Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
KrMhCpCNtm.exe

Overview

General Information

Sample name:KrMhCpCNtm.exe
Analysis ID:1545844
MD5:18fb86e828354d879698e7fefdde11a0
SHA1:3242e65c4c9a45a57aea38bd6bfdbe990a5c543f
SHA256:0e053da640e325971896b97f0993fbb17dd010bdc9625ca6fa4ee64c4a5f018a
Tags:exeuser-lontze7
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • KrMhCpCNtm.exe (PID: 7056 cmdline: "C:\Users\user\Desktop\KrMhCpCNtm.exe" MD5: 18FB86E828354D879698E7FEFDDE11A0)
    • conhost.exe (PID: 7080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: KrMhCpCNtm.exeAvira: detected
Source: KrMhCpCNtm.exeReversingLabs: Detection: 60%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 87.8% probability
Source: KrMhCpCNtm.exeJoe Sandbox ML: detected
Source: KrMhCpCNtm.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\userX\Desktop\kdmapper-master\x64\Release\kdmapper_Release.pdb source: KrMhCpCNtm.exe
Source: Binary string: C:\Users\userX\Desktop\kdmapper-master\x64\Release\kdmapper_Release.pdb11 source: KrMhCpCNtm.exe
Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: KrMhCpCNtm.exe
Source: KrMhCpCNtm.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: KrMhCpCNtm.exeString found in binary or memory: http://ocsp.thawte.com0
Source: KrMhCpCNtm.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: KrMhCpCNtm.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: KrMhCpCNtm.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF6673632E0 NtQuerySystemInformation,VirtualFree,VirtualAlloc,NtQuerySystemInformation,GetCurrentProcessId,VirtualFree,memset,DeviceIoControl,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,VirtualFree,0_2_00007FF6673632E0
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF66736F220 NtQuerySystemInformation,VirtualFree,VirtualAlloc,NtQuerySystemInformation,VirtualFree,_stricmp,VirtualFree,VirtualFree,_invalid_parameter_noinfo_noreturn,0_2_00007FF66736F220
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF667362880: DeviceIoControl,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,DeviceIoControl,DeviceIoControl,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,0_2_00007FF667362880
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF667361CE00_2_00007FF667361CE0
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF6673617600_2_00007FF667361760
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF66736B7700_2_00007FF66736B770
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF6673632E00_2_00007FF6673632E0
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: String function: 00007FF667366260 appears 105 times
Source: KrMhCpCNtm.exe, 00000000.00000000.1671593345.00007FF667372000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs KrMhCpCNtm.exe
Source: KrMhCpCNtm.exe, 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs KrMhCpCNtm.exe
Source: KrMhCpCNtm.exeBinary or memory string: OriginalFilenameiQVW64.SYSH vs KrMhCpCNtm.exe
Source: KrMhCpCNtm.exeBinary string: Unknown exceptionbad array new lengthstring too longbad cast\\\.\Nal[-] \Device\Nal is already in use.[<] Loading vulnerable driver, Name: [-] Can't find TEMP folder[-] Failed to create vulnerable driver file[-] Failed to register and start service for the vulnerable driver[-] Failed to load driver iqvw64e.sysntoskrnl.exe[-] Failed to get ntoskrnl.exe[-] Can't exploit intel driver, is there any antivirus or anticheat running?[-] Failed to ClearPiDDBCacheTable[-] Failed to ClearKernelHashBucketList[!] Failed to ClearMmUnloadedDrivers[!] Failed to ClearWdFilterDriverListWdFilter.sys[+] WdFilter.sys not loaded, clear skippedxxx????xxH
Source: KrMhCpCNtm.exeBinary string: \Device\Nal
Source: classification engineClassification label: mal64.winEXE@2/1@0/0
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF66736A700 GetCurrentProcessId,CreateToolhelp32Snapshot,memset,Process32FirstW,Process32NextW,CloseHandle,0_2_00007FF66736A700
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7080:120:WilError_03
Source: KrMhCpCNtm.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: KrMhCpCNtm.exeReversingLabs: Detection: 60%
Source: unknownProcess created: C:\Users\user\Desktop\KrMhCpCNtm.exe "C:\Users\user\Desktop\KrMhCpCNtm.exe"
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeSection loaded: kernel.appcore.dllJump to behavior
Source: KrMhCpCNtm.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: KrMhCpCNtm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: KrMhCpCNtm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: KrMhCpCNtm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: KrMhCpCNtm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: KrMhCpCNtm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: KrMhCpCNtm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: KrMhCpCNtm.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: KrMhCpCNtm.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\userX\Desktop\kdmapper-master\x64\Release\kdmapper_Release.pdb source: KrMhCpCNtm.exe
Source: Binary string: C:\Users\userX\Desktop\kdmapper-master\x64\Release\kdmapper_Release.pdb11 source: KrMhCpCNtm.exe
Source: Binary string: c:\users\cloudbuild\337244\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: KrMhCpCNtm.exe
Source: KrMhCpCNtm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: KrMhCpCNtm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: KrMhCpCNtm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: KrMhCpCNtm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: KrMhCpCNtm.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF66736A700 GetCurrentProcessId,CreateToolhelp32Snapshot,memset,Process32FirstW,Process32NextW,CloseHandle,0_2_00007FF66736A700
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeAPI coverage: 2.0 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF667370910 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF667370910
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF66736A700 GetCurrentProcessId,CreateToolhelp32Snapshot,memset,Process32FirstW,Process32NextW,CloseHandle,0_2_00007FF66736A700
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF66736A870 SetUnhandledExceptionFilter,_wcsicmp,_wcsicmp,_wcsicmp,_wcsicmp,_wcsicmp,_wcsicmp,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,memcpy,memcmp,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,memcpy,memcpy,_invalid_parameter_noinfo_noreturn,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A,??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF66736A870
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF667370910 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF667370910
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF667370120 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF667370120
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF667370ABC SetUnhandledExceptionFilter,0_2_00007FF667370ABC
Source: C:\Users\user\Desktop\KrMhCpCNtm.exeCode function: 0_2_00007FF667370B68 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF667370B68
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Process Injection
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS2
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
KrMhCpCNtm.exe61%ReversingLabsWin64.Trojan.DriverLoader
KrMhCpCNtm.exe100%AviraTR/Redcap.fmbdb
KrMhCpCNtm.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.thawte.com/ThawteTimestampingCA.crl0KrMhCpCNtm.exefalse
  • URL Reputation: safe
unknown
http://ocsp.thawte.com0KrMhCpCNtm.exefalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1545844
Start date and time:2024-10-31 06:49:08 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 1m 54s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:KrMhCpCNtm.exe
Detection:MAL
Classification:mal64.winEXE@2/1@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 4
  • Number of non-executed functions: 74
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: KrMhCpCNtm.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\KrMhCpCNtm.exe
File Type:ASCII text, with CRLF, CR line terminators
Category:dropped
Size (bytes):97
Entropy (8bit):4.68946445647071
Encrypted:false
SSDEEP:3:ytoICArEE0IEVq4MILAAzI1MCJEdMgxGzin:wRCA5CVq4FAAzI1M5VGzin
MD5:293C14E3E6CE8BCF759BCB6365C0D4FB
SHA1:0D7B836D72608CD666F00FFFAC677B8BFB660161
SHA-256:3C5C212D5DC08B830238A0B4B2B46B07EEA0847F1C05CC658F27F4DC44BE384C
SHA-512:0612C0976E7FBFF0CB8D311370EB1C031E61EE5B5AEB14C5A965F2B87B1E8BE4E401F7213A83B299E0E2C787CEFF7FFC7AC3B91D20AC6DE1A537D5EC952A0A5E
Malicious:false
Reputation:moderate, very likely benign file
Preview:......[!] Incorrect Usage!..[+] Usage: kdmapper.exe [--free][--mdl][--PassAllocationPtr] driver..
File type:PE32+ executable (console) x86-64, for MS Windows
Entropy (8bit):6.142037302452791
TrID:
  • Win64 Executable Console (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:KrMhCpCNtm.exe
File size:146'944 bytes
MD5:18fb86e828354d879698e7fefdde11a0
SHA1:3242e65c4c9a45a57aea38bd6bfdbe990a5c543f
SHA256:0e053da640e325971896b97f0993fbb17dd010bdc9625ca6fa4ee64c4a5f018a
SHA512:76340b7c0f88317c742fb92f853b129fff8731cb912ffa9ee95b1bf050c9d666879ce665c63dd6a10f0d9171b375587e7726fd8f0549b1f54a27a1e2ddbe0ffb
SSDEEP:3072:XIhPqvQBdqEbx39as9wOmJTQSaMm5/6N7uq0YmN:XIhPqoBdpBYwWWlOKq0
TLSH:98E33B5763A910A8E2B7D6B8DAB14612E7B17C051774D3CF1360813A0F637E1AE3EB61
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......(W,.l6BVl6BVl6BVeN.V~6BV.LFWf6BV.LAWh6BV.LGWM6BV.LCWj6BV.FCWe6BVl6CV.6BV.LKWj6BV.L.Vm6BV.L@Wm6BVRichl6BV................PE..d..
Icon Hash:90cececece8e8eb0
Entrypoint:0x14001061c
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x669D2E23 [Sun Jul 21 15:49:55 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:83068d21cd75a0464fd1ef096e108bca
Instruction
dec eax
sub esp, 28h
call 00007F5268D12AA8h
dec eax
add esp, 28h
jmp 00007F5268D123D7h
int3
int3
dec eax
sub esp, 28h
call 00007F5268D12DD0h
test eax, eax
je 00007F5268D12583h
dec eax
mov eax, dword ptr [00000030h]
dec eax
mov ecx, dword ptr [eax+08h]
jmp 00007F5268D12567h
dec eax
cmp ecx, eax
je 00007F5268D12576h
xor eax, eax
dec eax
cmpxchg dword ptr [0001447Ch], ecx
jne 00007F5268D12550h
xor al, al
dec eax
add esp, 28h
ret
mov al, 01h
jmp 00007F5268D12559h
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
movzx eax, byte ptr [00014467h]
test ecx, ecx
mov ebx, 00000001h
cmove eax, ebx
mov byte ptr [00014457h], al
call 00007F5268D12BCFh
call 00007F5268D12B06h
test al, al
jne 00007F5268D12566h
xor al, al
jmp 00007F5268D12576h
call 00007F5268D12AF9h
test al, al
jne 00007F5268D1256Bh
xor ecx, ecx
call 00007F5268D12AEEh
jmp 00007F5268D1254Ch
mov al, bl
dec eax
add esp, 20h
pop ebx
ret
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
cmp byte ptr [0001441Ch], 00000000h
mov ebx, ecx
jne 00007F5268D125C9h
cmp ecx, 01h
jnbe 00007F5268D125CCh
call 00007F5268D12D36h
test eax, eax
je 00007F5268D1258Ah
test ebx, ebx
jne 00007F5268D12586h
dec eax
lea ecx, dword ptr [00014406h]
call 00007F5268D125E2h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x214940x154.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x1e8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x250000xdf8.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x270000x108.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x1e6200x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x1e7000x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1e4e00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x120000x5e0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x10b8b0x10c0033a84da265abd7f11f347e08f316b3c7False0.49338269589552236data6.230571778777325IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x120000x1141e0x11600d4c8f50b09c1344c64c8b641003b78bfFalse0.4238421762589928data5.740973915220694IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x240000xd800x600044aa8e4f1755c27ba3b6b6d4f90fee5False0.20638020833333334data3.4464573681485184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x250000xdf80xe002601d8db3ec9b33fdb013992b6095436False0.49107142857142855PEX Binary Archive5.0225086026520485IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x260000x1e80x2002d22e421adfc8228f1491d43140ec4d8False0.5390625data4.768131151703051IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x270000x1080x200aee3ad14e40e8549046bb30bd1302939False0.435546875data3.2203490542556215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x260600x188XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5892857142857143
DLLImport
KERNEL32.dllCloseHandle, GetProcAddress, GetCurrentProcessId, CreateToolhelp32Snapshot, Process32NextW, GetModuleHandleA, SetUnhandledExceptionFilter, GetTempPathW, FormatMessageA, GetCurrentThreadId, CreateFileW, VirtualAlloc, DeviceIoControl, Process32FirstW, VirtualFree, GetFileAttributesExW, AreFileApisANSI, GetLastError, GetFileInformationByHandleEx, WideCharToMultiByte, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, GetModuleHandleW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, LocalFree
USER32.dllGetWindowThreadProcessId, GetShellWindow
ADVAPI32.dllRegCloseKey, RegDeleteTreeW, RegCreateKeyW, RegOpenKeyW, RegSetKeyValueW
MSVCP140.dll?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ, ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?widen@?$ctype@_W@std@@QEBA_WD@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?_Winerror_map@std@@YAHH@Z, ?_Syserror_map@std@@YAPEBDH@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z, ?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ??1_Lockit@std@@QEAA@XZ, ??0_Lockit@std@@QEAA@H@Z, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ??Bid@locale@std@@QEAA_KXZ, ?uncaught_exception@std@@YA_NXZ, ?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ?id@?$ctype@_W@std@@2V0locale@2@A, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?_Xlength_error@std@@YAXPEBD@Z, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z
ntdll.dllNtQuerySystemInformation, RtlInitUnicodeString
VCRUNTIME140_1.dll__CxxFrameHandler4
VCRUNTIME140.dll__current_exception, __C_specific_handler, __std_terminate, memset, __std_exception_destroy, memcmp, memcpy, __current_exception_context, _CxxThrowException, wcsstr, __std_exception_copy, memmove
api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, _fseeki64, fread, fsetpos, ungetc, _get_stream_buffer_pointers, fflush, setvbuf, fgetpos, fwrite, __p__commode, fputc, fgetc, fclose
api-ms-win-crt-utility-l1-1-0.dllrand, srand
api-ms-win-crt-filesystem-l1-1-0.dll_unlock_file, _lock_file, _wremove
api-ms-win-crt-string-l1-1-0.dll_stricmp, _wcsicmp
api-ms-win-crt-time-l1-1-0.dll_time64
api-ms-win-crt-runtime-l1-1-0.dll_register_thread_local_exe_atexit_callback, _register_onexit_function, _cexit, _crt_atexit, __p___argc, _invalid_parameter_noinfo_noreturn, _exit, exit, _initterm_e, _initterm, _get_initial_wide_environment, _initialize_wide_environment, _configure_wide_argv, __p___wargv, _set_app_type, _seh_filter_exe, _initialize_onexit_table, terminate, _c_exit
api-ms-win-crt-heap-l1-1-0.dllmalloc, _callnewh, free, _set_new_mode
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale, ___lc_codepage_func
api-ms-win-crt-math-l1-1-0.dll__setusermatherr
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:01:50:00
Start date:31/10/2024
Path:C:\Users\user\Desktop\KrMhCpCNtm.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\KrMhCpCNtm.exe"
Imagebase:0x7ff667360000
File size:146'944 bytes
MD5 hash:18FB86E828354D879698E7FEFDDE11A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:1
Start time:01:50:00
Start date:31/10/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:2.2%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:19.9%
    Total number of Nodes:1691
    Total number of Limit Nodes:3
    execution_graph 7495 7ff667371afa _seh_filter_exe 7496 7ff66736f8f8 7497 7ff66736f976 WideCharToMultiByte 7496->7497 7498 7ff66736f91f 7496->7498 7500 7ff66736f9a7 7497->7500 7498->7497 7499 7ff66736f927 WideCharToMultiByte 7498->7499 7499->7500 7501 7ff66736f964 7499->7501 7502 7ff66736f9ab GetLastError 7500->7502 7503 7ff66736f9b3 7500->7503 7502->7503 7503->7501 7504 7ff66736f9c0 WideCharToMultiByte 7503->7504 7504->7501 7505 7ff66736f9ed GetLastError 7504->7505 7505->7501 7599 7ff667370f78 7600 7ff667370fb0 __GSHandlerCheckCommon 7599->7600 7601 7ff667370fdc 7600->7601 7602 7ff667370fcb __CxxFrameHandler4 7600->7602 7602->7601 7691 7ff667370ff8 7692 7ff66737103a __GSHandlerCheckCommon 7691->7692 7693 7ff667371062 7692->7693 7694 7ff667371051 __C_specific_handler 7692->7694 7694->7693 7397 7ff667370484 7401 7ff667370abc SetUnhandledExceptionFilter 7397->7401 7506 7ff667371700 7507 7ff667371713 7506->7507 7508 7ff667371720 7506->7508 7510 7ff667365c40 7507->7510 7511 7ff667365c53 7510->7511 7512 7ff667365c7f 7510->7512 7513 7ff667365c77 7511->7513 7515 7ff667365c98 _invalid_parameter_noinfo_noreturn 7511->7515 7512->7508 7514 7ff66736fe10 free 7513->7514 7514->7512 7603 7ff667371780 7604 7ff66737179a 7603->7604 7605 7ff667371793 CloseHandle 7603->7605 7605->7604 7607 7ff667369980 7608 7ff667369995 7607->7608 7609 7ff6673699b1 ?_Winerror_map@std@@YAHH 7607->7609 7610 7ff6673699bd 7609->7610 7516 7ff667364f00 7517 7ff667364f13 7516->7517 7518 7ff667364f40 7516->7518 7517->7518 7519 7ff667364f23 fflush 7517->7519 7611 7ff667365780 7612 7ff66736579b 7611->7612 7613 7ff6673657e9 ungetc 7612->7613 7614 7ff6673657b1 7612->7614 7613->7614 7521 7ff66736ff10 EnterCriticalSection LeaveCriticalSection 7522 7ff667370008 7521->7522 7523 7ff66737002a SetEvent ResetEvent 7522->7523 7524 7ff667370018 7522->7524 7619 7ff667371990 7620 7ff66736d410 21 API calls 7619->7620 7621 7ff6673719aa 7620->7621 7628 7ff66736cf90 7621->7628 7629 7ff66736cfa4 _invalid_parameter_noinfo_noreturn 7628->7629 7631 7ff66737138e ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA 7525 7ff667365310 7526 7ff667365327 7525->7526 7527 7ff667365332 7525->7527 7528 7ff667365339 ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J 7527->7528 7529 7ff667365348 7527->7529 7528->7529 7530 7ff66736536d memcpy 7529->7530 7532 7ff6673653a2 7529->7532 7530->7532 7531 7ff66736543e 7532->7531 7533 7ff66736541e 7532->7533 7534 7ff6673653f0 fread 7532->7534 7533->7531 7535 7ff667365423 fread 7533->7535 7534->7531 7534->7532 7535->7531 7699 7ff667361010 __std_exception_copy 7700 7ff667365a10 7701 7ff667365a1c _unlock_file 7700->7701 7702 7ff667365a23 7700->7702 7701->7702 7703 7ff66737061c 7706 7ff667370b68 7703->7706 7707 7ff667370b8b GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7706->7707 7708 7ff667370625 7706->7708 7707->7708 7709 7ff66736fe18 InitializeCriticalSectionAndSpinCount GetModuleHandleW 7710 7ff66736fe49 GetModuleHandleW 7709->7710 7711 7ff66736fe5e GetProcAddress GetProcAddress 7709->7711 7710->7711 7720 7ff66736fec0 7710->7720 7712 7ff66736fe9b CreateEventW 7711->7712 7713 7ff66736fe86 7711->7713 7714 7ff66736fe8b 7712->7714 7712->7720 7713->7712 7713->7714 7722 7ff6673706b8 7714->7722 7715 7ff667370910 9 API calls 7716 7ff66736fee7 DeleteCriticalSection 7715->7716 7718 7ff66736ff0b 7716->7718 7719 7ff66736ff05 CloseHandle 7716->7719 7719->7718 7720->7715 7721 7ff66736fec4 7720->7721 7723 7ff6673706c9 7722->7723 7728 7ff6673706fb 7722->7728 7724 7ff667370738 7723->7724 7727 7ff6673706ce __scrt_release_startup_lock 7723->7727 7725 7ff667370910 9 API calls 7724->7725 7726 7ff667370742 7725->7726 7727->7728 7729 7ff6673706eb _initialize_onexit_table 7727->7729 7728->7720 7729->7728 4980 7ff6673704a0 4981 7ff6673704b9 __scrt_initialize_crt 4980->4981 4982 7ff6673705f7 4981->4982 4983 7ff6673704c1 __scrt_acquire_startup_lock 4981->4983 5127 7ff667370910 IsProcessorFeaturePresent 4982->5127 4985 7ff667370601 4983->4985 4991 7ff6673704df __scrt_release_startup_lock 4983->4991 4986 7ff667370910 9 API calls 4985->4986 4987 7ff66737060c 4986->4987 4989 7ff667370614 _exit 4987->4989 4988 7ff667370504 4990 7ff66737058a _get_initial_wide_environment __p___wargv __p___argc 5000 7ff66736a870 SetUnhandledExceptionFilter 4990->5000 4991->4988 4991->4990 4994 7ff667370582 _register_thread_local_exe_atexit_callback 4991->4994 4993 7ff6673705ac 5125 7ff667370a68 GetModuleHandleW 4993->5125 4994->4990 4997 7ff6673705b7 4998 7ff6673705bc _cexit 4997->4998 4999 7ff6673705c1 4997->4999 4998->4999 4999->4988 5001 7ff66736a964 5000->5001 5003 7ff66736a8d0 5000->5003 5133 7ff66736a5d0 5001->5133 5003->5001 5004 7ff66736a8f0 _wcsicmp 5003->5004 5006 7ff66736a930 _wcsicmp 5003->5006 5004->5003 5005 7ff66736aaf4 5007 7ff66736ab27 5005->5007 5008 7ff667366260 7 API calls 5005->5008 5006->5003 5009 7ff66736ab4f 5007->5009 5013 7ff667366260 7 API calls 5007->5013 5011 7ff66736ab17 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5008->5011 5014 7ff66736ab77 5009->5014 5018 7ff667366260 7 API calls 5009->5018 5010 7ff66736a9c0 _wcsicmp 5015 7ff66736a982 5010->5015 5011->5007 5012 7ff66736aa80 _wcsicmp 5016 7ff66736aa3e 5012->5016 5017 7ff66736ab3f ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5013->5017 5021 7ff667366260 7 API calls 5014->5021 5034 7ff66736ab9e 5014->5034 5015->5010 5015->5016 5020 7ff66736aa00 _wcsicmp 5015->5020 5016->5005 5016->5012 5024 7ff66736aac0 _wcsicmp 5016->5024 5017->5009 5019 7ff66736ab67 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5018->5019 5019->5014 5020->5015 5025 7ff66736ab8e ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5021->5025 5022 7ff66736adb0 5138 7ff667366260 5022->5138 5024->5016 5025->5034 5027 7ff667366260 7 API calls 5029 7ff66736ade6 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5027->5029 5028 7ff66736abff memcpy 5028->5034 5031 7ff66736adf6 5029->5031 5179 7ff66736fdf0 5031->5179 5034->5022 5034->5028 5038 7ff66736ae28 _invalid_parameter_noinfo_noreturn 5034->5038 5039 7ff66736ae3d 5034->5039 5040 7ff66736ae2f _invalid_parameter_noinfo_noreturn 5034->5040 5041 7ff66736ae36 _invalid_parameter_noinfo_noreturn 5034->5041 5043 7ff66736fe10 free 5034->5043 5150 7ff667368980 5034->5150 5168 7ff667369b70 5034->5168 5174 7ff66736bab0 5034->5174 5038->5040 5039->5022 5042 7ff66736ae46 5039->5042 5040->5041 5041->5039 5044 7ff66736ae85 memcpy 5042->5044 5045 7ff66736aea0 5042->5045 5043->5034 5046 7ff66736aea5 5044->5046 5047 7ff667368980 7 API calls 5045->5047 5048 7ff66736aedc memcpy 5046->5048 5049 7ff66736aef8 5046->5049 5047->5046 5050 7ff66736aefd 5048->5050 5051 7ff667368980 7 API calls 5049->5051 5188 7ff66736fae8 5050->5188 5051->5050 5053 7ff66736b2f3 5482 7ff66736a4c0 5053->5482 5055 7ff66736b009 5059 7ff66736b00d 5055->5059 5060 7ff66736b063 5055->5060 5056 7ff66736af24 5056->5053 5056->5055 5057 7ff66736b004 5056->5057 5061 7ff66736aff1 _invalid_parameter_noinfo_noreturn 5056->5061 5221 7ff66736fe10 5057->5221 5065 7ff667366260 7 API calls 5059->5065 5246 7ff667361760 _time64 GetCurrentThreadId srand CreateFileW 5060->5246 5061->5056 5064 7ff66736b34e 5064->4993 5068 7ff66736b020 5065->5068 5067 7ff66736b346 5072 7ff66736fe10 free 5067->5072 5224 7ff667369030 5068->5224 5069 7ff66736b075 5074 7ff66736a7d0 26 API calls 5069->5074 5070 7ff66736b07f 5323 7ff6673700b0 5070->5323 5071 7ff66736b361 _invalid_parameter_noinfo_noreturn 5072->5064 5083 7ff66736b05e 5074->5083 5078 7ff667366260 7 API calls 5080 7ff66736b049 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5078->5080 5236 7ff66736a7d0 GetShellWindow GetWindowThreadProcessId 5080->5236 5083->5031 5084 7ff66736b206 5083->5084 5087 7ff66736b2e0 _invalid_parameter_noinfo_noreturn 5083->5087 5088 7ff66736fe10 free 5084->5088 5094 7ff66736b2e7 5087->5094 5092 7ff66736b20b 5088->5092 5092->5031 5095 7ff66736fe10 free 5094->5095 5099 7ff66736b2ec 5095->5099 5099->5031 5126 7ff6673705b3 5125->5126 5126->4987 5126->4997 5128 7ff667370936 5127->5128 5129 7ff667370944 memset RtlCaptureContext RtlLookupFunctionEntry 5128->5129 5130 7ff6673709ba memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 5129->5130 5131 7ff66737097e RtlVirtualUnwind 5129->5131 5132 7ff667370a3e 5130->5132 5131->5130 5132->4985 5135 7ff66736a5f0 5133->5135 5134 7ff66736a6a6 5134->5015 5135->5134 5136 7ff66736a63f _wcsicmp 5135->5136 5137 7ff66736a676 _wcsicmp 5135->5137 5136->5135 5137->5135 5140 7ff667366290 5138->5140 5139 7ff6673662de 5142 7ff667366315 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 5139->5142 5144 7ff667366366 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 5139->5144 5146 7ff66736633d ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5139->5146 5140->5139 5141 7ff6673662f1 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 5140->5141 5141->5139 5145 7ff6673663f1 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 5142->5145 5148 7ff6673663fb ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5142->5148 5144->5142 5149 7ff667366383 5144->5149 5145->5148 5146->5139 5146->5142 5147 7ff667366388 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5147->5142 5147->5149 5148->5027 5149->5142 5149->5147 5151 7ff667368ae3 5150->5151 5155 7ff6673689a7 5150->5155 5499 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD 5151->5499 5152 7ff6673689c6 5154 7ff667368ae8 5152->5154 5158 7ff6673700b0 std::_Facet_Register 3 API calls 5152->5158 5500 7ff667361110 5154->5500 5155->5152 5155->5154 5157 7ff667368a54 5155->5157 5160 7ff667368a3d 5157->5160 5161 7ff6673700b0 std::_Facet_Register 3 API calls 5157->5161 5158->5160 5159 7ff667368aee 5162 7ff667368a66 memcpy 5160->5162 5163 7ff667368adc _invalid_parameter_noinfo_noreturn 5160->5163 5161->5160 5164 7ff667368abc 5162->5164 5165 7ff667368a8b 5162->5165 5163->5151 5164->5034 5165->5163 5166 7ff667368ab4 5165->5166 5167 7ff66736fe10 free 5166->5167 5167->5164 5169 7ff667369b8e 5168->5169 5170 7ff667369c76 5169->5170 5171 7ff667369c47 memcpy 5169->5171 5172 7ff667368980 7 API calls 5170->5172 5171->5034 5173 7ff667369c7b 5172->5173 5173->5034 5503 7ff66736f8d0 ___lc_codepage_func 5174->5503 5176 7ff66736bad6 5177 7ff66736ac6c memcmp 5176->5177 5506 7ff667369710 5176->5506 5177->5034 5180 7ff66736fdf9 5179->5180 5181 7ff66736ae07 5180->5181 5182 7ff667370154 IsProcessorFeaturePresent 5180->5182 5181->4993 5183 7ff66737016c 5182->5183 5600 7ff667370348 RtlCaptureContext 5183->5600 5190 7ff66736fb1f 5188->5190 5189 7ff66736fb96 5210 7ff66736fb28 5189->5210 5605 7ff66736fd7c CreateFileW 5189->5605 5190->5189 5192 7ff66736fb78 GetFileAttributesExW 5190->5192 5190->5210 5191 7ff66736fdf0 8 API calls 5193 7ff66736fd44 5191->5193 5192->5189 5195 7ff66736fb8b GetLastError 5192->5195 5193->5056 5195->5210 5197 7ff66736fbf2 5200 7ff66736fbfc CloseHandle 5197->5200 5197->5210 5198 7ff66736fc11 5199 7ff66736fc62 5198->5199 5202 7ff66736fc20 GetFileInformationByHandleEx 5198->5202 5203 7ff66736fc78 GetFileInformationByHandleEx 5199->5203 5204 7ff66736fcb5 5199->5204 5201 7ff66736fd6c terminate 5200->5201 5200->5210 5201->5210 5202->5199 5207 7ff66736fc39 GetLastError 5202->5207 5203->5204 5208 7ff66736fc93 GetLastError 5203->5208 5205 7ff66736fd0e 5204->5205 5206 7ff66736fccf GetFileInformationByHandleEx 5204->5206 5212 7ff66736fd59 5205->5212 5213 7ff66736fd23 5205->5213 5206->5205 5209 7ff66736fce4 GetLastError 5206->5209 5207->5210 5211 7ff66736fc47 CloseHandle 5207->5211 5208->5210 5214 7ff66736fca1 CloseHandle 5208->5214 5209->5210 5215 7ff66736fcf6 CloseHandle 5209->5215 5210->5191 5211->5210 5216 7ff66736fc54 terminate 5211->5216 5212->5210 5218 7ff66736fd5f CloseHandle 5212->5218 5213->5210 5217 7ff66736fd29 CloseHandle 5213->5217 5214->5210 5219 7ff66736fcae terminate 5214->5219 5215->5210 5220 7ff66736fd07 terminate 5215->5220 5216->5210 5217->5201 5217->5210 5218->5201 5218->5210 5219->5204 5220->5205 5221->5055 5222 7ff667370900 free 5221->5222 5225 7ff66736906c 5224->5225 5226 7ff6673690b2 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 5225->5226 5228 7ff66736909f 5225->5228 5226->5228 5229 7ff667369132 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 5228->5229 5232 7ff6673690d6 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 5228->5232 5234 7ff667369105 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5228->5234 5229->5232 5233 7ff667369122 5229->5233 5230 7ff6673691c8 5230->5078 5231 7ff6673691be ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 5231->5230 5232->5230 5232->5231 5233->5232 5235 7ff667369155 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 5233->5235 5234->5228 5234->5233 5235->5232 5235->5233 5608 7ff66736a700 GetCurrentProcessId CreateToolhelp32Snapshot 5236->5608 5239 7ff66736a85d 5241 7ff66736fdf0 8 API calls 5239->5241 5240 7ff667366260 7 API calls 5242 7ff66736a81d ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5240->5242 5243 7ff66736a86a 5241->5243 5244 7ff667366260 7 API calls 5242->5244 5243->5083 5245 7ff66736a840 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z ?get@?$basic_istream@DU?