186635 188873->186565 188874->186626 188875->186541 188892->186527 188893->186527 188894->186527 188898->186667 188899->186667 188900->186667 188901->186667 188902->186661 188903->186667 188904->186667 188905->186708 188907->186670 188908->186667 188909->186667 188910->186667 188911->186667 188912->186667 188913->186667 188914->186690 188915->186690 188916->186690 188917->186667 188921 7ff66e106720 7 API calls 188920->188921 188922 7ff66e273c54 188921->188922 188922->186720 188946->186741 188947->186741 188948->186741 188952->186867 188953->186873 188954->186866 188955->186874 188956->186853 188957->186874 188958->186898 188959->186950 188960->186872 188962->186950 188963->186950 188964->186950 188966->186950 188967->186950 188971->186950 188972->186950 188973->186950 188974->186950 188977->186859 188978->186859 188979->186859 188980->186950 188983->186978 188984->186982 188985->186977 188986->187080 188987->187080 188988->187006 188989->187071 188990->187071 188991->187071 188992->187071 188993->187071 188994->187036 188995->187071 188996->187071 189000->187071 189001->187071 189002->187071 189003->187071 189004->187071 189005->187071 189006->187065 189007->187065 189008->187065 189009->187071 189012->187104 189013->187109 189014->187103 189015->187204 189016->187089 189017->187204 189018->187134 189020->187110 189037->187096 189038->187096 189039->187096 189043->187208 189044->187219 189045->187235 189046->187264 189060->187259 189061->187265 189062->187228 189063->187228 189064->187257 189065->187256 189066->187302 189067->187228 189070->187225 189071->187302 189072->187295 189074->187232 189091->187233 189092->187233 189093->187233 189098 7ff66dfae8a0 189097->189098 189099 7ff66dfacc65 189097->189099 189098->187389 189100 7ff66dfacc8b HeapAlloc 189099->189100 189101 7ff66dfacc6e 189100->189101 189101->187389 189102->187398 189103->187406 189104->187412 189105->187414 189109->187388 189110->187388 189111->187388 189112->187440 189113->187440 189114->187440 189115->187454 189116->187468 189117->187451 189118->187468 189119->187468 189120->187468 189121->187468 189122->187478 189123->187468 189124->187468 189125->187508 189127->187472 189128->187468 189129->187468 189130->187468 189131->187468 189132->187468 189133->187468 189134->187464 189135->187464 189136->187464 189137->187468 189140->187540 189141->187546 189142->187539 189143->187576 189144->187525 189145->187576 189146->187571 189147->187596 189148->187545 189165->187532 189166->187532 189167->187532 189171->187645 189172->187671 189173->187675 189174->187670 189175->187770 189176->187659 189177->187770 189178->187700 189180->187676 189197->187649 189198->187649 189199->187649 189203->187799 189204->187803 189205->187798 189206->187898 189207->187787 189208->187898 189209->187829 189211->187804 189228->187780 189229->187780 189230->187780 189235 7ff66e16b9cc 189234->189235 189236 7ff66e16b9c0 189234->189236 189235->187902 189269 7ff66e18656e HeapAlloc 189236->189269 189238->187928 189239->187932 189240->187927 189241->188027 189242->187916 189243->188027 189244->187957 189246->187933 189263->187906 189264->187906 189265->187906 189269->189235 189270->188051 189271->188057 189272->188050 189273->188058 189274->188037 189275->188058 189276->188082 189277->188102 189278->188056 189280->188102 189281->188102 189282->188102 189284->188102 189285->188102 189289->188102 189290->188102 189291->188102 189292->188102 189295->188043 189296->188043 189297->188043 189298->188102 189301->188156 189302->188182 189303->188187 189304->188181 189305->188190 189306->188171 189307->188190 189308->188212 189310->188186 189327->188162 189328->188162 189329->188162 189333->188300 189334->188306 189335->188299 189336->188400 189337->188286 189338->188400 189339->188330 189340->188391 189341->188305 189343->188391 189344->188391 189345->188391 189347->188391 189348->188391 189352->188391 189353->188391 189354->188391 189355->188391 189358->188292 189359->188292 189360->188292 189361->188391 189364->188405 189365->188431 189366->188436 189367->188430 189368->188524 189369->188419 189370->188524 189371->188461 189373->188435 189390->188409 189391->188409 189392->188409 189397 7ff66e10375f 189396->189397 189403 7ff66e10377a memcpy 189396->189403 189399 7ff66e103c40 HeapAlloc 189397->189399 189404 7ff66e1037d2 189397->189404 189401 7ff66e103775 189399->189401 189401->189403 189401->189404 189433 7ff66e100880 189403->189433 189405 7ff66e280730 6 API calls 189404->189405 189406 7ff66e103804 189405->189406 189407->188547 189408->188552 189409->188569 189434 7ff66e1008b1 189433->189434 189437 7ff66e1000b0 189434->189437 189436 7ff66dfa5857 189436->188537 189438 7ff66e1000e1 189437->189438 189439 7ff66e1001a5 189438->189439 189442 7ff66e100182 189438->189442 189443 7ff66e1002cc 189438->189443 189440 7ff66e10028b memcpy 189439->189440 189449 7ff66e0e3e60 105 API calls 189439->189449 189440->189436 189442->189439 189446 7ff66e1002da 189442->189446 189450 7ff66e0e3e60 105 API calls 189443->189450 189444 7ff66e1002bf 189444->189440 189451 7ff66e0e3e60 105 API calls 189446->189451 189448 7ff66e100304 189449->189444 189450->189446 189451->189448 189452->186151 189453->186148 189454 7ff66e05aebc 189455 7ff66e05aed4 189454->189455 189459 7ff66e05af85 189455->189459 189554 7ff66e010468 HeapAlloc 189455->189554 189457 7ff66e05aef3 189457->189459 189501 7ff66e05c1b0 189457->189501 189555 7ff66e06c230 HeapAlloc 189457->189555 189469 7ff66e05b142 189459->189469 189459->189501 189556 7ff66e06c75b 189459->189556 189461 7ff66e05b3e0 189520 7ff66e05b42d 189461->189520 189560 7ff66e0b4c0f HeapAlloc 189461->189560 189463 7ff66e05d335 189579 7ff66e08fc08 memcpy memcpy memcpy memcpy 189463->189579 189466 7ff66e05b286 memcpy 189466->189469 189467 7ff66e209d49 7 API calls 189482 7ff66e05d7cd 189467->189482 189469->189461 189469->189466 189473 7ff66e05b3a2 memcpy 189469->189473 189469->189501 189470 7ff66e05d3da 189472 7ff66e209d49 7 API calls 189470->189472 189486 7ff66e05d45d 189470->189486 189470->189501 189472->189486 189473->189461 189475 7ff66e05d845 memcpy 189477 7ff66e078712 2 API calls 189475->189477 189476 7ff66e05b735 memcpy 189562 7ff66e00a997 memcpy memcpy memcpy memcpy 189476->189562 189480 7ff66e05d871 189477->189480 189540 7ff66e092477 189480->189540 189482->189475 189483 7ff66e05d354 189483->189470 189483->189501 189581 7ff66e029ded HeapAlloc 189483->189581 189486->189467 189486->189482 189486->189501 189489 7ff66e05be6f memcpy 189568 7ff66e00c7cd memcpy memcpy memcpy memcpy 189489->189568 189491 7ff66e05d889 189491->189501 189544 7ff66e00cd4a 189491->189544 189492 7ff66e05be9b memcpy 189492->189520 189494 7ff66e089348 HeapAlloc 189494->189520 189495 7ff66dfe62ec 7 API calls 189495->189520 189496 7ff66e05b8cc memcpy 189564 7ff66e00a997 memcpy memcpy memcpy memcpy 189496->189564 189497 7ff66e00ab68 memcpy memcpy 189497->189520 189499 7ff66e05dbba 189500 7ff66e05dbc2 memcpy 189499->189500 189531 7ff66e05dbe8 189500->189531 189502 7ff66e08c8eb memcpy memcpy memcpy 189502->189520 189504 7ff66e05da36 189504->189499 189504->189500 189580 7ff66e00ce4a memcpy memcpy 189504->189580 189506 7ff66e05cf83 memcpy 189574 7ff66e00c7cd memcpy memcpy memcpy memcpy 189506->189574 189507 7ff66e05c78f memcpy memcpy 189507->189520 189509 7ff66e05c9ec memcpy memcpy 189509->189520 189510 7ff66e05e135 7 API calls 189533 7ff66e05e1f7 189510->189533 189511 7ff66e00a997 memcpy memcpy memcpy memcpy 189511->189520 189512 7ff66e05c411 memcpy 189512->189520 189514 7ff66e05cb85 memset 189514->189520 189515 7ff66e05b9ab memcpy memcpy 189566 7ff66e00b6b8 memcpy memcpy memcpy memcpy 189515->189566 189516 7ff66e0c5f89 HeapAlloc 189516->189520 189518 7ff66e0103f5 HeapAlloc 189518->189520 189519 7ff66e05c54c memcpy 189519->189520 189520->189463 189520->189482 189520->189489 189520->189494 189520->189495 189520->189496 189520->189497 189520->189501 189520->189502 189520->189506 189520->189507 189520->189509 189520->189511 189520->189512 189520->189514 189520->189516 189520->189518 189520->189519 189528 7ff66e05ebcb memcpy memcpy HeapAlloc 189520->189528 189561 7ff66e00ab68 memcpy memcpy 189520->189561 189563 7ff66e00aaed memcpy memcpy 189520->189563 189565 7ff66e00ab68 memcpy memcpy 189520->189565 189567 7ff66e00af50 memcpy memcpy 189520->189567 189569 7ff66e08fb24 memcpy memcpy 189520->189569 189570 7ff66e070e53 memcpy HeapAlloc 189520->189570 189571 7ff66e010b0f HeapAlloc 189520->189571 189572 7ff66e0104c7 HeapAlloc 189520->189572 189573 7ff66e010785 HeapAlloc 189520->189573 189575 7ff66e00ab68 memcpy memcpy 189520->189575 189577 7ff66e091106 13 API calls 189520->189577 189578 7ff66e08f74b memcpy memcpy 189520->189578 189521 7ff66e05dbfb 189521->189510 189523 7ff66e05d039 memcpy 189576 7ff66e00a997 memcpy memcpy memcpy memcpy 189523->189576 189526 7ff66e05d055 memcpy memcpy 189526->189520 189527 7ff66e05de96 memcpy 189527->189531 189528->189520 189529 7ff66e05e009 memcpy 189529->189531 189530 7ff66e05df94 memcpy 189530->189531 189531->189501 189531->189521 189531->189527 189531->189529 189531->189530 189532 7ff66e05e06a memcpy 189531->189532 189535 7ff66e05e0bc memcpy 189531->189535 189532->189501 189532->189531 189548 7ff66e06f96a 189533->189548 189535->189531 189536 7ff66e05e2f7 189537 7ff66e06f96a 2 API calls 189536->189537 189538 7ff66e05e30e memcpy 189537->189538 189539 7ff66e05e3da 189538->189539 189541 7ff66e09247f 189540->189541 189543 7ff66e0924da 189541->189543 189582 7ff66e091106 13 API calls 189541->189582 189543->189491 189545 7ff66e00cd67 189544->189545 189547 7ff66e00cd90 189545->189547 189583 7ff66e00cea3 memcpy memcpy 189545->189583 189547->189504 189550 7ff66e06f985 189548->189550 189552 7ff66e06f9ac 189548->189552 189549 7ff66e06f9c4 memcpy 189549->189536 189553 7ff66e06f9eb 189550->189553 189584 7ff66e0103af HeapAlloc 189550->189584 189552->189549 189552->189553 189554->189457 189555->189457 189557 7ff66e06c774 189556->189557 189559 7ff66e06c78d 189556->189559 189558 7ff66e010093 HeapAlloc 189557->189558 189557->189559 189558->189559 189559->189469 189560->189520 189561->189476 189562->189520 189564->189520 189565->189515 189566->189520 189567->189520 189568->189492 189570->189520 189571->189520 189572->189520 189573->189520 189574->189520 189575->189523 189576->189526 189577->189520 189578->189520 189579->189483 189581->189483 189582->189541 189583->189547 189584->189552 189585 7ff66dfed650 189589 7ff66dfed65b 189585->189589 189586 7ff66dffaa91 189587 7ff66dff8d2b 189588 7ff66dff8e53 189587->189588 189600 7ff66dff8d47 189587->189600 189593 7ff66dff8e59 189588->189593 189594 7ff66dff8eb7 189588->189594 189589->189586 189590 7ff66dff8d0e 189589->189590 189591 7ff66dff8cfd 189589->189591 189639 7ff66dfed75d 189589->189639 189590->189587 189596 7ff66dff8fcc 189590->189596 189605 7ff66dff9b84 189590->189605 189591->189590 189592 7ff66dff974e 189591->189592 189599 7ff66dff8f53 189591->189599 189603 7ff66dff97bc 189592->189603 189618 7ff66dff978c 189592->189618 189593->189586 189595 7ff66dfed7cd 189593->189595 189598 7ff66dff908f 189593->189598 189609 7ff66dffa064 189593->189609 189594->189595 189662 7ff66dfff463 7 API calls 189594->189662 189595->189586 189676 7ff66dffbd23 memcpy memcpy 189595->189676 189666 7ff66dffe07a 7 API calls 189596->189666 189597 7ff66dff8dcb 189597->189594 189637 7ff66dff8e08 189597->189637 189614 7ff66dffaae9 189598->189614 189632 7ff66dff90b7 189598->189632 189664 7ff66dffe07a 7 API calls 189599->189664 189600->189597 189629 7ff66dff8d80 189600->189629 189602 7ff66dff9800 189602->189590 189613 7ff66dff9816 189602->189613 189603->189602 189606 7ff66dff97d0 189603->189606 189605->189587 189617 7ff66dff9bc8 189605->189617 189670 7ff66dffe07a 7 API calls 189606->189670 189607 7ff66dff8f69 189665 7ff66dfff327 7 API calls 189607->189665 189611 7ff66dfff284 7 API calls 189609->189611 189610 7ff66dff8eef 189663 7ff66dffc869 memcpy memcpy 189610->189663 189611->189595 189672 7ff66dffe07a 7 API calls 189613->189672 189651 7ff66dffc035 189614->189651 189616 7ff66dff8ff0 189667 7ff66dfff379 7 API calls 189616->189667 189674 7ff66dffe07a 7 API calls 189617->189674 189668 7ff66dffe07a 7 API calls 189618->189668 189619 7ff66dff97e6 189671 7ff66dfff350 7 API calls 189619->189671 189626 7ff66dff982d 189673 7ff66dfff350 7 API calls 189626->189673 189628 7ff66dff97a2 189669 7ff66dfff327 7 API calls 189628->189669 189660 7ff66dfff396 7 API calls 189629->189660 189641 7ff66dfff284 7 API calls 189632->189641 189633 7ff66dff9bec 189675 7ff66dfff379 7 API calls 189633->189675 189636 7ff66dffab06 189655 7ff66dfff284 189636->189655 189661 7ff66dfff396 7 API calls 189637->189661 189658 7ff66dffe07a 7 API calls 189639->189658 189644 7ff66dff90ea 189641->189644 189677 7ff66dffbd23 memcpy memcpy 189644->189677 189646 7ff66dffab29 189647 7ff66dfed773 189648 7ff66dfff284 7 API calls 189647->189648 189649 7ff66dfed7b8 189648->189649 189659 7ff66dfff2a1 7 API calls 189649->189659 189652 7ff66dffc054 189651->189652 189654 7ff66dffc067 189652->189654 189678 7ff66e084cdb 7 API calls 189652->189678 189654->189636 189679 7ff66e0093c8 189655->189679 189657 7ff66dfff29b 189657->189644 189658->189647 189659->189595 189660->189595 189661->189595 189662->189610 189663->189595 189664->189607 189665->189595 189666->189616 189667->189595 189668->189628 189669->189595 189670->189619 189671->189595 189672->189626 189673->189595 189674->189633 189675->189595 189676->189586 189677->189646 189678->189654 189682 7ff66dffbc10 189679->189682 189681 7ff66e0093ee 189681->189657 189685 7ff66e059d32 189682->189685 189684 7ff66dffbc24 189684->189681 189686 7ff66e05435f 7 API calls 189685->189686 189687 7ff66e059d54 189686->189687 189688 7ff66dfe62ec 7 API calls 189687->189688 189689 7ff66e059d59 189687->189689 189688->189689 189689->189684 189690 7ff66e273c99 189691 7ff66e273e00 189690->189691 189825 7ff66e276b3f 189691->189825 189694 7ff66e276b3f 2 API calls 189713 7ff66e274111 189694->189713 189695 7ff66e274237 189696 7ff66e276b3f 2 API calls 189695->189696 189697 7ff66e274263 189696->189697 189699 7ff66e276b3f 2 API calls 189697->189699 189698 7ff66e274206 189832 7ff66e1c4749 HeapAlloc 189698->189832 189714 7ff66e274288 189699->189714 189701 7ff66e274218 189833 7ff66e10cd7c memcpy 189701->189833 189704 7ff66e274374 189705 7ff66e276b3f 2 API calls 189704->189705 189706 7ff66e2743a0 189705->189706 189708 7ff66e2743e8 189706->189708 189712 7ff66dfacd2b HeapAlloc 189706->189712 189751 7ff66e276947 189706->189751 189711 7ff66e276b3f 2 API calls 189708->189711 189708->189751 189709 7ff66e274357 189835 7ff66e10cd7c memcpy 189709->189835 189723 7ff66e274432 189711->189723 189712->189708 189713->189695 189713->189698 189831 7ff66e273c1b HeapAlloc 189713->189831 189714->189704 189834 7ff66e1c4749 HeapAlloc 189714->189834 189715 7ff66e2744c2 189716 7ff66e276b3f 2 API calls 189715->189716 189717 7ff66e2744ef 189716->189717 189719 7ff66e276b3f 2 API calls 189717->189719 189749 7ff66e27450c 189719->189749 189720 7ff66e2744a5 189837 7ff66e10cd7c memcpy 189720->189837 189722 7ff66e27463b 189724 7ff66e276b3f 2 API calls 189722->189724 189723->189715 189836 7ff66e1c4749 HeapAlloc 189723->189836 189725 7ff66e274665 189724->189725 189728 7ff66e276b3f 2 API calls 189725->189728 189726 7ff66e27460a 189838 7ff66e1c4749 HeapAlloc 189726->189838 189735 7ff66e274682 189728->189735 189729 7ff66e27461c 189839 7ff66e10cd7c memcpy 189729->189839 189730 7ff66e274760 189732 7ff66e276b3f 2 API calls 189730->189732 189733 7ff66e274785 189732->189733 189734 7ff66e276b3f 2 API calls 189733->189734 189744 7ff66e2747a2 189734->189744 189735->189730 189735->189751 189840 7ff66e1c4749 HeapAlloc 189735->189840 189737 7ff66e274743 189841 7ff66e10cd7c memcpy 189737->189841 189738 7ff66e27483f 189741 7ff66e276b3f 2 API calls 189738->189741 189739 7ff66e1c4749 HeapAlloc 189739->189749 189742 7ff66e274864 189741->189742 189743 7ff66e276b3f 2 API calls 189742->189743 189750 7ff66e274881 189743->189750 189744->189738 189744->189751 189842 7ff66e1c4749 HeapAlloc 189744->189842 189746 7ff66e274822 189843 7ff66e10cd7c memcpy 189746->189843 189748 7ff66e276b3f 2 API calls 189752 7ff66e2749a2 189748->189752 189749->189722 189749->189726 189749->189739 189749->189751 189750->189751 189760 7ff66e274978 189750->189760 189844 7ff66e1c4749 HeapAlloc 189750->189844 189754 7ff66e276b3f 2 API calls 189752->189754 189771 7ff66e2749bf 189754->189771 189755 7ff66e274959 189845 7ff66e10cd7c memcpy 189755->189845 189757 7ff66e276b3f 2 API calls 189759 7ff66e274a9b 189757->189759 189758 7ff66e274a47 189847 7ff66e1c4749 HeapAlloc 189758->189847 189761 7ff66e276b3f 2 API calls 189759->189761 189760->189748 189768 7ff66e274aa8 189761->189768 189763 7ff66e274a59 189848 7ff66e10cd7c memcpy 189763->189848 189765 7ff66e276b3f 2 API calls 189767 7ff66e274b12 189765->189767 189766 7ff66e274a76 189766->189757 189777 7ff66e274ade 189768->189777 189849 7ff66e1c4749 HeapAlloc 189768->189849 189771->189758 189771->189766 189846 7ff66e1c4749 HeapAlloc 189771->189846 189773 7ff66e274ad7 189850 7ff66e10cdc7 memcpy 189773->189850 189777->189765 189826 7ff66e276b9f 189825->189826 189827 7ff66e2740f4 189826->189827 189829 7ff66e1c4749 HeapAlloc 189826->189829 189867 7ff66e10cca2 HeapAlloc memcpy 189826->189867 189868 7ff66e270891 HeapAlloc 189826->189868 189827->189694 189829->189826 189831->189713 189832->189701 189834->189709 189836->189720 189838->189729 189840->189737 189842->189746 189844->189755 189846->189771 189847->189763 189849->189773 189850->189777 189867->189826 189868->189826 189869 7ff66e0c9920 189870 7ff66e0c9971 189869->189870 189872 7ff66e0c9937 189869->189872 189871 7ff66e0de4f0 14 API calls 189870->189871 189871->189872 189873 7ff66e05557e 189874 7ff66e05558e 189873->189874 189875 7ff66e055596 189874->189875 189878 7ff66e05563c 189874->189878 189876 7ff66e06c75b HeapAlloc 189875->189876 189877 7ff66e0555d0 189875->189877 189876->189877 189879 7ff66e0556e0 189878->189879 189881 7ff66e055736 189878->189881 189883 7ff66e05571a 189878->189883 189884 7ff66e055710 189878->189884 189880 7ff66e0556e6 memcpy 189879->189880 189879->189883 189880->189884 189882 7ff66e0557b4 memcpy 189881->189882 189881->189883 189882->189883 189884->189883 189886 7ff66e08ccc5 HeapAlloc 189884->189886 189886->189884 189887 7ff66dfab1ca 189888 7ff66dfab1dd 189887->189888 189890 7ff66dfab1d6 189887->189890 189889 7ff66e0c5f89 HeapAlloc 189888->189889 189889->189890
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: 1$[$assertion failed: end >= start && end <= len$assertion failed: frame_layout.clobbered_callee_saves.is_empty()$called `Result::unwrap()` on an `Err` value$capacity overflow$q
                                • API String ID: 3510742995-962046948
                                • Opcode ID: a1f9bbbf8aab68fbef88d7b11f853fe7a14e5f2df70a8b0038a84add42dbe907
                                • Instruction ID: 8345160af95a3b186c4833da3ac45e5ba0e1fcd4421a353a1bdb08ea6a907a47
                                • Opcode Fuzzy Hash: a1f9bbbf8aab68fbef88d7b11f853fe7a14e5f2df70a8b0038a84add42dbe907
                                • Instruction Fuzzy Hash: 0C639172A0CBC2C1EA709B15E5443EAA371FB94B84F404136EA8D9BB99DF3CE155CB44
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: , unexpected token, expected one of: $assertion failed: regs.len() == 1$assertion failed: sret_reg.is_none()$assertion failed: sret_reg.is_some()$called `Result::unwrap()` on an `Err` value$register allocation$register allocation checker$unexpected edge_inst: not a parallel move$unexpected parallel_move in body (non-edge)
                                • API String ID: 3510742995-1172243485
                                • Opcode ID: 3044cc14a6cab2a3cae178dcb1202a4a358853f968dd4f6ca0e9ae6f4406eca8
                                • Instruction ID: 1493a1ae999f0d3cda3a3048738234e58e03c34d66eff40cce4b6fafa401f91e
                                • Opcode Fuzzy Hash: 3044cc14a6cab2a3cae178dcb1202a4a358853f968dd4f6ca0e9ae6f4406eca8
                                • Instruction Fuzzy Hash: DFC36E76A08BC1C1EA219B15E4503EEA3B0FB98784F405136EB8D9BB99DF3CD595CB04
                                APIs
                                Strings
                                • g], xrefs: 00007FF66DFAADA4
                                • assertion failed: !ptr.is_null()/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-runtime-17.0.3/src/instance.rs, xrefs: 00007FF66DFAACDA
                                • B^, xrefs: 00007FF66DFAACC9
                                • customnameproducersmetadata.code.branch_hint, xrefs: 00007FF66DFA8193
                                • assertion failed: edge.height == self.node.height - 1, xrefs: 00007FF66DFAAD29
                                • type mismatch with parameterstype mismatch with resultsmust use async instantiation when async support is enabled, xrefs: 00007FF66DFA920D, 00007FF66DFA9328
                                • dylink.0corefuncvaluetypecomponentinstancemoduleinterfacebools8u8s16u16s32u32s64u64f32f64float32float64charstringrecordvariantlisttupleflagsenumoptionresultownborrowbinding-weakbinding-localvisibility-hiddenundefinedexportedexplicit-nameno-striptlsabsolute, xrefs: 00007FF66DFA81EA
                                • Cache system should be enabled and all settings must be validated or defaulted/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-cache-17.0.3/src/config.rs, xrefs: 00007FF66DFAAC4A
                                • read_wasm_at_indexNot found read_wasm_at_index, xrefs: 00007FF66DFA91A8
                                • get_wasm_mem_sizeNot found get_wasm_mem_size, xrefs: 00007FF66DFA9163
                                • expected `(`, xrefs: 00007FF66DFAA58F
                                • Q'", xrefs: 00007FF66DFAA8B4
                                • assertion failed: idx < CAPACITY/rustc/129f3b9964af4d4a709d1383930ade12dfe7c081\library\alloc\src\collections\btree\node.rs, xrefs: 00007FF66DFAAD72, 00007FF66DFAAE47
                                • assertion failed: self.element_type() == TableElementType::Func, xrefs: 00007FF66DFAACB6
                                • multiple start sections foundexpected valid module field/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wast-219.0.1/src/core/binary.rs, xrefs: 00007FF66DFA803A
                                • expected `)`item nesting too deep, xrefs: 00007FF66DFA8733, 00007FF66DFAA778
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: Cache system should be enabled and all settings must be validated or defaulted/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-cache-17.0.3/src/config.rs$assertion failed: !ptr.is_null()/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-runtime-17.0.3/src/instance.rs$assertion failed: edge.height == self.node.height - 1$assertion failed: idx < CAPACITY/rustc/129f3b9964af4d4a709d1383930ade12dfe7c081\library\alloc\src\collections\btree\node.rs$assertion failed: self.element_type() == TableElementType::Func$customnameproducersmetadata.code.branch_hint$dylink.0corefuncvaluetypecomponentinstancemoduleinterfacebools8u8s16u16s32u32s64u64f32f64float32float64charstringrecordvariantlisttupleflagsenumoptionresultownborrowbinding-weakbinding-localvisibility-hiddenundefinedexportedexplicit-nameno-striptlsabsolute$expected `(`$expected `)`item nesting too deep$get_wasm_mem_sizeNot found get_wasm_mem_size$multiple start sections foundexpected valid module field/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wast-219.0.1/src/core/binary.rs$read_wasm_at_indexNot found read_wasm_at_index$type mismatch with parameterstype mismatch with resultsmust use async instantiation when async support is enabled$B^$Q'"$g]
                                • API String ID: 2221118986-304987011
                                • Opcode ID: fddbca585abf2ec3a7625c2c7d471a9bedaca2525d2a5c34371c1e3d5cdc6b00
                                • Instruction ID: 09d0c69e1ae7095805dd1298637c020755742cb9677cf21ae0ee37890e8cc121
                                • Opcode Fuzzy Hash: fddbca585abf2ec3a7625c2c7d471a9bedaca2525d2a5c34371c1e3d5cdc6b00
                                • Instruction Fuzzy Hash: 7C337032A0DBC2C1EA209B15E4503EAB3B1FB98B84F444136DA8D9BB99EF7DD545C740
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: assertion failed: !ptr.is_null()/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-runtime-17.0.3/src/instance.rs$assertion failed: edge.height == self.node.height - 1$assertion failed: idx < CAPACITY/rustc/129f3b9964af4d4a709d1383930ade12dfe7c081\library\alloc\src\collections\btree\node.rs$assertion failed: self.element_type() == TableElementType::Func$cannot access a Thread Local Storage value during or after destruction/rustc/129f3b9964af4d4a709d1383930ade12dfe7c081\library\std\src\thread\local.rs$compilation settings are not compatible with the native host/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-17.0.3/src/module.rsfailed to parse WebAssembly module$customnameproducersmetadata.code.branch_hint$dylink.0corefuncvaluetypecomponentinstancemoduleinterfacebools8u8s16u16s32u32s64u64f32f64float32float64charstringrecordvariantlisttupleflagsenumoptionresultownborrowbinding-weakbinding-localvisibility-hiddenundefinedexportedexplicit-nameno-striptlsabsolute$expected `(`$failed to allocate default callee$get_wasm_mem_sizeNot found get_wasm_mem_size$read_wasm_at_indexNot found read_wasm_at_index$tablememoryglobaltagelemdatalocalexpected `Num`$type mismatch with parameterstype mismatch with resultsmust use async instantiation when async support is enabled$ e($-e($:e($B^$Ge($Te($g]$s%
                                • API String ID: 3510742995-1110042966
                                • Opcode ID: 9360b872b6e97294046309baf92658c867457869f1cd208d2a96838b060c34f1
                                • Instruction ID: d0292ec5abaf6e6db18d05a19f15633aad346ec198ab506192b64efcbe837bff
                                • Opcode Fuzzy Hash: 9360b872b6e97294046309baf92658c867457869f1cd208d2a96838b060c34f1
                                • Instruction Fuzzy Hash: 63137E32A09BC2C2E7609B11E4503EAB375FB99B84F444136EA8D9BB85EF3CE155C744
                                Strings
                                • g], xrefs: 00007FF66DFAADA4