$char_traits@D@std@@@std@ 5244->5245 5245->5239 5247 7ff66736181c rand 5246->5247 5248 7ff6673617e7 CloseHandle 5246->5248 5250 7ff6673618c6 5247->5250 5251 7ff667361884 5247->5251 5249 7ff667366260 7 API calls 5248->5249 5252 7ff667361803 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5249->5252 5254 7ff667366260 7 API calls 5250->5254 5253 7ff667361895 rand 5251->5253 5255 7ff667361ca3 5252->5255 5253->5250 5253->5253 5256 7ff6673618d9 5254->5256 5257 7ff66736fdf0 8 API calls 5255->5257 5617 7ff6673612b0 5256->5617 5259 7ff667361cb5 5257->5259 5259->5069 5259->5070 5261 7ff667369030 7 API calls 5262 7ff667361900 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5261->5262 5263 7ff66736191c 5262->5263 5264 7ff667361956 5262->5264 5265 7ff667361951 5263->5265 5266 7ff66736194a _invalid_parameter_noinfo_noreturn 5263->5266 5268 7ff667361991 _wremove memset 5264->5268 5290 7ff667361969 5264->5290 5267 7ff66736fe10 free 5265->5267 5266->5265 5267->5264 5631 7ff667365ac0 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5268->5631 5271 7ff667366260 7 API calls 5274 7ff66736197c ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5271->5274 5272 7ff6673619fd 5636 7ff667365ee0 5272->5636 5273 7ff667361a39 5277 7ff667365ee0 12 API calls 5273->5277 5275 7ff667361c57 5274->5275 5275->5255 5284 7ff667361c9e 5275->5284 5288 7ff667361c97 _invalid_parameter_noinfo_noreturn 5275->5288 5279 7ff667361a3e 5277->5279 5278 7ff667361a02 5280 7ff667361a07 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 5278->5280 5281 7ff667361a24 5278->5281 5282 7ff667361a43 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 5279->5282 5283 7ff667361a60 5279->5283 5280->5281 5642 7ff667362720 5281->5642 5282->5283 5286 7ff667362720 15 API calls 5283->5286 5289 7ff66736fe10 free 5284->5289 5287 7ff667361a69 5286->5287 5646 7ff66736e770 5287->5646 5288->5284 5289->5255 5290->5271 5293 7ff667361a77 5295 7ff667366260 7 API calls 5293->5295 5294 7ff667361ab6 CreateFileW 5296 7ff667361b80 5294->5296 5297 7ff667361af3 5294->5297 5298 7ff667361a8a ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z _wremove 5295->5298 5301 7ff667366260 7 API calls 5296->5301 5299 7ff6673660d0 8 API calls 5297->5299 5298->5275 5300 7ff667361b22 5299->5300 5701 7ff66736f220 NtQuerySystemInformation 5300->5701 5303 7ff667361c3f ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5301->5303 5305 7ff6673623e0 97 API calls 5303->5305 5305->5275 5306 7ff667361b74 5306->5296 5721 7ff6673627e0 5306->5721 5307 7ff667361b6f 5308 7ff66736fe10 free 5307->5308 5308->5306 5310 7ff667361b68 _invalid_parameter_noinfo_noreturn 5310->5307 5311 7ff667361bb4 5311->5296 5729 7ff667363b10 5311->5729 5318 7ff667361c02 5951 7ff667361ce0 5318->5951 5324 7ff6673700ca malloc 5323->5324 5325 7ff66736b08e 5324->5325 5328 7ff6673700bb 5324->5328 5329 7ff66736ef50 memset 5325->5329 5327 7ff667361110 Concurrency::cancel_current_task __std_exception_copy 5327->5328 5328->5323 5328->5324 5328->5327 6495 7ff667370b48 5328->6495 5330 7ff66736ef9d 5329->5330 5331 7ff66736efa0 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5329->5331 5330->5331 5332 7ff667365f90 24 API calls 5331->5332 5333 7ff66736f059 5332->5333 5334 7ff66736f07d 5333->5334 5335 7ff66736f05e ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 5333->5335 5344 7ff66736f0ae 5334->5344 6499 7ff66736f490 5334->6499 5335->5334 5340 7ff667365ee0 12 API calls 5342 7ff66736f107 5340->5342 5343 7ff66736f10c ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 5342->5343 5342->5344 5343->5344 6512 7ff66736f160 5344->6512 7230 7ff667365ca0 5482->7230 5487 7ff66736a586 5490 7ff667366260 7 API calls 5487->5490 5488 7ff66736a52e 5488->5487 5489 7ff66736a534 5488->5489 5491 7ff667366260 7 API calls 5489->5491 5492 7ff66736a599 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5490->5492 5493 7ff66736a547 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX 5491->5493 5494 7ff66736a5ba 5492->5494 5495 7ff66736a5b5 5492->5495 5496 7ff667366260 7 API calls 5493->5496 5494->5064 5494->5067 5494->5071 5497 7ff6673623e0 97 API calls 5495->5497 5498 7ff66736a566 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K 5496->5498 5497->5494 5498->5492 5501 7ff66736111e Concurrency::cancel_current_task 5500->5501 5502 7ff66736112f __std_exception_copy 5501->5502 5502->5159 5504 7ff66736f8e3 AreFileApisANSI 5503->5504 5505 7ff66736f8f0 5503->5505 5504->5505 5505->5176 5507 7ff66736971e 5506->5507 5510 7ff667369650 5507->5510 5519 7ff6673660d0 5510->5519 5512 7ff667369692 5539 7ff667369450 5512->5539 5515 7ff6673696ee _CxxThrowException __std_exception_copy 5515->5176 5516 7ff6673696e9 5518 7ff66736fe10 free 5516->5518 5517 7ff6673696e2 _invalid_parameter_noinfo_noreturn 5517->5516 5518->5515 5520 7ff6673660ee memcpy 5519->5520 5523 7ff66736611a 5519->5523 5520->5512 5524 7ff667366178 5523->5524 5525 7ff6673661a4 5523->5525 5535 7ff667366226 5523->5535 5527 7ff667366221 5524->5527 5530 7ff6673700b0 std::_Facet_Register 3 API calls 5524->5530 5526 7ff66736618d 5525->5526 5528 7ff6673700b0 std::_Facet_Register 3 API calls 5525->5528 5529 7ff6673661b5 memcpy 5526->5529 5537 7ff66736621a _invalid_parameter_noinfo_noreturn 5526->5537 5531 7ff667361110 Concurrency::cancel_current_task __std_exception_copy 5527->5531 5528->5526 5533 7ff6673661d6 5529->5533 5534 7ff667366203 5529->5534 5530->5526 5531->5535 5536 7ff6673661fb 5533->5536 5533->5537 5534->5512 5557 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD 5535->5557 5538 7ff66736fe10 free 5536->5538 5537->5527 5538->5534 5558 7ff66736b370 5539->5558 5543 7ff6673694b1 5544 7ff66736b450 12 API calls 5543->5544 5545 7ff6673694de 5544->5545 5546 7ff66736951d __std_exception_copy 5545->5546 5547 7ff667369518 5545->5547 5550 7ff667369511 _invalid_parameter_noinfo_noreturn 5545->5550 5548 7ff6673695c3 5546->5548 5549 7ff66736958f 5546->5549 5551 7ff66736fe10 free 5547->5551 5553 7ff66736fdf0 8 API calls 5548->5553 5552 7ff6673695be 5549->5552 5554 7ff6673695b7 _invalid_parameter_noinfo_noreturn 5549->5554 5550->5547 5551->5546 5555 7ff66736fe10 free 5552->5555 5556 7ff6673695e3 5553->5556 5554->5552 5555->5548 5556->5515 5556->5516 5556->5517 5560 7ff66736b39d 5558->5560 5559 7ff66736948a 5559->5543 5572 7ff66736b450 5559->5572 5560->5559 5561 7ff66736b40b 5560->5561 5563 7ff66736b3e6 5560->5563 5564 7ff66736b447 5560->5564 5562 7ff66736b415 memcpy 5561->5562 5566 7ff6673700b0 std::_Facet_Register 3 API calls 5561->5566 5562->5559 5565 7ff6673700b0 std::_Facet_Register 3 API calls 5563->5565 5567 7ff667361110 Concurrency::cancel_current_task __std_exception_copy 5564->5567 5568 7ff66736b3ee 5565->5568 5566->5562 5569 7ff66736b44c 5567->5569 5570 7ff66736b3f6 5568->5570 5571 7ff66736b404 _invalid_parameter_noinfo_noreturn 5568->5571 5570->5562 5571->5561 5573 7ff66736b4b2 5572->5573 5574 7ff66736b473 memcpy 5572->5574 5578 7ff66736b900 5573->5578 5574->5543 5579 7ff66736ba86 5578->5579 5580 7ff66736b92e 5578->5580 5599 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD 5579->5599 5583 7ff66736b9bc 5580->5583 5584 7ff66736b990 5580->5584 5590 7ff6673700b0 std::_Facet_Register 3 API calls 5583->5590 5591 7ff66736b9a5 5583->5591 5586 7ff66736b99d 5584->5586 5587 7ff66736ba81 5584->5587 5589 7ff6673700b0 std::_Facet_Register 3 API calls 5586->5589 5588 7ff667361110 Concurrency::cancel_current_task __std_exception_copy 5587->5588 5588->5579 5589->5591 5590->5591 5592 7ff66736b9ed memcpy memcpy 5591->5592 5593 7ff66736ba41 memcpy memcpy 5591->5593 5595 7ff66736ba3a _invalid_parameter_noinfo_noreturn 5591->5595 5596 7ff66736ba18 5592->5596 5597 7ff66736ba2d 5592->5597 5594 7ff66736b4c5 5593->5594 5594->5543 5595->5593 5596->5595 5596->5597 5598 7ff66736fe10 free 5597->5598 5598->5594 5601 7ff667370362 RtlLookupFunctionEntry 5600->5601 5602 7ff667370378 RtlVirtualUnwind 5601->5602 5603 7ff66737017f 5601->5603 5602->5601 5602->5603 5604 7ff667370120 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 5603->5604 5606 7ff66736fbec 5605->5606 5607 7ff66736fdbe GetLastError 5605->5607 5606->5197 5606->5198 5607->5606 5609 7ff66736a747 memset Process32FirstW 5608->5609 5615 7ff66736a789 5608->5615 5610 7ff66736a76f 5609->5610 5610->5615 5616 7ff66736a779 Process32NextW 5610->5616 5611 7ff66736a79c 5613 7ff66736fdf0 8 API calls 5611->5613 5612 7ff66736a793 CloseHandle 5612->5611 5614 7ff66736a7ae 5613->5614 5614->5239 5614->5240 5615->5611 5615->5612 5616->5610 5618 7ff667361303 5617->5618 5618->5618 5619 7ff6673660d0 8 API calls 5618->5619 5620 7ff667361316 5619->5620 5626 7ff66736136c 5620->5626 6049 7ff667369200 5620->6049 5622 7ff667361414 5625 7ff66736fdf0 8 API calls 5622->5625 5623 7ff66736140c 5628 7ff66736fe10 free 5623->5628 5624 7ff6673613d1 5624->5622 5624->5623 5627 7ff667361405 _invalid_parameter_noinfo_noreturn 5624->5627 5629 7ff667361424 5625->5629 5626->5624 6069 7ff6673687d0 5626->6069 5627->5623 5628->5622 5629->5261 6091 7ff667365f90 5631->6091 5634 7ff667365b9a ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 5635 7ff6673619d3 ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J 5634->5635 5635->5272 5635->5273 5637 7ff667365efc 5636->5637 5641 7ff667365f4d 5636->5641 6121 7ff667365df0 5637->6121 5638 7ff667365f54 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 5638->5278 5640 7ff667365f31 fclose 5640->5638 5640->5641 5641->5638 5643 7ff667362776 5642->5643 5644 7ff6673627b3 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 5643->5644 5645 7ff667365ee0 12 API calls 5643->5645 5645->5644 5647 7ff6673612b0 23 API calls 5646->5647 5648 7ff66736e7a7 5647->5648 5685 7ff66736ec84 5648->5685 6133 7ff667368ef0 5648->6133 5651 7ff66736ec8a 6148 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD 5651->6148 5652 7ff66736e7f7 5652->5651 5654 7ff667368ef0 6 API calls 5652->5654 5656 7ff66736e839 RegCreateKeyW 5654->5656 5657 7ff66736e866 RegSetKeyValueW 5656->5657 5665 7ff66736e85d 5656->5665 5658 7ff66736e918 RegSetKeyValueW 5657->5658 5659 7ff66736e8a3 RegCloseKey 5657->5659 5660 7ff66736e95b RegCloseKey GetModuleHandleA 5658->5660 5661 7ff66736e949 RegCloseKey 5658->5661 5659->5665 5663 7ff66736e97a GetProcAddress GetProcAddress 5660->5663 5669 7ff66736e8cc 5660->5669 5661->5665 5662 7ff667366470 27 API calls 5664 7ff66736e8bc ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5662->5664 5663->5665 5664->5669 5665->5662 5670 7ff66736ec7f 5665->5670 5677 7ff667368ef0 6 API calls 5665->5677 5666 7ff66736ebb0 5667 7ff66736ec04 5666->5667 5672 7ff66736ebff 5666->5672 5679 7ff66736ebf8 _invalid_parameter_noinfo_noreturn 5666->5679 5674 7ff66736ec58 5667->5674 5675 7ff66736ec53 5667->5675 5681 7ff66736ec4c _invalid_parameter_noinfo_noreturn 5667->5681 5668 7ff66736ebab 5671 7ff66736fe10 free 5668->5671 5669->5666 5669->5668 5673 7ff66736e911 _invalid_parameter_noinfo_noreturn 5669->5673 5689 7ff667366470 27 API calls 5669->5689 5691 7ff667366470 27 API calls 5669->5691 5699 7ff66736fe10 free 5669->5699 5700 7ff66736eb19 _invalid_parameter_noinfo_noreturn 5669->5700 6146 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD 5670->6146 5671->5666 5680 7ff66736fe10 free 5672->5680 5673->5658 5676 7ff66736fdf0 8 API calls 5674->5676 5682 7ff66736fe10 free 5675->5682 5683 7ff667361a73 5676->5683 5684 7ff66736ea01 RtlInitUnicodeString 5677->5684 5679->5672 5680->5667 5681->5675 5682->5674 5683->5293 5683->5294 5686 7ff66736ea20 5684->5686 6147 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD 5685->6147 5687 7ff667366470 27 API calls 5686->5687 5688 7ff66736ea35 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5687->5688 5688->5669 5690 7ff66736ea7f ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5689->5690 5692 7ff667366470 27 API calls 5690->5692 5693 7ff66736eb43 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J 5691->5693 5694 7ff66736eaa2 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5692->5694 5695 7ff667366470 27 API calls 5693->5695 5697 7ff667366470 27 API calls 5694->5697 5696 7ff66736eb6d ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5695->5696 5696->5669 5698 7ff66736eac5 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5697->5698 5698->5669 5699->5669 5700->5669 5702 7ff66736f2ae 5701->5702 5703 7ff66736f25d 5701->5703 5704 7ff66736f2b2 5702->5704 5714 7ff66736f2cf 5702->5714 5705 7ff66736f276 VirtualAlloc NtQuerySystemInformation 5703->5705 5706 7ff66736f265 VirtualFree 5703->5706 5707 7ff66736f2b7 VirtualFree 5704->5707 5715 7ff66736f2d4 5704->5715 5705->5702 5705->5703 5706->5705 5707->5715 5708 7ff66736f3b8 VirtualFree 5708->5715 5709 7ff66736fdf0 8 API calls 5710 7ff667361b2d 5709->5710 5710->5306 5710->5307 5710->5310 5711 7ff6673660d0 8 API calls 5711->5714 5712 7ff66736f356 _stricmp 5713 7ff66736f3ee VirtualFree 5712->5713 5712->5714 5713->5715 5716 7ff66736f40e 5713->5716 5714->5708 5714->5711 5714->5712 5714->5715 5719 7ff66736f437 _invalid_parameter_noinfo_noreturn 5714->5719 5720 7ff66736fe10 free 5714->5720 5715->5709 5717 7ff66736f43e 5716->5717 5716->5719 5718 7ff66736fe10 free 5717->5718 5718->5715 5719->5717 5720->5714 5722 7ff667362868 5721->5722 5723 7ff6673627fe 5721->5723 5724 7ff66736fdf0 8 API calls 5722->5724 5723->5722 5725 7ff667362808 DeviceIoControl 5723->5725 5726 7ff667362877 5724->5726 5727 7ff66736fdf0 8 API calls 5725->5727 5726->5311 5728 7ff667362860 5727->5728 5728->5311 6149 7ff667364320 5729->6149 5732 7ff667364320 22 API calls 5733 7ff667363b97 5732->5733 5734 7ff667363c3d 5733->5734 5735 7ff667364320 22 API calls 5733->5735 5736 7ff667363c5d 5734->5736 5737 7ff667363bea 5734->5737 5738 7ff667363bd7 5735->5738 5739 7ff667366470 27 API calls 5736->5739 5740 7ff667366260 7 API calls 5737->5740 5738->5737 5741 7ff667366260 7 API calls 5738->5741 5742 7ff667363c69 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5739->5742 5743 7ff667363bf6 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5740->5743 5744 7ff667363c19 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5741->5744 5745 7ff667366470 27 API calls 5742->5745 5746 7ff667364181 5743->5746 5744->5734 5747 7ff667363cac ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5745->5747 5748 7ff66736fdf0 8 API calls 5746->5748 5749 7ff6673627e0 9 API calls 5747->5749 5751 7ff667361bcb 5748->5751 5750 7ff667363cfe 5749->5750 5752 7ff6673627e0 9 API calls 5750->5752 5751->5296 5807 7ff667364510 5751->5807 5753 7ff667363d33 5752->5753 6164 7ff667363690 5753->6164 5756 7ff667366260 7 API calls 5757 7ff667363d75 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5756->5757 5758 7ff6673612b0 23 API calls 5757->5758 5759 7ff667363d8e 5758->5759 6184 7ff667363930 5759->6184 5762 7ff6673627e0 9 API calls 5763 7ff667363dd2 5762->5763 5765 7ff6673627e0 9 API calls 5763->5765 5769 7ff667363db0 5763->5769 5764 7ff667366260 7 API calls 5766 7ff667364121 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5764->5766 5767 7ff667363df7 5765->5767 5768 7ff6673637f0 56 API calls 5766->5768 5767->5769 5770 7ff667366470 27 API calls 5767->5770 5774 7ff66736413c 5768->5774 5769->5764 5771 7ff667363e1a ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5770->5771 5771->5769 5772 7ff667363e53 DeviceIoControl 5771->5772 5772->5769 5775 7ff667363eaf 5772->5775 5773 7ff66736417c 5777 7ff66736fe10 free 5773->5777 5774->5746 5774->5773 5776 7ff667364175 _invalid_parameter_noinfo_noreturn 5774->5776 5775->5769 5778 7ff667363ebd DeviceIoControl 5775->5778 5776->5773 5777->5746 5778->5769 5779 7ff667363f19 5778->5779 5779->5769 5780 7ff667363ffa 5779->5780 6206 7ff66736ffa0 EnterCriticalSection 5779->6206 5781 7ff667364033 5780->5781 5782 7ff667364004 5780->5782 6211 7ff667368150 5781->6211 5784 7ff667366260 7 API calls 5782->5784 5787 7ff667364017 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5784->5787 5787->5769 5791 7ff667364051 5793 7ff6673627e0 9 API calls 5791->5793 5795 7ff66736406e 5793->5795 5796 7ff6673640d3 5795->5796 5798 7ff66736407f DeviceIoControl 5795->5798 6239 7ff6673637f0 5796->6239 5798->5796 5803 7ff6673640de 5805 7ff667366260 7 API calls 5803->5805 5806 7ff6673640f1 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5805->5806 5806->5774 5808 7ff6673660d0 8 API calls 5807->5808 5809 7ff667364570 5808->5809 5810 7ff66736f220 25 API calls 5809->5810 5811 7ff66736457a 5810->5811 5812 7ff6673645bb 5811->5812 5813 7ff6673645b6 5811->5813 5816 7ff6673645af _invalid_parameter_noinfo_noreturn 5811->5816 5815 7ff667364320 22 API calls 5812->5815 5833 7ff6673645c0 5812->5833 5814 7ff66736fe10 free 5813->5814 5814->5812 5817 7ff6673645f1 5815->5817 5816->5813 5820 7ff6673641b0 20 API calls 5817->5820 5817->5833 5818 7ff667366260 7 API calls 5819 7ff667364e52 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5818->5819 5821 7ff6673647f0 5819->5821 5822 7ff66736462a 5820->5822 5823 7ff66736fdf0 8 API calls 5821->5823 5824 7ff6673627e0 9 API calls 5822->5824 5822->5833 5825 7ff667361be0 5823->5825 5826 7ff66736465a 5824->5826 5825->5296 5913 7ff6673632e0 NtQuerySystemInformation 5825->5913 5827 7ff6673627e0 9 API calls 5826->5827 5828 7ff66736468d 5827->5828 5829 7ff667366260 7 API calls 5828->5829 5828->5833 5830 7ff6673646cb ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5829->5830 5831 7ff667363690 56 API calls 5830->5831 5832 7ff667364702 5831->5832 5832->5833 5834 7ff667366260 7 API calls 5832->5834 5833->5818 5833->5821 5835 7ff667364725 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5834->5835 5836 7ff6673627e0 9 API calls 5835->5836 5837 7ff66736474e 5836->5837 5838 7ff667364752 5837->5838 5839 7ff667364794 5837->5839 5840 7ff667366260 7 API calls 5838->5840 5841 7ff66736479b 5839->5841 5842 7ff6673647f7 5839->5842 5844 7ff667364765 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5840->5844 5845 7ff667366260 7 API calls 5841->5845 5843 7ff6673612b0 23 API calls 5842->5843 5884 7ff667364800 5843->5884 5846 7ff6673637f0 56 API calls 5844->5846 5847 7ff6673647ae ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5845->5847 5846->5833 5848 7ff6673637f0 56 API calls 5847->5848 5849 7ff6673647c9 5848->5849 5849->5821 5851 7ff667366260 7 API calls 5849->5851 5850 7ff667364d6a 5853 7ff6673637f0 56 API calls 5850->5853 5852 7ff6673647e0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5851->5852 5852->5821 5854 7ff667364d7a 5853->5854 5856 7ff667366260 7 API calls 5854->5856 5860 7ff667364d2c 5854->5860 5855 7ff667364d2e 5859 7ff667366260 7 API calls 5855->5859 5857 7ff667364d91 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5856->5857 5857->5860 5858 7ff667364de6 5858->5821 5866 7ff667364e35 5858->5866 5867 7ff667364e2e _invalid_parameter_noinfo_noreturn 5858->5867 5862 7ff667364d4a ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5859->5862 5860->5858 5861 7ff667364de1 5860->5861 5864 7ff667364dda _invalid_parameter_noinfo_noreturn 5860->5864 5865 7ff66736fe10 free 5861->5865 5862->5850 5863 7ff6673627e0 9 API calls 5863->5884 5864->5861 5865->5858 5868 7ff66736fe10 free 5866->5868 5867->5866 5868->5821 5869 7ff6673648bf memset 5870 7ff6673627e0 9 API calls 5869->5870 5870->5884 5871 7ff667364bd5 5872 7ff667366260 7 API calls 5871->5872 5874 7ff667364cde ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5872->5874 5873 7ff66736491b memcpy 5873->5884 5876 7ff667364cf3 5874->5876 5875 7ff667368980 7 API calls 5875->5884 5877 7ff6673637f0 56 API calls 5876->5877 5878 7ff667364cfb 5877->5878 5880 7ff667366260 7 API calls 5878->5880 5910 7ff667364cbe 5878->5910 5879 7ff667364ad9 5881 7ff667366260 7 API calls 5879->5881 5886 7ff667364d12 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5880->5886 5887 7ff667364aec 5881->5887 5882 7ff66736fe10 free 5882->5860 5883 7ff667364ad2 _invalid_parameter_noinfo_noreturn 5883->5879 5884->5850 5884->5855 5884->5863 5884->5869 5884->5871 5884->5873 5884->5875 5884->5879 5884->5883 5885 7ff66736fe10 free 5884->5885 5885->5884 5886->5910 5888 7ff667364b25 memcpy 5887->5888 5889 7ff667364b40 5887->5889 5890 7ff667364b48 5888->5890 5891 7ff667368980 7 API calls 5889->5891 5892 7ff667369030 7 API calls 5890->5892 5891->5890 5893 7ff667364b63 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5892->5893 5894 7ff667364bb7 5893->5894 5895 7ff667364b7e 5893->5895 5896 7ff6673627e0 9 API calls 5894->5896 5897 7ff667364bb2 5895->5897 5899 7ff667364bab _invalid_parameter_noinfo_noreturn 5895->5899 5898 7ff667364bd1 5896->5898 5900 7ff66736fe10 free 5897->5900 5898->5871 5901 7ff667364bee DeviceIoControl 5898->5901 5899->5897 5900->5894 5901->5871 5902 7ff667364c46 5901->5902 6409 7ff667362e70 5902->6409 5904 7ff667364c52 5904->5871 5905 7ff667364c66 5904->5905 5906 7ff667366260 7 API calls 5905->5906 5907 7ff667364c72 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5906->5907 5908 7ff6673637f0 56 API calls 5907->5908 5909 7ff667364c92 5908->5909 5909->5910 5911 7ff667366260 7 API calls 5909->5911 5910->5882 5912 7ff667364ca9 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5911->5912 5912->5876 5914 7ff667363334 VirtualFree VirtualAlloc NtQuerySystemInformation 5913->5914 5917 7ff66736337a 5913->5917 5914->5914 5914->5917 5915 7ff667363642 5916 7ff667363647 VirtualFree 5915->5916 5950 7ff6673635fd 5915->5950 5916->5950 5917->5915 5917->5916 5918 7ff6673633f9 VirtualFree 5917->5918 5919 7ff6673633a0 GetCurrentProcessId 5917->5919 5924 7ff6673633f5 5917->5924 5917->5950 5921 7ff667363413 5918->5921 5918->5950 5919->5917 5920 7ff66736fdf0 8 API calls 5922 7ff667361bf5 5920->5922 5923 7ff6673627e0 9 API calls 5921->5923 5922->5296 5922->5318 5925 7ff66736342d 5923->5925 5924->5918 5926 7ff667363602 5925->5926 5928 7ff6673627e0 9 API calls 5925->5928 5927 7ff667366260 7 API calls 5926->5927 5930 7ff667363615 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5927->5930 5929 7ff66736345c 5928->5929 5929->5926 5931 7ff6673627e0 9 API calls 5929->5931 5930->5950 5932 7ff66736348b 5931->5932 5932->5926 5933 7ff6673627e0 9 API calls 5932->5933 5934 7ff6673634bd 5933->5934 5934->5926 5935 7ff6673634d2 5934->5935 5936 7ff6673634f8 memset 5935->5936 5937 7ff6673627e0 9 API calls 5936->5937 5938 7ff667363520 5937->5938 5939 7ff667363524 5938->5939 5940 7ff667363543 DeviceIoControl 5938->5940 5942 7ff667366260 7 API calls 5939->5942 5940->5939 5941 7ff66736359b 5940->5941 5943 7ff667366260 7 API calls 5941->5943 5944 7ff6673635e3 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5942->5944 5945 7ff6673635ae 5943->5945 5946 7ff6673635f5 5944->5946 5947 7ff667366260 7 API calls 5945->5947 5948 7ff66736fe10 free 5946->5948 5949 7ff6673635bc ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5947->5949 5948->5950 5949->5946 5950->5920 5952 7ff6673660d0 8 API calls 5951->5952 5953 7ff667361d41 5952->5953 5954 7ff66736f220 25 API calls 5953->5954 5955 7ff667361d4b 5954->5955 5956 7ff667361d8c 5955->5956 5957 7ff667361d87 5955->5957 5960 7ff667361d80 _invalid_parameter_noinfo_noreturn 5955->5960 5958 7ff667361db8 5956->5958 5959 7ff667361d91 5956->5959 5961 7ff66736fe10 free 5957->5961 5963 7ff667364320 22 API calls 5958->5963 5962 7ff667366470 27 API calls 5959->5962 5960->5957 5961->5956 5964 7ff667361da4 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5962->5964 5965 7ff667361ddd 5963->5965 5966 7ff667361e08 5964->5966 5968 7ff667364320 22 API calls 5965->5968 5981 7ff667361de5 5965->5981 5967 7ff66736fdf0 8 API calls 5966->5967 5969 7ff667361c0a 5967->5969 5970 7ff667361e5c 5968->5970 5969->5275 6033 7ff667366470 5969->6033 5973 7ff667364320 22 API calls 5970->5973 5970->5981 5971 7ff667366470 27 API calls 5972 7ff667361df8 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5971->5972 5972->5966 5974 7ff667361e95 5973->5974 5975 7ff667361ef9 5974->5975 5976 7ff667364320 22 API calls 5974->5976 5977 7ff6673627e0 9 API calls 5975->5977 5978 7ff667361ec2 5976->5978 5979 7ff667361f17 5977->5979 5980 7ff667361edd 5978->5980 5978->5981 5984 7ff6673627e0 9 API calls 5979->5984 5982 7ff667366470 27 API calls 5980->5982 5981->5971 5983 7ff667361ee9 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 5982->5983 5983->5975 5985 7ff667361f48 5984->5985 5986 7ff6673627e0 9 API calls 5985->5986 5987 7ff667361f76 5986->5987 5988 7ff6673627e0 9 API calls 5987->5988 5989 7ff667361f90 5988->5989 5990 7ff6673627e0 9 API calls 5989->5990 5994 7ff667361fbe 5990->5994 5991 7ff6673627e0 9 API calls 5991->5994 5992 7ff66736201f memset 5993 7ff6673627e0 9 API calls 5992->5993 5993->5994 5994->5966 5994->5991 5994->5992 5995 7ff6673612b0 23 API calls 5994->5995 5996 7ff66736205e wcsstr 5994->5996 5997 7ff6673620ea _invalid_parameter_noinfo_noreturn 5994->5997 5998 7ff66736fe10 free 5994->5998 6000 7ff6673620f1 5994->6000 5995->5994 5996->5994 5997->6000 5998->5994 5999 7ff6673627e0 9 API calls 5999->6000 6000->5999 6001 7ff66736215f 6000->6001 6002 7ff667362135 6000->6002 6003 7ff6673621cc 6001->6003 6004 7ff667362178 DeviceIoControl 6001->6004 6005 7ff667366470 27 API calls 6002->6005 6006 7ff6673627e0 9 API calls 6003->6006 6004->6003 6007 7ff667362148 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6005->6007 6008 7ff6673621e3 6006->6008 6009 7ff6673623cb 6007->6009 6010 7ff6673627e0 9 API calls 6008->6010 6011 7ff66736fe10 free 6009->6011 6012 7ff667362207 6010->6012 6011->5966 6013 7ff667362275 6012->6013 6014 7ff66736221f DeviceIoControl 6012->6014 6015 7ff66736227a DeviceIoControl 6013->6015 6016 7ff6673622cc 6013->6016 6014->6013 6015->6016 6017 7ff6673627e0 9 API calls 6016->6017 6018 7ff6673622e4 6017->6018 6019 7ff6673622ec DeviceIoControl 6018->6019 6020 7ff66736233e 6018->6020 6019->6020 6021 7ff6673627e0 9 API calls 6020->6021 6022 7ff667362358 6021->6022 6023 7ff667362388 6022->6023 6024 7ff667362363 6022->6024 6454 7ff6673666d0 6023->6454 6025 7ff667366470 27 API calls 6024->6025 6027 7ff667362376 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6025->6027 6028 7ff667362398 6027->6028 6029 7ff667366470 27 API calls 6028->6029 6030 7ff6673623ab 6029->6030 6031 7ff667366260 7 API calls 6030->6031 6032 7ff6673623b9 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6031->6032 6032->6009 6035 7ff6673664a0 6033->6035 6034 7ff6673664ed 6037 7ff66736652e ?getloc@ios_base@std@@QEBA?AVlocale@2 6034->6037 6045 7ff667366524 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 6034->6045 6035->6034 6036 7ff667366500 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 6035->6036 6036->6034 6481 7ff6673686c0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 6037->6481 6040 7ff66736669a ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 6041 7ff667361c21 6040->6041 6041->5303 6042 7ff6673665b4 6042->6045 6046 7ff6673665da ?widen@?$ctype@_W@std@@QEBA_WD ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 6042->6046 6047 7ff667366623 6042->6047 6043 7ff667366597 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 6043->6042 6044 7ff667366549 6043->6044 6044->6042 6044->6043 6045->6040 6045->6041 6046->6042 6047->6045 6048 7ff667366628 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W 6047->6048 6048->6045 6048->6047 6050 7ff667369359 6049->6050 6051 7ff667369229 6049->6051 6089 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD 6050->6089 6053 7ff66736935e 6051->6053 6054 7ff66736929c 6051->6054 6055 7ff6673692c4 6051->6055 6056 7ff667361110 Concurrency::cancel_current_task __std_exception_copy 6053->6056 6054->6053 6057 7ff6673692a9 6054->6057 6060 7ff6673700b0 std::_Facet_Register 3 API calls 6055->6060 6061 7ff6673692b1 6055->6061 6058 7ff667369364 6056->6058 6059 7ff6673700b0 std::_Facet_Register 3 API calls 6057->6059 6059->6061 6060->6061 6062 7ff667369333 memcpy 6061->6062 6063 7ff6673692ee memcpy 6061->6063 6064 7ff66736932c _invalid_parameter_noinfo_noreturn 6061->6064 6068 7ff66736932a 6062->6068 6065 7ff66736930a 6063->6065 6066 7ff66736931f 6063->6066 6064->6062 6065->6064 6065->6066 6067 7ff66736fe10 free 6066->6067 6067->6068 6068->5626 6070 7ff66736896a 6069->6070 6074 7ff667368800 6069->6074 6090 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD 6070->6090 6072 7ff66736882b 6073 7ff66736896f 6072->6073 6075 7ff66736889a 6072->6075 6076 7ff667361110 Concurrency::cancel_current_task __std_exception_copy 6073->6076 6074->6072 6074->6073 6077 7ff6673688b9 6074->6077 6078 7ff6673700b0 std::_Facet_Register 3 API calls 6075->6078 6079 7ff667368975 6076->6079 6080 7ff6673688a2 6077->6080 6081 7ff6673700b0 std::_Facet_Register 3 API calls 6077->6081 6078->6080 6082 7ff66736892b _invalid_parameter_noinfo_noreturn 6080->6082 6083 7ff667368932 memcpy 6080->6083 6084 7ff6673688e2 memcpy 6080->6084 6081->6080 6082->6083 6087 7ff667368929 6083->6087 6085 7ff667368909 6084->6085 6086 7ff66736891e 6084->6086 6085->6082 6085->6086 6088 7ff66736fe10 free 6086->6088 6087->5626 6088->6087 6092 7ff66736607a 6091->6092 6093 7ff667365fbe ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH 6091->6093 6095 7ff66736fdf0 8 API calls 6092->6095 6093->6092 6094 7ff667365fdc ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ _get_stream_buffer_pointers ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2 6093->6094 6100 7ff6673685b0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 6094->6100 6097 7ff667365b95 6095->6097 6097->5634 6097->5635 6099 7ff667366080 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6099->6092 6101 7ff667368612 6100->6101 6102 7ff667368687 ??1_Lockit@std@@QEAA 6101->6102 6104 7ff667368635 6101->6104 6105 7ff667368629 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 6101->6105 6103 7ff66736fdf0 8 API calls 6102->6103 6106 7ff66736606a ?always_noconv@codecvt_base@std@ 6103->6106 6104->6102 6107 7ff66736864c ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 6104->6107 6105->6104 6106->6092 6106->6099 6108 7ff6673686b7 6107->6108 6109 7ff667368660 6107->6109 6117 7ff667361200 6108->6117 6114 7ff66736f824 6109->6114 6113 7ff6673686bc 6115 7ff6673700b0 std::_Facet_Register 3 API calls 6114->6115 6116 7ff667368672 6115->6116 6116->6102 6120 7ff6673611d0 6117->6120 6119 7ff66736120e _CxxThrowException __std_exception_copy 6119->6113 6120->6119 6122 7ff667365ec3 6121->6122 6123 7ff667365e13 6121->6123 6124 7ff66736fdf0 8 API calls 6122->6124 6123->6122 6125 7ff667365e1d 6123->6125 6126 7ff667365ed2 6124->6126 6127 7ff667365e36 ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD 6125->6127 6128 7ff667365e61 6125->6128 6126->5640 6129 7ff667365e5c 6127->6129 6130 7ff66736fdf0 8 API calls 6128->6130 6129->6128 6131 7ff667365e97 fwrite 6129->6131 6132 7ff667365e7e 6130->6132 6131->6128 6132->5640 6134 7ff667368fdb memcpy memcpy 6133->6134 6135 7ff667368f44 6133->6135 6134->5652 6136 7ff667369023 6135->6136 6137 7ff667368fc6 6135->6137 6138 7ff667368fa4 6135->6138 6139 7ff667361110 Concurrency::cancel_current_task __std_exception_copy 6136->6139 6141 7ff667368fb1 6137->6141 6144 7ff6673700b0 std::_Facet_Register 3 API calls 6137->6144 6140 7ff6673700b0 std::_Facet_Register 3 API calls 6138->6140 6142 7ff667369028 6139->6142 6143 7ff667368fac 6140->6143 6141->6134 6143->6141 6145 7ff667368fbf _invalid_parameter_noinfo_noreturn 6143->6145 6144->6141 6145->6137 6150 7ff667364331 6149->6150 6151 7ff6673627e0 9 API calls 6150->6151 6163 7ff6673643a2 6150->6163 6152 7ff66736437b 6151->6152 6154 7ff6673643aa 6152->6154 6155 7ff66736437f 6152->6155 6161 7ff667366260 7 API calls 6154->6161 6154->6163 6157 7ff667366260 7 API calls 6155->6157 6159 7ff667364392 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6157->6159 6158 7ff66736fdf0 8 API calls 6160 7ff667363b67 6158->6160 6159->6163 6160->5732 6162 7ff66736445f ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6161->6162 6162->6163 6284 7ff6673641b0 6163->6284 6165 7ff6673637a6 6164->6165 6166 7ff6673636a9 6164->6166 6165->5756 6167 7ff667363779 6166->6167 6170 7ff66736ffa0 5 API calls 6166->6170 6168 7ff6673637b6 6167->6168 6169 7ff667363783 6167->6169 6329 7ff667367d00 6168->6329 6171 7ff667366260 7 API calls 6169->6171 6172 7ff6673636d5 6170->6172 6174 7ff667363796 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6171->6174 6172->6167 6175 7ff6673660d0 8 API calls 6172->6175 6174->6165 6176 7ff667363710 6175->6176 6300 7ff667362fb0 6176->6300 6179 7ff66736376c 6325 7ff66736ff40 EnterCriticalSection LeaveCriticalSection 6179->6325 6180 7ff667363767 6183 7ff66736fe10 free 6180->6183 6182 7ff667363760 _invalid_parameter_noinfo_noreturn 6182->6180 6183->6179 6186 7ff667363990 6184->6186 6185 7ff667363a97 6188 7ff667363ac6 6185->6188 6189 7ff667363aa1 6185->6189 6186->6185 6190 7ff66736ffa0 5 API calls 6186->6190 6196 7ff667363ae0 6186->6196 6187 7ff66736fdf0 8 API calls 6191 7ff667363b01 6187->6191 6378 7ff667368380 6188->6378 6192 7ff667366260 7 API calls 6189->6192 6193 7ff6673639e0 6190->6193 6191->5762 6191->5769 6195 7ff667363ab4 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6192->6195 6193->6185 6197 7ff6673660d0 8 API calls 6193->6197 6195->6196 6196->6187 6198 7ff667363a1c 6197->6198 6199 7ff667362fb0 25 API calls 6198->6199 6200 7ff667363a31 6199->6200 6201 7ff667363a78 6200->6201 6203 7ff667363a73 6200->6203 6204 7ff667363a6c _invalid_parameter_noinfo_noreturn 6200->6204 6202 7ff66736ff40 4 API calls 6201->6202 6202->6185 6205 7ff66736fe10 free 6203->6205 6204->6203 6205->6201 6208 7ff66736ffb6 6206->6208 6207 7ff66736ffbb LeaveCriticalSection 6208->6207 6406 7ff66737004c 6208->6406 6212 7ff667368189 6211->6212 6238 7ff6673681c3 6211->6238 6213 7ff66736818e GetModuleHandleA 6212->6213 6212->6238 6215 7ff6673681e0 GetProcAddress 6213->6215 6216 7ff6673681a0 6213->6216 6214 7ff66736fdf0 8 API calls 6217 7ff667364047 6214->6217 6215->6216 6218 7ff667368201 6215->6218 6220 7ff667366260 7 API calls 6216->6220 6217->5769 6217->5791 6219 7ff6673682d9 6218->6219 6221 7ff66736ffa0 5 API calls 6218->6221 6224 7ff6673627e0 9 API calls 6219->6224 6222 7ff6673681b3 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6220->6222 6223 7ff66736823d 6221->6223 6222->6238 6223->6219 6225 7ff6673660d0 8 API calls 6223->6225 6229 7ff667368303 6224->6229 6226 7ff667368273 6225->6226 6228 7ff667362fb0 25 API calls 6226->6228 6227 7ff667362880 25 API calls 6230 7ff66736834e 6227->6230 6231 7ff667368287 6228->6231 6229->6227 6229->6238 6237 7ff667362880 25 API calls 6230->6237 6230->6238 6232 7ff6673682cc 6231->6232 6233 7ff6673682c7 6231->6233 6235 7ff6673682c0 _invalid_parameter_noinfo_noreturn 6231->6235 