                                • assertion failed: edge.height == self.node.height - 1, xrefs: 00007FF66DFAAD29
                                • inlineisa_defaultsetting is configured to which is not supported, xrefs: 00007FF66DFA3AB5
                                • called `Result::unwrap()` on an `Err` value, xrefs: 00007FF66DFA6675
                                • r-, xrefs: 00007FF66DFA7C90
                                • failed to create table pool mappingtotal size of tables exceeds addressable memory, xrefs: 00007FF66DFA4DD5
                                • %, xrefs: 00007FF66DFA3CF4
                                • preserve_frame_pointersprobestack_strategyenable_llvm_abi_extensionsenable_pinned_reguse_colocated_libcallsuse_pinned_reg_as_heap_baseenable_safepointsunwind_infoenable_heap_access_spectre_mitigationenable_table_access_spectre_mitigationenable_nan_canonicaliza, xrefs: 00007FF66DFA3D2C
                                • false, xrefs: 00007FF66DFA3C9A
                                • Q'", xrefs: 00007FF66DFAA8B4
                                • assertion failed: idx < CAPACITY/rustc/129f3b9964af4d4a709d1383930ade12dfe7c081\library\alloc\src\collections\btree\node.rs, xrefs: 00007FF66DFAAE47
                                • true, xrefs: 00007FF66DFA3C93, 00007FF66DFA3D0F, 00007FF66DFA3D49, 00007FF66DFA3DA6
                                • probestack_strategyenable_llvm_abi_extensionsenable_pinned_reguse_colocated_libcallsuse_pinned_reg_as_heap_baseenable_safepointsunwind_infoenable_heap_access_spectre_mitigationenable_table_access_spectre_mitigationenable_nan_canonicalizationenable_jump_tablese, xrefs: 00007FF66DFA3A98
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: %$assertion failed: edge.height == self.node.height - 1$assertion failed: idx < CAPACITY/rustc/129f3b9964af4d4a709d1383930ade12dfe7c081\library\alloc\src\collections\btree\node.rs$called `Result::unwrap()` on an `Err` value$failed to create table pool mappingtotal size of tables exceeds addressable memory$false$inlineisa_defaultsetting is configured to which is not supported$preserve_frame_pointersprobestack_strategyenable_llvm_abi_extensionsenable_pinned_reguse_colocated_libcallsuse_pinned_reg_as_heap_baseenable_safepointsunwind_infoenable_heap_access_spectre_mitigationenable_table_access_spectre_mitigationenable_nan_canonicaliza$probestack_strategyenable_llvm_abi_extensionsenable_pinned_reguse_colocated_libcallsuse_pinned_reg_as_heap_baseenable_safepointsunwind_infoenable_heap_access_spectre_mitigationenable_table_access_spectre_mitigationenable_nan_canonicalizationenable_jump_tablese$true$Q'"$g]$r-
                                • API String ID: 0-3521788614
                                • Opcode ID: ca5440a257c4f5d5c68ef4a7a049e2163b5a0107166b5dda1d46252e6a01b06c
                                • Instruction ID: 861d9c4f2e00b8a2fca1605ecf6ceb5c3bf1041553ad8cbf40cdcf45ffe23aae
                                • Opcode Fuzzy Hash: ca5440a257c4f5d5c68ef4a7a049e2163b5a0107166b5dda1d46252e6a01b06c
                                • Instruction Fuzzy Hash: 67F26A62A0DBC2C5EA319B15E4503EAB3B0FB99784F444136DA8D8BB99EF3CD145CB44
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: Edge block succ must be body block$L$Y$]$^$^$capacity overflow$every side-effecting inst should have a color-map entry$lower_branch_blockparam_args called on a critical edge!$q$q$q$q$q
                                • API String ID: 3510742995-2479579835
                                • Opcode ID: 65f7b6e5459c25a89ad34e864de0de0aefbd98bc8324f9e02fed72a867ba386c
                                • Instruction ID: a9af67e68a7f39ec3c956ad5eac2cc40bf4833df740a88663f5380e2f6dffe6d
                                • Opcode Fuzzy Hash: 65f7b6e5459c25a89ad34e864de0de0aefbd98bc8324f9e02fed72a867ba386c
                                • Instruction Fuzzy Hash: 3B03A176A08AC2C2EA60DB15E4443EEB374FB94784F444136EA8D8B79ADF3CE555CB04
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: ?$Imm64Offset32$Invalid operand: fixed constraint on Def/Mod at Early position$Invalid operand: fixed constraint on Use/Mod at Late point$called `Result::unwrap()` on an `Err` value$capacity overflow$multiple uses of vreg with a Stack constraint are not supported
                                • API String ID: 0-1284797997
                                • Opcode ID: 60b0b1b58069d5639ea24b491e4c9a41e40122d0e1bfbb294f4b0721155d4923
                                • Instruction ID: 0b5102298be984399758201bd4f702542bacecc10ccc3f4587bac1a06a8bed37
                                • Opcode Fuzzy Hash: 60b0b1b58069d5639ea24b491e4c9a41e40122d0e1bfbb294f4b0721155d4923
                                • Instruction Fuzzy Hash: BD93C372A08AC2C6EA64CB55E4443EAB7B0FBA4784F404136EB9D8B795DF3CE465C704
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: ?$?$Could not allocate minimal bundle, but the allocation problem should be possible to solve$assertion failed: self.height > 0$called `Result::unwrap()` on an `Err` value$capacity overflow$no entry found for key/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-environ-17.0.3/src/module_types.rs
                                • API String ID: 0-4005537490
                                • Opcode ID: d4fb6b333c96262b77008336854d4aeed5d1d25beeb45039f9adb0abcb89bf18
                                • Instruction ID: 21efc0b6e0b2f4595099a814a538aac2ef4cbfa769d71fcca10e2eccad915786
                                • Opcode Fuzzy Hash: d4fb6b333c96262b77008336854d4aeed5d1d25beeb45039f9adb0abcb89bf18
                                • Instruction Fuzzy Hash: D7637E76608AC1C2DA64CB95E4403EAB7B0FB98B84F504136EB8E9BB55DF3CE455CB04
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: Instruction not in layout.$Missing vmctx parameter$Replacing detached result$assertion failed: scale > 0$assertion failed: ty.bytes() <= 16$assertion failed: vector_ty.is_dynamic_vector()$block missing terminator!$current instruction removed?/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/cranelift-codegen-0.104.3/src/cursor.rs
                                • API String ID: 0-2425051935
                                • Opcode ID: bc820dc7ce6c6d6bac0bc013c8b2f60a10f29b9faf5839f2e17076aff7fbd0a5
                                • Instruction ID: 6435ba1accae06095011b31b9d7254c8d30408cc038cec8703ac6129a06c6ab3
                                • Opcode Fuzzy Hash: bc820dc7ce6c6d6bac0bc013c8b2f60a10f29b9faf5839f2e17076aff7fbd0a5
                                • Instruction Fuzzy Hash: 99438F32A08BC2C2EA60DB55E4443EA73B4FBA5784F404136EA8D9BB99DF3CE555C704

                                Control-flow Graph

                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: malloc$ExceptionFilterSleepUnhandledmemcpystrlen
                                • String ID:
                                • API String ID: 3806033187-0
                                • Opcode ID: c8bd3e23893c37efd771a59b602fedc20bf07a7cd1760fed2cd31d1802a29d83
                                • Instruction ID: 86bfddc646b3f970799d27f0ea7e2cca82d26df0ea21a07a1e76eda093d33f7f
                                • Opcode Fuzzy Hash: c8bd3e23893c37efd771a59b602fedc20bf07a7cd1760fed2cd31d1802a29d83
                                • Instruction Fuzzy Hash: 3D514935E09A03C6F6509F66E99467933B6AFA5B84F094031EA0DCF791EE3CE8458318
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpymemset
                                • String ID: called `Result::unwrap()` on an `Err` value$capacity overflow$generation_by_depth cannot be empty
                                • API String ID: 1297977491-3596424090
                                • Opcode ID: ec8d08c87645dc23196c0e250af53478cc0c3239d4703ad6a7d0e5ee25660c61
                                • Instruction ID: 26d2df9433056c338678952dd3db48af78d1356a73e730f7b6249ff113ae8672
                                • Opcode Fuzzy Hash: ec8d08c87645dc23196c0e250af53478cc0c3239d4703ad6a7d0e5ee25660c61
                                • Instruction Fuzzy Hash: 49437F72A08AC6C1EA70DB15E4407EAB371FBA4B80F444136EA8D9BB99DF3CD955C704
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: assertion failed: self.exports.names.is_empty()$called `Result::unwrap()` on an `Err` value$nameproducersmetadata.code.branch_hint
                                • API String ID: 0-3030008011
                                • Opcode ID: 5922fefb73896d5295be0795b68add2161260c2e08459d31855a6860ce5f2f4e
                                • Instruction ID: 26b6dfc5fe9cc10e3341a78a84291567be71be10814a948a33791093cdf385a7
                                • Opcode Fuzzy Hash: 5922fefb73896d5295be0795b68add2161260c2e08459d31855a6860ce5f2f4e
                                • Instruction Fuzzy Hash: 18237E72A18BC5C2EA60DB11E1413EAB375FB95B84F444136EA9D8BB89CF3CE145CB44

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 11408 7ff66e0887fc-7ff66e088875 call 7ff66e08c5f7 * 2 11413 7ff66e088877 11408->11413 11414 7ff66e08887d-7ff66e0888db call 7ff66e08d883 call 7ff66e08d877 call 7ff66e097ce7 11408->11414 11413->11414 11421 7ff66e0888e1-7ff66e0888fa 11414->11421 11422 7ff66e0890fa-7ff66e08911f call 7ff66e0c8c9f 11414->11422 11424 7ff66e0888fc-7ff66e088907 11421->11424 11425 7ff66e088964-7ff66e08898a 11424->11425 11426 7ff66e088909-7ff66e088930 call 7ff66e097c4d 11424->11426 11429 7ff66e08898f-7ff66e088992 11425->11429 11434 7ff66e089093-7ff66e08909a call 7ff66dfb5960 11426->11434 11435 7ff66e088936-7ff66e088939 call 7ff66dffcf8f 11426->11435 11431 7ff66e088994-7ff66e0889b5 call 7ff66e08da32 11429->11431 11432 7ff66e0889b7-7ff66e0889d8 11429->11432 11431->11429 11433 7ff66e0889db-7ff66e0889e0 11432->11433 11437 7ff66e0889e6-7ff66e088a1a call 7ff66e08e247 11433->11437 11438 7ff66e088a89-7ff66e088ad9 call 7ff66e1261fb call 7ff66e08c412 11433->11438 11444 7ff66e08909f-7ff66e0890f5 call 7ff66dfaf0b0 11434->11444 11445 7ff66e08893e-7ff66e088949 11435->11445 11452 7ff66e088a2c-7ff66e088a4a memcpy 11437->11452 11453 7ff66e088a1c-7ff66e088a24 11437->11453 11458 7ff66e088ade-7ff66e088ae6 11438->11458 11444->11422 11449 7ff66e08895b-7ff66e088962 11445->11449 11450 7ff66e08894b-7ff66e088953 call 7ff66e010b0f 11445->11450 11449->11424 11450->11449 11456 7ff66e088a52-7ff66e088a66 call 7ff66e00ab02 11452->11456 11453->11452 11465 7ff66e088a75-7ff66e088a84 call 7ff66e00ab4e 11456->11465 11466 7ff66e088a68-7ff66e088a73 call 7ff66e05504b 11456->11466 11460 7ff66e088edc-7ff66e088f4f call 7ff66e08ecf1 memcpy 11458->11460 11461 7ff66e088aec-7ff66e088b00 call 7ff66e08c412 11458->11461 11471 7ff66e088f57-7ff66e088f6b call 7ff66e00ab02 11460->11471 11472 7ff66e088b06-7ff66e088b16 11461->11472 11473 7ff66e088feb-7ff66e088ff5 call 7ff66dfaf470 11461->11473 11465->11433 11466->11456 11484 7ff66e088f7a-7ff66e088fc8 call 7ff66e00ab4e call 7ff66e08d9c6 call 7ff66e00abef * 2 11471->11484 11485 7ff66e088f6d-7ff66e088f78 call 7ff66e05504b 11471->11485 11477 7ff66e088ffa-7ff66e088ffd 11472->11477 11478 7ff66e088b1c-7ff66e088b38 call 7ff66e00d797 11472->11478 11473->11477 11482 7ff66e08905f-7ff66e08908c 11477->11482 11483 7ff66e088fff-7ff66e089005 11477->11483 11490 7ff66e088b69-7ff66e088b75 11478->11490 11491 7ff66e088b3a-7ff66e088b4a call 7ff66e1ba995 11478->11491 11482->11434 11487 7ff66e08901f-7ff66e08905d 11483->11487 11488 7ff66e089007-7ff66e089017 11483->11488 11519 7ff66e088fd6-7ff66e088fea 11484->11519 11520 7ff66e088fca-7ff66e088fd1 call 7ff66e084cbe 11484->11520 11485->11471 11487->11434 11488->11487 11494 7ff66e088b7b-7ff66e088bc4 call 7ff66e0cfa6d 11490->11494 11502 7ff66e088b77-7ff66e088b79 11491->11502 11503 7ff66e088b4c-7ff66e088b67 call 7ff66e00ba51 11491->11503 11506 7ff66e088bc7-7ff66e088bca 11494->11506 11502->11494 11503->11494 11509 7ff66e088bd0-7ff66e088bd3 11506->11509 11510 7ff66e088de5-7ff66e088df8 11506->11510 11512 7ff66e088c24 11509->11512 11513 7ff66e088bd5-7ff66e088bf7 11509->11513 11514 7ff66e088e00-7ff66e088e03 11510->11514 11518 7ff66e088c2c-7ff66e088c70 11512->11518 11513->11512 11516 7ff66e088bf9-7ff66e088c22 11513->11516 11517 7ff66e088e09-7ff66e088e27 11514->11517 11514->11518 11516->11506 11517->11518 11521 7ff66e088e2d-7ff66e088e60 11517->11521 11522 7ff66e088c72 11518->11522 11523 7ff66e088c77-7ff66e088c88 11518->11523 11520->11519 11525 7ff66e088e62-7ff66e088e8e 11521->11525 11526 7ff66e088e93-7ff66e088ebc call 7ff66e00b9fb 11521->11526 11522->11523 11527 7ff66e088cda-7ff66e088cf9 call 7ff66e00dd16 call 7ff66e089120 11523->11527 11528 7ff66e088c8a-7ff66e088c8e 11523->11528 11525->11514 11526->11525 11540 7ff66e088d03-7ff66e088d35 call 7ff66e08ea4f 11527->11540 11528->11444 11529 7ff66e088c94-7ff66e088cd8 call 7ff66e00dd16 call 7ff66e089120 call 7ff66e00dd16 call 7ff66e089120 11528->11529 11529->11540 11545 7ff66e088d47-7ff66e088dbe memcpy call 7ff66e00b6b8 11540->11545 11546 7ff66e088d37-7ff66e088d3f 11540->11546 11551 7ff66e088ebe-7ff66e088ed2 call 7ff66e00e142 11545->11551 11552 7ff66e088dc4-7ff66e088dd1 11545->11552 11546->11545 11551->11460 11554 7ff66e088dd3-7ff66e088dd6 call 7ff66e00da78 11552->11554 11555 7ff66e088ddb-7ff66e088de0 11552->11555 11554->11555 11555->11458
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: q$q