6234 7ff66736ff40 4 API calls 6232->6234 6236 7ff66736fe10 free 6233->6236 6234->6219 6235->6233 6236->6232 6237->6238 6238->6214 6240 7ff667363906 6239->6240 6241 7ff667363809 6239->6241 6240->5803 6242 7ff6673638d9 6241->6242 6245 7ff66736ffa0 5 API calls 6241->6245 6243 7ff667363913 6242->6243 6244 7ff6673638e3 6242->6244 6249 7ff667367f65 GetModuleHandleA 6243->6249 6283 7ff667367f9a 6243->6283 6246 7ff667366260 7 API calls 6244->6246 6247 7ff667363835 6245->6247 6248 7ff6673638f6 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6246->6248 6247->6242 6250 7ff6673660d0 8 API calls 6247->6250 6248->6240 6251 7ff667367fbd GetProcAddress 6249->6251 6252 7ff667367f77 6249->6252 6255 7ff667363870 6250->6255 6251->6252 6254 7ff667367fde 6251->6254 6259 7ff667366260 7 API calls 6252->6259 6253 7ff66736fdf0 8 API calls 6256 7ff667367fa8 6253->6256 6257 7ff6673680b6 6254->6257 6261 7ff66736ffa0 5 API calls 6254->6261 6258 7ff667362fb0 25 API calls 6255->6258 6256->5803 6264 7ff6673627e0 9 API calls 6257->6264 6262 7ff667363885 6258->6262 6260 7ff667367f8a ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6259->6260 6260->6283 6263 7ff66736801a 6261->6263 6265 7ff6673638cc 6262->6265 6267 7ff6673638c7 6262->6267 6270 7ff6673638c0 _invalid_parameter_noinfo_noreturn 6262->6270 6263->6257 6269 7ff6673660d0 8 API calls 6263->6269 6272 7ff6673680e0 6264->6272 6266 7ff66736ff40 4 API calls 6265->6266 6266->6242 6268 7ff66736fe10 free 6267->6268 6268->6265 6271 7ff667368050 6269->6271 6270->6267 6274 7ff667362fb0 25 API calls 6271->6274 6273 7ff667362880 25 API calls 6272->6273 6272->6283 6280 7ff66736812b 6273->6280 6275 7ff667368064 6274->6275 6276 7ff6673680a4 6275->6276 6278 7ff66736809d _invalid_parameter_noinfo_noreturn 6275->6278 6281 7ff6673680a9 6275->6281 6279 7ff66736fe10 free 6276->6279 6277 7ff66736ff40 4 API calls 6277->6257 6278->6276 6279->6281 6282 7ff667362880 25 API calls 6280->6282 6280->6283 6281->6277 6282->6283 6283->6253 6285 7ff66736420d 6284->6285 6286 7ff6673641e3 6284->6286 6285->6286 6287 7ff66736421f 6285->6287 6288 7ff667366260 7 API calls 6286->6288 6290 7ff667364227 memset 6287->6290 6289 7ff6673641f6 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6288->6289 6291 7ff6673642f6 6289->6291 6292 7ff6673627e0 9 API calls 6290->6292 6293 7ff66736fdf0 8 API calls 6291->6293 6294 7ff66736424d 6292->6294 6295 7ff667364306 6293->6295 6296 7ff667366260 7 API calls 6294->6296 6299 7ff667364276 6294->6299 6295->6158 6297 7ff667364264 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6296->6297 6297->6299 6298 7ff66736fe10 free 6298->6291 6299->6298 6301 7ff667362fea memset 6300->6301 6302 7ff6673631f4 6300->6302 6303 7ff6673627e0 9 API calls 6301->6303 6305 7ff66736fdf0 8 API calls 6302->6305 6304 7ff667363025 6303->6304 6304->6302 6307 7ff6673627e0 9 API calls 6304->6307 6306 7ff66736321b 6305->6306 6306->6179 6306->6180 6306->6182 6308 7ff667363056 6307->6308 6308->6302 6309 7ff667363081 VirtualAlloc 6308->6309 6310 7ff6673627e0 9 API calls 6309->6310 6311 7ff6673630d1 6310->6311 6312 7ff6673630d5 VirtualFree 6311->6312 6317 7ff6673630ed 6311->6317 6312->6302 6313 7ff6673631e1 VirtualFree 6313->6302 6314 7ff6673660d0 8 API calls 6314->6317 6315 7ff667363175 _stricmp 6316 7ff66736322a 6315->6316 6315->6317 6318 7ff6673632ae VirtualFree 6316->6318 6319 7ff667363260 VirtualFree 6316->6319 6322 7ff667363271 6316->6322 6317->6313 6317->6314 6317->6315 6320 7ff6673632a7 _invalid_parameter_noinfo_noreturn 6317->6320 6321 7ff66736fe10 free 6317->6321 6318->6322 6319->6322 6320->6318 6321->6317 6322->6302 6322->6320 6323 7ff6673632c1 6322->6323 6324 7ff66736fe10 free 6323->6324 6324->6302 6326 7ff667370008 6325->6326 6327 7ff66737002a SetEvent ResetEvent 6326->6327 6328 7ff667370018 6326->6328 6330 7ff667367d36 6329->6330 6356 7ff667367d70 6329->6356 6331 7ff667367d3b GetModuleHandleA 6330->6331 6330->6356 6332 7ff667367d4d 6331->6332 6333 7ff667367d92 GetProcAddress 6331->6333 6338 7ff667366260 7 API calls 6332->6338 6333->6332 6335 7ff667367db3 6333->6335 6334 7ff66736fdf0 8 API calls 6336 7ff667367d7e 6334->6336 6337 7ff667367e8b 6335->6337 6339 7ff66736ffa0 5 API calls 6335->6339 6336->6165 6342 7ff6673627e0 9 API calls 6337->6342 6340 7ff667367d60 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6338->6340 6341 7ff667367def 6339->6341 6340->6356 6341->6337 6344 7ff6673660d0 8 API calls 6341->6344 6343 7ff667367eb5 6342->6343 6343->6356 6357 7ff667362880 6343->6357 6345 7ff667367e25 6344->6345 6347 7ff667362fb0 25 API calls 6345->6347 6348 7ff667367e39 6347->6348 6349 7ff667367e7e 6348->6349 6351 7ff667367e79 6348->6351 6353 7ff667367e72 _invalid_parameter_noinfo_noreturn 6348->6353 6350 7ff66736ff40 4 API calls 6349->6350 6350->6337 6354 7ff66736fe10 free 6351->6354 6353->6351 6354->6349 6355 7ff667362880 25 API calls 6355->6356 6356->6334 6358 7ff6673628b2 6357->6358 6372 7ff667362a60 6357->6372 6359 7ff6673628bb DeviceIoControl 6358->6359 6358->6372 6361 7ff66736290d 6359->6361 6362 7ff667362943 6359->6362 6360 7ff66736fdf0 8 API calls 6363 7ff667362a80 6360->6363 6364 7ff667366260 7 API calls 6361->6364 6365 7ff667362a8d 6362->6365 6366 7ff667362958 DeviceIoControl 6362->6366 6363->6355 6363->6356 6367 7ff667362920 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6364->6367 6368 7ff667366260 7 API calls 6365->6368 6366->6365 6369 7ff6673629b4 6366->6369 6367->6372 6370 7ff667362aa0 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6368->6370 6369->6365 6371 7ff6673629c1 6369->6371 6370->6372 6373 7ff6673627e0 9 API calls 6371->6373 6372->6360 6374 7ff6673629d5 DeviceIoControl 6373->6374 6374->6372 6375 7ff667362a31 6374->6375 6376 7ff667366260 7 API calls 6375->6376 6377 7ff667362a44 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6376->6377 6377->6372 6379 7ff6673683b9 6378->6379 6405 7ff6673683f3 6378->6405 6380 7ff6673683be GetModuleHandleA 6379->6380 6379->6405 6381 7ff667368410 GetProcAddress 6380->6381 6382 7ff6673683d0 6380->6382 6381->6382 6385 7ff667368431 6381->6385 6386 7ff667366260 7 API calls 6382->6386 6383 7ff66736fdf0 8 API calls 6384 7ff667368401 6383->6384 6384->6196 6388 7ff667368509 6385->6388 6389 7ff66736ffa0 5 API calls 6385->6389 6387 7ff6673683e3 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6386->6387 6387->6405 6391 7ff6673627e0 9 API calls 6388->6391 6390 7ff66736846d 6389->6390 6390->6388 6392 7ff6673660d0 8 API calls 6390->6392 6395 7ff667368533 6391->6395 6393 7ff6673684a3 6392->6393 6394 7ff667362fb0 25 API calls 6393->6394 6397 7ff6673684b7 6394->6397 6396 7ff667362880 25 API calls 6395->6396 6395->6405 6398 7ff66736857e 6396->6398 6399 7ff6673684fc 6397->6399 6400 7ff6673684f7 6397->6400 6402 7ff6673684f0 _invalid_parameter_noinfo_noreturn 6397->6402 6404 7ff667362880 25 API calls 6398->6404 6398->6405 6401 7ff66736ff40 4 API calls 6399->6401 6403 7ff66736fe10 free 6400->6403 6401->6388 6402->6400 6403->6399 6404->6405 6405->6383 6407 7ff66737007d LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 6406->6407 6408 7ff667370060 6406->6408 6408->6407 6410 7ff667362e89 6409->6410 6411 7ff667362f88 6409->6411 6412 7ff667362f59 6410->6412 6415 7ff66736ffa0 5 API calls 6410->6415 6411->5904 6413 7ff667362f95 6412->6413 6414 7ff667362f65 6412->6414 6418 7ff667366701 GetModuleHandleA 6413->6418 6453 7ff667366736 6413->6453 6416 7ff667366260 7 API calls 6414->6416 6417 7ff667362eb5 6415->6417 6419 7ff667362f78 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6416->6419 6417->6412 6422 7ff6673660d0 8 API calls 6417->6422 6420 7ff667366759 GetProcAddress 6418->6420 6421 7ff667366713 6418->6421 6419->6411 6420->6421 6423 7ff66736677a 6420->6423 6427 7ff667366260 7 API calls 6421->6427 6424 7ff667362ef0 6422->6424 6426 7ff667366852 6423->6426 6430 7ff66736ffa0 5 API calls 6423->6430 6428 7ff667362fb0 25 API calls 6424->6428 6425 7ff66736fdf0 8 API calls 6429 7ff667366744 6425->6429 6435 7ff6673627e0 9 API calls 6426->6435 6431 7ff667366726 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6427->6431 6432 7ff667362f05 6428->6432 6429->5904 6434 7ff6673667b6 6430->6434 6431->6453 6433 7ff667362f4c 6432->6433 6436 7ff667362f47 6432->6436 6438 7ff667362f40 _invalid_parameter_noinfo_noreturn 6432->6438 6437 7ff66736ff40 4 API calls 6433->6437 6434->6426 6440 7ff6673660d0 8 API calls 6434->6440 6444 7ff66736687c 6435->6444 6439 7ff66736fe10 free 6436->6439 6437->6412 6438->6436 6439->6433 6441 7ff6673667ec 6440->6441 6443 7ff667362fb0 25 API calls 6441->6443 6442 7ff667362880 25 API calls 6448 7ff6673668c7 6442->6448 6446 7ff667366800 6443->6446 6444->6442 6444->6453 6445 7ff66736ff40 4 API calls 6445->6426 6447 7ff667366840 6446->6447 6449 7ff667366839 _invalid_parameter_noinfo_noreturn 6446->6449 6451 7ff667366845 6446->6451 6450 7ff66736fe10 free 6447->6450 6452 7ff667362880 25 API calls 6448->6452 6448->6453 6449->6447 6450->6451 6451->6445 6452->6453 6453->6425 6455 7ff667366736 6454->6455 6456 7ff667366701 GetModuleHandleA 6454->6456 6460 7ff66736fdf0 8 API calls 6455->6460 6457 7ff667366759 GetProcAddress 6456->6457 6458 7ff667366713 6456->6458 6457->6458 6459 7ff66736677a 6457->6459 6462 7ff667366260 7 API calls 6458->6462 6461 7ff667366852 6459->6461 6464 7ff66736ffa0 5 API calls 6459->6464 6463 7ff667366744 6460->6463 6467 7ff6673627e0 9 API calls 6461->6467 6465 7ff667366726 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 6462->6465 6463->6028 6466 7ff6673667b6 6464->6466 6465->6455 6466->6461 6468 7ff6673660d0 8 API calls 6466->6468 6472 7ff66736687c 6467->6472 6469 7ff6673667ec 6468->6469 6471 7ff667362fb0 25 API calls 6469->6471 6470 7ff667362880 25 API calls 6473 7ff6673668c7 6470->6473 6474 7ff667366800 6471->6474 6472->6455 6472->6470 6473->6455 6480 7ff667362880 25 API calls 6473->6480 6475 7ff667366845 6474->6475 6477 7ff667366840 6474->6477 6478 7ff667366839 _invalid_parameter_noinfo_noreturn 6474->6478 6476 7ff66736ff40 4 API calls 6475->6476 6476->6461 6479 7ff66736fe10 free 6477->6479 6478->6477 6479->6475 6480->6455 6482 7ff667368722 6481->6482 6483 7ff667368797 ??1_Lockit@std@@QEAA 6482->6483 6485 7ff667368745 6482->6485 6486 7ff667368739 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 6482->6486 6484 7ff66736fdf0 8 API calls 6483->6484 6487 7ff6673687b2 6484->6487 6485->6483 6488 7ff66736875c ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 6485->6488 6486->6485 6487->6044 6489 7ff6673687c7 6488->6489 6490 7ff667368770 6488->6490 6492 7ff667361200 Concurrency::cancel_current_task 2 API calls 6489->6492 6491 7ff66736f824 std::_Facet_Register 3 API calls 6490->6491 6493 7ff667368782 6491->6493 6494 7ff6673687cc 6492->6494 6493->6483 6498 7ff667370b28 6495->6498 6497 7ff667370b56 _CxxThrowException 6498->6497 6502 7ff66736f4c7 6499->6502 6500 7ff66736f4d5 ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6500->6502 6501 7ff66736f500 ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6501->6502 6502->6500 6502->6501 6503 7ff66736f56d ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6502->6503 6506 7ff66736f590 ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6502->6506 6507 7ff66736f524 6502->6507 6503->6502 6504 7ff66736f543 ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6504->6507 6505 7ff66736f5de ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6505->6507 6506->6502 6507->6504 6507->6505 6508 7ff66736f0fd 6507->6508 6509 7ff66736f62f ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6507->6509 6511 7ff66736f677 ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 6507->6511 6516 7ff66736f6a0 6507->6516 6508->5340 6509->6507 6511->6507 6513 7ff66736f1b6 6512->6513 6514 7ff66736f1f3 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 6513->6514 6515 7ff667365ee0 12 API calls 6513->6515 6515->6514 6517 7ff66736f6d8 6516->6517 6518 7ff66736f803 6516->6518 6519 7ff66736f6fe 6517->6519 6521 7ff66736f74a 6517->6521 6536 7ff66736ba90 ?_Xlength_error@std@@YAXPEBD 6518->6536 6522 7ff66736f808 6519->6522 6523 7ff6673700b0 std::_Facet_Register 3 API calls 6519->6523 6525 7ff66736f70d 6521->6525 6526 7ff6673700b0 std::_Facet_Register 3 API calls 6521->6526 6524 7ff667361110 Concurrency::cancel_current_task __std_exception_copy 6522->6524 6523->6525 6527 7ff66736f80e 6524->6527 6528 7ff66736f77d memcpy 6525->6528 6529 7ff66736f778 6525->6529 6530 7ff66736f7fc _invalid_parameter_noinfo_noreturn 6525->6530 6526->6525 6531 7ff66736f796 memcpy 6528->6531 6529->6531 6530->6518 6532 7ff66736f7a3 6531->6532 6533 7ff66736f7d0 6531->6533 6532->6530 6534 7ff66736f7c8 6532->6534 6533->6507 6535 7ff66736fe10 free 6534->6535 6535->6533 7231 7ff667365cc1 7230->7231 7231->7231 7232 7ff6673660d0 8 API calls 7231->7232 7233 7ff667365ccf 7232->7233 7234 7ff667369d90 7233->7234 7235 7ff667369450 25 API calls 7234->7235 7236 7ff667369db8 7235->7236 7243 7ff667369ec0 7236->7243 7239 7ff667369ea5 _CxxThrowException 7239->5487 7239->5488 7240 7ff667369ea0 7242 7ff66736fe10 free 7240->7242 7241 7ff667369e99 _invalid_parameter_noinfo_noreturn 7241->7240 7242->7239 7244 7ff66736f8d0 __std_fs_code_page 2 API calls 7243->7244 7245 7ff667369f21 7244->7245 7281 7ff66736b4d0 7245->7281 7248 7ff66736b4d0 48 API calls 7249 7ff667369f89 7248->7249 7252 7ff667369fd3 7249->7252 7253 7ff667369fbf 7249->7253 7258 7ff667369fcd 7249->7258 7250 7ff66736b450 12 API calls 7251 7ff66736a04c 7250->7251 7254 7ff66736b450 12 API calls 7251->7254 7256 7ff667369fdf memcpy 7252->7256 7252->7258 7299 7ff66736b620 7253->7299 7257 7ff66736a061 7254->7257 7259 7ff66736a01a 7256->7259 7260 7ff66736a001 7256->7260 7261 7ff66736b450 12 API calls 7257->7261 7258->7250 7263 7ff66736fe10 free 7259->7263 7260->7259 7262 7ff66736a0d7 _invalid_parameter_noinfo_noreturn 7260->7262 7264 7ff66736a07b 7261->7264 7265 7ff66736a0ae 7262->7265 7263->7258 7264->7265 7267 7ff66736b450 12 API calls 7264->7267 7272 7ff66736a0bb 7265->7272 7319 7ff667368af0 7265->7319 7268 7ff66736a094 7267->7268 7269 7ff66736b450 12 API calls 7268->7269 7269->7265 7270 7ff66736a128 7271 7ff66736a176 7270->7271 7274 7ff66736a171 7270->7274 7278 7ff66736a16a _invalid_parameter_noinfo_noreturn 7270->7278 7275 7ff66736fdf0 8 API calls 7271->7275 7272->7270 7273 7ff66736a123 7272->7273 7276 7ff66736a11c _invalid_parameter_noinfo_noreturn 7272->7276 7277 7ff66736fe10 free 7273->7277 7279 7ff66736fe10 free 7274->7279 7280 7ff667369e5f 7275->7280 7276->7273 7277->7270 7278->7274 7279->7271 7280->7239 7280->7240 7280->7241 7282 7ff66736b51d 7281->7282 7283 7ff667369f56 7281->7283 7284 7ff66736b609 7282->7284 7344 7ff66736fa1c WideCharToMultiByte 7282->7344 7283->7248 7285 7ff667369710 31 API calls 7284->7285 7287 7ff66736b60f 7285->7287 7289 7ff667369a20 30 API calls 7287->7289 7292 7ff66736b617 7289->7292 7290 7ff66736b589 memset 7295 7ff66736b55d 7290->7295 7291 7ff66736b5b0 7350 7ff66736b770 7291->7350 7296 7ff66736fa1c 4 API calls 7295->7296 7297 7ff66736b5dd 7296->7297 7297->7283 7389 7ff667369a20 7297->7389 7300 7ff66736b649 7299->7300 7301 7ff66736b760 7299->7301 7304 7ff66736b6a6 7300->7304 7305 7ff66736b6ce 7300->7305 7394 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD 7301->7394 7306 7ff66736b75b 7304->7306 7307 7ff66736b6b3 7304->7307 7310 7ff6673700b0 std::_Facet_Register 3 API calls 7305->7310 7313 7ff66736b6bb 7305->7313 7309 7ff667361110 Concurrency::cancel_current_task __std_exception_copy 7306->7309 7308 7ff6673700b0 std::_Facet_Register 3 API calls 7307->7308 7308->7313 7309->7301 7310->7313 7311 7ff66736b6f4 memcpy 7314 7ff66736b70c 7311->7314 7315 7ff66736b721 7311->7315 7312 7ff66736b735 memcpy 7318 7ff66736b72c 7312->7318 7313->7311 7313->7312 7316 7ff66736b72e _invalid_parameter_noinfo_noreturn 7313->7316 7314->7315 7314->7316 7317 7ff66736fe10 free 7315->7317 7316->7312 7317->7318 7318->7258 7320 7ff667368c48 7319->7320 7321 7ff667368b1f 7319->7321 7395 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD 7320->7395 7323 7ff667368b7c 7321->7323 7324 7ff667368ba4 7321->7324 7325 7ff667368b89 7323->7325 7326 7ff667368c43 7323->7326 7330 7ff6673700b0 std::_Facet_Register 3 API calls 7324->7330 7335 7ff667368b91 7324->7335 7328 7ff6673700b0 std::_Facet_Register 3 API calls 7325->7328 7329 7ff667361110 Concurrency::cancel_current_task __std_exception_copy 7326->7329 7328->7335 7329->7320 7330->7335 7331 7ff667368bc9 memcpy 7336 7ff667368bea 7331->7336 7337 7ff667368bff 7331->7337 7332 7ff667368c13 memcpy 7340 7ff667368c0a 7332->7340 7335->7331 7335->7332 7341 7ff667368c0c _invalid_parameter_noinfo_noreturn 7335->7341 7336->7337 7336->7341 7342 7ff66736fe10 free 7337->7342 7340->7272 7341->7332 7342->7340 7345 7ff66736fa7b 7344->7345 7346 7ff66736fa73 GetLastError 7344->7346 7347 7ff66736fa88 WideCharToMultiByte 7345->7347 7348 7ff66736b542 7345->7348 7346->7345 7347->7348 7349 7ff66736fab6 GetLastError 7347->7349 7348->7287 7348->7290 7348->7291 7348->7295 7349->7348 7351 7ff66736b79d 7350->7351 7352 7ff66736b8ee 7350->7352 7354 7ff66736b82b 7351->7354 7355 7ff66736b7ff 7351->7355 7393 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD 7352->7393 7361 7ff6673700b0 std::_Facet_Register 3 API calls 7354->7361 7365 7ff66736b814 7354->7365 7357 7ff66736b80c 7355->7357 7358 7ff66736b8e9 7355->7358 7359 7ff6673700b0 std::_Facet_Register 3 API calls 7357->7359 7360 7ff667361110 Concurrency::cancel_current_task __std_exception_copy 7358->7360 7359->7365 7360->7352 7361->7365 7362 7ff66736b8ab memcpy memset 7371 7ff66736b8a2 7362->7371 7363 7ff66736b858 memcpy memset 7366 7ff66736b897 7363->7366 7367 7ff66736b882 7363->7367 7365->7362 7365->7363 7372 7ff66736b8a4 _invalid_parameter_noinfo_noreturn 7365->7372 7373 7ff66736fe10 free 7366->7373 7367->7366 7367->7372 7371->7295 7372->7362 7373->7371 7390 7ff667369a30 7389->7390 7391 7ff667369650 29 API calls 7390->7391 7392 7ff667369a47 _CxxThrowException 7391->7392 7405 7ff6673698a0 7406 7ff6673698b8 7405->7406 7407 7ff6673698ae 7405->7407 7408 7ff66736fe10 free 7407->7408 7408->7406 7632 7ff6673713a0 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 7730 7ff667369820 7731 7ff667369853 ?_Syserror_map@std@@YAPEBDH 7730->7731 7732 7ff667369834 7730->7732 7731->7732 7732->7732 7733 7ff6673660d0 8 API calls 7732->7733 7734 7ff667369889 7733->7734 7409 7ff667364ea0 7410 7ff667364eac 7409->7410 7411 7ff66736fe10 free 7409->7411 7739 7ff667370228 7742 7ff66737023c IsProcessorFeaturePresent 7739->7742 7743 7ff667370253 7742->7743 7748 7ff6673702d8 RtlCaptureContext RtlLookupFunctionEntry 7743->7748 7749 7ff667370267 7748->7749 7750 7ff667370308 RtlVirtualUnwind 7748->7750 7751 7ff667370120 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 7749->7751 7750->7749 7413 7ff66736d6b0 7414 7ff66736d720 18 API calls 7413->7414 7416 7ff66736d6c2 7414->7416 7415 7ff66736d6f8 7416->7415 7417 7ff66736d6f0 7416->7417 7418 7ff66736d711 _invalid_parameter_noinfo_noreturn 7416->7418 7419 7ff66736fe10 free 7417->7419 7419->7415 7536 7ff667371b30 7538 7ff667371b38 7536->7538 7537 7ff667371b85 7538->7537 7539 7ff66736fe10 free 7538->7539 7539->7538 7634 7ff66736a1b0 7635 7ff66736a202 7634->7635 7640 7ff66736a1d1 7634->7640 7638 7ff66736a257 7635->7638 7639 7ff66736a2ed _invalid_parameter_noinfo_noreturn 7635->7639 7642 7ff66736fe10 free 7635->7642 7636 7ff66736fe10 free 7636->7635 7637 7ff66736a2a3 __std_exception_destroy 7644 7ff66736a2cd 7637->7644 7645 7ff66736a2da 7637->7645 7638->7637 7638->7639 7643 7ff66736a29b 7638->7643 7641 7ff66736a31a 7639->7641 7651 7ff66736a34b 7639->7651 7640->7636 7640->7639 7648 7ff66736a41b _invalid_parameter_noinfo_noreturn __std_exception_copy 7641->7648 7649 7ff66736fe10 free 7641->7649 7642->7638 7646 7ff66736fe10 free 7643->7646 7647 7ff66736fe10 free 7644->7647 7646->7637 7647->7645 7655 7ff66736a48c 7648->7655 7649->7651 7650 7ff66736a3ec __std_exception_destroy 7650->7648 7651->7648 7652 7ff66736fe10 free 7651->7652 7653 7ff66736a3a0 7651->7653 7652->7653 7653->7648 7653->7650 7654 7ff66736fe10 free 7653->7654 7654->7650 7656 7ff66736b370 5 API calls 7655->7656 7657 7ff66736a4a8 7656->7657 7396 7ff667366430 ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 7420 7ff667364eb0 7421 7ff6673685b0 18 API calls 7420->7421 7422 7ff667364ec5 ?always_noconv@codecvt_base@std@ 7421->7422 7423 7ff667364ee8 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 7422->7423 7424 7ff667364ed5 7422->7424 7540 7ff667365130 7541 7ff667365163 7540->7541 7542 7ff667365df0 10 API calls 7541->7542 7548 7ff6673651c1 7541->7548 7546 7ff667365186 7542->7546 7543 7ff66736fdf0 8 API calls 7544 7ff66736522b 7543->7544 7545 7ff667365194 _fseeki64 7547 7ff6673651ab fgetpos 7545->7547 7545->7548 7546->7545 7546->7547 7546->7548 7547->7548 7548->7543 7658 7ff667365db0 ?uncaught_exception@std@ 7659 7ff667365dc3 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 7658->7659 7660 7ff667365dcd 7658->7660 7659->7660 7752 7ff667365a30 7753 7ff667365a3c _lock_file 7752->7753 7754 7ff667365a43 7752->7754 7753->7754 7755 7ff6673703bc 7756 7ff6673703cc 7755->7756 7757 7ff6673706b8 10 API calls 7756->7757 7760 7ff6673703f0 _RTC_Initialize 7757->7760 7758 7ff667370910 9 API calls 7759 7ff667370471 7758->7759 7765 7ff667370453 7760->7765 7768 7ff667370c24 InitializeSListHead 7760->7768 7765->7758 7767 7ff667370461 7765->7767 7769 7ff6673663c3 7770 7ff6673663d1 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 7769->7770 7771 7ff6673663fb 7770->7771 7772 7ff6673663f1 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 7770->7772 7772->7771 7549 7ff667371abe ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA 7429 7ff667365240 7430 7ff667365259 ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J 7429->7430 7432 7ff667365268 7429->7432 7430->7432 7431 7ff6673652e9 7432->7431 7433 7ff66736529c memcpy 7432->7433 7434 7ff6673652c9 7432->7434 7433->7431 7433->7434 7434->7431 7435 7ff6673652d5 fwrite 7434->7435 7435->7431 7550 7ff6673610c0 __std_exception_destroy 7437 7ff66736f450 7438 7ff66736f160 15 API calls 7437->7438 7439 7ff66736f46b 7438->7439 7440 7ff66736f47d 7439->7440 7441 7ff66736fe10 free 7439->7441 7441->7440 7773 7ff66736d3d0 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 7774 7ff6673705ce 7775 7ff667370a68 GetModuleHandleW 7774->7775 7776 7ff6673705d5 7775->7776 7777 7ff6673705d9 7776->7777 7778 7ff667370614 _exit 7776->7778 7442 7ff667365050 7443 7ff667365086 7442->7443 7449 7ff6673650a5 7442->7449 7444 7ff667365df0 10 API calls 7443->7444 7446 7ff66736508b 7444->7446 7445 7ff66736fdf0 8 API calls 7447 7ff66736511b 7445->7447 7448 7ff66736508f fsetpos 7446->7448 7446->7449 7448->7449 7449->7445 7450 7ff667365a50 7451 7ff667365a6d 7450->7451 7452 7ff667365aaa ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 7451->7452 7453 7ff667365ee0 12 API calls 7451->7453 7453->7452 7661 7ff667364f50 7662 7ff667364f73 7661->7662 7663 7ff667364f8f setvbuf 7662->7663 7665 7ff66736500d 7662->7665 7664 7ff667364f9d ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 7663->7664 7663->7665 7664->7665 7666 7ff667364fbf _get_stream_buffer_pointers 7664->7666 7667 7ff66736fdf0 8 API calls 7665->7667 7666->7665 7668 7ff66736503c 7667->7668 7779 7ff667365bd0 7780 7ff667365c14 7779->7780 7781 7ff667365be3 7779->7781 7782 7ff667365c0c 7781->7782 7783 7ff667365c2b _invalid_parameter_noinfo_noreturn 7781->7783 7784 7ff66736fe10 free 7782->7784 7784->7780 7454 7ff667371660 ??1_Lockit@std@@QEAA 7552 7ff667368ce0 7553 7ff667368d29 7552->7553 7554 7ff667368d82 7552->7554 7553->7554 7555 7ff667368d2e memcpy 7553->7555 7556 7ff667368d8a memcpy 7554->7556 7557 7ff667368de5 7554->7557 7564 7ff667368ecc 7555->7564 7558 7ff667368dcb 7556->7558 7559 7ff667368dce memcpy 7556->7559 7560 7ff667368ee4 7557->7560 7561 7ff667368dfe 7557->7561 7558->7559 7559->7564 7578 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD 7560->7578 7565 7ff667368ee9 7561->7565 7566 7ff667368e7b 7561->7566 7567 7ff667368e59 7561->7567 7568 7ff667361110 Concurrency::cancel_current_task __std_exception_copy 7565->7568 7571 7ff667368e66 memcpy 7566->7571 7573 7ff6673700b0 std::_Facet_Register 3 API calls 7566->7573 7569 7ff6673700b0 std::_Facet_Register 3 API calls 7567->7569 7570 7ff667368eef 7568->7570 7572 7ff667368e61 7569->7572 7575 7ff667368eb8 memcpy 7571->7575 7576 7ff667368eb5 7571->7576 7572->7571 7577 7ff667368e74 _invalid_parameter_noinfo_noreturn 7572->7577 7573->7571 7575->7564 7576->7575 7577->7566 7579 7ff6673698e0 7586 7ff66736f868 FormatMessageA 7579->7586 7582 7ff6673660d0 8 API calls 7583 7ff66736994e LocalFree 7582->7583 7584 7ff66736fdf0 8 API calls 7583->7584 7585 7ff667369969 7584->7585 7587 7ff667369915 7586->7587 7587->7582 7669 7ff667371360 7670 7ff667371388 7669->7670 7671 7ff667371373 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 7669->7671 7671->7670 7672 7ff66736e760 7673 7ff66736e76c 7672->7673 7674 7ff66736d720 7672->7674 7675 7ff66736d800 17 API calls 7674->7675 7680 7ff66736d78d 7674->7680 7676 7ff66736d73a 7675->7676 7677 7ff66736d785 7676->7677 7678 7ff66736d7a0 _invalid_parameter_noinfo_noreturn 7676->7678 7679 7ff66736fe10 free 7677->7679 7679->7680 7455 7ff667365460 7456 7ff667365492 7455->7456 7458 7ff66736550d fgetc 7456->7458 7460 7ff6673654a2 7456->7460 7464 7ff667365529 7456->7464 7457 7ff66736fdf0 8 API calls 7459 7ff6673656f6 7457->7459 7458->7460 7460->7457 7461 7ff66736553e fgetc 7461->7464 7465 7ff667365643 7461->7465 7462 7ff66736558a ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 7462->7464 7463 7ff667368af0 9 API calls 7463->7462 7464->7461 7464->7462 7464->7463 7464->7465 7468 7ff6673655f4 memcpy 7464->7468 7471 7ff66736565b 7464->7471 7465->7460 7466 7ff6673656e3 7465->7466 7469 7ff6673656dc _invalid_parameter_noinfo_noreturn 7465->7469 7467 7ff66736fe10 free 7466->7467 7467->7460 7468->7461 7469->7466 7470 7ff667365680 ungetc 7470->7465 7470->7471 7471->7465 7471->7470 7472 7ff667365860 7473 7ff66736588d 7472->7473 7474 7ff667365886 7472->7474 7475 7ff6673658b8 7473->7475 7477 7ff6673658a8 ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 7473->7477 7476 7ff66736fdf0 8 API calls 7474->7476 7475->7474 7479 7ff667365926 ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 7475->7479 7480 7ff667365904 fputc 7475->7480 7478 7ff6673659f7 7476->7478 7477->7474 7481 7ff66736596b 7479->7481 7482 7ff667365995 7479->7482 7480->7474 7481->7482 7483 7ff667365970 7481->7483 7482->7474 7484 7ff6673659a4 fwrite 7482->7484 7483->7474 7485 7ff667365975 fputc 7483->7485 7484->7474 7485->7474 7588 7ff667365ce0 7589 7ff667365d03 7588->7589 7590 7ff667365d3e ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 7589->7590 7591 7ff667365ee0 12 API calls 7589->7591 7592 7ff667365d5b 7590->7592 7593 7ff667365d4e 7590->7593 7591->7590 7594 7ff66736fe10 free 7593->7594 7594->7592 7785 7ff6673713e8 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 7786 7ff6673717f0 7787 7ff667371803 7786->7787 7788 7ff667371810 7786->7788 7789 7ff667365c40 2 API calls 7787->7789 7789->7788 7491 7ff667361070 __std_exception_destroy 7492 7ff667361098 7491->7492 7493 7ff6673610a5 7491->7493 7494 7ff66736fe10 free 7492->7494 7494->7493 7686 7ff667365d70 7687 7ff667362720 15 API calls 7686->7687 7688 7ff667365d8b 7687->7688 7689 7ff667365d9d 7688->7689 7690 7ff66736fe10 free 7688->7690 7690->7689
    APIs
    • SetUnhandledExceptionFilter.KERNEL32 ref: 00007FF66736A8B4
    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF66736A8FB
    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF66736A93B
    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00007FF66736A9CB
    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00007FF66736AA0B
    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00007FF66736AA8B
    • _wcsicmp.API-MS-WIN-CRT-STRING-L1-1-0(?), ref: 00007FF66736AACB
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?), ref: 00007FF66736AB21
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?), ref: 00007FF66736AB49
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?), ref: 00007FF66736AB71
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?), ref: 00007FF66736AB98
    • memcpy.VCRUNTIME140(?,?), ref: 00007FF66736AC0E
      • Part of subcall function 00007FF667368980: memcpy.VCRUNTIME140 ref: 00007FF667368A7B
      • Part of subcall function 00007FF66736BAB0: __std_fs_code_page.MSVCPRT ref: 00007FF66736BAD1
    • memcmp.VCRUNTIME140(?,?), ref: 00007FF66736AC9A
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?), ref: 00007FF66736ADCD
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736ADF0
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?), ref: 00007FF66736AE28
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?), ref: 00007FF66736AE2F
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?), ref: 00007FF66736AE36
    • memcpy.VCRUNTIME140(?,?), ref: 00007FF66736AE93
    • memcpy.VCRUNTIME140(?,?), ref: 00007FF66736AEEB
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?), ref: 00007FF66736AFF1
      • Part of subcall function 00007FF667368980: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667368ADC
      • Part of subcall function 00007FF667368980: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF667368AE9
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?), ref: 00007FF66736B053
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?), ref: 00007FF66736B175
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?), ref: 00007FF66736B23D
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?), ref: 00007FF66736B265
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736B299
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736B2E0
      • Part of subcall function 00007FF66736C310: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736C965
      • Part of subcall function 00007FF667366260: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E0
      • Part of subcall function 00007FF667366260: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E7
      • Part of subcall function 00007FF667366260: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663F4
      • Part of subcall function 00007FF667369030: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6673691AD
      • Part of subcall function 00007FF667369030: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6673691B4
      • Part of subcall function 00007FF667369030: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6673691C1
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736B361
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@_V01@@$_invalid_parameter_noinfo_noreturn$_wcsicmp$memcpy$?setstate@?$basic_ios@_?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@$Concurrency::cancel_current_taskExceptionFilterUnhandled__std_fs_code_pagememcmp
    • String ID: [!] Incorrect Usage!$ doesn't exist$.sys$PassAllocationPtr$[+] Allocate Independent Pages mode enabled$[+] Free pool memory after usage enabled$[+] Mdl memory usage enabled$[+] Pass Allocation Ptr as first param enabled$[+] Usage: kdmapper.exe [--free][--mdl][--PassAllocationPtr] driver$[+] success$[-] Failed to map $[-] Failed to read image to memory$[-] File $[-] Too many allocation modes$[-] Warning failed to fully unload vulnerable driver $free$indPages$mdl
    • API String ID: 3819007230-912387167
    • Opcode ID: 4b22240b4a028cde26dbc79ad241a238124bf3edf135c065056b3fdd9352ead6
    • Instruction ID: 1dd701f9a4ba8bead2f476570c98fde58d04d7ee55732d20bf9c14540e32ea60
    • Opcode Fuzzy Hash: 4b22240b4a028cde26dbc79ad241a238124bf3edf135c065056b3fdd9352ead6
    • Instruction Fuzzy Hash: 4C629162E18656C5EB00DB66E8642BC23B1FF447A4F504235DA6DAF6E5EF7CE580C300