                                • API String ID: 3510742995-2090367865
                                • Opcode ID: 9e9a31d66abafd135a5721e7c9eca3adbbc9fa6ee38985cf4b982066724fa9c2
                                • Instruction ID: 4a632c52111e6a732d1d7261266cad9b18f837abd7f6a156b155936a270af708
                                • Opcode Fuzzy Hash: 9e9a31d66abafd135a5721e7c9eca3adbbc9fa6ee38985cf4b982066724fa9c2
                                • Instruction Fuzzy Hash: F3327B72608BC5D1EA60DB11E4443EAB375FB94B84F848236EA8D8BB99DF3CD155CB04
                                Strings
                                • modnarod, xrefs: 00007FF66DFA1D3F
                                • setybdet, xrefs: 00007FF66DFA1D59
                                • pteD/wX+Gd+e9jRL8fz36BljbaFo98qbLASNGx7I1qlzPPlZeww2OqqF94URMSyD2BmjO932Sj6eaMfUy9JUgFqH75hsDU9vrxKvXtM+lUK+rqf9VwDKsSSrKWW2iMMjCvCBKSYnn7gxLpE2G0zNhdMbITs4o/Tpe/nTysaDR05e89k9L0kwSltLZ4xQIJXoVvP0mWn22tkLB/6KQI3Ja+ICkDfZiVdQWVsn+rSLX7TJ931pm57G08wuDfqtCNEApSJx, xrefs: 00007FF66DFA23A8
                                • arenegyl, xrefs: 00007FF66DFA1D4C
                                • unable to convert from a shared memory, xrefs: 00007FF66DFA235D
                                • uespemos, xrefs: 00007FF66DFA1D32
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: arenegyl$modnarod$pteD/wX+Gd+e9jRL8fz36BljbaFo98qbLASNGx7I1qlzPPlZeww2OqqF94URMSyD2BmjO932Sj6eaMfUy9JUgFqH75hsDU9vrxKvXtM+lUK+rqf9VwDKsSSrKWW2iMMjCvCBKSYnn7gxLpE2G0zNhdMbITs4o/Tpe/nTysaDR05e89k9L0kwSltLZ4xQIJXoVvP0mWn22tkLB/6KQI3Ja+ICkDfZiVdQWVsn+rSLX7TJ931pm57G08wuDfqtCNEApSJx$setybdet$uespemos$unable to convert from a shared memory
                                • API String ID: 0-700421367
                                • Opcode ID: 57bb879ba97aaa42aeb7a2c3249d08a18e84a97c5698cef6edf2927878570d0c
                                • Instruction ID: 9ae16a707a561e6c6b95529d0df6d0336c274b6c4648a4e40894c53804641090
                                • Opcode Fuzzy Hash: 57bb879ba97aaa42aeb7a2c3249d08a18e84a97c5698cef6edf2927878570d0c
                                • Instruction Fuzzy Hash: 83C1B472B19B86C2EA60DB16E4002EAB3B5FB95B84F445136EE8D9B755EF3CE541C300

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: arenegyl$modnarod$setybdet$uespemos
                                • API String ID: 3510742995-66988881
                                • Opcode ID: c1e5eb01764c3431324badec47370c1ce8461ccae6f591e3c713980d0d351a4b
                                • Instruction ID: d243916b110f4b1884a099012d690fa74fa201f19956fdf726fbf52a31fb5965
                                • Opcode Fuzzy Hash: c1e5eb01764c3431324badec47370c1ce8461ccae6f591e3c713980d0d351a4b
                                • Instruction Fuzzy Hash: 8961C372B09BC481EAA1CB25B9153EAB365FB987D8F409121DECC47B59DF38D195C700
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: Q'"$a)$r-
                                • API String ID: 0-605250197
                                • Opcode ID: 2efe0658367b3e209ce1d09915ef8c300225c6188c86cb7cbb306fbd8ce39e5d
                                • Instruction ID: e58bb80b104c5f79c390904fbb853914f10374d32748e95df898d97eedcdd957
                                • Opcode Fuzzy Hash: 2efe0658367b3e209ce1d09915ef8c300225c6188c86cb7cbb306fbd8ce39e5d
                                • Instruction Fuzzy Hash: 06322832A0CBC1C1E2318B15E4453EAB3B4FBA9788F466225DFDC57A59EF38D5918B00

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 13669 7ff66e205718-7ff66e205727 13670 7ff66e205745-7ff66e20574a 13669->13670 13671 7ff66e205729-7ff66e20573c GetSystemInfo 13669->13671 13672 7ff66e20573e 13671->13672 13673 7ff66e20574b-7ff66e2057c0 call 7ff66dfb0b10 call 7ff66dfb0d50 13671->13673 13672->13670
                                APIs
                                Strings
                                • assertion failed: size != 0/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-runtime-17.0.3/src/lib.rs, xrefs: 00007FF66E20574B
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: InfoSystem
                                • String ID: assertion failed: size != 0/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-runtime-17.0.3/src/lib.rs
                                • API String ID: 31276548-2560985841
                                • Opcode ID: 465aeef1801c49e9d73fd4a592853909ecd2db4c2698b26686bbe42ce45a4176
                                • Instruction ID: 80a75d04f5105b137244209d9685e9eb1753f24a9581b0c249a55b8f87baef91
                                • Opcode Fuzzy Hash: 465aeef1801c49e9d73fd4a592853909ecd2db4c2698b26686bbe42ce45a4176
                                • Instruction Fuzzy Hash: 71116532A09B4AD2EB40DF25F5412A833B4FB65B44F604136EA4C9B350DF7CE55AC744
                                APIs
                                Strings
                                • modules/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-cache-17.0.3/src/lib.rsmod, xrefs: 00007FF66DFA5840
                                • Cache system should be enabled and all settings must be validated or defaulted/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-cache-17.0.3/src/config.rs, xrefs: 00007FF66DFAAC4A
                                • g], xrefs: 00007FF66DFAADA4
                                • assertion failed: !ptr.is_null()/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-runtime-17.0.3/src/instance.rs, xrefs: 00007FF66DFAACDA
                                • B^, xrefs: 00007FF66DFAACC9
                                • assertion failed: edge.height == self.node.height - 1, xrefs: 00007FF66DFAAD29
                                • assertion failed: idx < CAPACITY/rustc/129f3b9964af4d4a709d1383930ade12dfe7c081\library\alloc\src\collections\btree\node.rs, xrefs: 00007FF66DFAAE47
                                • assertion failed: self.element_type() == TableElementType::Func, xrefs: 00007FF66DFAACB6
                                • wasmtimewasm-function[, xrefs: 00007FF66DFA57A7
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: Cache system should be enabled and all settings must be validated or defaulted/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-cache-17.0.3/src/config.rs$assertion failed: !ptr.is_null()/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-runtime-17.0.3/src/instance.rs$assertion failed: edge.height == self.node.height - 1$assertion failed: idx < CAPACITY/rustc/129f3b9964af4d4a709d1383930ade12dfe7c081\library\alloc\src\collections\btree\node.rs$assertion failed: self.element_type() == TableElementType::Func$modules/user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/wasmtime-cache-17.0.3/src/lib.rsmod$wasmtimewasm-function[$B^$g]
                                • API String ID: 3510742995-3245745188
                                • Opcode ID: 745f5f4e7382043f6cb8bcd374fab8cb3726d7e97be40ea9694eb5e7c0e43dd3
                                • Instruction ID: cfcd711c8c656cccbf63c20444e9005f48ecb9cc8d053f3728c4e75a03a92631
                                • Opcode Fuzzy Hash: 745f5f4e7382043f6cb8bcd374fab8cb3726d7e97be40ea9694eb5e7c0e43dd3
                                • Instruction Fuzzy Hash: BEF15C32A18BC6C1EA60DB11E4503FAB371FB94784F848032EA8D9BA95DF7DE549C744

                                Control-flow Graph

                                Strings
                                • enable_verifierenable_pccregalloc_checkerregalloc_verbose_logsis_picbb_padding_log2_minus_onemachine_code_cfg_infotls_modelopt_levelenable_alias_analysisprobestack_func_adjusts_spprobestack_size_log2regallocenable_incremental_compilation_cache_checksenable_ato, xrefs: 00007FF66DFA2C4F
                                • false, xrefs: 00007FF66DFA2C6C
                                • Q'", xrefs: 00007FF66DFAA8B4
                                • WASMTIME_BACKTRACE_DETAILSspeedfeature 'reference_types' requires 'bulk_memory' to be enabled, xrefs: 00007FF66DFA2D12
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: WASMTIME_BACKTRACE_DETAILSspeedfeature 'reference_types' requires 'bulk_memory' to be enabled$enable_verifierenable_pccregalloc_checkerregalloc_verbose_logsis_picbb_padding_log2_minus_onemachine_code_cfg_infotls_modelopt_levelenable_alias_analysisprobestack_func_adjusts_spprobestack_size_log2regallocenable_incremental_compilation_cache_checksenable_ato$false$Q'"
                                • API String ID: 0-214950099
                                • Opcode ID: 7f5edfe1f35f97f3caf54b55cc8d5f822bed24e5e71e75720c789134252d52ea
                                • Instruction ID: 562b3671430948adcf327dce6e14b77ca305a161e51cede1bad82a9ede58f21a
                                • Opcode Fuzzy Hash: 7f5edfe1f35f97f3caf54b55cc8d5f822bed24e5e71e75720c789134252d52ea
                                • Instruction Fuzzy Hash: 74124832A08BC5C2E6648B25E4503EAB7B4F799B84F048225DBDD5BB99DF7CE185C700

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 10604 7ff66e0de420-7ff66e0de43b call 7ff66e0df430 10607 7ff66e0de44e-7ff66e0de452 10604->10607 10608 7ff66e0de43d-7ff66e0de441 10604->10608 10609 7ff66e0de454-7ff66e0de458 call 7ff66e0df620 10607->10609 10610 7ff66e0de45d-7ff66e0de480 call 7ff66dfb5720 10607->10610 10611 7ff66e0de443-7ff66e0de44d 10608->10611 10612 7ff66e0de485-7ff66e0de4c1 call 7ff66dfb5720 10608->10612 10609->10610 10610->10612 10617 7ff66e0de4c3 10612->10617 10618 7ff66e0de4d2-7ff66e0de4d5 call 7ff66e0df620 10612->10618 10619 7ff66e0de4da-7ff66e0de524 call 7ff66e280730 10617->10619 10618->10619 10623 7ff66e0de54c-7ff66e0de552 10619->10623 10624 7ff66e0de554-7ff66e0de558 10623->10624 10625 7ff66e0de539-7ff66e0de546 10623->10625 10626 7ff66e0de530-7ff66e0de533 10624->10626 10627 7ff66e0de55a-7ff66e0de55e 10624->10627 10625->10623 10628 7ff66e0de6c8-7ff66e0de6e0 10625->10628 10626->10625 10631 7ff66e0de737-7ff66e0de761 call 7ff66dfaf0b0 10626->10631 10629 7ff66e0de6f3-7ff66e0de704 10627->10629 10630 7ff66e0de564-7ff66e0de56d 10627->10630 10635 7ff66e0de6e7-7ff66e0de6ee call 7ff66e0df380 10628->10635 10632 7ff66e0de58f-7ff66e0de597 call 7ff66e0df430 10630->10632 10633 7ff66e0de56f 10630->10633 10636 7ff66e0de766-7ff66e0de79a call 7ff66dfb0b10 call 7ff66e0df380 call 7ff66e280730 call 7ff66dfb5d70 call 7ff66e0df680 10631->10636 10641 7ff66e0de705-7ff66e0de718 call 7ff66dfb5980 10632->10641 10642 7ff66e0de59d-7ff66e0de5a3 10632->10642 10633->10636 10635->10629 10650 7ff66e0de79f-7ff66e0de7a7 call 7ff66dfb5d70 10636->10650 10648 7ff66e0de71d-7ff66e0de735 call 7ff66dfb5980 10641->10648 10645 7ff66e0de5f3-7ff66e0de605 call 7ff66e0df590 10642->10645 10646 7ff66e0de5a5-7ff66e0de5a9 10642->10646 10651 7ff66e0de5af-7ff66e0de5b2 10645->10651 10659 7ff66e0de607 10645->10659 10646->10650 10646->10651 10648->10650 10651->10641 10656 7ff66e0de5b8-7ff66e0de5d0 10651->10656 10661 7ff66e0de68f-7ff66e0de695 10656->10661 10662 7ff66e0de5d6-7ff66e0de5e0 10656->10662 10659->10650 10664 7ff66e0de610-7ff66e0de61b call 7ff66e0df430 10661->10664 10665 7ff66e0de69b-7ff66e0de6a2 10661->10665 10666 7ff66e0de5e2-7ff66e0de5e6 10662->10666 10667 7ff66e0de580-7ff66e0de589 10662->10667 10664->10648 10680 7ff66e0de621-7ff66e0de627 10664->10680 10669 7ff66e0de6c0-7ff66e0de6c3 10665->10669 10671 7ff66e0de6a4-7ff66e0de6a8 10665->10671 10666->10667 10672 7ff66e0de5e8-7ff66e0de5f1 call 7ff66e0df620 10666->10672 10667->10632 10667->10669 10669->10623 10671->10669 10676 7ff66e0de6aa-7ff66e0de6b3 call 7ff66e0df620 10671->10676 10672->10667 10676->10669 10682 7ff66e0de634-7ff66e0de639 10680->10682 10683 7ff66e0de629-7ff66e0de631 call 7ff66e0df590 10680->10683 10682->10650 10686 7ff66e0de63f-7ff66e0de642 10682->10686 10683->10682 10686->10648 10688 7ff66e0de648-7ff66e0de64d 10686->10688 10689 7ff66e0de64f-7ff66e0de653 10688->10689 10690 7ff66e0de680-7ff66e0de685 10688->10690 10691 7ff66e0de660-7ff66e0de67e WaitOnAddress 10689->10691 10690->10661 10692 7ff66e0de687-7ff66e0de68a call 7ff66e0df620 10690->10692 10691->10690 10691->10691 10692->10661
                                Strings
                                • cannot access a Thread Local Storage value during or after destruction/rustc/129f3b9964af4d4a709d1383930ade12dfe7c081\library\std\src\thread\local.rs, xrefs: 00007FF66E0DE469
                                • use of std::thread::current() is not possible after the thread's local data has been destroyed, xrefs: 00007FF66E0DE705, 00007FF66E0DE71D
                                • assertion failed: state_and_queue.addr() & STATE_MASK == RUNNINGlibrary\std\src\sys\sync\once\queue.rs, xrefs: 00007FF66E0DE766
                                • called `Result::unwrap()` on an `Err` value, xrefs: 00007FF66E0DE495
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: Value
                                • String ID: assertion failed: state_and_queue.addr() & STATE_MASK == RUNNINGlibrary\std\src\sys\sync\once\queue.rs$called `Result::unwrap()` on an `Err` value$cannot access a Thread Local Storage value during or after destruction/rustc/129f3b9964af4d4a709d1383930ade12dfe7c081\library\std\src\thread\local.rs$use of std::thread::current() is not possible after the thread's local data has been destroyed