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: __p___argc__p___wargv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_release_startup_lock_cexit_exit_get_initial_wide_environment_register_thread_local_exe_atexit_callback
    • String ID:
    • API String ID: 1184979102-0
    • Opcode ID: 8334bf1337a27570fc31efeb7616df46911b556520961b86d9452f094374e34a
    • Instruction ID: 50825a8759b59c94b866ff32795257ef1e49047722f9bc32859885ac59d6e66d
    • Opcode Fuzzy Hash: 8334bf1337a27570fc31efeb7616df46911b556520961b86d9452f094374e34a
    • Instruction Fuzzy Hash: 5D316861A2D207C1FA40AB20E5723BD13B0AF85784F844035EA4EEF6D7CE6EF805C648

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 288 7ff667366260-7ff66736628f 289 7ff667366290-7ff667366298 288->289 289->289 290 7ff66736629a-7ff6673662a9 289->290 291 7ff6673662ab-7ff6673662ae 290->291 292 7ff6673662b5 290->292 291->292 294 7ff6673662b0-7ff6673662b3 291->294 293 7ff6673662b7-7ff6673662c7 292->293 295 7ff6673662c9-7ff6673662cf 293->295 296 7ff6673662d0-7ff6673662dc 293->296 294->293 295->296 297 7ff6673662e2-7ff6673662ea 296->297 298 7ff6673662de-7ff6673662e0 296->298 301 7ff66736630b 297->301 302 7ff6673662ec-7ff6673662ef 297->302 300 7ff66736630d-7ff667366313 298->300 304 7ff667366315-7ff66736631a 300->304 305 7ff66736631f-7ff667366336 300->305 301->300 302->301 303 7ff6673662f1-7ff667366309 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ 302->303 303->300 306 7ff6673663d1-7ff6673663ef ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 304->306 307 7ff667366366-7ff667366381 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 305->307 308 7ff667366338-7ff66736633b 305->308 311 7ff6673663fb-7ff66736640b 306->311 312 7ff6673663f1-7ff6673663fa ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 306->312 309 7ff6673663aa 307->309 310 7ff667366383-7ff667366386 307->310 308->307 313 7ff66736633d-7ff667366358 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 308->313 318 7ff6673663ad 309->318 316 7ff667366388-7ff6673663a3 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 310->316 317 7ff6673663b1-7ff6673663c1 310->317 319 7ff66736640d-7ff667366413 311->319 320 7ff667366414-7ff66736642e 311->320 312->311 314 7ff66736635a-7ff66736635f 313->314 315 7ff667366361-7ff667366364 313->315 314->318 315->308 316->309 321 7ff6673663a5-7ff6673663a8 316->321 317->306 318->317 319->320 321->310
    APIs
    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673662F4
    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF66736634E
    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF667366378
    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF667366399
    • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E0
    • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E7
    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663F4
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
    • String ID:
    • API String ID: 2558415004-0
    • Opcode ID: e2c367ad136847038fff30af22d074e8d0cf769924741a1b4bfb1a54706169fd
    • Instruction ID: 90b68d49bb3dd83bbfcb8be62fdafdf7bdb5bd29f9827afef0e87813b4ccbeba
    • Opcode Fuzzy Hash: e2c367ad136847038fff30af22d074e8d0cf769924741a1b4bfb1a54706169fd
    • Instruction Fuzzy Hash: 18512E32608A41C2EB60CB1AE5A0239A7B0FB84FD5F258535CE4E9B7B4DF3AD5468300

    Control-flow Graph

    APIs
    • ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF667366445
    • ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z.MSVCP140 ref: 00007FF667366451
    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF66736645A
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: U?$char_traits@_W@std@@@std@@$?flush@?$basic_ostream@?put@?$basic_ostream@_?widen@?$basic_ios@_D@std@@@std@@U?$char_traits@V12@V12@_
    • String ID:
    • API String ID: 1552636710-0
    • Opcode ID: 6b9bb272492244e5790e4fd1cbe884ca5642f07c574ec06d6b73e01d33ea6295
    • Instruction ID: 0738c8274e851824ff59b320d65f5434f3eb269c72dcf31295825e7fef64b020
    • Opcode Fuzzy Hash: 6b9bb272492244e5790e4fd1cbe884ca5642f07c574ec06d6b73e01d33ea6295
    • Instruction Fuzzy Hash: DED06755A84B46C6EA199F67B9A41381331EF9DF56F0CA431DD4F9B310CE3EE09A8218

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 870 7ff667361760-7ff6673617e5 _time64 GetCurrentThreadId srand CreateFileW 871 7ff66736181c-7ff667361882 rand 870->871 872 7ff6673617e7-7ff667361817 CloseHandle call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 870->872 874 7ff6673618c6-7ff6673618f0 call 7ff667366260 call 7ff6673612b0 871->874 875 7ff667361884-7ff66736188e 871->875 879 7ff667361ca6-7ff667361cd1 call 7ff66736fdf0 872->879 885 7ff6673618f2 874->885 886 7ff6673618f5-7ff66736191a call 7ff667369030 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 874->886 877 7ff667361895-7ff6673618c4 rand 875->877 877->874 877->877 885->886 889 7ff66736191c-7ff667361933 886->889 890 7ff667361956-7ff667361967 call 7ff667361440 886->890 891 7ff667361935-7ff667361948 889->891 892 7ff667361951 call 7ff66736fe10 889->892 897 7ff667361969 890->897 898 7ff667361991-7ff6673619fb _wremove memset call 7ff667365ac0 ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z 890->898 891->892 894 7ff66736194a-7ff667361950 _invalid_parameter_noinfo_noreturn 891->894 892->890 894->892 900 7ff667361970-7ff66736198c call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 897->900 903 7ff6673619fd-7ff667361a05 call 7ff667365ee0 898->903 904 7ff667361a39-7ff667361a41 call 7ff667365ee0 898->904 906 7ff667361c57 900->906 914 7ff667361a07-7ff667361a23 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z 903->914 915 7ff667361a24-7ff667361a34 call 7ff667362720 903->915 916 7ff667361a43-7ff667361a5f ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z 904->916 917 7ff667361a60-7ff667361a75 call 7ff667362720 call 7ff66736e770 904->917 909 7ff667361c5e-7ff667361c67 906->909 912 7ff667361c69-7ff667361c80 909->912 913 7ff667361ca3 909->913 918 7ff667361c82-7ff667361c95 912->918 919 7ff667361c9e call 7ff66736fe10 912->919 913->879 914->915 915->900 916->917 928 7ff667361a77-7ff667361ab1 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z _wremove 917->928 929 7ff667361ab6-7ff667361aed CreateFileW 917->929 918->919 923 7ff667361c97-7ff667361c9d _invalid_parameter_noinfo_noreturn 918->923 919->913 923->919 928->906 931 7ff667361c2c 929->931 932 7ff667361af3-7ff667361b3d call 7ff6673660d0 call 7ff66736f220 929->932 935 7ff667361c33-7ff667361c3a call 7ff667366260 931->935 942 7ff667361b7b-7ff667361b7e 932->942 943 7ff667361b3f-7ff667361b51 932->943 939 7ff667361c3f-7ff667361c52 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff6673623e0 935->939 939->906 944 7ff667361b8c-7ff667361bb6 call 7ff6673627e0 942->944 945 7ff667361b80-7ff667361b87 942->945 946 7ff667361b53-7ff667361b66 943->946 947 7ff667361b6f-7ff667361b74 call 7ff66736fe10 943->947 953 7ff667361bb8-7ff667361bc1 944->953 954 7ff667361c23-7ff667361c2a 944->954 945->935 946->947 950 7ff667361b68-7ff667361b6e _invalid_parameter_noinfo_noreturn 946->950 947->942 950->947 953->954 955 7ff667361bc3-7ff667361bcd call 7ff667363b10 953->955 954->935 958 7ff667361bd8-7ff667361be2 call 7ff667364510 955->958 959 7ff667361bcf-7ff667361bd6 955->959 962 7ff667361bed-7ff667361bf7 call 7ff6673632e0 958->962 963 7ff667361be4-7ff667361beb 958->963 959->935 966 7ff667361bf9-7ff667361c00 962->966 967 7ff667361c02-7ff667361c0c call 7ff667361ce0 962->967 963->935 966->935 967->909 970 7ff667361c0e-7ff667361c21 call 7ff667366470 967->970 970->939
    APIs
    • _time64.API-MS-WIN-CRT-TIME-L1-1-0 ref: 00007FF667361796
    • GetCurrentThreadId.KERNEL32 ref: 00007FF66736179F
    • srand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF6673617AA
    • CreateFileW.KERNEL32 ref: 00007FF6673617D7
    • CloseHandle.KERNEL32 ref: 00007FF6673617EA
      • Part of subcall function 00007FF667366260: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E0
      • Part of subcall function 00007FF667366260: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E7
      • Part of subcall function 00007FF667366260: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663F4
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736180D
    • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF667361851
    • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF667361895
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736190A
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736194A
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667361986
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@_V01@@$rand$?setstate@?$basic_ios@_?uncaught_exception@std@@CloseCreateCurrentD@std@@@std@@FileHandleOsfx@?$basic_ostream@ThreadU?$char_traits@_invalid_parameter_noinfo_noreturn_time64srand
    • String ID: [!] Failed to ClearMmUnloadedDrivers$[!] Failed to ClearWdFilterDriverList$[-] Can't exploit intel driver, is there any antivirus or anticheat running?$[-] Can't find TEMP folder$[-] Failed to ClearKernelHashBucketList$[-] Failed to ClearPiDDBCacheTable$[-] Failed to create vulnerable driver file$[-] Failed to get ntoskrnl.exe$[-] Failed to get temp path$[-] Failed to load driver iqvw64e.sys$[-] Failed to register and start service for the vulnerable driver$[-] \Device\Nal is already in use.$[<] Loading vulnerable driver, Name: $\\.\Nal$gfff$ntoskrnl.exe
    • API String ID: 3610494094-2874678725
    • Opcode ID: 215f6cb8711acf866a15f77a1b43d1d7574e59f13d4660aa0747dac13177975f
    • Instruction ID: 4193bc72ac9add26cceb160350a558cdd11df49ffc2886ba4d166f1cb6328391
    • Opcode Fuzzy Hash: 215f6cb8711acf866a15f77a1b43d1d7574e59f13d4660aa0747dac13177975f
    • Instruction Fuzzy Hash: 90E19C31E18A46C1FA00DB26E9742B92371FF85794F405235DA5EEBAA5EF7CE644C700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 973 7ff667361ce0-7ff667361d42 call 7ff6673660d0 976 7ff667361d46 call 7ff66736f220 973->976 977 7ff667361d4b-7ff667361d56 976->977 978 7ff667361d8c-7ff667361d8f 977->978 979 7ff667361d58-7ff667361d69 977->979 982 7ff667361db8-7ff667361de3 call 7ff667364320 978->982 983 7ff667361d91-7ff667361db6 call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 978->983 980 7ff667361d6b-7ff667361d7e 979->980 981 7ff667361d87 call 7ff66736fe10 979->981 980->981 984 7ff667361d80-7ff667361d86 _invalid_parameter_noinfo_noreturn 980->984 981->978 990 7ff667361e37-7ff667361e62 call 7ff667364320 982->990 991 7ff667361de5 982->991 992 7ff667361e0a-7ff667361e36 call 7ff66736fdf0 983->992 984->981 1000 7ff667361e64-7ff667361e6b 990->1000 1001 7ff667361e70-7ff667361e9b call 7ff667364320 990->1001 993 7ff667361dec 991->993 996 7ff667361df3-7ff667361e02 call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 993->996 1004 7ff667361e08 996->1004 1000->993 1006 7ff667361e9d-7ff667361ecf call 7ff667364320 1001->1006 1007 7ff667361ef9-7ff667361f19 call 7ff6673627e0 1001->1007 1004->992 1012 7ff667361edd-7ff667361ef3 call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1006->1012 1013 7ff667361ed1-7ff667361ed8 1006->1013 1014 7ff667361f1b-7ff667361f22 1007->1014 1015 7ff667361f24-7ff667361f2b 1007->1015 1012->1007 1013->996 1017 7ff667361f2e-7ff667361f4a call 7ff6673627e0 1014->1017 1015->1017 1021 7ff667361f4c-7ff667361f4f 1017->1021 1022 7ff667361f51-7ff667361f59 1017->1022 1023 7ff667361f5c-7ff667361f92 call 7ff6673627e0 * 2 1021->1023 1022->1023 1028 7ff667361f9a-7ff667361fa5 1023->1028 1029 7ff667361f94-7ff667361f98 1023->1029 1030 7ff667361fa9-7ff667361fcb call 7ff6673627e0 1028->1030 1029->1030 1030->1004 1033 7ff667361fd1-7ff667361fd8 1030->1033 1034 7ff667361fe0-7ff667361ff8 call 7ff6673627e0 1033->1034 1037 7ff6673620bd-7ff6673620df call 7ff6673627e0 1034->1037 1038 7ff667361ffe-7ff667362049 call 7ff6673700ec memset call 7ff6673627e0 1034->1038 1037->1004 1044 7ff6673620e5 1037->1044 1046 7ff66736204b-7ff667362059 call 7ff6673612b0 1038->1046 1047 7ff6673620ae-7ff6673620b6 call 7ff66736fe10 1038->1047 1044->1034 1052 7ff66736205b 1046->1052 1053 7ff66736205e-7ff667362075 wcsstr 1046->1053 1047->1037 1052->1053 1054 7ff667362077-7ff66736208d 1053->1054 1055 7ff6673620a9-7ff6673620ac 1053->1055 1056 7ff6673620a4 call 7ff66736fe10 1054->1056 1057 7ff66736208f-7ff6673620a2 1054->1057 1055->1047 1058 7ff6673620f1-7ff6673620fa 1055->1058 1056->1055 1057->1056 1060 7ff6673620ea-7ff6673620f0 _invalid_parameter_noinfo_noreturn 1057->1060 1059 7ff667362100-7ff667362125 call 7ff6673627e0 1058->1059 1064 7ff667362127-7ff667362133 1059->1064 1065 7ff66736215f-7ff667362176 1059->1065 1060->1058 1064->1059 1066 7ff667362135-7ff66736215a call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1064->1066 1067 7ff6673621cc 1065->1067 1068 7ff667362178-7ff6673621ca DeviceIoControl 1065->1068 1074 7ff6673623cb-7ff6673623d6 call 7ff66736fe10 1066->1074 1069 7ff6673621ce-7ff66736221d call 7ff6673627e0 * 2 1067->1069 1068->1069 1079 7ff667362275-7ff667362278 1069->1079 1080 7ff66736221f-7ff667362271 DeviceIoControl 1069->1080 1074->992 1081 7ff66736227a-7ff6673622c6 DeviceIoControl 1079->1081 1082 7ff6673622cc-7ff6673622ea call 7ff6673627e0 1079->1082 1080->1079 1081->1082 1085 7ff6673622ec-7ff667362338 DeviceIoControl 1082->1085 1086 7ff66736233e-7ff667362361 call 7ff6673627e0 1082->1086 1085->1086 1089 7ff667362388-7ff667362390 1086->1089 1090 7ff667362363-7ff667362386 call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1086->1090 1092 7ff667362393 call 7ff6673666d0 1089->1092 1094 7ff667362398-7ff6673623c9 call 7ff667366470 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1090->1094 1092->1094 1094->1074
    APIs
      • Part of subcall function 00007FF6673660D0: memcpy.VCRUNTIME140 ref: 00007FF667366101
      • Part of subcall function 00007FF66736F220: NtQuerySystemInformation.NTDLL ref: 00007FF66736F250
      • Part of subcall function 00007FF66736F220: VirtualFree.KERNEL32 ref: 00007FF66736F270
      • Part of subcall function 00007FF66736F220: VirtualAlloc.KERNEL32 ref: 00007FF66736F286
      • Part of subcall function 00007FF66736F220: NtQuerySystemInformation.NTDLL ref: 00007FF66736F2A1
      • Part of subcall function 00007FF66736F220: VirtualFree.KERNEL32 ref: 00007FF66736F2C2
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667361D80
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667361DAE
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667361E02
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667361EF3
    • memset.VCRUNTIME140 ref: 00007FF66736202A
    • wcsstr.VCRUNTIME140 ref: 00007FF667362064
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6673620EA
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362152
    • DeviceIoControl.KERNEL32 ref: 00007FF6673621C4
    • DeviceIoControl.KERNEL32 ref: 00007FF66736226B
    • DeviceIoControl.KERNEL32 ref: 00007FF6673622C6
    • DeviceIoControl.KERNEL32 ref: 00007FF667362338
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362380
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6673623C3
      • Part of subcall function 00007FF6673666D0: GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF667366708
      • Part of subcall function 00007FF6673666D0: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF667366730
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_V01@@W@std@@@std@@$ControlDevice$Virtual$FreeInformationQuerySystem_invalid_parameter_noinfo_noreturn$AllocHandleModulememcpymemsetwcsstr
    • String ID: PAGE$WdFilter.sys$[!] DriverInfo Magic is invalid, new wdfilter version?, driver info will not be released to prevent bsod$[!] Failed to find WdFilter MpFreeDriverInfoEx$[!] Failed to find WdFilter RuntimeDriversCount$[!] Failed to find WdFilter RuntimeDriversList$[!] Failed to remove from RuntimeDriversArray$[+] Found WdFilter MpFreeDriverInfoEx with second pattern$[+] WdFilter.sys not loaded, clear skipped$[+] WdFilterDriverList Cleaned: $xx????xxx$xxx????xx$xxx?x?xx???????????x$xxx?xx?x???????????x
    • API String ID: 1039085603-2424582720
    • Opcode ID: 3af2ef3975ef6651820a215681cdd876bbf7a2ba93fdc62476ba25fb80ec0d09
    • Instruction ID: a216b80ff7f8023199b95253357b68d5b2a53fbce8e1387db8f6a2d5b43f3cb5
    • Opcode Fuzzy Hash: 3af2ef3975ef6651820a215681cdd876bbf7a2ba93fdc62476ba25fb80ec0d09
    • Instruction Fuzzy Hash: 58123876B09B41D5EB10DB62E5602BC2371BB49798F804135DE4DABB99DF3CE20AC344