                                • API String ID: 3702945584-2484187703
                                • Opcode ID: b1966bcdf5d059be08767728971f86487fc78eddc5a70415fe123b83355a033d
                                • Instruction ID: 418bea9dc28f0be3bb72e272b52985a2aa48198d4c790456cffa9b4611a2f3b5
                                • Opcode Fuzzy Hash: b1966bcdf5d059be08767728971f86487fc78eddc5a70415fe123b83355a033d
                                • Instruction Fuzzy Hash: 9091B02AE09A47C4FB519B61D8403BE6774EF64798F584432EE0D8B7D5DE3CA462C348

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 12512 7ff66e05557e-7ff66e055590 call 7ff66e0507ba 12515 7ff66e05563c-7ff66e055693 call 7ff66dfb0b10 12512->12515 12516 7ff66e055596-7ff66e0555ce 12512->12516 12527 7ff66e055699-7ff66e0556ca call 7ff66e1ba995 12515->12527 12528 7ff66e055815-7ff66e05582c 12515->12528 12519 7ff66e0555e8-7ff66e0555fa call 7ff66e06c75b 12516->12519 12520 7ff66e0555d0-7ff66e0555e6 call 7ff66e1b1a13 12516->12520 12526 7ff66e0555ff-7ff66e055610 call 7ff66e06c7e1 12519->12526 12529 7ff66e055615-7ff66e055623 12520->12529 12526->12529 12534 7ff66e055845-7ff66e055858 call 7ff66dfb0b10 12527->12534 12535 7ff66e0556d0-7ff66e0556de 12527->12535 12539 7ff66e05585d-7ff66e0558f4 call 7ff66dfb5720 call 7ff66e08c38c 12534->12539 12537 7ff66e055736-7ff66e055739 12535->12537 12538 7ff66e0556e0-7ff66e0556e4 12535->12538 12540 7ff66e05573b-7ff66e05573e 12537->12540 12542 7ff66e055743-7ff66e055761 call 7ff66e00e0d0 12537->12542 12538->12540 12541 7ff66e0556e6-7ff66e055714 memcpy call 7ff66e00e0d0 12538->12541 12565 7ff66e0558f7-7ff66e055902 12539->12565 12546 7ff66e055806-7ff66e055811 call 7ff66e0cfa6d 12540->12546 12541->12539 12552 7ff66e05571a-7ff66e055731 call 7ff66dfab0a0 12541->12552 12542->12546 12553 7ff66e055767-7ff66e055770 12542->12553 12546->12528 12552->12546 12555 7ff66e05579a-7ff66e0557b2 call 7ff66dfd38c8 12553->12555 12556 7ff66e055772-7ff66e055793 call 7ff66e00e0d0 12553->12556 12555->12546 12568 7ff66e0557b4-7ff66e0557c9 memcpy 12555->12568 12566 7ff66e0557cb-7ff66e0557e9 call 7ff66dfab0c0 12556->12566 12567 7ff66e055795-7ff66e055798 12556->12567 12572 7ff66e05591a-7ff66e05591e 12565->12572 12573 7ff66e055904-7ff66e05590a 12565->12573 12566->12546 12571 7ff66e0557eb-7ff66e0557fc 12566->12571 12567->12546 12568->12571 12571->12546 12572->12565 12573->12572 12574 7ff66e05590c-7ff66e055915 call 7ff66e08ccc5 12573->12574 12574->12572
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: assertion failed: !self.inst_sunk.contains(&inst)$called `Result::unwrap()` on an `Err` value
                                • API String ID: 0-3366224540
                                • Opcode ID: 6384a2d18beafd6e0f511aa13d352ae6e2ac96441adbe4d61c2e75b745ff56f3
                                • Instruction ID: c4f5436fe033b7dd1e7238e42eaa117f38afd1e7c031db2bd40994a3317fa332
                                • Opcode Fuzzy Hash: 6384a2d18beafd6e0f511aa13d352ae6e2ac96441adbe4d61c2e75b745ff56f3
                                • Instruction Fuzzy Hash: 3F91C376B08A46C2EA109F12E5403BA67B1FB94BC4F848432EE4E9B795DF3CE195C704

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 12577 7ff66e106720-7ff66e106733 12578 7ff66e1067f0-7ff66e1067fe call 7ff66e0df6e0 12577->12578 12579 7ff66e106739 12577->12579 12581 7ff66e10673b-7ff66e106744 TlsGetValue 12578->12581 12579->12581 12583 7ff66e106751-7ff66e106759 12581->12583 12584 7ff66e106746-7ff66e10674b 12581->12584 12586 7ff66e106803-7ff66e106811 call 7ff66e0df6e0 12583->12586 12587 7ff66e10675f 12583->12587 12584->12583 12585 7ff66e1067e1-7ff66e1067e5 12584->12585 12588 7ff66e1067e9-7ff66e1067ef 12585->12588 12590 7ff66e106761-7ff66e10676a TlsGetValue 12586->12590 12587->12590 12591 7ff66e10676c-7ff66e106772 12590->12591 12592 7ff66e1067e7 12590->12592 12594 7ff66e106774-7ff66e10678a call 7ff66e103c40 12591->12594 12595 7ff66e1067b9-7ff66e1067dd ProcessPrng 12591->12595 12592->12588 12598 7ff66e106790-7ff66e1067aa 12594->12598 12599 7ff66e10682c-7ff66e10683c call 7ff66dfab7d0 12594->12599 12595->12585 12601 7ff66e1067ac 12598->12601 12602 7ff66e106816-7ff66e10682a call 7ff66e0df6e0 12598->12602 12604 7ff66e1067ae-7ff66e1067b4 TlsSetValue 12601->12604 12602->12604 12604->12595
                                APIs
                                • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66E106718), ref: 00007FF66E10673B
                                • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66E106718), ref: 00007FF66E106761
                                • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66E106718), ref: 00007FF66E1067B4
                                • ProcessPrng.BCRYPTPRIMITIVES(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66E106718), ref: 00007FF66E1067C9
                                  • Part of subcall function 00007FF66E0DF6E0: TlsAlloc.KERNEL32(?,?,?,?,?,?,-00000008,00000000,00000001,?,00007FF66E1067FC), ref: 00007FF66E0DF72A
                                  • Part of subcall function 00007FF66E0DF6E0: InitOnceComplete.KERNEL32(?,?,?,?,?,?,-00000008,00000000,00000001,?,00007FF66E1067FC), ref: 00007FF66E0DF76E
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: Value$AllocCompleteInitOncePrngProcess
                                • String ID:
                                • API String ID: 26077812-0
                                • Opcode ID: 4edb42c680f0164e9d1c72f79fe9fe7ea70df06d6c68e7da6fdde4f190e5d4a6
                                • Instruction ID: f958129dbc2917a005f52dfe77c6b6c4ca053738462fad6f5abe344e83e579cf
                                • Opcode Fuzzy Hash: 4edb42c680f0164e9d1c72f79fe9fe7ea70df06d6c68e7da6fdde4f190e5d4a6
                                • Instruction Fuzzy Hash: B931D424E29247D2FA55972094113B962B5AF74304F988539F90ECEBD1EE3CF4D1D248

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 12607 7ff66e106700-7ff66e106719 call 7ff66e1066e0
                                APIs
                                • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66E106718), ref: 00007FF66E10673B
                                • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66E106718), ref: 00007FF66E106761
                                • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66E106718), ref: 00007FF66E1067B4
                                • ProcessPrng.BCRYPTPRIMITIVES(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66E106718), ref: 00007FF66E1067C9
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: Value$PrngProcess
                                • String ID:
                                • API String ID: 3259538350-0
                                • Opcode ID: 588b169b4117b5d4b8879caaf6fe924ecd94b8e42a86c495c1b41ebd2ac45bee
                                • Instruction ID: 1fee8ad55823d69d872cd9b824a13e2bf88185145f17cf0c371665f0af95a6de
                                • Opcode Fuzzy Hash: 588b169b4117b5d4b8879caaf6fe924ecd94b8e42a86c495c1b41ebd2ac45bee
                                • Instruction Fuzzy Hash: 8D212925E29746C5FB19972098017B9A3B1AF78304F484439FE4D8ABD1EE3CF4D1D244

                                Control-flow Graph

                                APIs
                                • SetThreadDescription.KERNELBASE ref: 00007FF66DFAAF2A
                                  • Part of subcall function 00007FF66E102DB0: WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(00000001,00000215D79F13A0,?,?,?,00007FF66DFAAFA6), ref: 00007FF66E102ED0
                                  • Part of subcall function 00007FF66E102750: WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(?,?,?,?,-00000008,-00000006,00000001,?,00007FF66DFAAFC9), ref: 00007FF66E10281A
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: AddressSingleWake$DescriptionThread
                                • String ID: main
                                • API String ID: 1846246661-3207122276
                                • Opcode ID: 509eb113969ebaa81318ea2f85c0d662066716ac3b41824aecd06d142fea7b77
                                • Instruction ID: 71b4320355e85a48e99f2fed1dd4d702a4fcd01e22b8bae017fbb5450a3d4c0d
                                • Opcode Fuzzy Hash: 509eb113969ebaa81318ea2f85c0d662066716ac3b41824aecd06d142fea7b77
                                • Instruction Fuzzy Hash: 8C410836E05B42D9FB10DBA0E4913ED37B4AF54308F944436EA4C9B795EF789159C384

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 14600 215d76f7b9c-215d76f7c06 14601 215d76f7c0b-215d76f7c14 14600->14601 14602 215d76f7c1a-215d76f7c9f call 215d76f70cc LoadLibraryA 14601->14602 14603 215d76f7e39-215d76f7e4d 14601->14603 14606 215d76f7ca4-215d76f7cad 14602->14606 14607 215d76f7cb3-215d76f7cb9 14606->14607 14608 215d76f7e26-215d76f7e34 14606->14608 14609 215d76f7d92-215d76f7dfa call 215d76f70cc 14607->14609 14610 215d76f7cbf-215d76f7cd7 14607->14610 14608->14601 14613 215d76f7dfd-215d76f7e11 14609->14613 14610->14609 14611 215d76f7cdd-215d76f7d90 14610->14611 14611->14613 14615 215d76f7e13-215d76f7e1c 14613->14615 14616 215d76f7e21 14613->14616 14615->14616 14616->14606
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000215D76E0000, based on PE: true
                                • Associated: 00000000.00000002.3254228521.00000215D771E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_215d76e0000_Z9fvmHepQC.jbxd
                                Yara matches
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: d4af7de97e5f5be688b556db8afd153c006a3b745c34cce90d3c1c24bb727529
                                • Instruction ID: 213ea89caad573a00947198bf4be10e0138c7b54677db9a0dfb455896bf6eb06
                                • Opcode Fuzzy Hash: d4af7de97e5f5be688b556db8afd153c006a3b745c34cce90d3c1c24bb727529
                                • Instruction Fuzzy Hash: 44719836219F8486DAA0CB09F49036AB7A0F7C8B98F504525EBCE83B69DF3DD555CB00
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memset
                                • String ID:
                                • API String ID: 2221118986-0
                                • Opcode ID: 6683a3c2c8b6b7f467e2841cfb5fd917e78bb33ecc39277beb1150b20f46cb97
                                • Instruction ID: 4c3180ff732ecea61b60dc6a07b7857d5d59a77409e905e9bd28747f48e53539
                                • Opcode Fuzzy Hash: 6683a3c2c8b6b7f467e2841cfb5fd917e78bb33ecc39277beb1150b20f46cb97
                                • Instruction Fuzzy Hash: B9213662B0970692EE148B12A8203765561AB717F0F144735FE7D8B7C0FE7CB5A9C308
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3254228521.00000215D76E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00000215D76E0000, based on PE: true
                                • Associated: 00000000.00000002.3254228521.00000215D771E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_215d76e0000_Z9fvmHepQC.jbxd
                                Yara matches
                                Similarity
                                • API ID: AllocVirtual
                                • String ID:
                                • API String ID: 4275171209-0
                                • Opcode ID: 614a4b05fd2fcf958961d58200ae62ff8fa006310eb0dba3dbba10185b0029ad
                                • Instruction ID: 18b2f622a76412e969cf92e3952cc0f444199a0d31114b5d508fccb2dc3b7099
                                • Opcode Fuzzy Hash: 614a4b05fd2fcf958961d58200ae62ff8fa006310eb0dba3dbba10185b0029ad
                                • Instruction Fuzzy Hash: 8D418872618B84C7DB50CB1AF44471AB7A1F7D8B94F504225FA9E87B68DB3CD851CB00
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID:
                                • API String ID: 3510742995-0
                                • Opcode ID: 5d7ef3c081dc9df231fd70588046b5c6274a2eaa279377e622065271de711ee9
                                • Instruction ID: b9202fe6f8943a8ff2c56137865ae61abc6e4eb562b34dec38cdcd0c1331893b
                                • Opcode Fuzzy Hash: 5d7ef3c081dc9df231fd70588046b5c6274a2eaa279377e622065271de711ee9
                                • Instruction Fuzzy Hash: 8D217176704A81C2E925DB26E9553EEA731EB58BD0F408031FF5E8BB95DE3CE4829304
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID:
                                • API String ID: 3510742995-0
                                • Opcode ID: 9264a6f4ae5f56173e9a9a8ecf5a3900a50d9ea0765c8f6750152c6475cef05c
                                • Instruction ID: b25be86eceaaed24bc2408055e60405e9e727bab7beae877b0e501750ee479c4
                                • Opcode Fuzzy Hash: 9264a6f4ae5f56173e9a9a8ecf5a3900a50d9ea0765c8f6750152c6475cef05c
                                • Instruction Fuzzy Hash: 5DF082A3B04A41D3DA158F57E94045AA730FB18FD07088831EF5C87B41DE38D5F29248
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID:
                                • API String ID: 3510742995-0
                                • Opcode ID: 8e2849de6149072a46ea44b45f06e36b053381f36ed4c1ccf5ce320a2333aa00
                                • Instruction ID: 8b8d3b9a7c013c84f7edc8ef64374a7383c7ccdaf050fa5cb2da3e46f4c49ba6