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1099 7ff66736b770-7ff66736b797 1100 7ff66736b79d-7ff66736b7b9 1099->1100 1101 7ff66736b8ef-7ff66736b928 call 7ff6673611b0 1099->1101 1102 7ff66736b7da-7ff66736b7fd 1100->1102 1103 7ff66736b7bb-7ff66736b7ca 1100->1103 1114 7ff66736ba87-7ff66736baa1 call 7ff6673611b0 ?_Xlength_error@std@@YAXPEBD@Z 1101->1114 1115 7ff66736b92e-7ff66736b94a 1101->1115 1106 7ff66736b82b-7ff66736b82e 1102->1106 1107 7ff66736b7ff-7ff66736b806 1102->1107 1103->1102 1105 7ff66736b7cc-7ff66736b7d6 1103->1105 1105->1102 1111 7ff66736b83a 1106->1111 1112 7ff66736b830 1106->1112 1109 7ff66736b80c 1107->1109 1110 7ff66736b8e9-7ff66736b8ee call 7ff667361110 1107->1110 1116 7ff66736b80f call 7ff6673700b0 1109->1116 1110->1101 1119 7ff66736b83c-7ff66736b856 1111->1119 1118 7ff66736b830 call 7ff6673700b0 1112->1118 1122 7ff66736b94c-7ff66736b95b 1115->1122 1123 7ff66736b96b-7ff66736b98e 1115->1123 1125 7ff66736b814-7ff66736b817 1116->1125 1127 7ff66736b835-7ff66736b838 1118->1127 1120 7ff66736b8ab-7ff66736b8c0 memcpy memset 1119->1120 1121 7ff66736b858-7ff66736b880 memcpy memset 1119->1121 1134 7ff66736b8c5-7ff66736b8e8 1120->1134 1128 7ff66736b89a-7ff66736b8a2 call 7ff66736fe10 1121->1128 1129 7ff66736b882-7ff66736b895 1121->1129 1122->1123 1130 7ff66736b95d-7ff66736b967 1122->1130 1132 7ff66736b9bc-7ff66736b9bf 1123->1132 1133 7ff66736b990-7ff66736b997 1123->1133 1135 7ff66736b81d-7ff66736b829 1125->1135 1136 7ff66736b8a4-7ff66736b8aa _invalid_parameter_noinfo_noreturn 1125->1136 1127->1119 1128->1134 1129->1136 1137 7ff66736b897 1129->1137 1130->1123 1142 7ff66736b9cb 1132->1142 1143 7ff66736b9c1 1132->1143 1140 7ff66736b99d 1133->1140 1141 7ff66736ba81-7ff66736ba86 call 7ff667361110 1133->1141 1135->1119 1136->1120 1137->1128 1146 7ff66736b9a0 call 7ff6673700b0 1140->1146 1141->1114 1148 7ff66736b9cd-7ff66736b9eb 1142->1148 1147 7ff66736b9c1 call 7ff6673700b0 1143->1147 1150 7ff66736b9a5-7ff66736b9a8 1146->1150 1151 7ff66736b9c6-7ff66736b9c9 1147->1151 1152 7ff66736b9ed-7ff66736ba16 memcpy * 2 1148->1152 1153 7ff66736ba41-7ff66736ba57 memcpy * 2 1148->1153 1155 7ff66736ba3a-7ff66736ba40 _invalid_parameter_noinfo_noreturn 1150->1155 1156 7ff66736b9ae-7ff66736b9ba 1150->1156 1151->1148 1157 7ff66736ba18-7ff66736ba2b 1152->1157 1158 7ff66736ba30-7ff66736ba38 call 7ff66736fe10 1152->1158 1154 7ff66736ba5c-7ff66736ba80 1153->1154 1155->1153 1156->1148 1157->1155 1160 7ff66736ba2d 1157->1160 1158->1154 1160->1158
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: memcpy$V01@$_invalid_parameter_noinfo_noreturnmemset$??6?$basic_ostream@_Concurrency::cancel_current_taskU?$char_traits@_V01@@W@std@@@std@@Xlength_error@std@@__std_fs_convert_wide_to_narrow$ApisByteCharFileMultiWide___lc_codepage_func__std_exception_copy__std_fs_code_page
    • String ID: MmAllocatePagesForMdl$[!] Failed to find MmAlocatePagesForMdl$[-] Can't allocate pages for mdl$vector too long
    • API String ID: 525806170-1127084285
    • Opcode ID: 40c3f28e2fd63654cb26dbddd77a1e857423d7b86104dd573d2a7600dc734811
    • Instruction ID: 83ba49626e6310d9420b179b6f2796b2de3749a9e57c5ecbd31236f19c08324c
    • Opcode Fuzzy Hash: 40c3f28e2fd63654cb26dbddd77a1e857423d7b86104dd573d2a7600dc734811
    • Instruction Fuzzy Hash: BEE1C132B08A82C5EA20DF27E4242696375FB44BD4F544635EEADAFBD5DE3CE2418700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1313 7ff6673632e0-7ff667363332 NtQuerySystemInformation 1314 7ff66736337a-7ff66736337c 1313->1314 1315 7ff667363334-7ff667363378 VirtualFree VirtualAlloc NtQuerySystemInformation 1313->1315 1316 7ff667363642-7ff667363645 1314->1316 1317 7ff667363382-7ff667363385 1314->1317 1315->1314 1315->1315 1319 7ff667363658 1316->1319 1320 7ff667363647-7ff667363652 VirtualFree 1316->1320 1318 7ff66736338b-7ff667363394 1317->1318 1317->1319 1321 7ff667363396-7ff667363399 1318->1321 1322 7ff6673633f9-7ff66736340d VirtualFree 1318->1322 1323 7ff66736365a-7ff667363682 call 7ff66736fdf0 1319->1323 1320->1319 1324 7ff6673633a0-7ff6673633de GetCurrentProcessId 1321->1324 1322->1319 1326 7ff667363413-7ff66736342f call 7ff6673627e0 1322->1326 1327 7ff6673633e6-7ff6673633ed 1324->1327 1328 7ff6673633e0-7ff6673633e4 1324->1328 1334 7ff667363639-7ff667363640 1326->1334 1335 7ff667363435-7ff66736343c 1326->1335 1327->1320 1332 7ff6673633f3 1327->1332 1328->1327 1331 7ff6673633f5 1328->1331 1331->1322 1332->1324 1336 7ff667363609-7ff667363625 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1334->1336 1335->1334 1337 7ff667363442-7ff66736345e call 7ff6673627e0 1335->1337 1336->1319 1342 7ff667363464-7ff66736346b 1337->1342 1343 7ff667363630-7ff667363637 1337->1343 1342->1343 1344 7ff667363471-7ff66736348d call 7ff6673627e0 1342->1344 1343->1336 1347 7ff667363627-7ff66736362e 1344->1347 1348 7ff667363493-7ff66736349a 1344->1348 1347->1336 1348->1347 1349 7ff6673634a0-7ff6673634bf call 7ff6673627e0 1348->1349 1352 7ff667363602 1349->1352 1353 7ff6673634c5-7ff6673634cc 1349->1353 1352->1336 1353->1352 1354 7ff6673634d2-7ff667363522 call 7ff6673700ec memset call 7ff6673627e0 1353->1354 1359 7ff667363524-7ff66736352b 1354->1359 1360 7ff667363530-7ff66736353d 1354->1360 1361 7ff6673635d7-7ff6673635f3 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1359->1361 1362 7ff667363543-7ff667363599 DeviceIoControl 1360->1362 1363 7ff6673635d0 1360->1363 1369 7ff6673635f5-7ff667363600 call 7ff66736fe10 1361->1369 1362->1363 1364 7ff66736359b-7ff6673635ce call 7ff667366260 * 2 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1362->1364 1363->1361 1364->1369 1369->1323
    APIs
    • NtQuerySystemInformation.NTDLL ref: 00007FF667363327
    • VirtualFree.KERNEL32 ref: 00007FF66736333F
    • VirtualAlloc.KERNEL32 ref: 00007FF667363354
    • NtQuerySystemInformation.NTDLL ref: 00007FF66736336D
    • GetCurrentProcessId.KERNEL32 ref: 00007FF6673633C5
    • VirtualFree.KERNEL32 ref: 00007FF667363404
    • memset.VCRUNTIME140 ref: 00007FF667363503
    • DeviceIoControl.KERNEL32 ref: 00007FF667363591
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6673635C6
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6673635ED
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736361F
    • VirtualFree.KERNEL32 ref: 00007FF667363652
      • Part of subcall function 00007FF667366260: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E0
      • Part of subcall function 00007FF667366260: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E7
      • Part of subcall function 00007FF667366260: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663F4
      • Part of subcall function 00007FF667366260: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673662F4
      • Part of subcall function 00007FF667366260: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF66736634E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$U?$char_traits@_W@std@@@std@@$Virtual$??6?$basic_ostream@_FreeV01@@$D@std@@@std@@InformationQuerySystemU?$char_traits@$?flush@?$basic_ostream@?setstate@?$basic_ios@_?sputc@?$basic_streambuf@_?uncaught_exception@std@@AllocControlCurrentDeviceOsfx@?$basic_ostream@ProcessV12@memset
    • String ID: [!] Failed to find device_object$[!] Failed to find driver name$[!] Failed to find driver_object$[!] Failed to find driver_section$[!] Failed to read driver name$[!] Failed to write driver name length$[+] MmUnloadedDrivers Cleaned:
    • API String ID: 1665244892-3011715350
    • Opcode ID: 3048a13f96c088af2f3ecdc01685d36d1f6f71eb46c19ee1ce8045e942d742ce
    • Instruction ID: 2dbdac93806ae27d029d64225063aa4f92c5dee44b8dc518fc7d9722cfee8a4f
    • Opcode Fuzzy Hash: 3048a13f96c088af2f3ecdc01685d36d1f6f71eb46c19ee1ce8045e942d742ce
    • Instruction Fuzzy Hash: 39A17C61B18A82C5FB50CB72A9602BC23B1AB49B88F415535DE4DBBB95EF3CE6458304
    APIs
    • DeviceIoControl.KERNEL32 ref: 00007FF667362903
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • DeviceIoControl.KERNEL32 ref: 00007FF6673629A6
    • DeviceIoControl.KERNEL32 ref: 00007FF667362A27
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362A4A
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362A5A
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362AA6
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362AB6
      • Part of subcall function 00007FF667366260: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E0
      • Part of subcall function 00007FF667366260: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E7
      • Part of subcall function 00007FF667366260: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663F4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@_$ControlDeviceV01@@$?setstate@?$basic_ios@_?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@
    • String ID: [!] Failed to unmap IO space of physical address 0x$[-] Failed to map IO space of 0x$[-] Failed to translate virtual address 0x
    • API String ID: 20913588-3202290428
    • Opcode ID: 83d2ddee1cbd4f1f821ab8dc32ab4a6b52691e33f519396b2e160e7a928be1da
    • Instruction ID: 00b5873d557885f3b76f76f2aace9792ee79af4b6cea6f99e20c172b434c2aea
    • Opcode Fuzzy Hash: 83d2ddee1cbd4f1f821ab8dc32ab4a6b52691e33f519396b2e160e7a928be1da
    • Instruction Fuzzy Hash: EF515A72A18B41D5EB10CF62E9603A933F5FB88B88F414135DA8DABA58DF3CE255C354
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: Virtual$Free$InformationQuerySystem$Alloc_invalid_parameter_noinfo_noreturn_stricmp
    • String ID:
    • API String ID: 562193759-0
    • Opcode ID: de73c7e78ad315794530ca9c89639a921326d6ff70a50400cf3f909c5ccb5263
    • Instruction ID: 92d5700ed8535a3d900985333254144da324c0234005a84a4dfcb7a073f92012
    • Opcode Fuzzy Hash: de73c7e78ad315794530ca9c89639a921326d6ff70a50400cf3f909c5ccb5263
    • Instruction Fuzzy Hash: B251D862B08A46C2EB20CB26E46433A6372FF857A4F544235DA5DDB6D8DF3DE5858B00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
    • String ID:
    • API String ID: 313767242-0
    • Opcode ID: 3a3f7b6156f9f1253ce8f7f467242a578426a768b2d0c5aee2506a33b1ef9736
    • Instruction ID: 7fe154aa258af37dfc2636047604c8c2ebf2dc6b42fb2631566bd70869d280ec
    • Opcode Fuzzy Hash: 3a3f7b6156f9f1253ce8f7f467242a578426a768b2d0c5aee2506a33b1ef9736
    • Instruction Fuzzy Hash: 3B314D72619A81C9EB608F60E8503ED73B0FB84744F444039DB8D9BB99DF39E548C714
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: Process32$CloseCreateCurrentFirstHandleNextProcessSnapshotToolhelp32memset
    • String ID:
    • API String ID: 2672634495-0
    • Opcode ID: ff6efbfb5b425ced449d133739804b3107b5d5d0ed23d36771b0c2a69f465a45
    • Instruction ID: f3dfa4dafdda7a76ddd793d13fdbe2edc7a79522a119787fb6f81b987810fb09
    • Opcode Fuzzy Hash: ff6efbfb5b425ced449d133739804b3107b5d5d0ed23d36771b0c2a69f465a45
    • Instruction Fuzzy Hash: 83118432618A41C2E650CB22E46426A73B1FB84BB0F445331E97E9B7D4DF3CE506CB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 2933794660-0
    • Opcode ID: 195a780caf0b4952fb62f880ecd92757cba55315611c2ac06db9a5d9cc98433a
    • Instruction ID: 20d879d2deda494ea2bc39de158ed8504598037d32e6d2cfc01c2ccec775a0ad
    • Opcode Fuzzy Hash: 195a780caf0b4952fb62f880ecd92757cba55315611c2ac06db9a5d9cc98433a
    • Instruction Fuzzy Hash: A3112E22604F41CAEB10CF61E8642A933B4FB19758F041A35EA6D8AB94DF3CE1948340
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9418ca02b4fd9ec178474b58b1caaeded2a12ab26dff9239f5f7e46ab255eefd
    • Instruction ID: c47c21fbfc943f4cb69ca1b3679dca6a3a5317c2cdc7fb6ecb24395916684c45
    • Opcode Fuzzy Hash: 9418ca02b4fd9ec178474b58b1caaeded2a12ab26dff9239f5f7e46ab255eefd
    • Instruction Fuzzy Hash: 7AA0022295DC07D0E644CB04E9706312771FB50301F455031C00DE9460DF3DF400C32E

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 532 7ff66736e770-7ff66736e7c0 call 7ff6673612b0 535 7ff66736e7c6-7ff66736e806 call 7ff667368ef0 532->535 536 7ff66736ec85-7ff66736ec8a call 7ff6673611b0 532->536 541 7ff66736ec8b-7ff66736ec90 call 7ff6673611b0 535->541 542 7ff66736e80c-7ff66736e811 535->542 536->541 543 7ff66736e816-7ff66736e85b call 7ff667368ef0 RegCreateKeyW 542->543 544 7ff66736e813 542->544 549 7ff66736e85d-7ff66736e864 543->549 550 7ff66736e866-7ff66736e8a1 RegSetKeyValueW 543->550 544->543 551 7ff66736e8b0-7ff66736e8c6 call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 549->551 552 7ff66736e918-7ff66736e947 RegSetKeyValueW 550->552 553 7ff66736e8a3-7ff66736e8a9 RegCloseKey 550->553 557 7ff66736e8cc 551->557 554 7ff66736e95b-7ff66736e974 RegCloseKey GetModuleHandleA 552->554 555 7ff66736e949-7ff66736e956 RegCloseKey 552->555 553->551 554->557 558 7ff66736e97a-7ff66736e9b1 GetProcAddress * 2 554->558 555->551 560 7ff66736e8ce-7ff66736e8d6 557->560 564 7ff66736e9b3-7ff66736e9ba 558->564 565 7ff66736e9bf-7ff66736e9ca 558->565 562 7ff66736e8dc-7ff66736e8f2 560->562 563 7ff66736ebb0-7ff66736ebc9 560->563 568 7ff66736ebab call 7ff66736fe10 562->568 569 7ff66736e8f8-7ff66736e90b 562->569 566 7ff66736ebcb-7ff66736ebe1 563->566 567 7ff66736ec04-7ff66736ec1d 563->567 564->551 570 7ff66736e9d0-7ff66736ea66 call 7ff667368ef0 RtlInitUnicodeString call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 565->570 571 7ff66736ec7f-7ff66736ec84 call 7ff6673611b0 565->571 573 7ff66736ebe3-7ff66736ebf6 566->573 574 7ff66736ebff call 7ff66736fe10 566->574 576 7ff66736ec58-7ff66736ec7e call 7ff66736fdf0 567->576 577 7ff66736ec1f-7ff66736ec35 567->577 568->563 569->568 575 7ff66736e911-7ff66736e917 _invalid_parameter_noinfo_noreturn 569->575 593 7ff66736ea6c-7ff66736eacf call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 570->593 594 7ff66736eb20-7ff66736eb26 570->594 571->536 573->574 583 7ff66736ebf8-7ff66736ebfe _invalid_parameter_noinfo_noreturn 573->583 574->567 575->552 578 7ff66736ec37-7ff66736ec4a 577->578 579 7ff66736ec53 call 7ff66736fe10 577->579 578->579 585 7ff66736ec4c-7ff66736ec52 _invalid_parameter_noinfo_noreturn 578->585 579->576 583->574 585->579 603 7ff66736ead5-7ff66736ead7 593->603 595 7ff66736eb28-7ff66736eb2e 594->595 596 7ff66736eb30-7ff66736eb77 call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 594->596 595->596 599 7ff66736eb7d-7ff66736eb83 595->599 596->599 602 7ff66736eb89-7ff66736eb8b 599->602 599->603 606 7ff66736eada-7ff66736eae2 602->606 603->606 610 7ff66736eae8-7ff66736eafe 606->610 611 7ff66736eb95-7ff66736eba6 606->611 613 7ff66736eb04-7ff66736eb17 610->613 614 7ff66736eb90 call 7ff66736fe10 610->614 611->560 613->614 616 7ff66736eb19-7ff66736eb1f _invalid_parameter_noinfo_noreturn 613->616 614->611 616->594
    APIs
      • Part of subcall function 00007FF6673612B0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667361405
      • Part of subcall function 00007FF667368EF0: memcpy.VCRUNTIME140 ref: 00007FF667368FF0
      • Part of subcall function 00007FF667368EF0: memcpy.VCRUNTIME140 ref: 00007FF667369000
    • RegCreateKeyW.ADVAPI32 ref: 00007FF66736E853
    • RegSetKeyValueW.ADVAPI32 ref: 00007FF66736E895
    • RegCloseKey.ADVAPI32 ref: 00007FF66736E8A3
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736E8C6
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736E911
    • RegSetKeyValueW.ADVAPI32 ref: 00007FF66736E93B
    • RegCloseKey.ADVAPI32 ref: 00007FF66736E949
    • RegCloseKey.ADVAPI32 ref: 00007FF66736E95B
    • GetModuleHandleA.KERNEL32 ref: 00007FF66736E968
    • GetProcAddress.KERNEL32 ref: 00007FF66736E984
    • GetProcAddress.KERNEL32 ref: 00007FF66736E997
    • RtlInitUnicodeString.NTDLL ref: 00007FF66736EA14
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF66736EA3F
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z.MSVCP140 ref: 00007FF66736EA4A
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736EA5A
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736EA89
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736EAAC
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736EACF
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736EB19
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF66736EB4D
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z.MSVCP140 ref: 00007FF66736EB58
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736EB77
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736EBF8
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736EC4C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$_invalid_parameter_noinfo_noreturn$Close$AddressProcV21@@ValueVios_base@1@memcpy$CreateHandleInitModuleStringUnicode
    • String ID: "$), Probably some anticheat or antivirus running blocking the load of vulnerable driver$4$Fatal error: failed to acquire SE_LOAD_DRIVER_PRIVILEGE. Make sure you are running as administrator.$ImagePath$NtLoadDriver$RtlAdjustPrivilege$SYSTEM\CurrentControlSet\Services\$Type$[+] NtLoadDriver Status 0x$[-] Access Denied or Insufficient Resources (0x$[-] Can't create 'ImagePath' registry value$[-] Can't create 'Type' registry value$[-] Can't create service key$[-] Registry path to disable vulnerable driver list: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CI\Config$[-] Set 'VulnerableDriverBlocklistEnable' as dword to 0$[-] Your vulnerable driver list is enabled and have blocked the driver loading, you must disable vulnerable driver list to use kdmapper with intel driver$\??\$\Registry\Machine\System\CurrentControlSet\Services\$ntdll.dll
    • API String ID: 115755377-1790068772
    • Opcode ID: 3dd81763b4872d8400494d668b676379e2fd1e07951aeee8f1a5be909c7a21e7
    • Instruction ID: 92d8ce3a0d295c4295f35b751381c45d8649847058789299e3861d1c5ecd3882
    • Opcode Fuzzy Hash: 3dd81763b4872d8400494d668b676379e2fd1e07951aeee8f1a5be909c7a21e7
    • Instruction Fuzzy Hash: D1E17371B58B42D5FB00DB66E8A42AC2371FF44798F404635DA5DAB6A8EF3CE248C344

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 617 7ff66736c310-7ff66736c362 618 7ff66736c948 617->618 619 7ff66736c368-7ff66736c375 617->619 620 7ff66736c94f-7ff66736c965 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 618->620 619->618 621 7ff66736c37b-7ff66736c384 619->621 625 7ff66736c96b 620->625 623 7ff66736c386-7ff66736c38d 621->623 624 7ff66736c392-7ff66736c3b1 VirtualAlloc 621->624 623->620 624->625 626 7ff66736c3b7-7ff66736c3d7 624->626 630 7ff66736c96d-7ff66736c993 call 7ff66736fdf0 625->630 628 7ff66736c3f8-7ff66736c3fb 626->628 629 7ff66736c3d9-7ff66736c3f3 call 7ff66736bc10 626->629 632 7ff66736c3fd-7ff66736c40f call 7ff66736c0c0 628->632 633 7ff66736c414-7ff66736c417 628->633 641 7ff66736c576-7ff66736c57e 629->641 632->641 638 7ff66736c41d-7ff66736c437 633->638 639 7ff66736c519-7ff66736c54d call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z VirtualFree 633->639 643 7ff66736c43d-7ff66736c450 call 7ff66736ffa0 638->643 644 7ff66736c4e9 638->644 639->625 641->639 646 7ff66736c580-7ff66736c5cf call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z memcpy 641->646 643->644 655 7ff66736c456-7ff66736c4a4 call 7ff6673660d0 call 7ff667362fb0 643->655 648 7ff66736c4ec-7ff66736c4f4 644->648 659 7ff66736c611-7ff66736c69e call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff66736d890 call 7ff66736c9a0 call 7ff66736caa0 646->659 660 7ff66736c5d1-7ff66736c5d8 646->660 651 7ff66736c4f6-7ff66736c513 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 648->651 652 7ff66736c552-7ff66736c56b call 7ff667367ac0 648->652 651->639 652->639 664 7ff66736c56d-7ff66736c572 652->664 673 7ff66736c4db-7ff66736c4e7 call 7ff66736ff40 655->673 674 7ff66736c4a6-7ff66736c4b7 655->674 689 7ff66736c6ac-7ff66736c6c5 call 7ff66736d9e0 call 7ff66736cbf0 659->689 690 7ff66736c6a0-7ff66736c6a7 659->690 665 7ff66736c5e0-7ff66736c5e7 660->665 664->641 668 7ff66736c5fd-7ff66736c60b 665->668 669 7ff66736c5e9-7ff66736c5f8 memcpy 665->669 668->665 670 7ff66736c60d 668->670 669->668 670->659 673->648 676 7ff66736c4b9-7ff66736c4cc 674->676 677 7ff66736c4d5-7ff66736c4da call 7ff66736fe10 674->677 676->677 680 7ff66736c4ce-7ff66736c4d4 _invalid_parameter_noinfo_noreturn 676->680 677->673 680->677 695 7ff66736c6c7-7ff66736c6ce 689->695 696 7ff66736c6d3-7ff66736c6f2 call 7ff6673627e0 689->696 690->620 697 7ff66736c78f 695->697 702 7ff66736c6f4-7ff66736c6fb 696->702 703 7ff66736c700-7ff66736c748 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff66736a6d0 696->703 699 7ff66736c796-7ff66736c7ea call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z VirtualFree call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 697->699 710 7ff66736c7ec-7ff66736c7f9 call 7ff667362bf0 699->710 711 7ff66736c830-7ff66736c833 699->711 702->699 716 7ff66736c74a-7ff66736c751 703->716 717 7ff66736c753-7ff66736c782 call 7ff66736cfd0 703->717 724 7ff66736c7fb-7ff66736c808 call 7ff667362d30 710->724 725 7ff66736c824-7ff66736c82b 710->725 713 7ff66736c80d-7ff66736c810 call 7ff667362e70 711->713 714 7ff66736c835-7ff66736c841 call 7ff667362ad0 711->714 722 7ff66736c815-7ff66736c81e 713->722 714->722 716->697 727 7ff66736c788 717->727 728 7ff66736c843-7ff66736c84e 717->728 722->620 722->725 724->725 734 7ff66736c80a 724->734 725->620 727->697 730 7ff66736c852-7ff66736c894 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 728->730 731 7ff66736c850 728->731 736 7ff66736c89a-7ff66736c8c6 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 730->736 737 7ff66736c91f-7ff66736c933 VirtualFree 730->737 731->730 734->713 740 7ff66736c8c8-7ff66736c8d5 call 7ff667362bf0 736->740 741 7ff66736c935-7ff66736c938 736->741 737->630 749 7ff66736c8fc 740->749 750 7ff66736c8d7-7ff66736c8e4 call 7ff667362d30 740->750 742 7ff66736c93a-7ff66736c946 call 7ff667362ad0 741->742 743 7ff66736c8e9-7ff66736c8ec call 7ff667362e70 741->743 751 7ff66736c8f1-7ff66736c8fa 742->751 743->751 753 7ff66736c903-7ff66736c919 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 749->753 750->749 756 7ff66736c8e6 750->756 751->749 751->753 753->737 756->743
    APIs
    • VirtualAlloc.KERNEL32 ref: 00007FF66736C3A5
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF66736C599
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736C5A9
    • memcpy.VCRUNTIME140 ref: 00007FF66736C5B9
    • memcpy.VCRUNTIME140 ref: 00007FF66736C5F8
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF66736C640
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF66736C64D
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736C66C
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736C965
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$memcpy$AllocV21@@Vios_base@1@Virtual
    • String ID: bytes of PE Header$ExAllocatePoolWithTag$[!] Failed to find ExAllocatePool$[+] DriverEntry returned 0x$[+] Freeing memory$[+] Image base has been allocated at 0x$[+] Memory has been released$[+] Skipped 0x$[-] Callback returns false, failed!$[-] Failed to allocate remote image in kernel$[-] Failed to call driver entry$[-] Failed to fix cookie$[-] Failed to resolve imports$[-] Failed to write local image to remote image$[-] Image is not 64 bit$[-] Invalid format of PE image$[-] WARNING: Failed to free memory!$[<] Calling DriverEntry 0x
    • API String ID: 3943948942-2368498643
    • Opcode ID: e85050eabc87d11fccc521391b061a4e56f73e79f52928a46ddf4199e58d5a21
    • Instruction ID: 19fa000d80a7f11120d5d2f36957301d1fc3de87f353f9e66bc61a920cf119a4
    • Opcode Fuzzy Hash: e85050eabc87d11fccc521391b061a4e56f73e79f52928a46ddf4199e58d5a21
    • Instruction Fuzzy Hash: 0B024961A18A42C6EE50DB66E9A02B923B2BF44B84F404135DE4EFF795EE3CF645C344

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 758 7ff667363b10-7ff667363ba8 call 7ff667364320 * 2 763 7ff667363c3d 758->763 764 7ff667363bae-7ff667363be8 call 7ff667364320 758->764 765 7ff667363c41-7ff667363c52 763->765 770 7ff667363bea 764->770 771 7ff667363c0d-7ff667363c3b call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 764->771 767 7ff667363c5d-7ff667363d00 call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff6673627e0 765->767 768 7ff667363c54-7ff667363c5b 765->768 786 7ff667363d07-7ff667363d0f 767->786 787 7ff667363d02-7ff667363d05 767->787 772 7ff667363bf1-7ff667363c08 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 768->772 770->772 771->765 780 7ff667364184-7ff6673641ac call 7ff66736fdf0 772->780 788 7ff667363d12-7ff667363d35 call 7ff6673627e0 786->788 787->788 791 7ff667363d3c-7ff667363d44 788->791 792 7ff667363d37-7ff667363d3a 788->792 793 7ff667363d47-7ff667363d5b call 7ff667363690 791->793 792->793 796 7ff667363d5d 793->796 797 7ff667363d69-7ff667363dae call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff6673612b0 call 7ff667363930 793->797 796->797 804 7ff667363dbc-7ff667363dd4 call 7ff6673627e0 797->804 805 7ff667363db0-7ff667363db7 797->805 810 7ff667363dd6-7ff667363ddd 804->810 811 7ff667363de2-7ff667363e00 call 7ff6673627e0 804->811 806 7ff667364115 805->806 809 7ff66736411c-7ff667364134 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 806->809 816 7ff667364137 call 7ff6673637f0 809->816 810->806 817 7ff667363e02-7ff667363e09 811->817 818 7ff667363e0e-7ff667363e4d call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 811->818 819 7ff66736413c 816->819 817->809 825 7ff667363e53-7ff667363ea9 DeviceIoControl 818->825 826 7ff66736410e 818->826 821 7ff66736413e-7ff667364146 819->821 822 7ff667364148-7ff66736415e 821->822 823 7ff667364181 821->823 827 7ff66736417c call 7ff66736fe10 822->827 828 7ff667364160-7ff667364173 822->828 823->780 825->826 829 7ff667363eaf-7ff667363eb7 825->829 826->806 827->823 828->827 830 7ff667364175-7ff66736417b _invalid_parameter_noinfo_noreturn 828->830 832 7ff667363ebd-7ff667363f13 DeviceIoControl 829->832 833 7ff667364105-7ff66736410c 829->833 830->827 832->833 834 7ff667363f19-7ff667363f1c 832->834 833->806 835 7ff667364027-7ff66736402e 834->835 836 7ff667363f22-7ff667363f3c 834->836 835->806 837 7ff667363ffa-7ff667364002 836->837 838 7ff667363f42-7ff667363f55 call 7ff66736ffa0 836->838 839 7ff667364033-7ff66736403f 837->839 840 7ff667364004-7ff667364021 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 837->840 838->837 846 7ff667363f5b-7ff667363f91 call 7ff6673660d0 838->846 844 7ff667364042 call 7ff667368150 839->844 840->835 847 7ff667364047-7ff667364049 844->847 852 7ff667363f94 call 7ff667362fb0 846->852 847->835 849 7ff66736404b-7ff66736404f 847->849 849->835 851 7ff667364051-7ff667364073 call 7ff6673627e0 849->851 856 7ff6673640d3-7ff6673640d6 851->856 857 7ff667364075-7ff66736407d 851->857 854 7ff667363f99-7ff667363fa8 852->854 858 7ff667363faa-7ff667363fbb 854->858 859 7ff667363fde-7ff667363ff5 call 7ff66736ff40 854->859 861 7ff6673640d9 call 7ff6673637f0 856->861 857->856 860 7ff66736407f-7ff6673640cd DeviceIoControl 857->860 863 7ff667363fbd-7ff667363fd0 858->863 864 7ff667363fd9 call 7ff66736fe10 858->864 859->837 860->856 866 7ff6673640de-7ff667364103 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 861->866 863->864 867 7ff667363fd2-7ff667363fd8 _invalid_parameter_noinfo_noreturn 863->867 864->859 866->821 867->864
    APIs
      • Part of subcall function 00007FF667364320: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(00000000,?,?,00000000,00007FF667363B67), ref: 00007FF66736439C
      • Part of subcall function 00007FF667364320: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(00000000,?,?,00000000,00007FF667363B67), ref: 00007FF667364469
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667363C00
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667363C23
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF667363C73
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF667363C83
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667363C93
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF667363CB6
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF667363CC6
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667363CD6
      • Part of subcall function 00007FF667366260: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E0
      • Part of subcall function 00007FF667366260: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E7
      • Part of subcall function 00007FF667366260: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663F4
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667363D7F
      • Part of subcall function 00007FF6673612B0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667361405
      • Part of subcall function 00007FF667363930: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667363A6C
      • Part of subcall function 00007FF667363930: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667363ABE
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736412B
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667364175
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@_$V01@@$_invalid_parameter_noinfo_noreturn$V01@_V21@@Vios_base@1@$?setstate@?$basic_ios@_?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@
    • String ID: PAGE$RtlDeleteElementGenericTableAvl$[!] Failed to find RtlDeleteElementGenericTableAvl$[+] Found Table Entry = 0x$[+] PiDDBCacheTable Cleaned$[+] PiDDBCacheTable Ptr 0x$[+] PiDDBLock Locked$[+] PiDDBLock Ptr 0x$[+] PiDDBLock found with second pattern$[-] Can't delete from PiDDBCacheTable$[-] Can't get next entry$[-] Can't get prev entry$[-] Can't lock PiDDBCacheTable$[-] Can't set next entry$[-] Can't set prev entry$[-] Not found in cache$[-] Warning PiDDBCacheTable not found$[-] Warning PiDDBLock not found$xxx????xxxxx????xxx????x????x$xxxxxx$xxxxxx????xxxxx????xxx????xxxxx????x????xx?x
    • API String ID: 104082274-3657977524
    • Opcode ID: 477d5d5a1778ed4d96003cb5815249dbca58ca70d61b128b4ae4fc44ad3b2010
    • Instruction ID: 8779357431a60e9a5e9b8fcd3af794e389179736cc7f69bee33e4fe09956b247
    • Opcode Fuzzy Hash: 477d5d5a1778ed4d96003cb5815249dbca58ca70d61b128b4ae4fc44ad3b2010
    • Instruction Fuzzy Hash: A1122A71A09B42D5FB00DF66E8742B823B5BB44B88F405535D94DABB69EF3CE219C304

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1162 7ff66736bc10-7ff66736bc62 1163 7ff66736bc68-7ff66736bc7b call 7ff66736ffa0 1162->1163 1164 7ff66736bd0e-7ff66736bd16 1162->1164 1163->1164 1171 7ff66736bc81-7ff66736bcb4 call 7ff6673660d0 1163->1171 1166 7ff66736bd88-7ff66736bdb5 1164->1166 1167 7ff66736bd18-7ff66736bd35 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1164->1167 1169 7ff66736bdb8 call 7ff667366fa0 1166->1169 1175 7ff66736bd3b 1167->1175 1172 7ff66736bdbd-7ff66736bdbf 1169->1172 1180 7ff66736bcb7 call 7ff667362fb0 1171->1180 1172->1175 1176 7ff66736bdc5-7ff66736bdcc 1172->1176 1178 7ff66736bd42-7ff66736bd58 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1175->1178 1176->1175 1179 7ff66736bdd2-7ff66736bded call 7ff6673627e0 1176->1179 1188 7ff66736bd5e 1178->1188 1189 7ff66736bdfb-7ff66736be01 1179->1189 1190 7ff66736bdef-7ff66736bdf6 1179->1190 1183 7ff66736bcbc-7ff66736bccb 1180->1183 1186 7ff66736bccd-7ff66736bcde 1183->1186 1187 7ff66736bd02-7ff66736bd09 call 7ff66736ff40 1183->1187 1191 7ff66736bcfc-7ff66736bd01 call 7ff66736fe10 1186->1191 1192 7ff66736bce0-7ff66736bcf3 1186->1192 1187->1164 1193 7ff66736bd60-7ff66736bd87 call 7ff66736fdf0 1188->1193 1194 7ff66736be03-7ff66736be34 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff667362d30 1189->1194 1195 7ff66736be41-7ff66736be4a 1189->1195 1190->1178 1191->1187 1192->1191 1197 7ff66736bcf5-7ff66736bcfb _invalid_parameter_noinfo_noreturn 1192->1197 1220 7ff66736be37 call 7ff667362e70 1194->1220 1201 7ff66736bef9-7ff66736bf01 1195->1201 1202 7ff66736be50-7ff66736be63 call 7ff66736ffa0 1195->1202 1197->1191 1203 7ff66736bf32-7ff66736bf3d 1201->1203 1204 7ff66736bf03-7ff66736bf20 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1201->1204 1202->1201 1214 7ff66736be69-7ff66736be9f call 7ff6673660d0 1202->1214 1211 7ff66736bf40 call 7ff6673671e0 1203->1211 1217 7ff66736bf26 1204->1217 1215 7ff66736bf45-7ff66736bf47 1211->1215 1224 7ff66736bea2 call 7ff667362fb0 1214->1224 1215->1217 1219 7ff66736bf49-7ff66736bf50 1215->1219 1217->1203 1219->1217 1222 7ff66736bf52-7ff66736bf5b 1219->1222 1223 7ff66736be3c 1220->1223 1225 7ff66736c00a-7ff66736c012 1222->1225 1226 7ff66736bf61-7ff66736bf74 call 7ff66736ffa0 1222->1226 1223->1188 1227 7ff66736bea7-7ff66736beb6 1224->1227 1228 7ff66736c06d-7ff66736c074 1225->1228 1229 7ff66736c014-7ff66736c031 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1225->1229 1226->1225 1240 7ff66736bf7a-7ff66736bfb0 call 7ff6673660d0 1226->1240 1232 7ff66736beed-7ff66736bef4 call 7ff66736ff40 1227->1232 1233 7ff66736beb8-7ff66736bec9 1227->1233 1231 7ff66736c077 call 7ff667367430 1228->1231 1242 7ff66736c037-7ff66736c068 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff667362bf0 1229->1242 1236 7ff66736c07c-7ff66736c07e 1231->1236 1232->1201 1237 7ff66736becb-7ff66736bede 1233->1237 1238 7ff66736bee7-7ff66736beec call 7ff66736fe10 1233->1238 1236->1242 1243 7ff66736c080-7ff66736c084 1236->1243 1237->1238 1244 7ff66736bee0-7ff66736bee6 _invalid_parameter_noinfo_noreturn 1237->1244 1238->1232 1252 7ff66736bfb3 call 7ff667362fb0 1240->1252 1242->1228 1243->1242 1247 7ff66736c086-7ff66736c0ac call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1243->1247 1244->1238 1260 7ff66736c0b2-7ff66736c0b5 1247->1260 1261 7ff66736c0ae 1247->1261 1255 7ff66736bfb8-7ff66736bfc7 1252->1255 1258 7ff66736bfc9-7ff66736bfda 1255->1258 1259 7ff66736bffe-7ff66736c005 call 7ff66736ff40 1255->1259 1262 7ff66736bfdc-7ff66736bfef 1258->1262 1263 7ff66736bff8-7ff66736bffd call 7ff66736fe10 1258->1263 1259->1225 1260->1193 1261->1260 1262->1263 1265 7ff66736bff1-7ff66736bff7 _invalid_parameter_noinfo_noreturn 1262->1265 1263->1259 1265->1263
    APIs
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736BCF5
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736BD35
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736BE20
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736BEE0
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736BF20
      • Part of subcall function 00007FF6673660D0: memcpy.VCRUNTIME140 ref: 00007FF667366101
      • Part of subcall function 00007FF667362FB0: memset.VCRUNTIME140 ref: 00007FF66736300A
      • Part of subcall function 00007FF667362FB0: VirtualAlloc.KERNEL32 ref: 00007FF6673630A9
      • Part of subcall function 00007FF667362FB0: VirtualFree.KERNEL32 ref: 00007FF6673630E0
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736BD58
      • Part of subcall function 00007FF66736FFA0: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF66736708F), ref: 00007FF66736FFB0
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736BFF1
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736C031
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736C054
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736C0A3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_V01@@W@std@@@std@@$_invalid_parameter_noinfo_noreturn$Virtual$AllocCriticalEnterFreeSectionmemcpymemset
    • String ID: MmAllocatePagesForMdl$MmMapLockedPagesSpecifyCache$MmProtectMdlSystemAddress$[!] Failed to find MmAlocatePagesForMdl$[!] Failed to find MmMapLockedPagesSpecifyCache$[!] Failed to find MmProtectMdlSystemAddress$[+] Allocated pages for mdl$[-] Can't allocate pages for mdl$[-] Can't change protection for mdl pages, cleaning up$[-] Can't read the _MDL : byteCount$[-] Can't set mdl pages cache, cleaning up.$[-] Couldn't allocate enough memory, cleaning up
    • API String ID: 1352232468-338763861
    • Opcode ID: faf9ab730050889ef882498f7ec94a8934ccc62aaabe8813ea574f7c8a9881b4
    • Instruction ID: 45e1e70c5e2008fe8396fe04b656d0a1c4198440e2dae05e1f40a47a054a7567
    • Opcode Fuzzy Hash: faf9ab730050889ef882498f7ec94a8934ccc62aaabe8813ea574f7c8a9881b4
    • Instruction Fuzzy Hash: FED15E61A08A02E5FB00DF66E9643B82375BF44794F404235EA5DEFAA9EF7CE245C704

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1268 7ff66736eca0-7ff66736ece1 GetModuleHandleA 1269 7ff66736ece7-7ff66736ecff 1268->1269 1270 7ff66736ef20-7ff66736ef43 call 7ff66736fdf0 1268->1270 1272 7ff66736ef4a-7ff66736ef4f call 7ff6673611b0 1269->1272 1273 7ff66736ed05-7ff66736ed0d 1269->1273 1276 7ff66736ed12-7ff66736ed59 call 7ff667368ef0 RtlInitUnicodeString 1273->1276 1277 7ff66736ed0f 1273->1277 1281 7ff66736ef44-7ff66736ef49 call 7ff6673611b0 1276->1281 1282 7ff66736ed5f-7ff66736ed64 1276->1282 1277->1276 1281->1272 1283 7ff66736ed69-7ff66736edae call 7ff667368ef0 RegOpenKeyW 1282->1283 1284 7ff66736ed66 1282->1284 1289 7ff66736edbb-7ff66736ee1d RegCloseKey GetProcAddress call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1283->1289 1290 7ff66736edb0-7ff66736edb6 1283->1290 1284->1283 1306 7ff66736ee61-7ff66736ee7e RegDeleteTreeW 1289->1306 1307 7ff66736ee1f-7ff66736ee5f call 7ff667366470 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z RegDeleteTreeW 1289->1307 1291 7ff66736ee86-7ff66736ee8e 1290->1291 1292 7ff66736eec9-7ff66736eee2 1291->1292 1293 7ff66736ee90-7ff66736eea6 1291->1293 1297 7ff66736ef1d 1292->1297 1298 7ff66736eee4-7ff66736eefa 1292->1298 1295 7ff66736eea8-7ff66736eebb 1293->1295 1296 7ff66736eec4 call 7ff66736fe10 1293->1296 1295->1296 1300 7ff66736eebd-7ff66736eec3 _invalid_parameter_noinfo_noreturn 1295->1300 1296->1292 1297->1270 1302 7ff66736eefc-7ff66736ef0f 1298->1302 1303 7ff66736ef18 call 7ff66736fe10 1298->1303 1300->1296 1302->1303 1305 7ff66736ef11-7ff66736ef17 _invalid_parameter_noinfo_noreturn 1302->1305 1303->1297 1305->1303 1309 7ff66736ee84 1306->1309 1310 7ff66736ee80-7ff66736ee82 1306->1310 1307->1291 1309->1291 1310->1291
    APIs
    • GetModuleHandleA.KERNEL32 ref: 00007FF66736ECD5
    • RtlInitUnicodeString.NTDLL ref: 00007FF66736ED48
    • RegOpenKeyW.ADVAPI32 ref: 00007FF66736EDA6
    • RegCloseKey.ADVAPI32 ref: 00007FF66736EDBF
    • GetProcAddress.KERNEL32 ref: 00007FF66736EDCF
      • Part of subcall function 00007FF667366470: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF667366689
      • Part of subcall function 00007FF667366470: ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF667366690
      • Part of subcall function 00007FF667366470: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF66736669D
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF66736EDFA
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z.MSVCP140 ref: 00007FF66736EE05
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736EE15
    • RegDeleteTreeW.ADVAPI32 ref: 00007FF66736EE76
      • Part of subcall function 00007FF667366470: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF667366503
      • Part of subcall function 00007FF667366470: ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF66736653A
      • Part of subcall function 00007FF667366470: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF6673665A8
      • Part of subcall function 00007FF667366470: ?widen@?$ctype@_W@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF6673665F8
      • Part of subcall function 00007FF667366470: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF667366606
      • Part of subcall function 00007FF667366470: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF667366639
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736EE3C
    • RegDeleteTreeW.ADVAPI32 ref: 00007FF66736EE57
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736EEBD
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736EF11
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: U?$char_traits@_W@std@@@std@@$V01@$??6?$basic_ostream@_$?sputc@?$basic_streambuf@_$D@std@@@std@@DeleteTreeU?$char_traits@V01@@_invalid_parameter_noinfo_noreturn$?flush@?$basic_ostream@?getloc@ios_base@std@@?setstate@?$basic_ios@_?uncaught_exception@std@@?widen@?$ctype@_AddressCloseHandleInitModuleOpenOsfx@?$basic_ostream@ProcStringUnicodeV12@V21@@Vios_base@1@Vlocale@2@W@std@@
    • String ID: "$NtUnloadDriver$SYSTEM\CurrentControlSet\Services\$[+] NtUnloadDriver Status 0x$[-] Driver Unload Failed!!$\Registry\Machine\System\CurrentControlSet\Services\$ntdll.dll
    • API String ID: 3029441947-3977549460
    • Opcode ID: 8aa02ac224f8c6c68e2a193379f6398c8910db6acd76c3abf61c4becc9892492
    • Instruction ID: 865bf7505440a6744830236ba2816c8f188185f4c3f6f30152bc00aeb9e9f936
    • Opcode Fuzzy Hash: 8aa02ac224f8c6c68e2a193379f6398c8910db6acd76c3abf61c4becc9892492
    • Instruction Fuzzy Hash: 78717262B19B46D5EB10CF66E8B42AC2371FB44B98F404635DA5DAB698DF3CE249C304

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1374 7ff6673623e0-7ff66736243e call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1377 7ff667362449-7ff66736246a call 7ff6673612b0 call 7ff66736eca0 1374->1377 1378 7ff667362440-7ff667362443 CloseHandle 1374->1378 1383 7ff66736246c-7ff667362483 1377->1383 1384 7ff6673624a6-7ff6673624a8 1377->1384 1378->1377 1385 7ff667362485-7ff667362498 1383->1385 1386 7ff6673624a1 call 7ff66736fe10 1383->1386 1387 7ff6673624aa-7ff6673624ac 1384->1387 1388 7ff6673624b1-7ff66736253e call 7ff667361440 memset call 7ff667365ac0 rand * 2 call 7ff6673700ec 1384->1388 1385->1386 1389 7ff66736249a-7ff6673624a0 _invalid_parameter_noinfo_noreturn 1385->1389 1386->1384 1391 7ff6673626e9-7ff667362710 call 7ff66736fdf0 1387->1391 1400 7ff667362573-7ff66736259f ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z 1388->1400 1401 7ff667362540-7ff667362571 rand 1388->1401 1389->1386 1402 7ff6673625a8-7ff6673625ca call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z call 7ff667365ee0 1400->1402 1403 7ff6673625a1 1400->1403 1401->1400 1401->1401 1408 7ff6673625ea-7ff667362647 call 7ff66736fe10 _wremove 1402->1408 1409 7ff6673625cc-7ff6673625e4 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z 1402->1409 1403->1402 1412 7ff667362649-7ff667362654 1408->1412 1413 7ff667362670-7ff667362674 1408->1413 1409->1408 1412->1413 1416 7ff667362656-7ff66736266e 1412->1416 1414 7ff667362676-7ff66736267b call 7ff667365ee0 1413->1414 1415 7ff667362680-7ff6673626aa ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 1413->1415 1414->1415 1418 7ff6673626ac-7ff6673626c3 1415->1418 1419 7ff6673626e6 1415->1419 1416->1413 1420 7ff6673626c5-7ff6673626d8 1418->1420 1421 7ff6673626e1 call 7ff66736fe10 1418->1421 1419->1391 1420->1421 1422 7ff6673626da-7ff6673626e0 _invalid_parameter_noinfo_noreturn 1420->1422 1421->1419 1422->1421
    APIs
      • Part of subcall function 00007FF667366260: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E0
      • Part of subcall function 00007FF667366260: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E7
      • Part of subcall function 00007FF667366260: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663F4
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362430
    • CloseHandle.KERNEL32 ref: 00007FF667362443
      • Part of subcall function 00007FF667361760: GetTempPathW.KERNEL32 ref: 00007FF667361494
      • Part of subcall function 00007FF667361760: memcpy.VCRUNTIME140 ref: 00007FF667361522
      • Part of subcall function 00007FF667361760: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6673615CC
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736249A
    • memset.VCRUNTIME140 ref: 00007FF6673624C9
      • Part of subcall function 00007FF667365AC0: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF667365AF3
      • Part of subcall function 00007FF667365AC0: ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF667365B12
      • Part of subcall function 00007FF667365AC0: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF667365B44
      • Part of subcall function 00007FF667365AC0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF667365B60
      • Part of subcall function 00007FF667365AC0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF667365BAA
    • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF6673624EA
    • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF6673624F3
      • Part of subcall function 00007FF6673700B0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00007FF6673661AE), ref: 00007FF6673700CA
    • rand.API-MS-WIN-CRT-UTILITY-L1-1-0 ref: 00007FF667362540
    • ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z.MSVCP140 ref: 00007FF66736257E
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6673625B7
    • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6673625E4
    • _wremove.API-MS-WIN-CRT-FILESYSTEM-L1-1-0 ref: 00007FF667362603
    • ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF667362685
    • ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF667362690
    • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF66736269A
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6673626DA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: U?$char_traits@$D@std@@@std@@$U?$char_traits@_W@std@@@std@@$V01@$?setstate@?$basic_ios@__invalid_parameter_noinfo_noreturnrand$??6?$basic_ostream@_V01@@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@??1?$basic_streambuf@?uncaught_exception@std@@?write@?$basic_ostream@CloseD@std@@@1@_HandleInit@?$basic_streambuf@Osfx@?$basic_ostream@PathTempV12@V?$basic_streambuf@_wremovemallocmemcpymemset
    • String ID: [!] Error dumping shit inside the disk$[+] Vul driver data destroyed before unlink$[<] Unloading vulnerable driver
    • API String ID: 3024648514-4078119036
    • Opcode ID: 0314a88b68f23f562cf9c8614c019e7b2f401058eb6cf3280caed7b87f3eb0f2
    • Instruction ID: 2d3c0ea95a0b6b9031e289e59f064dd6e193e6f917f20fdea3fca1c122a322db
    • Opcode Fuzzy Hash: 0314a88b68f23f562cf9c8614c019e7b2f401058eb6cf3280caed7b87f3eb0f2
    • Instruction Fuzzy Hash: 9A91B272B18A46C2EF00DB26E9642BD6371FB84B94F414132DA4DABBA9DF7CE545C700

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1424 7ff66736fae8-7ff66736fb1d 1425 7ff66736fb32-7ff66736fb3b 1424->1425 1426 7ff66736fb1f-7ff66736fb26 1424->1426 1428 7ff66736fb3d-7ff66736fb40 1425->1428 1429 7ff66736fb57-7ff66736fb59 1425->1429 1426->1425 1427 7ff66736fb28-7ff66736fb2d 1426->1427 1432 7ff66736fd38-7ff66736fd58 call 7ff66736fdf0 1427->1432 1428->1429 1433 7ff66736fb42-7ff66736fb4a 1428->1433 1430 7ff66736fd36 1429->1430 1431 7ff66736fb5f-7ff66736fb63 1429->1431 1430->1432 1434 7ff66736fbca-7ff66736fbf0 call 7ff66736fd7c 1431->1434 1435 7ff66736fb65-7ff66736fb68 1431->1435 1437 7ff66736fb4c-7ff66736fb4e 1433->1437 1438 7ff66736fb50-7ff66736fb53 1433->1438 1449 7ff66736fbf2-7ff66736fbfa 1434->1449 1450 7ff66736fc11-7ff66736fc18 1434->1450 1439 7ff66736fb6a-7ff66736fb72 1435->1439 1440 7ff66736fb78-7ff66736fb89 GetFileAttributesExW 1435->1440 1437->1429 1437->1438 1438->1429 1439->1440 1443 7ff66736fb74-7ff66736fb76 1439->1443 1444 7ff66736fb8b-7ff66736fb91 GetLastError 1440->1444 1445 7ff66736fb96-7ff66736fb9b 1440->1445 1443->1434 1443->1440 1444->1432 1447 7ff66736fb9d-7ff66736fba4 1445->1447 1448 7ff66736fba6-7ff66736fbc4 1445->1448 1447->1434 1447->1448 1448->1430 1448->1434 1453 7ff66736fbfc-7ff66736fc04 CloseHandle 1449->1453 1454 7ff66736fc0a-7ff66736fc0c 1449->1454 1451 7ff66736fc1a-7ff66736fc1e 1450->1451 1452 7ff66736fc72-7ff66736fc76 1450->1452 1451->1452 1456 7ff66736fc20-7ff66736fc37 GetFileInformationByHandleEx 1451->1456 1457 7ff66736fc78-7ff66736fc91 GetFileInformationByHandleEx 1452->1457 1458 7ff66736fcc4-7ff66736fccd 1452->1458 1453->1454 1455 7ff66736fd6c-7ff66736fd72 terminate 1453->1455 1454->1432 1465 7ff66736fd73-7ff66736fd78 1455->1465 1461 7ff66736fc39-7ff66736fc45 GetLastError 1456->1461 1462 7ff66736fc62-7ff66736fc6f 1456->1462 1463 7ff66736fcb5-7ff66736fcc1 1457->1463 1464 7ff66736fc93-7ff66736fc9f GetLastError 1457->1464 1459 7ff66736fd1f-7ff66736fd21 1458->1459 1460 7ff66736fccf-7ff66736fce2 GetFileInformationByHandleEx 1458->1460 1470 7ff66736fd59-7ff66736fd5d 1459->1470 1471 7ff66736fd23-7ff66736fd27 1459->1471 1466 7ff66736fce4-7ff66736fcf0 GetLastError 1460->1466 1467 7ff66736fd0e-7ff66736fd1c 1460->1467 1468 7ff66736fc5b-7ff66736fc5d 1461->1468 1469 7ff66736fc47-7ff66736fc52 CloseHandle 1461->1469 1462->1452 1463->1458 1464->1468 1472 7ff66736fca1-7ff66736fcac CloseHandle 1464->1472 1465->1432 1466->1468 1473 7ff66736fcf6-7ff66736fd01 CloseHandle 1466->1473 1467->1459 1468->1432 1469->1468 1474 7ff66736fc54-7ff66736fc5a terminate 1469->1474 1470->1465 1476 7ff66736fd5f-7ff66736fd6a CloseHandle 1470->1476 1471->1430 1475 7ff66736fd29-7ff66736fd34 CloseHandle 1471->1475 1472->1468 1477 7ff66736fcae-7ff66736fcb4 terminate 1472->1477 1473->1468 1478 7ff66736fd07-7ff66736fd0d terminate 1473->1478 1474->1468 1475->1430 1475->1455 1476->1455 1476->1465 1477->1463 1478->1467
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: CloseHandle$AttributesErrorFileLast__std_fs_open_handleterminate
    • String ID:
    • API String ID: 1657120197-0
    • Opcode ID: 70276f9bcb9585dddc24ae70747ab01c5c0698922327de83e8fc3262c8de8dc7
    • Instruction ID: 8d8ef67020f4665aa52127b4997af3bc9423b292276c35625c0536d9f7d0db86
    • Opcode Fuzzy Hash: 70276f9bcb9585dddc24ae70747ab01c5c0698922327de83e8fc3262c8de8dc7
    • Instruction Fuzzy Hash: 04814032B08A03C6F7648B26A83467922B1AF457B4F140735DE6EEB6D4DF2CE5468B10