                                • Opcode Fuzzy Hash: 8e2849de6149072a46ea44b45f06e36b053381f36ed4c1ccf5ce320a2333aa00
                                • Instruction Fuzzy Hash: 32F0A02260464581FA602A15F6103FF5162A794780F088134DE9C4F7C2DE3CD09A4700
                                Strings
                                • .debug_tu_index.debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo.debug_loclists.dwo.debug_rnglists.dwo.debug_str.dwo.debug_str_offsets.dwo.debug_types.dwo, xrefs: 00007FF66E0EA437
                                • assertion failed: end >= start && end <= len, xrefs: 00007FF66E0EA8EA, 00007FF66E0EA932
                                • .debug_cu_index.debug_frame.eh_frame_hdr.debug_macinfo.debug_macro, xrefs: 00007FF66E0EA3A0
                                • .debug_abbrev.debug_addr.debug_info.debug_line.debug_line_str.debug_str.debug_str_offsets.debug_str_sup.debug_types.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_aranges.debug_pubnames.debug_pubtypes, xrefs: 00007FF66E0E70CD
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: .debug_abbrev.debug_addr.debug_info.debug_line.debug_line_str.debug_str.debug_str_offsets.debug_str_sup.debug_types.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_aranges.debug_pubnames.debug_pubtypes$.debug_cu_index.debug_frame.eh_frame_hdr.debug_macinfo.debug_macro$.debug_tu_index.debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo.debug_loclists.dwo.debug_rnglists.dwo.debug_str.dwo.debug_str_offsets.dwo.debug_types.dwo$assertion failed: end >= start && end <= len
                                • API String ID: 0-4179323916
                                • Opcode ID: f885839a468a762f4b4e83704a7cdad7ce2697d05d3a0686e04c228603eeac9a
                                • Instruction ID: 7a4b289ba370e66458b870d0b89451429a3500d9c521213259c51ba036434940
                                • Opcode Fuzzy Hash: f885839a468a762f4b4e83704a7cdad7ce2697d05d3a0686e04c228603eeac9a
                                • Instruction Fuzzy Hash: BD537E22A09FC5C9EBB08F25D8443E923B5FB54788F445136DA4D9FB99DF38A2A1C344
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: 8$assertion failed: end >= start && end <= len
                                • API String ID: 0-1013222689
                                • Opcode ID: d0e9ce743c92fbb737e643746edfc0164baf5784c0a37503959ef034958d8c21
                                • Instruction ID: d69b76927f18232d1c03fe7ee871e962d18c35e6d34db2617dfd820237b46514
                                • Opcode Fuzzy Hash: d0e9ce743c92fbb737e643746edfc0164baf5784c0a37503959ef034958d8c21
                                • Instruction Fuzzy Hash: 69238A72A08BC5C5EB608F25D8443E927B0FB64B88F444136EA5D9FB98DF39D6A5C304
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: Iterator supplied too few elements$assertion failed: edge.block != entry_block$assertion failed: mb_old_absval.is_none()$called `Result::unwrap()` on an `Err` value$capacity overflow$remove_constant_phis: entry block unknown
                                • API String ID: 3510742995-2067728096
                                • Opcode ID: 1f3282391a34e57d3ea08661ce9898bba433284cab20aac5be7e6e5727a027a6
                                • Instruction ID: 2c4b887dfea8a1ff2154edbd0136895b84246f64ee12ffb6f0279f106a617044
                                • Opcode Fuzzy Hash: 1f3282391a34e57d3ea08661ce9898bba433284cab20aac5be7e6e5727a027a6
                                • Instruction Fuzzy Hash: 94A29F72608AC6C1EA70DB16E4403EAB3B0FB94784F544136EA9D8BB99DF3CD595CB04
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: $ $Argument stack offset greater than 2GB; should hit impl limit first$called `Result::unwrap()` on an `Err` value$capacity overflow$q
                                • API String ID: 3510742995-461167430
                                • Opcode ID: e3d1849368c565f5a2010b60b42a62a5001999d873ecce7e34f8f3c609503f84
                                • Instruction ID: db4bea3023967829c2717bc11a8f05b1d9e789eed9cdaaeee034b57beb9533bc
                                • Opcode Fuzzy Hash: e3d1849368c565f5a2010b60b42a62a5001999d873ecce7e34f8f3c609503f84
                                • Instruction Fuzzy Hash: ECC27A72A08AC6C5DA60DB15E4403EE73B5EBD8B84F408136DA8D8BB9AEF3CD545C744
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: @$assertion failed: end >= start && end <= len
                                • API String ID: 3510742995-884486453
                                • Opcode ID: 64eda54c603b5dcfa28ba000039e6a23a48ed32c7a715b452495b47dc997f9f0
                                • Instruction ID: 1cbe2cace133bfac4b3f3a9e56b6c8aaffafc179981de2598344383d39662444
                                • Opcode Fuzzy Hash: 64eda54c603b5dcfa28ba000039e6a23a48ed32c7a715b452495b47dc997f9f0
                                • Instruction Fuzzy Hash: 1CC28032A08AC6C5EB608F21D8543F92375FB64788F544136EE5D9FB89EF389665C308
                                APIs
                                Strings
                                • RUST_LIB_BACKTRACERUST_BACKTRACEunsupported backtracedisabled backtrace, xrefs: 00007FF66E0FEB42
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: ErrorLast$CaptureContextEntryEnvironmentFunctionLookupUnwindVariableVirtualmemset
                                • String ID: RUST_LIB_BACKTRACERUST_BACKTRACEunsupported backtracedisabled backtrace
                                • API String ID: 3171385808-4053888247
                                • Opcode ID: 5cf352f9fbc5c34b7d2163354ef467015593991a35a7da61981eb83491243aa7
                                • Instruction ID: 17797ff5a520db4f395566476c1438c03aa7ac11cbb9c35177fc6e71a7bac652
                                • Opcode Fuzzy Hash: 5cf352f9fbc5c34b7d2163354ef467015593991a35a7da61981eb83491243aa7
                                • Instruction Fuzzy Hash: F3F1A462A096D2C5F7718B60D8007FE2370ABA0758F444136EE4D9B799DF7CA566C30C
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: assertion failed: d.mant + d.plus < (1 << 61)$assertion failed: d.mant > 0$assertion failed: d.mant.checked_add(d.plus).is_some()$assertion failed: d.mant.checked_sub(d.minus).is_some()$assertion failed: d.minus > 0$assertion failed: d.plus > 0$assertion failed: digits < 40assertion failed: other > 0$assertion failed: edelta >= 0library\core\src\num\diy_float.rs$d
                                • API String ID: 0-4078518668
                                • Opcode ID: 38772c9860d07e9ba59c0b18dd1c0c08319fe9f9ac6a3df7480cfaca08ebffdd
                                • Instruction ID: ab432a62abf411e40be391ac1bc2f9de7988dfaaabb4359aa2a7daf582ad465d
                                • Opcode Fuzzy Hash: 38772c9860d07e9ba59c0b18dd1c0c08319fe9f9ac6a3df7480cfaca08ebffdd
                                • Instruction Fuzzy Hash: BD42EF62B14ACAC7EB14CF61A8407F827B5FB54788F549136EA0D9BBD9EE38D585C300
                                Strings
                                • assertion failed: self.value_lowered_uses[*result] == 0, xrefs: 00007FF66E084E81
                                • assertion failed: has_lowering_side_effect(self.f, ir_inst), xrefs: 00007FF66E0852F1
                                • assertion failed: self.cur_scan_entry_color.is_some(), xrefs: 00007FF66E085309
                                • Instruction with amode should have memflags, xrefs: 00007FF66E085369
                                • assertion failed: sunk_inst_exit_color == self.cur_scan_entry_color.unwrap(), xrefs: 00007FF66E085339
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: Instruction with amode should have memflags$assertion failed: has_lowering_side_effect(self.f, ir_inst)$assertion failed: self.cur_scan_entry_color.is_some()$assertion failed: self.value_lowered_uses[*result] == 0$assertion failed: sunk_inst_exit_color == self.cur_scan_entry_color.unwrap()
                                • API String ID: 0-3697193702
                                • Opcode ID: bc6f86d660f5f289b53ff9071708af56bf944f8745d967658b103bb51b795d35
                                • Instruction ID: 90c741e82aeee193812d6b813e4a6f8a900e5f2e360fa37ffb3b33b62b58400a
                                • Opcode Fuzzy Hash: bc6f86d660f5f289b53ff9071708af56bf944f8745d967658b103bb51b795d35
                                • Instruction Fuzzy Hash: BAE1F362B08682D2EB54CF26D5403BA67B1FBA4B80F408035EE5E8B795DF3DE455CB04
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: arenegyl$modnarod$setybdet$uespemos
                                • API String ID: 0-66988881
                                • Opcode ID: b8a95bbf08b82cf016ca4e85f8596a9d168c95a7896e66de7ad28c796873687a
                                • Instruction ID: 6094f4a4622b93dc28d1fb8f4bff7402eb2f6725ae407d21a3eea9d774895bcb
                                • Opcode Fuzzy Hash: b8a95bbf08b82cf016ca4e85f8596a9d168c95a7896e66de7ad28c796873687a
                                • Instruction Fuzzy Hash: 4312B222A18B81C2DA60CB25E4403AE7770FBA5B94F448632EF9D9BB95DF3DD591C304
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: <$INF$INFINITY$NAN
                                • API String ID: 0-3778457919
                                • Opcode ID: 01b54da2ed3a0773c2d6bdb7f45125091ac0217669fc6bdaf991d66509b29ad7
                                • Instruction ID: 1683536f8c683baceeab2ea089997bbf62f756450f2418ac100d3ba79dc73f81
                                • Opcode Fuzzy Hash: 01b54da2ed3a0773c2d6bdb7f45125091ac0217669fc6bdaf991d66509b29ad7
                                • Instruction Fuzzy Hash: F2D10662E0C687C5FB618A3598543BD67B6BF61394F548531DE0DEF2D6FE3CAA818200
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: assertion failed: index <= len
                                • API String ID: 0-2991906026
                                • Opcode ID: 98878e9f1d6c6de173e95e550d25968dc4a56537940da66004d8df966a7130ff
                                • Instruction ID: 69daeaa9244deda794bfc15ff925f298191cc99e81c91a8359aa1bef5e0a3cc4
                                • Opcode Fuzzy Hash: 98878e9f1d6c6de173e95e550d25968dc4a56537940da66004d8df966a7130ff
                                • Instruction Fuzzy Hash: E0729D76A18A86C1DA20CB95E4406EA7BB0FBD9B88F458032EF8D9B765DF3CD454C704
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: $$punycode{
                                • API String ID: 2221118986-3583469537
                                • Opcode ID: fabd44f3b406659ff481968fd06ae94b77e196f2af04abdebe17e69a90515a6e
                                • Instruction ID: e39dddedcb661ca12c53f83ae8dfb94170c1ffa212013a7bbdaf80fff29e3ff4
                                • Opcode Fuzzy Hash: fabd44f3b406659ff481968fd06ae94b77e196f2af04abdebe17e69a90515a6e
                                • Instruction Fuzzy Hash: B191E126B28A45C1EA64CB11F4443B977A5EBA9BC4F084032FE8D8B799DE3CE455C704
                                Strings
                                • `fmt::Error`s should be impossible without a `fmt::Formatter`, xrefs: 00007FF66E0D541E
                                • .llvm./user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/rustc-demangle-0.1.24/src/lib.rs, xrefs: 00007FF66E0D495E
                                • __ZN, xrefs: 00007FF66E0D4D35
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcmp
                                • String ID: .llvm./user/momo/.cargo/registry/src/index.crates.io-6f17d22bba15001f/rustc-demangle-0.1.24/src/lib.rs$__ZN$`fmt::Error`s should be impossible without a `fmt::Formatter`
                                • API String ID: 1475443563-1214091625
                                • Opcode ID: 552e1ad3c8fdd89dd1b6a6706a2bf74b0b5342aaefd981679413ae7da0b0d30f
                                • Instruction ID: bffa79312a50fa675ba6003098f2c323e4c044b4021894ee2d75508e867aa792
                                • Opcode Fuzzy Hash: 552e1ad3c8fdd89dd1b6a6706a2bf74b0b5342aaefd981679413ae7da0b0d30f
                                • Instruction Fuzzy Hash: BF52362AE185A2D5FB658B5094043BD2B72EB65368F444231FE6E8F6C4DF3CD966C308
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: \u${$}
                                • API String ID: 0-1393841519
                                • Opcode ID: b027a7e5dfa48e0861fe8f916bf3f0ff75c04569ad842a2f40a47e0c3d461f88
                                • Instruction ID: 1589c0f9bb0b4d7401e0e36b48af150b17ab4ddcad741dca42bf4a67f2be25c5
                                • Opcode Fuzzy Hash: b027a7e5dfa48e0861fe8f916bf3f0ff75c04569ad842a2f40a47e0c3d461f88
                                • Instruction Fuzzy Hash: 81E13813A1C6D1C7E3258A29981067EAFB1E7DA740F088135EFDA8BB95EE3CD501DB14
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: INF$INFINITY$NAN
                                • API String ID: 0-1478606128
                                • Opcode ID: 29880fc97b88e28d92cd478af4fb663ad8c39e028079ba639fcf3f3cf4c62c50
                                • Instruction ID: c722cc12d922e044c1fd31eca15afb410721bc00b7c8daa18b970d4a2079b925
                                • Opcode Fuzzy Hash: 29880fc97b88e28d92cd478af4fb663ad8c39e028079ba639fcf3f3cf4c62c50