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1479 7ff6673637f0-7ff667363803 1480 7ff667363906-7ff667363912 1479->1480 1481 7ff667363809-7ff667363823 1479->1481 1482 7ff6673638d9-7ff6673638e1 1481->1482 1483 7ff667363829-7ff66736383c call 7ff66736ffa0 1481->1483 1484 7ff667363913-7ff667367f63 1482->1484 1485 7ff6673638e3-7ff667363900 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1482->1485 1483->1482 1491 7ff667363842-7ff667363895 call 7ff6673660d0 call 7ff667362fb0 1483->1491 1492 7ff667367f9a 1484->1492 1493 7ff667367f65-7ff667367f75 GetModuleHandleA 1484->1493 1485->1480 1515 7ff6673638cd-7ff6673638d4 call 7ff66736ff40 1491->1515 1516 7ff667363897-7ff6673638a9 1491->1516 1494 7ff667367f9c-7ff667367fbc call 7ff66736fdf0 1492->1494 1496 7ff667367fbd-7ff667367fd3 GetProcAddress 1493->1496 1497 7ff667367f77 1493->1497 1499 7ff667367fd5-7ff667367fdc 1496->1499 1500 7ff667367fde-7ff667368008 1496->1500 1502 7ff667367f7e-7ff667367f94 call 7ff667366260 ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1497->1502 1499->1502 1504 7ff6673680b6-7ff6673680c0 1500->1504 1505 7ff66736800e-7ff667368021 call 7ff66736ffa0 1500->1505 1502->1492 1509 7ff6673680c2 1504->1509 1510 7ff6673680ce-7ff6673680e2 call 7ff6673627e0 1504->1510 1505->1504 1518 7ff667368027-7ff667368073 call 7ff6673660d0 call 7ff667362fb0 1505->1518 1509->1510 1510->1492 1524 7ff6673680e8-7ff6673680ef 1510->1524 1515->1482 1520 7ff6673638ab-7ff6673638be 1516->1520 1521 7ff6673638c7-7ff6673638cc call 7ff66736fe10 1516->1521 1536 7ff6673680aa-7ff6673680b1 call 7ff66736ff40 1518->1536 1537 7ff667368075-7ff667368086 1518->1537 1520->1521 1525 7ff6673638c0-7ff6673638c6 _invalid_parameter_noinfo_noreturn 1520->1525 1521->1515 1528 7ff667368118-7ff66736812d call 7ff667362880 1524->1528 1529 7ff6673680f1-7ff6673680f8 1524->1529 1525->1521 1528->1492 1539 7ff667368133-7ff66736814b call 7ff667362880 1528->1539 1529->1528 1530 7ff6673680fa-7ff667368101 1529->1530 1530->1528 1533 7ff667368103-7ff66736810a 1530->1533 1533->1528 1538 7ff66736810c 1533->1538 1536->1504 1540 7ff667368088-7ff66736809b 1537->1540 1541 7ff6673680a4-7ff6673680a9 call 7ff66736fe10 1537->1541 1538->1528 1539->1494 1540->1541 1543 7ff66736809d-7ff6673680a3 _invalid_parameter_noinfo_noreturn 1540->1543 1541->1536 1543->1541
    APIs
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6673638C0
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,-0000000A,00007FF66736413C), ref: 00007FF667363900
    • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF667367F6C
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF667367F94
      • Part of subcall function 00007FF66736FFA0: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF66736708F), ref: 00007FF66736FFB0
      • Part of subcall function 00007FF6673660D0: memcpy.VCRUNTIME140 ref: 00007FF667366101
      • Part of subcall function 00007FF667362FB0: memset.VCRUNTIME140 ref: 00007FF66736300A
      • Part of subcall function 00007FF667362FB0: VirtualAlloc.KERNEL32 ref: 00007FF6673630A9
      • Part of subcall function 00007FF667362FB0: VirtualFree.KERNEL32 ref: 00007FF6673630E0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_V01@@VirtualW@std@@@std@@$AllocCriticalEnterFreeHandleModuleSection_invalid_parameter_noinfo_noreturnmemcpymemset
    • String ID: ExReleaseResourceLite$NtAddAtom$[!] Failed to find ExReleaseResourceLite$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 2380966100-1591343369
    • Opcode ID: 9a55819e55609df80ef77bf808e43bff089201616bccec53d007c7fb8a1bbac8
    • Instruction ID: 79019874f9fc6d201522bd58b47a9169aeb139d2cb01911d3dedc045df172d3d
    • Opcode Fuzzy Hash: 9a55819e55609df80ef77bf808e43bff089201616bccec53d007c7fb8a1bbac8
    • Instruction Fuzzy Hash: D9915C61A19A42E5FA00DB66F8602B823B5BF45794F404131D95DFFBA5EF7CE644C700
    APIs
      • Part of subcall function 00007FF667364320: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(00000000,?,?,00000000,00007FF667363B67), ref: 00007FF66736439C
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736C13B
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736C15E
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736C22C
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736C24F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_V01@@W@std@@@std@@
    • String ID: PAGE$PAGELK$[!] Failed to find MmAllocateIndependentPagesEx$[!] Failed to find MmSetPageProtection$[-] Error allocating independent pages$[-] Failed to change page protections$x????xxxxxxxx????xxxxxxxxx????xxxxxxxx$xx????x???x?x????xxxxxxx????x
    • API String ID: 302930070-3125098887
    • Opcode ID: b56b588d9dd8c2ee139c9fe0190437d2656703fa9a6609ae01abd2105fc46c28
    • Instruction ID: ecd66b75f36ef2c613283ba6ba6771d20df87e95c8ce9ba755a01af352a0e90f
    • Opcode Fuzzy Hash: b56b588d9dd8c2ee139c9fe0190437d2656703fa9a6609ae01abd2105fc46c28
    • Instruction Fuzzy Hash: C9514561A0CA86D1EE20DB52F8601B563B5BF84B84F410136DA8DEFB65EF7CF2558704
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
    • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
    • API String ID: 2565136772-3242537097
    • Opcode ID: e5e4f754f3f487965fad72919d86d6d4df3eb9a1f8798c2007f0e7c32e2b8c95
    • Instruction ID: 6f9e7b930ba94645fbb1861dee8d617ebb508783bf37593a364495448c79c66e
    • Opcode Fuzzy Hash: e5e4f754f3f487965fad72919d86d6d4df3eb9a1f8798c2007f0e7c32e2b8c95
    • Instruction Fuzzy Hash: 83213C64E1AA03D1FA64DB21FA7417823B1FF48B41F544435C90EEEAA2EE3CB645C714
    APIs
    • GetModuleHandleA.KERNEL32 ref: 00007FF667367B01
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667367B29
    • GetProcAddress.KERNEL32 ref: 00007FF667367B5C
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667367C32
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: EtwB$NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-361367663
    • Opcode ID: 3d84c6219891c647c69fca7b64475852b5ddfbdd79266993850f1803d0d63c17
    • Instruction ID: 064a2f415cff7b18f8ca286c8882499ed1566f5875cbe6c4c8ea474fc14a8741
    • Opcode Fuzzy Hash: 3d84c6219891c647c69fca7b64475852b5ddfbdd79266993850f1803d0d63c17
    • Instruction Fuzzy Hash: B2517B61F19A52D8FB00DF66A8602B827B5AF05794F800131DD5DEFA99EF7CE6458300
    APIs
    • GetModuleHandleA.KERNEL32 ref: 00007FF667367225
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736724D
    • GetProcAddress.KERNEL32 ref: 00007FF667367282
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667367358
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-2622504768
    • Opcode ID: d2bf155c53d14ee0042dbf99ce9987022f349bafadc77a487a6711574ac93195
    • Instruction ID: 06043bcce9e0f945e8c994755eb23df00bb2be5bd9d297c2cf9580fb61504b17
    • Opcode Fuzzy Hash: d2bf155c53d14ee0042dbf99ce9987022f349bafadc77a487a6711574ac93195
    • Instruction Fuzzy Hash: 1E519B62F08692D4FB10DFA6A8602B82372BF45798F844131DD5CEFA96DF7CA644C340
    APIs
    • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,00007FF667362D1D), ref: 00007FF6673676A5
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,00000000,?,?,?,?,00007FF667362D1D), ref: 00007FF6673676CD
    • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,?,?,?,00007FF667362D1D), ref: 00007FF6673676FA
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6673677D0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-2622504768
    • Opcode ID: 5f69a67ae23bb2902702042ca96775c38ade745b8d232f53ffbc23ae1f596fee
    • Instruction ID: b10cbd56588094c97f164f959b3fba320ae401e8e0591458663b9fc1fa31c881
    • Opcode Fuzzy Hash: 5f69a67ae23bb2902702042ca96775c38ade745b8d232f53ffbc23ae1f596fee
    • Instruction Fuzzy Hash: 5C514C62F18A92D4FB00DB66A8602B82771BF15B94F840132DD1DFFA9ADF7CA645C310
    APIs
    • GetModuleHandleA.KERNEL32 ref: 00007FF6673683C5
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6673683ED
    • GetProcAddress.KERNEL32 ref: 00007FF66736841A
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6673684F0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-2622504768
    • Opcode ID: d5914a3aceeddefa298d63cf9fe1c31d30150c684a02f743b30f77e38ff69dc3
    • Instruction ID: 271ecebece78b917db684e09f4582d1e44c691460978c38ad490f1f80e631958
    • Opcode Fuzzy Hash: d5914a3aceeddefa298d63cf9fe1c31d30150c684a02f743b30f77e38ff69dc3
    • Instruction Fuzzy Hash: B8516E62F09A92D8FB00DB66A8602B82371AF4A794F404031DE5DEFA99DE7CA645C304
    APIs
    • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,00000000,?,?,-0000000A,00000000,?,?,00007FF667364047), ref: 00007FF667368195
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,00000000,?,?,-0000000A,00000000,?,?,00007FF667364047), ref: 00007FF6673681BD
    • GetProcAddress.KERNEL32(?,?,?,?,?,?,00000000,?,?,-0000000A,00000000,?,?,00007FF667364047), ref: 00007FF6673681EA
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000), ref: 00007FF6673682C0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-2622504768
    • Opcode ID: cfd99600240ea865c8abca17f9a6b5a273b43b259d413c1336a8cc50b629559b
    • Instruction ID: 150a384ca18d4f5eff15b6f914ff9e4cd229cacf5c130557cbe3a3a4afc00e1d
    • Opcode Fuzzy Hash: cfd99600240ea865c8abca17f9a6b5a273b43b259d413c1336a8cc50b629559b
    • Instruction Fuzzy Hash: 7D517DA2F08A92D8FB00DB66A8606FC2775AF4A794F444031DD5DFFA95DE7CA645C300
    APIs
    • GetModuleHandleA.KERNEL32 ref: 00007FF667366932
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736695A
    • GetProcAddress.KERNEL32 ref: 00007FF66736698C
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667366A62
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-2622504768
    • Opcode ID: d181614ac96272674aa025f0740ef16019df5227f5e9e5bb7aeea0a741bf88c2
    • Instruction ID: 201117e0ad912296d88798b2db91e921eca0777ac29ca3eb868a725198d82baa
    • Opcode Fuzzy Hash: d181614ac96272674aa025f0740ef16019df5227f5e9e5bb7aeea0a741bf88c2
    • Instruction Fuzzy Hash: AD518C62E18692D4FB00DBA6E8602B827B1AF05BD4F404136DD5CFFA96EE3CE645C700
    APIs
    • GetModuleHandleA.KERNEL32 ref: 00007FF667366FE2
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736700A
    • GetProcAddress.KERNEL32 ref: 00007FF66736703C
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667367112
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-2622504768
    • Opcode ID: fd4aca2d8a64865051f19ff153611ac29a365584bc3508e8b6c01445a04472ba
    • Instruction ID: 751c9d18f73b122e8bb67d24505c029ef97e89e9c8230560d9aa564f8980282e
    • Opcode Fuzzy Hash: fd4aca2d8a64865051f19ff153611ac29a365584bc3508e8b6c01445a04472ba
    • Instruction Fuzzy Hash: E8517D61F09A92E4FB00DFA6A8602B82775AF45B94F800536DD5CFFA95EF3CA645C310
    APIs
    • GetModuleHandleA.KERNEL32 ref: 00007FF667366DA2
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667366DCA
    • GetProcAddress.KERNEL32 ref: 00007FF667366DFC
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667366ED2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-2622504768
    • Opcode ID: 7df866b1bfae26fce69b877358477c94e2d24cea98912b209813e1143ddbe160
    • Instruction ID: 5e4435f95911ebf976ad5c7c81cde7d1a8d1b1cdeba6cf042e07aaef573aa0f5
    • Opcode Fuzzy Hash: 7df866b1bfae26fce69b877358477c94e2d24cea98912b209813e1143ddbe160
    • Instruction Fuzzy Hash: 67516A62F09692D8FB00DB66E9602B82771AF45BD4F400135DE5DEFA9AEE3CA6458310
    APIs
    • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,?,00007FF6673637C6), ref: 00007FF667367D42
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,?,00007FF6673637C6), ref: 00007FF667367D6A
    • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,00000000,?,00000000,00000000,?,00007FF6673637C6), ref: 00007FF667367D9C
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667367E72
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-2622504768
    • Opcode ID: 25595bbf758e887c76229151383a3d9b7dfdecd2447f45c8952dfdeb4ff478cf
    • Instruction ID: e0b9912a56815814914f0ca541394b9eede701e1d2fd19dc69db4647f90c31a6
    • Opcode Fuzzy Hash: 25595bbf758e887c76229151383a3d9b7dfdecd2447f45c8952dfdeb4ff478cf
    • Instruction Fuzzy Hash: 17516D66F18A92D4FB00DB66A8602B82771AF457D4F800531DE5DFFA96DF7CA649C300
    APIs
    • GetModuleHandleA.KERNEL32 ref: 00007FF667366B72
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667366B9A
    • GetProcAddress.KERNEL32 ref: 00007FF667366BCC
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667366CA2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-2622504768
    • Opcode ID: 7dff1be43380c2075c1653e5a398fea07c88866777cc68459b13cbe2b9be6b05
    • Instruction ID: ed172745beda163f7697f9d5e8db09a85bcd6fc07f6a6156c616d280931ebb3c
    • Opcode Fuzzy Hash: 7dff1be43380c2075c1653e5a398fea07c88866777cc68459b13cbe2b9be6b05
    • Instruction Fuzzy Hash: 2F516A62F08A92D4FB00DB66A8602B827B5AF457D4F410135DE5CEFA99EF7CA645C310
    APIs
    • GetModuleHandleA.KERNEL32 ref: 00007FF667367472
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736749A
    • GetProcAddress.KERNEL32 ref: 00007FF6673674CC
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6673675A2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-2622504768
    • Opcode ID: e69972e1455e28ddab483bdba82815947aa41dbc40940289e3b5e9cd92b0a036
    • Instruction ID: f24cd66c363af5253079cab4920583cde46e4b87e08a533c41c8391f36f98e8d
    • Opcode Fuzzy Hash: e69972e1455e28ddab483bdba82815947aa41dbc40940289e3b5e9cd92b0a036
    • Instruction Fuzzy Hash: CA519DA1F18692D8FB00DB66A8602B82775AF05794F800131DE5DFFA9AEF7CE644C300
    APIs
    • GetModuleHandleA.KERNEL32 ref: 00007FF66736D00E
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736D036
    • GetProcAddress.KERNEL32 ref: 00007FF66736D068
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736D13E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-2622504768
    • Opcode ID: fc7ebf4f9e867cc079bb03149116c4735acc596d073804fac287f1617048577e
    • Instruction ID: 31463e766c94360ad075dab339628f6da6581512648a77c4fc04d4e6d19fc778
    • Opcode Fuzzy Hash: fc7ebf4f9e867cc079bb03149116c4735acc596d073804fac287f1617048577e
    • Instruction Fuzzy Hash: A1518DA2F19692D4FF40DB62A8602B82371AF45794F604132DD1CFFB96EF6CA645C340
    APIs
    • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF667362E5A), ref: 00007FF6673678D2
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF667362E5A), ref: 00007FF6673678FA
    • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF667362E5A), ref: 00007FF66736792C
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667367A02
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$V01@@$AddressControlDeviceHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 154489249-2622504768
    • Opcode ID: 00ea5fb1913a1544e8fb066c0cd4c828ab647674224ae55823c4c8056406986d
    • Instruction ID: f8d8eb8e86c580523c74bc6c2bd580e4d19e5825ec5b4662bcf8b0d533b93d80
    • Opcode Fuzzy Hash: 00ea5fb1913a1544e8fb066c0cd4c828ab647674224ae55823c4c8056406986d
    • Instruction Fuzzy Hash: C4516A61E18692D4FB00DB66E8602B827B1AF45B94F804536DD5CFFBA5EF2CE645C300
    APIs
    • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF667366708
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF667366730
    • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00007FF667366763
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667366839
      • Part of subcall function 00007FF6673627E0: DeviceIoControl.KERNEL32 ref: 00007FF667362848
      • Part of subcall function 00007FF667362880: DeviceIoControl.KERNEL32 ref: 00007FF667362903
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF667362926
      • Part of subcall function 00007FF667362880: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362936
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_W@std@@@std@@$ControlDeviceV01@@$AddressHandleModuleProc_invalid_parameter_noinfo_noreturn
    • String ID: NtAddAtom$[-] FAILED!: The code was already hooked!! another instance of kdmapper running?!$[-] Failed to get export ntdll.NtAddAtom$[-] Failed to get export ntoskrnl.NtAddAtom$[-] Failed to load ntdll.dll$ntdll.dll
    • API String ID: 368370636-2622504768
    • Opcode ID: 3fec9d493ada84cb4297804ef8d2f4951bff63eda7d5f7ec7d82c214cec2d980
    • Instruction ID: a0be62ef8a1fd86e149e46839c5a8575e17bd8d82f87985422898db38ed64dc3
    • Opcode Fuzzy Hash: 3fec9d493ada84cb4297804ef8d2f4951bff63eda7d5f7ec7d82c214cec2d980
    • Instruction Fuzzy Hash: F5515A61E08A92D4FB00DB66E8602B82775AB45BD4F404135DD5DFFA9AEF3CE645C310
    APIs
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736CAED
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736CB26
      • Part of subcall function 00007FF667366260: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E0
      • Part of subcall function 00007FF667366260: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E7
      • Part of subcall function 00007FF667366260: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663F4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@_V01@@$?setstate@?$basic_ios@_?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@U?$char_traits@
    • String ID: [+] Fixing stack cookie$[+] Load config directory wasn't found, probably StackCookie not defined, fix cookie skipped$[+] StackCookie not defined, fix cookie skipped$[-] StackCookie already fixed!? this probably wrong
    • API String ID: 3392577530-4185774449
    • Opcode ID: 119d1a7f2ce1b52c047562b3e4f240a8331c9d7a6ca3e0cc265bb6ff5394e7aa
    • Instruction ID: 3e52b1329ae2c7d25f8914843e133b0349393bada56d324da9769dae08058965
    • Opcode Fuzzy Hash: 119d1a7f2ce1b52c047562b3e4f240a8331c9d7a6ca3e0cc265bb6ff5394e7aa
    • Instruction Fuzzy Hash: 15312D25B19B42C2EB44DB16E9A40642371BF88B84F846135DA4DABB24EF7CF655C700
    APIs
      • Part of subcall function 00007FF667369D90: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667369E99
    • _CxxThrowException.VCRUNTIME140 ref: 00007FF66736A513
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF66736A570
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF66736A57E
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z.MSVCP140 ref: 00007FF66736A551
      • Part of subcall function 00007FF667366260: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673662F4
      • Part of subcall function 00007FF667366260: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF66736634E
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736A5A3
      • Part of subcall function 00007FF667366260: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E0
      • Part of subcall function 00007FF667366260: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E7
      • Part of subcall function 00007FF667366260: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663F4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: U?$char_traits@_W@std@@@std@@$V01@$??6?$basic_ostream@_$D@std@@@std@@U?$char_traits@$?flush@?$basic_ostream@?setstate@?$basic_ios@_?sputc@?$basic_streambuf@_?uncaught_exception@std@@ExceptionOsfx@?$basic_ostream@ThrowV01@@V12@V21@@Vios_base@1@_invalid_parameter_noinfo_noreturn
    • String ID: by 0x$[!!] Crash$[!!] Crash at addr 0x$exists
    • API String ID: 2277563936-3783130642
    • Opcode ID: 535a1234e0204e77f2ef34367f67c725e831e19f87e0402f4d4628cd6423aad2
    • Instruction ID: 653c8a9dc6509b6bef9f80e8bfaf15ba5903a8600d6087eee1c4e806073cf9f4
    • Opcode Fuzzy Hash: 535a1234e0204e77f2ef34367f67c725e831e19f87e0402f4d4628cd6423aad2
    • Instruction Fuzzy Hash: 0D218061A19A4AD1EE55DB26E8702B52331FF84B84F409131EA4DEF665EF6CF284C700
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: memcpy$__std_fs_convert_wide_to_narrow$Concurrency::cancel_current_taskXlength_error@std@@__std_fs_code_page_invalid_parameter_noinfo_noreturn
    • String ID: vector too long
    • API String ID: 3691590088-2873823879
    • Opcode ID: 64dd0da5c6c718c10fab4fc3bf8a8a2f09032a453412b0b66b556e69621a75d1
    • Instruction ID: 772d9c35436fd35b3b109e7fbd7f78dd83d9a32680ef46ab037f59b464cb164e
    • Opcode Fuzzy Hash: 64dd0da5c6c718c10fab4fc3bf8a8a2f09032a453412b0b66b556e69621a75d1
    • Instruction Fuzzy Hash: 9C71E222B08A85C5EA249F27E510269A7B1FB44BD0F544231EFADAFBD5DF7CE1818704
    APIs
    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF667366503
    • ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF66736653A
    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF6673665A8
    • ?widen@?$ctype@_W@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF6673665F8
    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF667366606
    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF667366639
    • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF667366689
    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF667366690
    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF66736669D
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: U?$char_traits@_W@std@@@std@@$?sputc@?$basic_streambuf@_$D@std@@@std@@U?$char_traits@$?flush@?$basic_ostream@?getloc@ios_base@std@@?setstate@?$basic_ios@_?uncaught_exception@std@@?widen@?$ctype@_Osfx@?$basic_ostream@V12@Vlocale@2@W@std@@
    • String ID:
    • API String ID: 2222884580-0
    • Opcode ID: e77928c5753ed680b28fef293076735a46cca9beb7c00ed2b32deb3eff45dfaf
    • Instruction ID: bf56d6830126e0ea8ef97510e773dc179d294704e8e621f2deadd911804ad37b
    • Opcode Fuzzy Hash: e77928c5753ed680b28fef293076735a46cca9beb7c00ed2b32deb3eff45dfaf
    • Instruction Fuzzy Hash: 81615B62A09A81C2EB218F1AE5A4239A7B0FB85FD5F148531CE4E9B7A4DF3ED545C300
    APIs
    • __std_fs_code_page.MSVCPRT ref: 00007FF667369F1C
      • Part of subcall function 00007FF66736F8D0: ___lc_codepage_func.API-MS-WIN-CRT-LOCALE-L1-1-0(?,?,?,?,00007FF66736BAD6), ref: 00007FF66736F8D4
      • Part of subcall function 00007FF66736F8D0: AreFileApisANSI.KERNEL32(?,?,?,?,00007FF66736BAD6), ref: 00007FF66736F8E3
    • memcpy.VCRUNTIME140 ref: 00007FF667369FEC
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736A0D7
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736A11C
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736A16A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn$ApisFile___lc_codepage_func__std_fs_code_pagememcpy
    • String ID: ", "$: "
    • API String ID: 2077005984-747220369
    • Opcode ID: 0a6a4b3a9adcd80266947c47bd89dbf9618c69305a6b470e113da48a37139e51
    • Instruction ID: 3767a28a570d22a9a15a29dcbbd27d641247ac7c9cd45661d6c576f6349f71c7
    • Opcode Fuzzy Hash: 0a6a4b3a9adcd80266947c47bd89dbf9618c69305a6b470e113da48a37139e51
    • Instruction Fuzzy Hash: 9A81BD72B04B51C5EB04DF66E4643AC2372EB48B88F005531DE5EABB99DF38D291C344
    APIs
    • GetShellWindow.USER32 ref: 00007FF66736A7EB
    • GetWindowThreadProcessId.USER32 ref: 00007FF66736A7F9
      • Part of subcall function 00007FF66736A700: GetCurrentProcessId.KERNEL32 ref: 00007FF66736A726
      • Part of subcall function 00007FF66736A700: CreateToolhelp32Snapshot.KERNEL32 ref: 00007FF66736A733
      • Part of subcall function 00007FF66736A700: memset.VCRUNTIME140 ref: 00007FF66736A754
      • Part of subcall function 00007FF66736A700: Process32FirstW.KERNEL32 ref: 00007FF66736A769
      • Part of subcall function 00007FF66736A700: Process32NextW.KERNEL32 ref: 00007FF66736A781
      • Part of subcall function 00007FF66736A700: CloseHandle.KERNEL32 ref: 00007FF66736A796
      • Part of subcall function 00007FF667366260: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E0
      • Part of subcall function 00007FF667366260: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E7
      • Part of subcall function 00007FF667366260: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663F4
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736A827
      • Part of subcall function 00007FF667366260: ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673662F4
      • Part of subcall function 00007FF667366260: ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF66736634E
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736A84A
    • ?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736A857
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: U?$char_traits@_V01@W@std@@@std@@$D@std@@@std@@U?$char_traits@$??6?$basic_ostream@_ProcessProcess32V01@@Window$?flush@?$basic_ostream@?get@?$basic_istream@?setstate@?$basic_ios@_?sputc@?$basic_streambuf@_?uncaught_exception@std@@CloseCreateCurrentFirstHandleNextOsfx@?$basic_ostream@ShellSnapshotThreadToolhelp32V12@memset
    • String ID: [+] Pausing to allow for debugging$[+] Press enter to close
    • API String ID: 2421931184-3552938800
    • Opcode ID: d799bcc2c641e56387cb5b05c0a9e70f9737d20a39f1af464e7d864c7a967c66
    • Instruction ID: f1720edeb02facb1450f55901e02dfd1da4230e81a00679ae4a0f67f1f75e5e4
    • Opcode Fuzzy Hash: d799bcc2c641e56387cb5b05c0a9e70f9737d20a39f1af464e7d864c7a967c66
    • Instruction Fuzzy Hash: D101E561A1CA06C2FA50EB12E9B50792370FF88B94F801135D94EEE335EE2CF2498B04
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: Virtual$Free$AllocControlDevice_invalid_parameter_noinfo_noreturn_stricmpmemset
    • String ID:
    • API String ID: 2498276250-0
    • Opcode ID: 66b3e47e2253705823354aa73bcccda996f8792d3160eedf610dc4bdda25e3ed
    • Instruction ID: 501cdc0090b48a74984672384f51de00ee605371ea63af70a073d8785f15543e
    • Opcode Fuzzy Hash: 66b3e47e2253705823354aa73bcccda996f8792d3160eedf610dc4bdda25e3ed
    • Instruction Fuzzy Hash: 2181D362B08A45C6EB60DB26E86036963B2FB857D4F004231DE5DABB99DF3CE181C700
    APIs
    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736F4D8
    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736F500
    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736F546
    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736F570
    • ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736F590
    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736F5DE
    • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736F632
    • ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736F67A
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$?sgetc@?$basic_streambuf@$?sbumpc@?$basic_streambuf@
    • String ID:
    • API String ID: 2679766405-0
    • Opcode ID: 83025bd7b9ae019ff96d57ff895ab50cb2d4f39cd8efc2b9ac4daaf6003c9158
    • Instruction ID: 0c58da626ee0fbd4ab11fb2b4bde76bca0ba0d7529956be030f3eec84969944d
    • Opcode Fuzzy Hash: 83025bd7b9ae019ff96d57ff895ab50cb2d4f39cd8efc2b9ac4daaf6003c9158
    • Instruction Fuzzy Hash: 1961E42290D7C3C1EA258F26A5601396AB0AF11758F188535CFAD9F691DF3CEAA8C700
    APIs
      • Part of subcall function 00007FF66736F220: NtQuerySystemInformation.NTDLL ref: 00007FF66736F250
      • Part of subcall function 00007FF66736F220: VirtualFree.KERNEL32 ref: 00007FF66736F270
      • Part of subcall function 00007FF66736F220: VirtualAlloc.KERNEL32 ref: 00007FF66736F286
      • Part of subcall function 00007FF66736F220: NtQuerySystemInformation.NTDLL ref: 00007FF66736F2A1
      • Part of subcall function 00007FF66736F220: VirtualFree.KERNEL32 ref: 00007FF66736F2C2
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736CD09
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF66736CD64
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736CE79
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$Virtual$??6?$basic_ostream@_FreeInformationQuerySystemU?$char_traits@_V01@@W@std@@@std@@$Alloc_invalid_parameter_noinfo_noreturn
    • String ID: wasn't found$[-] Dependency $[-] Failed to resolve import
    • API String ID: 4161254548-3042260135
    • Opcode ID: 0925f29cc72eec34a0ff72f6e2f61871d9bfd0b3e1c8f3396de838dbbfb4f2f0
    • Instruction ID: c420a2a825ba1a251c4cf452f4c0595611628cd9a1e0f24c80a747cb2734d00f
    • Opcode Fuzzy Hash: 0925f29cc72eec34a0ff72f6e2f61871d9bfd0b3e1c8f3396de838dbbfb4f2f0
    • Instruction Fuzzy Hash: 2B61DF62A1AB42C1EE08DB13E5641B86371AF49BC0F515536DE1DAF395EF3CF2818340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 1775671525-0
    • Opcode ID: cb7b4f10e26dee5128991d942973fbc3bfcb92a9b5f8e060f3fb3f666126e786
    • Instruction ID: a7dd31ac08eea6c000c8609c8eef390568b7aa3e60709481b2d47c02f9f209cb
    • Opcode Fuzzy Hash: cb7b4f10e26dee5128991d942973fbc3bfcb92a9b5f8e060f3fb3f666126e786
    • Instruction Fuzzy Hash: 43519032A04B81D1EA10AB26D5682A82370FB59BA4F544A35DB6C9B3D1DF3CF2A5C345
    APIs
    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6673690B5
    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF667369116
    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF667369144
    • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF667369166
    • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6673691AD
    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6673691B4
    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6673691C1
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
    • String ID:
    • API String ID: 2558415004-0
    • Opcode ID: f5842ea8b05c013ede3a4686ef5de30cbbc8f17b4fe7c7b699e31dca6ef38b2d
    • Instruction ID: 010d575b9d78b6dec895eff3995b674b87435eea2dd43392bf62f19808646055
    • Opcode Fuzzy Hash: f5842ea8b05c013ede3a4686ef5de30cbbc8f17b4fe7c7b699e31dca6ef38b2d
    • Instruction Fuzzy Hash: 7C516572608A41C5EB20CF1AE5A4239A7B0FB85F85F258439CE4E9B764CF3DD546C340
    APIs
    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF66736D293
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF66736D2E7
    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF66736D30E
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF66736D336
    • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF66736D37C
    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF66736D383
    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF66736D390
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@U?$char_traits@_V12@W@std@@@std@@
    • String ID:
    • API String ID: 1696915518-0
    • Opcode ID: 5ec0a2693dc774f7ca45a3de31a3a17a0356bab5e3fa53e9ccc4ffb754c3d16b
    • Instruction ID: 0b7b86043cd4998b1e513833af8e0050d0d099d6565458b02e865429660b65a9
    • Opcode Fuzzy Hash: 5ec0a2693dc774f7ca45a3de31a3a17a0356bab5e3fa53e9ccc4ffb754c3d16b
    • Instruction Fuzzy Hash: 72515122618A45C1EF618F1AE5A0238A7B1FB85F95F35C635CE5E9B7A0CF3ED5468300
    APIs
    • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF66736D56F
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF66736D5C6
    • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF66736D5F3
    • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF66736D616
    • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF66736D65C
    • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF66736D663
    • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF66736D670
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@U?$char_traits@_V12@W@std@@@std@@
    • String ID:
    • API String ID: 1696915518-0
    • Opcode ID: f4ca5e86a5bc9f66354cfb4c9ce41e81ff872464d18b4223a737d3866f68204c
    • Instruction ID: f617cf3778960b3075f10c838e041632abd574877295ee80d107035060ea3e77
    • Opcode Fuzzy Hash: f4ca5e86a5bc9f66354cfb4c9ce41e81ff872464d18b4223a737d3866f68204c
    • Instruction Fuzzy Hash: 31515E22618A45C1EF608F1AE5A0238A7B0EB85F95F758535CF4E9BBA4CF3DD542C304
    APIs
    • memset.VCRUNTIME140 ref: 00007FF66736EF91
    • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF66736EFB0
    • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF66736EFCF
    • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF66736F00D
    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF66736F02D
    • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF66736F076
      • Part of subcall function 00007FF66736F490: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736F4D8
      • Part of subcall function 00007FF66736F490: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736F500
      • Part of subcall function 00007FF66736F490: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736F546
      • Part of subcall function 00007FF66736F490: ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF66736F5DE
      • Part of subcall function 00007FF667365EE0: fclose.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF667365F43
      • Part of subcall function 00007FF667365EE0: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF667365F5F
    • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?), ref: 00007FF66736F124
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: U?$char_traits@$D@std@@@std@@$?sgetc@?$basic_streambuf@$?setstate@?$basic_ios@_Init@?$basic_streambuf@U?$char_traits@_W@std@@@std@@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@D@std@@@1@_V?$basic_streambuf@fclosememset
    • String ID:
    • API String ID: 3541683867-0
    • Opcode ID: b440af641cabfaf063f76f4877d2c8caeba461419372ae639d3a866274d0b941
    • Instruction ID: 07a1a23209ce9e3c7eb1deff85823f702c5805154c14eef157f24fededae1c2b
    • Opcode Fuzzy Hash: b440af641cabfaf063f76f4877d2c8caeba461419372ae639d3a866274d0b941
    • Instruction Fuzzy Hash: 38517032618B85C6EB10CF25E4902AEB7B0FB85758F444536EA8D97B68DF7CE505CB00
    APIs
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(00007FF6673644AE,00000000,?,?,00000000,00007FF667363B67), ref: 00007FF667364200
      • Part of subcall function 00007FF6673700B0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00007FF6673661AE), ref: 00007FF6673700CA
    • memset.VCRUNTIME140(00007FF6673644AE,00000000,?,?,00000000,00007FF667363B67), ref: 00007FF667364232
      • Part of subcall function 00007FF6673627E0: DeviceIoControl.KERNEL32 ref: 00007FF667362848
      • Part of subcall function 00007FF667366260: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E0
      • Part of subcall function 00007FF667366260: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E7
      • Part of subcall function 00007FF667366260: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663F4
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(00007FF6673644AE,00000000,?,?,00000000,00007FF667363B67), ref: 00007FF66736426E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@_V01@@$?setstate@?$basic_ios@_?uncaught_exception@std@@ControlD@std@@@std@@DeviceOsfx@?$basic_ostream@U?$char_traits@mallocmemset
    • String ID: [-] Can't find pattern, Too big section$[-] No module address to find pattern$[-] Read failed in FindPatternAtKernel
    • API String ID: 3199127221-2370303861
    • Opcode ID: a5b15031b568e83adb44dbd77ee795a1e81541a5821a5e36bd780176e67dd98c
    • Instruction ID: f55f4c872213fc5200ade56d7a06dcb89452f85896e57c056f5942bea9f174d2
    • Opcode Fuzzy Hash: a5b15031b568e83adb44dbd77ee795a1e81541a5821a5e36bd780176e67dd98c
    • Instruction Fuzzy Hash: 9C41C051E1C69AC4FA50DB23A8302B967B2AF48BD0F954131DE4DAF796DE3CE7458304
    APIs
    • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66736606A), ref: 00007FF6673686ED
    • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66736606A), ref: 00007FF667368707
    • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66736606A), ref: 00007FF667368739
    • ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66736606A), ref: 00007FF667368764
    • std::_Facet_Register.LIBCPMT ref: 00007FF66736877D
    • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF66736606A), ref: 00007FF66736879C
    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6673687C7
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$ctype@_Getgloballocale@locale@std@@Locimp@12@RegisterV42@@Vfacet@locale@2@W@std@@std::_
    • String ID:
    • API String ID: 3972169111-0
    • Opcode ID: 1455c883d76591fc276e9e02a1d90c742c4438e208f5989aa16e13b846b562ef
    • Instruction ID: 6c953023ce55a1fd1db19c1ca856edad23d6d51c2e3aa219f93b278f21209449
    • Opcode Fuzzy Hash: 1455c883d76591fc276e9e02a1d90c742c4438e208f5989aa16e13b846b562ef
    • Instruction Fuzzy Hash: 08317026A08B46C1EB54CF12E8601A97770FB88BD4F480631DB9DAB7A5CF3CE581C700
    APIs
    • ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF66736606A), ref: 00007FF6673685DD
    • ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF66736606A), ref: 00007FF6673685F7
    • ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF66736606A), ref: 00007FF667368629
    • ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF66736606A), ref: 00007FF667368654
    • std::_Facet_Register.LIBCPMT ref: 00007FF66736866D
    • ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF66736606A), ref: 00007FF66736868C
    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6673686B7
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
    • String ID:
    • API String ID: 762505753-0
    • Opcode ID: 55813dc35775508b1fa826b9b8463ae929d5cf02014b1989c443db391dc86a28
    • Instruction ID: 4b083f9c1e4c92fb751ec198ae7f55e4ef72319f4cc1f0cc9627d182b0409640
    • Opcode Fuzzy Hash: 55813dc35775508b1fa826b9b8463ae929d5cf02014b1989c443db391dc86a28
    • Instruction Fuzzy Hash: 4F318F62A08B46C1EB54DF12E4601A97370FB8CB94F480631DB9EABBA9DF3CE551C704
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: fgetc
    • String ID:
    • API String ID: 2807381905-0
    • Opcode ID: 61ec44058c4cd3d8dd3c4fffd9a272c7328883b7f716a20a89009a361ef52dd4
    • Instruction ID: 96693d74de8aabc808ce3f00d144d4fc1b0375e12cfa6a5464fb199440427afb
    • Opcode Fuzzy Hash: 61ec44058c4cd3d8dd3c4fffd9a272c7328883b7f716a20a89009a361ef52dd4
    • Instruction Fuzzy Hash: 3D818B72B05A41D9EB00CF66D4A02AC37B1FB48768F945632DB1EA7B99DF38D695C300
    APIs
    • ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF667365FCA
    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF667365FE7
    • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF667366010
    • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF66736605B
      • Part of subcall function 00007FF6673685B0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF66736606A), ref: 00007FF6673685DD
      • Part of subcall function 00007FF6673685B0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF66736606A), ref: 00007FF6673685F7
      • Part of subcall function 00007FF6673685B0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF66736606A), ref: 00007FF667368629
      • Part of subcall function 00007FF6673685B0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140(?,?,?,?,?,?,00000000,00007FF66736606A), ref: 00007FF667368654
      • Part of subcall function 00007FF6673685B0: std::_Facet_Register.LIBCPMT ref: 00007FF66736866D
      • Part of subcall function 00007FF6673685B0: ??1_Lockit@std@@QEAA@XZ.MSVCP140(?,?,?,?,?,?,00000000,00007FF66736606A), ref: 00007FF66736868C
    • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF667366070
    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF667366087
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: D@std@@@std@@U?$char_traits@$Init@?$basic_streambuf@Lockit@std@@$??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@Bid@locale@std@@Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterU_iobuf@@V42@@Vfacet@locale@2@Vlocale@2@_get_stream_buffer_pointersstd::_
    • String ID:
    • API String ID: 3911317180-0
    • Opcode ID: f45ff3f6b93f247a59edc750639a9470ae7e35f1fcf175b5cfe22a50c44a8090
    • Instruction ID: 0477aa2c47044d56e68fc7f1624a3acd4e155bbb4009d3fdf839b29beb8f0bf8
    • Opcode Fuzzy Hash: f45ff3f6b93f247a59edc750639a9470ae7e35f1fcf175b5cfe22a50c44a8090
    • Instruction Fuzzy Hash: 3C313632619B41C2EB50DF26A92426973B4FB48F88F041039DA8E9BB58EF3DD544C740
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
    • String ID: gfffffff
    • API String ID: 1155477157-1523873471
    • Opcode ID: f6edf330ca5ca30059f15d38455b2e6e2e6911fa1b94adfe8bdb8e9572dd240a
    • Instruction ID: 244177b2e629fd54c4730a86165eab5557ac2569496feb4e0b7223f3a61d7ec3
    • Opcode Fuzzy Hash: f6edf330ca5ca30059f15d38455b2e6e2e6911fa1b94adfe8bdb8e9572dd240a
    • Instruction Fuzzy Hash: DE51CDB2B14B8AC2DE14DB26D9641A963F1FB88BC4F408536DE4D5B789DF3CE2958300
    APIs
    • ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,00007FF66736F808,?,?,?,00007FF66736F672), ref: 00007FF66736BA9B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: Xlength_error@std@@
    • String ID: MmAllocatePagesForMdl$[!] Failed to find MmAlocatePagesForMdl$[-] Can't allocate pages for mdl$vector too long
    • API String ID: 1004598685-1127084285
    • Opcode ID: 2c5294f61749c6ed12f9d09fd890bea2904c1101e62972038d5a794ec4fecf14
    • Instruction ID: c07fbc8274eb3f1ce51c409bf4a36eed813acfc2c29114f60a4465136528a3b9
    • Opcode Fuzzy Hash: 2c5294f61749c6ed12f9d09fd890bea2904c1101e62972038d5a794ec4fecf14
    • Instruction Fuzzy Hash: E3B00270915849D1E544DB11EDE506413345B54711F904535C10DA5574DE1CB5D78705
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturnmemcpy$Concurrency::cancel_current_task
    • String ID:
    • API String ID: 621473597-0
    • Opcode ID: b7f63f3848a9eda8fa38444eb648b3e468b5ad83cce1f8edb1aa24f103f144b2
    • Instruction ID: 0494d27d4d3733f3bc8f6bf2bfed6d1fd95d7a7475c8bf8524139043e96fa0e0
    • Opcode Fuzzy Hash: b7f63f3848a9eda8fa38444eb648b3e468b5ad83cce1f8edb1aa24f103f144b2
    • Instruction Fuzzy Hash: A8510462B0A781C4EE14DB27E5243A8A371EB09BE4F584631CBAD9B7C5DF7CE1918304
    APIs
    • ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ.MSVCP140 ref: 00007FF6673658A8
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: D@std@@@std@@Pninc@?$basic_streambuf@U?$char_traits@
    • String ID:
    • API String ID: 3551493264-0
    • Opcode ID: 047d4b8e94dd60f6427977f98b60e465b347fcc8b00cdb505f53d951d95db41d
    • Instruction ID: 4b10f0cb22e72e9e82698032e9579ce492e6be01c046a0b44f3c6e001e6a12ce
    • Opcode Fuzzy Hash: 047d4b8e94dd60f6427977f98b60e465b347fcc8b00cdb505f53d951d95db41d
    • Instruction Fuzzy Hash: B3415032709B82C5EB108B29E46036E73B4FB85BA4F544136DA9D9B7A9EF38D585C700
    APIs
    • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF667365AF3
    • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF667365B12
    • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF667365B44
    • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF667365B60
      • Part of subcall function 00007FF667365F90: ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF667365FCA
      • Part of subcall function 00007FF667365F90: ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF667365FE7
      • Part of subcall function 00007FF667365F90: _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF667366010
      • Part of subcall function 00007FF667365F90: ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF66736605B
      • Part of subcall function 00007FF667365F90: ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF667366070
    • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF667365BAA
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@_D@std@@@1@_Fiopen@std@@U?$char_traits@_U_iobuf@@V?$basic_streambuf@Vlocale@2@W@std@@@std@@_get_stream_buffer_pointers
    • String ID:
    • API String ID: 3167182450-0
    • Opcode ID: ba74e8258644c3f4ba068952e4ce57b1c4bf1eb57d395062d2def3a3f7fdcbd8
    • Instruction ID: b29e616acac74aa0ec3c6fbd4a4d489e7833e388b982a42f91e0bdd9570ad8cf
    • Opcode Fuzzy Hash: ba74e8258644c3f4ba068952e4ce57b1c4bf1eb57d395062d2def3a3f7fdcbd8
    • Instruction Fuzzy Hash: FE212732605B41C6EB50CF29F56472977B4FB89B88F048131CA8D97724DF3DE1058B44
    APIs
      • Part of subcall function 00007FF6673627E0: DeviceIoControl.KERNEL32 ref: 00007FF667362848
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(00000000,?,?,00000000,00007FF667363B67), ref: 00007FF66736439C
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(00000000,?,?,00000000,00007FF667363B67), ref: 00007FF667364469
      • Part of subcall function 00007FF667366260: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E0
      • Part of subcall function 00007FF667366260: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663E7
      • Part of subcall function 00007FF667366260: ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,00007FF66736154C), ref: 00007FF6673663F4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@_V01@@$?setstate@?$basic_ios@_?uncaught_exception@std@@ControlD@std@@@std@@DeviceOsfx@?$basic_ostream@U?$char_traits@
    • String ID: [-] Can't find section$[-] Can't read module headers
    • API String ID: 376834646-471806993
    • Opcode ID: 46807fa1b466cf5d27ac0d7d1ab7a7363cf5286f44af8c965e4c0010cec98fd9
    • Instruction ID: b10b22a90334b098d329ef54e0b731213d4c646256496684b7a23b4eedf36342
    • Opcode Fuzzy Hash: 46807fa1b466cf5d27ac0d7d1ab7a7363cf5286f44af8c965e4c0010cec98fd9
    • Instruction Fuzzy Hash: D5419572A09AC2C1EA10CB16E4601BA63B4FF45BD4F444235EE9DAB798DF7CE255C700
    APIs
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667363A6C
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667363ABE
      • Part of subcall function 00007FF667368380: GetModuleHandleA.KERNEL32 ref: 00007FF6673683C5
      • Part of subcall function 00007FF667368380: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6673683ED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_V01@@W@std@@@std@@$HandleModule_invalid_parameter_noinfo_noreturn
    • String ID: RtlLookupElementGenericTableAvl$[!] Failed to find RtlLookupElementGenericTableAvl
    • API String ID: 4059861771-1952825546
    • Opcode ID: 82cf0fd250cbaa2920a9bdd8c940fd86b4df535274d1999f57af125dd1d579a7
    • Instruction ID: a06ae3134c4f77da5b247fed8de9e28e3a485e15b41a94acfc7621fdae04120a
    • Opcode Fuzzy Hash: 82cf0fd250cbaa2920a9bdd8c940fd86b4df535274d1999f57af125dd1d579a7
    • Instruction Fuzzy Hash: 31418262A1CB86D2EA10DF26E460369A370FB85790F501235EA9DDBBD5DF7CE144CB00
    APIs
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,-0000000A,00007FF667363D52), ref: 00007FF6673637A0
      • Part of subcall function 00007FF66736FFA0: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF66736708F), ref: 00007FF66736FFB0
      • Part of subcall function 00007FF6673660D0: memcpy.VCRUNTIME140 ref: 00007FF667366101
      • Part of subcall function 00007FF667362FB0: memset.VCRUNTIME140 ref: 00007FF66736300A
      • Part of subcall function 00007FF667362FB0: VirtualAlloc.KERNEL32 ref: 00007FF6673630A9
      • Part of subcall function 00007FF667362FB0: VirtualFree.KERNEL32 ref: 00007FF6673630E0
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF667363760
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@Virtual$??6?$basic_ostream@_AllocCriticalEnterFreeSectionU?$char_traits@_V01@@W@std@@@std@@_invalid_parameter_noinfo_noreturnmemcpymemset
    • String ID: ExAcquireResourceExclusiveLite$[!] Failed to find ExAcquireResourceExclusiveLite
    • API String ID: 3663098849-2131800721
    • Opcode ID: 887cbdd1a3081a804e17c0299c65e203f8458d149b7f00593a1d163f9d0a08cd
    • Instruction ID: ea3165e8b9ae40ac8c0d721d7996b5424b3f53058b10c8fa8ee3dbdb018d91ba
    • Opcode Fuzzy Hash: 887cbdd1a3081a804e17c0299c65e203f8458d149b7f00593a1d163f9d0a08cd
    • Instruction Fuzzy Hash: 233181B1A1CA42D1EA50DB26F9603796371AF857E0F405131E65DEFBA6EE7CE284C700
    APIs
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF667362CF8
      • Part of subcall function 00007FF66736FFA0: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF66736708F), ref: 00007FF66736FFB0
      • Part of subcall function 00007FF6673660D0: memcpy.VCRUNTIME140 ref: 00007FF667366101
      • Part of subcall function 00007FF667362FB0: memset.VCRUNTIME140 ref: 00007FF66736300A
      • Part of subcall function 00007FF667362FB0: VirtualAlloc.KERNEL32 ref: 00007FF6673630A9
      • Part of subcall function 00007FF667362FB0: VirtualFree.KERNEL32 ref: 00007FF6673630E0
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF667362CB8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@Virtual$??6?$basic_ostream@_AllocCriticalEnterFreeSectionU?$char_traits@_V01@@W@std@@@std@@_invalid_parameter_noinfo_noreturnmemcpymemset
    • String ID: MmUnmapLockedPages$[!] Failed to find MmUnmapLockedPages
    • API String ID: 3663098849-2848997145
    • Opcode ID: 2634cfcc20b9850ddd5d598bede792e8ed12be9122a38ff57198395de4790ca7
    • Instruction ID: 58fb4a250f51b3fb4403b96386400826c36883a4e559d38507fc8a9b1512ac28
    • Opcode Fuzzy Hash: 2634cfcc20b9850ddd5d598bede792e8ed12be9122a38ff57198395de4790ca7
    • Instruction Fuzzy Hash: D331A672A18A46D1EA10DB16F8603692371AF84BE0F401131EA5DEFB95EF3CE584C700
    APIs
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF66736BE3C), ref: 00007FF667362F82
      • Part of subcall function 00007FF66736FFA0: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF66736708F), ref: 00007FF66736FFB0
      • Part of subcall function 00007FF6673660D0: memcpy.VCRUNTIME140 ref: 00007FF667366101
      • Part of subcall function 00007FF667362FB0: memset.VCRUNTIME140 ref: 00007FF66736300A
      • Part of subcall function 00007FF667362FB0: VirtualAlloc.KERNEL32 ref: 00007FF6673630A9
      • Part of subcall function 00007FF667362FB0: VirtualFree.KERNEL32 ref: 00007FF6673630E0
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00007FF66736BE3C), ref: 00007FF667362F40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@Virtual$??6?$basic_ostream@_AllocCriticalEnterFreeSectionU?$char_traits@_V01@@W@std@@@std@@_invalid_parameter_noinfo_noreturnmemcpymemset
    • String ID: ExFreePool$[!] Failed to find ExAllocatePool
    • API String ID: 3663098849-3091510598
    • Opcode ID: cbd3235423878d68549747824a181f698f0a4e05e09ad4a0383578c5c1cd946d
    • Instruction ID: 6e2c0f51d797366b7ede0398e0e0fe166b9f0ff9a352ee76834209e1b7e7f35d
    • Opcode Fuzzy Hash: cbd3235423878d68549747824a181f698f0a4e05e09ad4a0383578c5c1cd946d
    • Instruction Fuzzy Hash: AA319E61A0DA46E1EE10DB16F9602796375BF847D0F404231EA9DEFBA6EF3CE6408700
    APIs
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF66736BE31), ref: 00007FF667362E37
      • Part of subcall function 00007FF66736FFA0: EnterCriticalSection.KERNEL32(?,?,00000000,00007FF66736708F), ref: 00007FF66736FFB0
      • Part of subcall function 00007FF6673660D0: memcpy.VCRUNTIME140 ref: 00007FF667366101
      • Part of subcall function 00007FF667362FB0: memset.VCRUNTIME140 ref: 00007FF66736300A
      • Part of subcall function 00007FF667362FB0: VirtualAlloc.KERNEL32 ref: 00007FF6673630A9
      • Part of subcall function 00007FF667362FB0: VirtualFree.KERNEL32 ref: 00007FF6673630E0
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,00007FF66736BE31), ref: 00007FF667362DF7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@Virtual$??6?$basic_ostream@_AllocCriticalEnterFreeSectionU?$char_traits@_V01@@W@std@@@std@@_invalid_parameter_noinfo_noreturnmemcpymemset
    • String ID: MmFreePagesFromMdl$[!] Failed to find MmFreePagesFromMdl
    • API String ID: 3663098849-1029121595
    • Opcode ID: 793d0ce5824efa901dae09877a5f25384ef1e47cf3b41f159a3ede0084faa407
    • Instruction ID: f1c1f762ff7e7ba46546140f7c17e4daac1f950942cbc8798e49a3682eb7e555
    • Opcode Fuzzy Hash: 793d0ce5824efa901dae09877a5f25384ef1e47cf3b41f159a3ede0084faa407
    • Instruction Fuzzy Hash: 77317571A0CA42D1EA10DB16F96037963B1FF84794F415231E69DEB7A5DE3CE694C700
    APIs
      • Part of subcall function 00007FF667364320: ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140(00000000,?,?,00000000,00007FF667363B67), ref: 00007FF66736439C
    • ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF667362B51
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: V01@$??6?$basic_ostream@_U?$char_traits@_V01@@W@std@@@std@@
    • String ID: PAGE$[!] Failed to find MmFreeIndependentPages$xxxxxxxxx????xxxxxxx
    • API String ID: 302930070-3730907401
    • Opcode ID: 2e524db7402ccccccec1bf18dfb0146a85c470eb90c20110a5108008e21500d1
    • Instruction ID: 4967d6d6f4591db9a74c6f7c293eab798d937d5bbf6ba5098219e5f2c134088e
    • Opcode Fuzzy Hash: 2e524db7402ccccccec1bf18dfb0146a85c470eb90c20110a5108008e21500d1
    • Instruction Fuzzy Hash: D8213961A18B42D1EA00CF12E9A07B563B4FF88784F811135EA8EAF765DF7CE245C740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy__std_exception_destroy
    • String ID:
    • API String ID: 2138705365-0
    • Opcode ID: 493b706f516ae84df4b5478a5c742185c21df3b43785bedc8f4f6859583b16f9
    • Instruction ID: 37531f34d3f647d5fcc76e11017900e95b4c10429f3e67151eab98dc512729d5
    • Opcode Fuzzy Hash: 493b706f516ae84df4b5478a5c742185c21df3b43785bedc8f4f6859583b16f9
    • Instruction Fuzzy Hash: 8381BF72604A85D1EB04CF2AE4A836C2376FB44F88F908036D74D5B66ADF79D9D4C340
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
    • String ID:
    • API String ID: 1155477157-0
    • Opcode ID: 71607f1d556e088dd11d655bbba62e82d4fc23a91cc1b010c831f17a59419ccb
    • Instruction ID: 7c0fb28dc0fb6573960a0df19d3e5a4020ee3d7fea142e3f0073b8fbd1901c2c
    • Opcode Fuzzy Hash: 71607f1d556e088dd11d655bbba62e82d4fc23a91cc1b010c831f17a59419ccb
    • Instruction Fuzzy Hash: 64411272B09A89C5EE18DB67D5642386271AB04FE4F144630CE2DAB7D6EE3CE5828301
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
    • String ID:
    • API String ID: 1155477157-0
    • Opcode ID: 2105ef64bd8c2709b0877f5f345279e0cb74be18507c369e4501b6cae12024c2
    • Instruction ID: a25aa0e7f2c4da6e4bbe011828a7a268f026e6c93aab346a99d00da916fbda15
    • Opcode Fuzzy Hash: 2105ef64bd8c2709b0877f5f345279e0cb74be18507c369e4501b6cae12024c2
    • Instruction Fuzzy Hash: 4D41FD72B08B42C1EA109B23A5641A9A3B5EB0ABF4F540731DE7D9BBD5EE3CE151C304
    APIs
    • memcpy.VCRUNTIME140(?,?,?,00007FF66736F672), ref: 00007FF66736F783
    • memcpy.VCRUNTIME140(?,?,?,00007FF66736F672), ref: 00007FF66736F796
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF66736F672), ref: 00007FF66736F7FC
      • Part of subcall function 00007FF6673700B0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,00007FF6673661AE), ref: 00007FF6673700CA
    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF66736F809
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
    • String ID:
    • API String ID: 1155477157-0
    • Opcode ID: 79702250229d4f11bbe9b27d259316ebdb0cd84ea214da641715860fab525b69
    • Instruction ID: 6200022758fcf399c95cc1eb6cb839c41b8d68de6d8be7487bc8ba6082db1cac
    • Opcode Fuzzy Hash: 79702250229d4f11bbe9b27d259316ebdb0cd84ea214da641715860fab525b69
    • Instruction Fuzzy Hash: E441D162719B8AC5ED14DF27D1642B9A7A1AB04BD0F248531EBAD9B7D5DE3CE240C300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 1775671525-0
    • Opcode ID: 301210f45aa0c2a89f331fa54ccdb207e425740bf550326a3284023867a91a6b
    • Instruction ID: 6f8404c91b6a34990ecf2d6e5588c1b35f0b95065ca0e3781419d5248bb7e958
    • Opcode Fuzzy Hash: 301210f45aa0c2a89f331fa54ccdb207e425740bf550326a3284023867a91a6b
    • Instruction Fuzzy Hash: CF31E571B09645C4EE249F17A52427CA372AB08BF0F580735DA7D9F7D5DE7CE1418204
    APIs
    • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF667369F56), ref: 00007FF66736B6FA
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF667369F56), ref: 00007FF66736B72E
    • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00007FF667369F56), ref: 00007FF66736B738
    • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF66736B75B
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
    • String ID:
    • API String ID: 1775671525-0
    • Opcode ID: c61de400fb73a06a11d061661f365d8bb49d412696654f8ef0c51e24c3d5ed98
    • Instruction ID: 3439c624e0f7e3d3abf9ebc3b12a9a8e06d6ba99931b019b3d43baa50937a148
    • Opcode Fuzzy Hash: c61de400fb73a06a11d061661f365d8bb49d412696654f8ef0c51e24c3d5ed98
    • Instruction Fuzzy Hash: 3231B271B19741C5EE249F17A5242B8A371AF04BE0F680731EB6D9F7D5DE3CE1518604
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
    • String ID:
    • API String ID: 1155477157-0
    • Opcode ID: b4015fddf09147aaab7c03480a9f974cb24aaec6581656856fa90672ee1efeb8
    • Instruction ID: 630207ab9c313057b3e6a0d2599d582b37a8f53d89e15d9197f36373d06dc805
    • Opcode Fuzzy Hash: b4015fddf09147aaab7c03480a9f974cb24aaec6581656856fa90672ee1efeb8
    • Instruction Fuzzy Hash: 4931AC32B0AA45D0EA24DB12A4202B962A1AB48BF4F584B31DB7DDF7D0DE3CE1558300
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: ByteCharErrorLastMultiWide
    • String ID:
    • API String ID: 203985260-0
    • Opcode ID: 7e20026105950b9a8a8157f3b8ca2520a27d39f809ec044d8ec0fb3d82313544
    • Instruction ID: fec6dd1091fdd6eb5b2b1780f478df8e0ff69b5316951147341287e2f4232369
    • Opcode Fuzzy Hash: 7e20026105950b9a8a8157f3b8ca2520a27d39f809ec044d8ec0fb3d82313544
    • Instruction Fuzzy Hash: 80215B76A18B86C7E3208F16E85432EB6B4FB89B94F140139DB88A7B58DF3CD5458F04
    APIs
    • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF66736E58D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1672807010.00007FF667361000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF667360000, based on PE: true
    • Associated: 00000000.00000002.1672791823.00007FF667360000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672823126.00007FF667372000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672841161.00007FF667384000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1672856140.00007FF667385000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff667360000_KrMhCpCNtm.jbxd
    Similarity
    • API ID: _invalid_parameter_noinfo_noreturn
    • String ID: gfffffff$gfffffff
    • API String ID: 3668304517-161084747
    • Opcode ID: 37f5fb826b2345107f2ec240f921a2a54887c14404dff841389612428914b1b7
    • Instruction ID: cc172782dc03e5ac520751c074f4a1b89aa2dbe08942b8405d0500a0cc9f6608
    • Opcode Fuzzy Hash: 37f5fb826b2345107f2ec240f921a2a54887c14404dff841389612428914b1b7
    • Instruction Fuzzy Hash: 2581ABB2A04B8982DE10CF26F8542A973A1F758BC4F549236DF8D9B755EF38E294C301