                                • Instruction Fuzzy Hash: 0AD11562F08683C5FB658A65C8443B95772AFD8794F498632DE0DEF2C5FE3CB9808240
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: Authenti$GenuineI$HygonGen
                                • API String ID: 0-696657513
                                • Opcode ID: 38bd0842e0960c831964c41a1a55cf9730d189a0339f298647c0480d69f3d721
                                • Instruction ID: 9fe8f9dfbe9ea84dbccfbe83768b4b1c14c9e2ad62bd4b3ca66cf3bb1aba13cc
                                • Opcode Fuzzy Hash: 38bd0842e0960c831964c41a1a55cf9730d189a0339f298647c0480d69f3d721
                                • Instruction Fuzzy Hash: 0C916AA3B3595546FB5C85A5AC32BB94892B3687C8F08A03DED5FDBBC4DC7CCA518240
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memset
                                • String ID: punycode{
                                • API String ID: 2221118986-686464348
                                • Opcode ID: 87db05023e9e394c1209a789ab43f632fa923bc66acba664bf755a20b1287cbd
                                • Instruction ID: 0332dd13d37135f41f905cc2417e4c6a9cdc9b7aaa90f844d3cf5aaed1750f83
                                • Opcode Fuzzy Hash: 87db05023e9e394c1209a789ab43f632fa923bc66acba664bf755a20b1287cbd
                                • Instruction Fuzzy Hash: D822276AF0D786C5FB608B25D4443F867A6EB25B94F148131EE5D4BBC4EE3CA5628308
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: .eexportunresolved index in emission: $called `Result::unwrap()` on an `Err` value
                                • API String ID: 0-1231597272
                                • Opcode ID: c1009f6875e98d6361a8aed327a5e8f54da816031e0595c5774b7ce7f3c88e84
                                • Instruction ID: 8d4ae5906bebd8c39745db56f6ca56bd564485710870e1a25418683498949812
                                • Opcode Fuzzy Hash: c1009f6875e98d6361a8aed327a5e8f54da816031e0595c5774b7ce7f3c88e84
                                • Instruction Fuzzy Hash: 91223962A0C642C2EA148B1396602B977B6BF657D8F544632FE8E8F7D5DE3CD542C304
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpymemset
                                • String ID:
                                • API String ID: 1297977491-0
                                • Opcode ID: e91a09746a417af8bdcbdab9e2dd80ae183fa3a75d68153a0c92587c3297d703
                                • Instruction ID: 3d461d92a9a45cb9bf6b1349bc8946716c4e16b11decc5ab1bff9039c06e7253
                                • Opcode Fuzzy Hash: e91a09746a417af8bdcbdab9e2dd80ae183fa3a75d68153a0c92587c3297d703
                                • Instruction Fuzzy Hash: 18A12362728B81C2EA208B19A41427AA361F7A5FE0F544735EFAE8B7C5DF3CD011C314
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: B
                                • API String ID: 0-1255198513
                                • Opcode ID: 2b0eb72c81153b082d99fab378ca7a65e7da55b7abaaf9fbd9c3dd9d2099dab8
                                • Instruction ID: e08dbed61f3cbf7f4ec715e6ca10561eb729ecc8999b6fcb316f09b99cf5c4c7
                                • Opcode Fuzzy Hash: 2b0eb72c81153b082d99fab378ca7a65e7da55b7abaaf9fbd9c3dd9d2099dab8
                                • Instruction Fuzzy Hash: E4C23166B08AD6C2EB20DA26D044BAE6B70FB85BD4F419031EE4D9B786EF7CD545C340
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: called `Result::unwrap()` on an `Err` value
                                • API String ID: 0-2333694755
                                • Opcode ID: a3c37dfcf1e9183ff8e332d14030c8123c4dd24eb0c386aa2ae3a509edbdd51a
                                • Instruction ID: 66976721662eed9e791ad202494d86ff7a78c630575b68f37a0751744d57b582
                                • Opcode Fuzzy Hash: a3c37dfcf1e9183ff8e332d14030c8123c4dd24eb0c386aa2ae3a509edbdd51a
                                • Instruction Fuzzy Hash: F4728F32608B82C5EB608F11E4503EA77B4FBA5784F504136EA8D9BB99DF3DE1A5C704
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID: .eexportunresolved index in emission:
                                • API String ID: 0-3952738300
                                • Opcode ID: a405ef1b4f23eef402c5861237753b5c9e7b6a2aa72974ddd0c93d338f2511d9
                                • Instruction ID: 1916b02ddbfc12d7e0ecd1f4248a216cc4ae5004832c06a31718e387532a943d
                                • Opcode Fuzzy Hash: a405ef1b4f23eef402c5861237753b5c9e7b6a2aa72974ddd0c93d338f2511d9
                                • Instruction Fuzzy Hash: A1B117D2B08652C2EE108A2296403B97775FB60BE8F045231FE6E9B7C1DE3CF1568308
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID:
                                • API String ID: 3510742995-0
                                • Opcode ID: 3db0af232b465546c9d0c2a3b13f95d82b24879ebb7f4fead11ae23106c1dbca
                                • Instruction ID: 7a2ed73e6dc233b269b73c83a6ee6ad61d5a6a6ac6c48b47b65d69d788fde216
                                • Opcode Fuzzy Hash: 3db0af232b465546c9d0c2a3b13f95d82b24879ebb7f4fead11ae23106c1dbca
                                • Instruction Fuzzy Hash: F7613552E19AD2CAFB10866585013FE2B61EB24798F049934EE4E9F7CACE7CD290D354
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 541ff257fcec1c62a30a0f2912fceba7caa316db9d0ce2e3086d560c05e9e909
                                • Instruction ID: f7cf67924421dff9e17ef1910c9470047abe5bc66fcdca7e2083ff4e6250b6f2
                                • Opcode Fuzzy Hash: 541ff257fcec1c62a30a0f2912fceba7caa316db9d0ce2e3086d560c05e9e909
                                • Instruction Fuzzy Hash: D232D332B0869AC5EA20CB15E4047AA7770FB45BD4F548236EE9D8BB94EF3CE145C744
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 911790123ab9d70389e8947397c78e6afbc9c575541e7a7ee7fbf939b58f8b50
                                • Instruction ID: eeeae85075d152baf0a991d88a8692211b0e82e471d6597258f81746823b9eaf
                                • Opcode Fuzzy Hash: 911790123ab9d70389e8947397c78e6afbc9c575541e7a7ee7fbf939b58f8b50
                                • Instruction Fuzzy Hash: 4BC1ACA2E0CED2C4F7668A7494187796EA15B76721F449330E96D9F2E1CF3C9DB18304
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: adff3433ac91e2e2c6fcb71bd2fe2f95089e4e47d7bb8eaf2b6026ed797b53c1
                                • Instruction ID: e3696f0e561db8983098f12fca081a1c4a7c55e1ce5d23ba0a76627e1190b2b2
                                • Opcode Fuzzy Hash: adff3433ac91e2e2c6fcb71bd2fe2f95089e4e47d7bb8eaf2b6026ed797b53c1
                                • Instruction Fuzzy Hash: 2CC1F236B18A85C6EB618B64E000BF96720FB547A4F448631EBAE9BBD1DF3CD545C341
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: df81040f3822bf8f896d39e1f734d0ac8a56abe0e474f45979fa09b41f6a469e
                                • Instruction ID: f5057723cb2a39504f608e57e2d3958cf8dccd7dfcc638851b16764de8e76729
                                • Opcode Fuzzy Hash: df81040f3822bf8f896d39e1f734d0ac8a56abe0e474f45979fa09b41f6a469e
                                • Instruction Fuzzy Hash: 3DB1E322A1D795C5EA60CB15E404BAAB3B0FB95B84F544231EE9D8BB94EF3CD186C704
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: dfd25df926a26cc26fa987fe5f990772751d892c699f429a67ac87972d362c4b
                                • Instruction ID: cb35501751368a272f310fb970e2682e4ed87cb08c204a0463d9c4af48190abe
                                • Opcode Fuzzy Hash: dfd25df926a26cc26fa987fe5f990772751d892c699f429a67ac87972d362c4b
                                • Instruction Fuzzy Hash: 4B512A57F2DAE1DAE311877984006AD3F729BE6748F08C0B5DA845BBDACA3EC105D711
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 71a2081e78611e45f47f1aa7975277132279a70a0c576d2d19a2e3981c294dc2
                                • Instruction ID: 0731862e32191fe8ccb708cfaee40a9aba02e2e353be8938bc1d43c7be052364
                                • Opcode Fuzzy Hash: 71a2081e78611e45f47f1aa7975277132279a70a0c576d2d19a2e3981c294dc2
                                • Instruction Fuzzy Hash: E5312656B2556382FE69813A8D14B754A935B857F0F589330ED3ECFBD8FD3C99424200
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7906608fd44422f96e14d677eed26ab4c0e02accd03b5c7e13c58568574530ff
                                • Instruction ID: 956d1d4b8d28a861d561a6d68c3d5f4309a8e60aafaabc73f1d42b816fe9fa53
                                • Opcode Fuzzy Hash: 7906608fd44422f96e14d677eed26ab4c0e02accd03b5c7e13c58568574530ff
                                • Instruction Fuzzy Hash: A1F0128BD0EEC39AF29341745E251191FE06F73A2470D42BBDAA8BB2D7DD095905831E
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID:
                                • API String ID: 3510742995-0
                                • Opcode ID: 4277ce5df32a28979e2520d44abf2c8191dce2745f8c294398660aa16ba42cb9
                                • Instruction ID: 0140972bd97fcdedc25f287ab40cf9cb555f6a9eae0a78e9c2beb7ea0e9a436f
                                • Opcode Fuzzy Hash: 4277ce5df32a28979e2520d44abf2c8191dce2745f8c294398660aa16ba42cb9
                                • Instruction Fuzzy Hash: 9DF16F2260DAC1D1E7219B25D0443EAA7B5FB96B88F448121DFCC4BB9AEF39D695C700
                                APIs
                                Strings
                                • expected keyword `rec``rec`expected keyword `acq_rel`repexpected keyword `rep`expected keyword `resource``resource`expected keyword `resource.new``resource.new`expected keyword `resource.drop``resource.drop`expected keyword `resource.rep``resource.rep`expected, xrefs: 00007FF66E218E2D
                                • expected `(`, xrefs: 00007FF66E218B79
                                • expected `)`item nesting too deep, xrefs: 00007FF66E218D87
                                • recacq_relresourceresource.newresource.dropresource.repseq_cstsharedstartsubswitchfinal, xrefs: 00007FF66E218913
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: expected `(`$expected `)`item nesting too deep$expected keyword `rec``rec`expected keyword `acq_rel`repexpected keyword `rep`expected keyword `resource``resource`expected keyword `resource.new``resource.new`expected keyword `resource.drop``resource.drop`expected keyword `resource.rep``resource.rep`expected$recacq_relresourceresource.newresource.dropresource.repseq_cstsharedstartsubswitchfinal
                                • API String ID: 3510742995-3382110302
                                • Opcode ID: fe135cbe99bf4eaacbef4a2d6781c19827130da55ea2f588fb493ee87e5b7e5d
                                • Instruction ID: 14ac5b2ba31e7794e85333520bd534737dbad604da96083aadf96232df327d3c
                                • Opcode Fuzzy Hash: fe135cbe99bf4eaacbef4a2d6781c19827130da55ea2f588fb493ee87e5b7e5d
                                • Instruction Fuzzy Hash: F1025922A0CAC1C1E6658B19E5403EAB374FBA9B48F449121EBCC47B59EF39D295CB00
                                APIs
                                Strings
                                • assertion failed: *op == SseOpcode::Blendvpd || *op == SseOpcode::Blendvps || *op == SseOpcode::Pblendvb, xrefs: 00007FF66E059879
                                • assertion failed: end >= start && end <= len, xrefs: 00007FF66E059757
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: assertion failed: *op == SseOpcode::Blendvpd || *op == SseOpcode::Blendvps || *op == SseOpcode::Pblendvb$assertion failed: end >= start && end <= len
                                • API String ID: 3510742995-3011230143
                                • Opcode ID: 033a67036a1f1fe4f634fcfb2566d8239946ab7c374f2d7215186b47d47ad841
                                • Instruction ID: 6d6eeec96a4dd0936b3eb81247506f9d05d32162d3e8b1d0f864a2a5cb386252
                                • Opcode Fuzzy Hash: 033a67036a1f1fe4f634fcfb2566d8239946ab7c374f2d7215186b47d47ad841
                                • Instruction Fuzzy Hash: CDD1EFB2B08B82C5EA00DF15E5403A97375FB64B84F948132EA5D8B795EF3CE55AC308
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: @$q$q
                                • API String ID: 3510742995-844641622
                                • Opcode ID: 0130b3ffb870c2bd7e336783ea1e127eaab3c162c12a58bfbe23b4368bbd4416
                                • Instruction ID: 26bf7b8eaeeac75167122519e03e2209c10c0ecb1e78b1bc2168741ea5d9bd9e
                                • Opcode Fuzzy Hash: 0130b3ffb870c2bd7e336783ea1e127eaab3c162c12a58bfbe23b4368bbd4416
                                • Instruction Fuzzy Hash: A7E1BF72A1CAC6D1DA219B11E0443EFA760FBA9784F405126EBDD9BB8ADF3CD149C704
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: assertion failed: count > 0$assertion failed: old_left_len >= count$assertion failed: old_right_len + count <= CAPACITY
                                • API String ID: 3510742995-2932549692
                                • Opcode ID: dc3c6dbfda9fa088675994ba030a625ea1ea81b83474131b5a017887a3be6f6f
                                • Instruction ID: d97bfebddcd51ff946cfc3d9c9d5f8ab310fb1583de5e32e28c758fc0a40b517
                                • Opcode Fuzzy Hash: dc3c6dbfda9fa088675994ba030a625ea1ea81b83474131b5a017887a3be6f6f
                                • Instruction Fuzzy Hash: E261E176A18B85C6EA11CB55E8413E9A370FBA8B98F545132EF5C4B754EF3CD296C300
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: assertion failed: count > 0$assertion failed: old_left_len >= count$assertion failed: old_right_len + count <= CAPACITY
                                • API String ID: 3510742995-2932549692
                                • Opcode ID: 47a30c832265b638aef33dcfffeb6675bd3e07f96e6d42be8c8ac99a844c7939
                                • Instruction ID: 0059488e61a8187a6e7e3ab1376d53e8f1ddf1248b6f6d267ee2890cce6ff9fb
                                • Opcode Fuzzy Hash: 47a30c832265b638aef33dcfffeb6675bd3e07f96e6d42be8c8ac99a844c7939
                                • Instruction Fuzzy Hash: 5B510662B14A86D6EA01CB16E8413EA6331FB64BD8F544132EF4D8B761DF3CE256C304
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: ErrorLastPerformanceQuery$CounterFrequency
                                • String ID: called `Result::unwrap()` on an `Err` value
                                • API String ID: 2984914903-2333694755
                                • Opcode ID: 0fc92a202f866277736bf4f14e2439d2252f4543df45f436f099e42cdca22039
                                • Instruction ID: 8c9c93f7c3ac5b956fc5622fce41bee05d555ebf508aecf09526fdccbe72fedb
                                • Opcode Fuzzy Hash: 0fc92a202f866277736bf4f14e2439d2252f4543df45f436f099e42cdca22039
                                • Instruction Fuzzy Hash: 0241B221B09A86D5FF14DBA1D8013FA6376AFA4784F148132FD4D8B795EE3CA51AC304
                                APIs
                                Strings
                                • assertion failed: std::ptr::eq(module, self.module().as_ref()), xrefs: 00007FF66E1FF3BD
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: assertion failed: std::ptr::eq(module, self.module().as_ref())
                                • API String ID: 3510742995-3332592105
                                • Opcode ID: 46b0bf2eb6231795dffbea40c71d4dd824a0e9f6defeac9abed55139fd2873c2
                                • Instruction ID: c65cbc322d5f6b21bfe4f518f1a82709d231538a496efcae6d7cf12f07afd26e
                                • Opcode Fuzzy Hash: 46b0bf2eb6231795dffbea40c71d4dd824a0e9f6defeac9abed55139fd2873c2
                                • Instruction Fuzzy Hash: 49E1AE76608A85C2DB10DF29E4503AE77B1FB98B94F418222EF9D87795DF38E155C340
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: Blockblockty$called `Result::unwrap()` on an `Err` value$capacity overflow
                                • API String ID: 3510742995-2547643530
                                • Opcode ID: e07d49cc9763389e28fd68a5723aeca13563728d0ba972e906dec6b70da4b873
                                • Instruction ID: ff5cfb1c9cd3ec8dc5a823adff2e34c5e5ee45283e6d8a11426110edf32f9972
                                • Opcode Fuzzy Hash: e07d49cc9763389e28fd68a5723aeca13563728d0ba972e906dec6b70da4b873
                                • Instruction Fuzzy Hash: 0171C561B1964AC2EA10DB92E4107FA6370BB64BC8F648436EE4D8FB94DF3DD459D304
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
                                • String ID:
                                • API String ID: 1956605914-0
                                • Opcode ID: 0174804e2cb8242b60b5376a91a15f01f001060861c9e868f9c167998ac4849e
                                • Instruction ID: 785284c736875edb20d2305727d59cf407a13e9dc9bc2a726e95ad9280d5f6cf
                                • Opcode Fuzzy Hash: 0174804e2cb8242b60b5376a91a15f01f001060861c9e868f9c167998ac4849e
                                • Instruction Fuzzy Hash: A551043AE08693C5F7308BA0D9043F9A665AB64394F588135F94C8FBD9EF7C92968344
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: assertion failed: count > 0$assertion failed: old_left_len + count <= CAPACITY
                                • API String ID: 3510742995-809906443
                                • Opcode ID: 268946026f9baed49e16e20397957c74e4a343cc688bc1036f9603b63326911f
                                • Instruction ID: 71e9426b5b0fd77f0370cc24f857b339bc4e9e904d2885d72161bceed516da90
                                • Opcode Fuzzy Hash: 268946026f9baed49e16e20397957c74e4a343cc688bc1036f9603b63326911f
                                • Instruction Fuzzy Hash: 9B5116A3B14A86D2EA45DB2199017E96335FB64BD8F844032EE0D9B395DF3CE256C304
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: q$q
                                • API String ID: 3510742995-2090367865
                                • Opcode ID: e9668355a17d0d515558e40f715793a6a583350318ce2310e99cbb8c71d532ed
                                • Instruction ID: 3d64c809c718294ba6e6f958dd40e57a13a0b978d867cbc75936803a781a9a77
                                • Opcode Fuzzy Hash: e9668355a17d0d515558e40f715793a6a583350318ce2310e99cbb8c71d532ed
                                • Instruction Fuzzy Hash: 28F18922A08BC5D1EA21DB25E4043EA67B4FBA8784F404125EF8D4B79ADF3CE195C744
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: called `Result::unwrap()` on an `Err` value$capacity overflow
                                • API String ID: 3510742995-2618782069
                                • Opcode ID: bc6230688d1f7c20cf0553333cec2783f49253db0bd12588bbaded5aecac4d23
                                • Instruction ID: 382b67e1fe52674cbfd1fe66fd3ba4521407c2118c802000ab0367e3904ed244
                                • Opcode Fuzzy Hash: bc6230688d1f7c20cf0553333cec2783f49253db0bd12588bbaded5aecac4d23
                                • Instruction Fuzzy Hash: 6D81E422B1D695C2EA109F21E4103AA6774FB64BC4F509432FE8D9BB95EF3DE456C304
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: called `Result::unwrap()` on an `Err` value$capacity overflow
                                • API String ID: 3510742995-2618782069
                                • Opcode ID: a77158a3c9625c024ab7dbe5622da0647ccc9447491f8762f9beac6e9ff2ae10
                                • Instruction ID: 22aaba1d10d23285ab6ea0d458415b6baa995a062e029f9e7cc0916739e3e09f
                                • Opcode Fuzzy Hash: a77158a3c9625c024ab7dbe5622da0647ccc9447491f8762f9beac6e9ff2ae10
                                • Instruction Fuzzy Hash: 8661F421B0D646C2EA109F12E9207BA6371FB64FC8F549032ED4D9FB84EE3DE4559304
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: called `Result::unwrap()` on an `Err` value$capacity overflow
                                • API String ID: 3510742995-2618782069
                                • Opcode ID: e6f88890d67f8a4f26f035c7d28eb947b7023010939778003f75515bb6290386
                                • Instruction ID: d1791a3e43107b00f9a2337467b0dacd4bb3146d2939a3881030ffbc201cd673
                                • Opcode Fuzzy Hash: e6f88890d67f8a4f26f035c7d28eb947b7023010939778003f75515bb6290386
                                • Instruction Fuzzy Hash: 3161F532B09656D1EA509B12E9107FA6371BB60FC4F548136ED4E9FBC8DE3CD8669308
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: assertion failed: new_left_len <= CAPACITY
                                • API String ID: 3510742995-3316943531
                                • Opcode ID: 8bba80f2815754e9c4253b3e9faa55bc9c5a43b8d4771924f0157607ad094928
                                • Instruction ID: 3e2f14dcd0557bf60e95dca0dd374be3079975ecd80de3a59aebd38408eacfd4
                                • Opcode Fuzzy Hash: 8bba80f2815754e9c4253b3e9faa55bc9c5a43b8d4771924f0157607ad094928
                                • Instruction Fuzzy Hash: 8D41D1B2614A89D2EA00CB06E8017DAB325FB55BD8F944122EF4D4B765DF3CD265D344
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: called `Result::unwrap()` on an `Err` value$capacity overflow
                                • API String ID: 3510742995-2618782069
                                • Opcode ID: 2af04e43dbcddd2b8dc461452a2f3f13179edd28f7ecec877da75dc1686b8899
                                • Instruction ID: 1e959675dfdab65c5ee143828e458c938cbe4d1cf6632551c0cd6dd72c2e97ee
                                • Opcode Fuzzy Hash: 2af04e43dbcddd2b8dc461452a2f3f13179edd28f7ecec877da75dc1686b8899
                                • Instruction Fuzzy Hash: 6A41E2A1B09607C1FE559A12A9107BA5271AF25BC4F584432FC0D9F7C9DE3EF0579388
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: q$q
                                • API String ID: 3510742995-2090367865
                                • Opcode ID: e0b4300398caa65ac6bd75f1a0ec808c8c99779582975709ecb00425748d395c
                                • Instruction ID: d03baae47f41bdd7ea5181cafc522a22d6edc2d788d34fc50774fe0e32d2ca4d
                                • Opcode Fuzzy Hash: e0b4300398caa65ac6bd75f1a0ec808c8c99779582975709ecb00425748d395c
                                • Instruction Fuzzy Hash: 24319E22B08681D1EA10DF01E9457BEA375FB69BD0F948131EA8E4BAC6DF7CD199C344
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID: q$q
                                • API String ID: 3510742995-2090367865
                                • Opcode ID: bf8014ba56d7157f80f96e40d72bd30a7d97129636a1d5ad3400643cfaaf3685
                                • Instruction ID: c58f24cc74bd226162311de8406277d1cac816d0476edfecc2f84301a605957e
                                • Opcode Fuzzy Hash: bf8014ba56d7157f80f96e40d72bd30a7d97129636a1d5ad3400643cfaaf3685
                                • Instruction Fuzzy Hash: 2E31A122B08681D1EA54DF11E5883BEA375FB59780F848232EF8D4B685DF7CD195C348
                                APIs
                                  • Part of subcall function 00007FF66E0DFF00: TlsGetValue.KERNEL32(?,?,00000000,?,00007FF66E10276B,?,?,?,?,-00000008,-00000006,00000001,?,00007FF66DFAAFC9), ref: 00007FF66E0DFF1B
                                  • Part of subcall function 00007FF66E0DFF00: TlsGetValue.KERNEL32(?,?,00000000,?,00007FF66E10276B,?,?,?,?,-00000008,-00000006,00000001,?,00007FF66DFAAFC9), ref: 00007FF66E0DFF38
                                  • Part of subcall function 00007FF66E0DFF00: TlsSetValue.KERNEL32(?,?,00000000,?,00007FF66E10276B,?,?,?,?,-00000008,-00000006,00000001,?,00007FF66DFAAFC9), ref: 00007FF66E0DFF80
                                • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0(?,?,?,?,-00000008,-00000006,00000001,?,00007FF66DFAAFC9), ref: 00007FF66E10281A
                                Strings
                                • cannot access a Thread Local Storage value during or after destruction/rustc/129f3b9964af4d4a709d1383930ade12dfe7c081\library\std\src\thread\local.rs, xrefs: 00007FF66E102845
                                • lock count overflow in reentrant mutexlibrary\std\src\sync\reentrant_lock.rs, xrefs: 00007FF66E102861
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: Value$AddressSingleWake
                                • String ID: cannot access a Thread Local Storage value during or after destruction/rustc/129f3b9964af4d4a709d1383930ade12dfe7c081\library\std\src\thread\local.rs$lock count overflow in reentrant mutexlibrary\std\src\sync\reentrant_lock.rs
                                • API String ID: 232517740-1224199344
                                • Opcode ID: 88da7737f8e90675926a91f3603cda0ea739d60ba8312b9406bc250868fd1047
                                • Instruction ID: f6ef30ddf295a7aae39511dcaf4ca29b07cbe6a9b99e05a5240502291cfecbba
                                • Opcode Fuzzy Hash: 88da7737f8e90675926a91f3603cda0ea739d60ba8312b9406bc250868fd1047
                                • Instruction Fuzzy Hash: FF319025E09A46D8FB01DB61D8403F963B0AF65788F988432EA0D8F786DF3CE556D384
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.3256172113.00007FF66DFA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF66DFA0000, based on PE: true
                                • Associated: 00000000.00000002.3256154174.00007FF66DFA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256350291.00007FF66E2D7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256368709.00007FF66E2D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256471133.00007FF66E490000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256488232.00007FF66E491000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256504955.00007FF66E492000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256520870.00007FF66E493000.00000008.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.3256537369.00007FF66E496000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff66dfa0000_Z9fvmHepQC.jbxd
                                Similarity
                                • API ID: memcpy
                                • String ID:
                                • API String ID: 3510742995-0
                                • Opcode ID: 53d72ceed66aef2761e36a819b4ac461623abee5d8dc007600090a72f0b6625e
                                • Instruction ID: a16117399a4f014fba3135441c24afc30b269e6cda92090226dce539a775e43e
                                • Opcode Fuzzy Hash: 53d72ceed66aef2761e36a819b4ac461623abee5d8dc007600090a72f0b6625e
                                • Instruction Fuzzy Hash: 41816972608B92D1EA20CB15E1407EE7B71EB55B84F448036DF8D5BB4AEF39E1A6C700